@@ -247,8 +247,7 @@ |
||
| 247 | 247 | return new JSONResponse($e->getReturnMessage(), Http::STATUS_BAD_REQUEST); |
| 248 | 248 | } catch (AuthenticationFailedException $e) { |
| 249 | 249 | return new JSONResponse(["message" => "RESOURCE_NOT_FOUND"], Http::STATUS_FORBIDDEN); |
| 250 | - } |
|
| 251 | - catch (\Exception $e) { |
|
| 250 | + } catch (\Exception $e) { |
|
| 252 | 251 | return new JSONResponse( |
| 253 | 252 | ['message' => 'Internal error at ' . $this->urlGenerator->getBaseUrl()], |
| 254 | 253 | Http::STATUS_BAD_REQUEST |
@@ -18,14 +18,20 @@ discard block |
||
| 18 | 18 | |
| 19 | 19 | <p> |
| 20 | 20 | <input type="checkbox" name="outgoing_server2server_share_enabled" id="outgoingServer2serverShareEnabled" class="checkbox" |
| 21 | - value="1" <?php if ($_['outgoingServer2serverShareEnabled']) print_unescaped('checked="checked"'); ?> /> |
|
| 21 | + value="1" <?php if ($_['outgoingServer2serverShareEnabled']) { |
|
| 22 | + print_unescaped('checked="checked"'); |
|
| 23 | +} |
|
| 24 | +?> /> |
|
| 22 | 25 | <label for="outgoingServer2serverShareEnabled"> |
| 23 | 26 | <?php p($l->t('Allow users on this server to send shares to other servers'));?> |
| 24 | 27 | </label> |
| 25 | 28 | </p> |
| 26 | 29 | <p> |
| 27 | 30 | <input type="checkbox" name="incoming_server2server_share_enabled" id="incomingServer2serverShareEnabled" class="checkbox" |
| 28 | - value="1" <?php if ($_['incomingServer2serverShareEnabled']) print_unescaped('checked="checked"'); ?> /> |
|
| 31 | + value="1" <?php if ($_['incomingServer2serverShareEnabled']) { |
|
| 32 | + print_unescaped('checked="checked"'); |
|
| 33 | +} |
|
| 34 | +?> /> |
|
| 29 | 35 | <label for="incomingServer2serverShareEnabled"> |
| 30 | 36 | <?php p($l->t('Allow users on this server to receive shares from other servers'));?> |
| 31 | 37 | </label><br/> |
@@ -33,14 +39,20 @@ discard block |
||
| 33 | 39 | <?php if($_['federatedGroupSharingSupported']): ?> |
| 34 | 40 | <p> |
| 35 | 41 | <input type="checkbox" name="outgoing_server2server_group_share_enabled" id="outgoingServer2serverGroupShareEnabled" class="checkbox" |
| 36 | - value="1" <?php if ($_['outgoingServer2serverGroupShareEnabled']) print_unescaped('checked="checked"'); ?> /> |
|
| 42 | + value="1" <?php if ($_['outgoingServer2serverGroupShareEnabled']) { |
|
| 43 | + print_unescaped('checked="checked"'); |
|
| 44 | +} |
|
| 45 | +?> /> |
|
| 37 | 46 | <label for="outgoingServer2serverGroupShareEnabled"> |
| 38 | 47 | <?php p($l->t('Allow users on this server to send shares to groups on other servers'));?> |
| 39 | 48 | </label> |
| 40 | 49 | </p> |
| 41 | 50 | <p> |
| 42 | 51 | <input type="checkbox" name="incoming_server2server_group_share_enabled" id="incomingServer2serverGroupShareEnabled" class="checkbox" |
| 43 | - value="1" <?php if ($_['incomingServer2serverGroupShareEnabled']) print_unescaped('checked="checked"'); ?> /> |
|
| 52 | + value="1" <?php if ($_['incomingServer2serverGroupShareEnabled']) { |
|
| 53 | + print_unescaped('checked="checked"'); |
|
| 54 | +} |
|
| 55 | +?> /> |
|
| 44 | 56 | <label for="incomingServer2serverGroupShareEnabled"> |
| 45 | 57 | <?php p($l->t('Allow users on this server to receive group shares from other servers'));?> |
| 46 | 58 | </label><br/> |
@@ -48,14 +60,20 @@ discard block |
||
| 48 | 60 | <?php endif; ?> |
| 49 | 61 | <p> |
| 50 | 62 | <input type="checkbox" name="lookupServerEnabled" id="lookupServerEnabled" class="checkbox" |
| 51 | - value="1" <?php if ($_['lookupServerEnabled']) print_unescaped('checked="checked"'); ?> /> |
|
| 63 | + value="1" <?php if ($_['lookupServerEnabled']) { |
|
| 64 | + print_unescaped('checked="checked"'); |
|
| 65 | +} |
|
| 66 | +?> /> |
|
| 52 | 67 | <label for="lookupServerEnabled"> |
| 53 | 68 | <?php p($l->t('Search global and public address book for users'));?> |
| 54 | 69 | </label><br/> |
| 55 | 70 | </p> |
| 56 | 71 | <p> |
| 57 | 72 | <input type="checkbox" name="lookupServerUploadEnabled" id="lookupServerUploadEnabled" class="checkbox" |
| 58 | - value="1" <?php if ($_['lookupServerUploadEnabled']) print_unescaped('checked="checked"'); ?> /> |
|
| 73 | + value="1" <?php if ($_['lookupServerUploadEnabled']) { |
|
| 74 | + print_unescaped('checked="checked"'); |
|
| 75 | +} |
|
| 76 | +?> /> |
|
| 59 | 77 | <label for="lookupServerUploadEnabled"> |
| 60 | 78 | <?php p($l->t('Allow users to publish their data to a global and public address book'));?> |
| 61 | 79 | </label><br/> |
@@ -226,7 +226,7 @@ |
||
| 226 | 226 | if ($share->getSharedWith() === null) { |
| 227 | 227 | throw new \InvalidArgumentException('SharedWith should not be empty'); |
| 228 | 228 | } |
| 229 | - } else if ($share->getShareType() === \OCP\Share::SHARE_TYPE_REMOTE_GROUP) { |
|
| 229 | + } else if ($share->getShareType() === \OCP\Share::SHARE_TYPE_REMOTE_GROUP) { |
|
| 230 | 230 | if ($share->getSharedWith() === null) { |
| 231 | 231 | throw new \InvalidArgumentException('SharedWith should not be empty'); |
| 232 | 232 | } |
@@ -96,7 +96,10 @@ discard block |
||
| 96 | 96 | <form data-can-create="<?php echo $canCreateMounts?'true':'false' ?>" id="files_external" class="section" data-encryption-enabled="<?php echo $_['encryptionEnabled']?'true': 'false'; ?>"> |
| 97 | 97 | <h2 data-anchor-name="external-storage"><?php p($l->t('External storages')); ?></h2> |
| 98 | 98 | <p class="settings-hint"><?php p($l->t('External storage enables you to mount external storage services and devices as secondary Nextcloud storage devices. You may also allow users to mount their own external storage services.')); ?></p> |
| 99 | - <?php if (isset($_['dependencies']) and ($_['dependencies'] !== '') and $canCreateMounts) print_unescaped(''.$_['dependencies'].''); ?> |
|
| 99 | + <?php if (isset($_['dependencies']) and ($_['dependencies'] !== '') and $canCreateMounts) { |
|
| 100 | + print_unescaped(''.$_['dependencies'].''); |
|
| 101 | +} |
|
| 102 | +?> |
|
| 100 | 103 | <table id="externalStorage" class="grid" data-admin='<?php print_unescaped(json_encode($_['visibilityType'] === BackendService::VISIBILITY_ADMIN)); ?>'> |
| 101 | 104 | <thead> |
| 102 | 105 | <tr> |
@@ -105,7 +108,10 @@ discard block |
||
| 105 | 108 | <th><?php p($l->t('External storage')); ?></th> |
| 106 | 109 | <th><?php p($l->t('Authentication')); ?></th> |
| 107 | 110 | <th><?php p($l->t('Configuration')); ?></th> |
| 108 | - <?php if ($_['visibilityType'] === BackendService::VISIBILITY_ADMIN) print_unescaped('<th>'.$l->t('Available for').'</th>'); ?> |
|
| 111 | + <?php if ($_['visibilityType'] === BackendService::VISIBILITY_ADMIN) { |
|
| 112 | + print_unescaped('<th>'.$l->t('Available for').'</th>'); |
|
| 113 | +} |
|
| 114 | +?> |
|
| 109 | 115 | <th> </th> |
| 110 | 116 | <th> </th> |
| 111 | 117 | <th> </th> |
@@ -138,7 +144,10 @@ discard block |
||
| 138 | 144 | }); |
| 139 | 145 | ?> |
| 140 | 146 | <?php foreach ($sortedBackends as $backend): ?> |
| 141 | - <?php if ($backend->getDeprecateTo()) continue; // ignore deprecated backends ?> |
|
| 147 | + <?php if ($backend->getDeprecateTo()) { |
|
| 148 | + continue; |
|
| 149 | +} |
|
| 150 | +// ignore deprecated backends ?> |
|
| 142 | 151 | <option value="<?php p($backend->getIdentifier()); ?>"><?php p($backend->getText()); ?></option> |
| 143 | 152 | <?php endforeach; ?> |
| 144 | 153 | </select> |
@@ -163,7 +172,10 @@ discard block |
||
| 163 | 172 | |
| 164 | 173 | <?php if ($_['visibilityType'] === BackendService::VISIBILITY_ADMIN): ?> |
| 165 | 174 | <input type="checkbox" name="allowUserMounting" id="allowUserMounting" class="checkbox" |
| 166 | - value="1" <?php if ($_['allowUserMounting']) print_unescaped(' checked="checked"'); ?> /> |
|
| 175 | + value="1" <?php if ($_['allowUserMounting']) { |
|
| 176 | + print_unescaped(' checked="checked"'); |
|
| 177 | +} |
|
| 178 | +?> /> |
|
| 167 | 179 | <label for="allowUserMounting"><?php p($l->t('Allow users to mount external storage')); ?></label> <span id="userMountingMsg" class="msg"></span> |
| 168 | 180 | |
| 169 | 181 | <p id="userMountingBackends"<?php if (!$_['allowUserMounting']): ?> class="hidden"<?php endif; ?>> |
@@ -175,8 +187,14 @@ discard block |
||
| 175 | 187 | <?php $i = 0; foreach ($userBackends as $backend): ?> |
| 176 | 188 | <?php if ($deprecateTo = $backend->getDeprecateTo()): ?> |
| 177 | 189 | <input type="hidden" id="allowUserMountingBackends<?php p($i); ?>" name="allowUserMountingBackends[]" value="<?php p($backend->getIdentifier()); ?>" data-deprecate-to="<?php p($deprecateTo->getIdentifier()); ?>" /> |
| 178 | - <?php else: ?> |
|
| 179 | - <input type="checkbox" id="allowUserMountingBackends<?php p($i); ?>" class="checkbox" name="allowUserMountingBackends[]" value="<?php p($backend->getIdentifier()); ?>" <?php if ($backend->isVisibleFor(BackendService::VISIBILITY_PERSONAL)) print_unescaped(' checked="checked"'); ?> /> |
|
| 190 | + <?php else { |
|
| 191 | + : ?> |
|
| 192 | + <input type="checkbox" id="allowUserMountingBackends<?php p($i); |
|
| 193 | +} |
|
| 194 | +?>" class="checkbox" name="allowUserMountingBackends[]" value="<?php p($backend->getIdentifier()); ?>" <?php if ($backend->isVisibleFor(BackendService::VISIBILITY_PERSONAL)) { |
|
| 195 | + print_unescaped(' checked="checked"'); |
|
| 196 | +} |
|
| 197 | +?> /> |
|
| 180 | 198 | <label for="allowUserMountingBackends<?php p($i); ?>"><?php p($backend->getText()); ?></label> <br /> |
| 181 | 199 | <?php endif; ?> |
| 182 | 200 | <?php $i++; ?> |
@@ -71,11 +71,17 @@ discard block |
||
| 71 | 71 | </select> |
| 72 | 72 | |
| 73 | 73 | <label id="mail_smtpsecure_label" for="mail_smtpsecure" |
| 74 | - <?php if ($_['mail_smtpmode'] !== 'smtp') print_unescaped(' class="hidden"'); ?>> |
|
| 74 | + <?php if ($_['mail_smtpmode'] !== 'smtp') { |
|
| 75 | + print_unescaped(' class="hidden"'); |
|
| 76 | +} |
|
| 77 | +?>> |
|
| 75 | 78 | <?php p($l->t('Encryption')); ?> |
| 76 | 79 | </label> |
| 77 | 80 | <select name="mail_smtpsecure" id="mail_smtpsecure" |
| 78 | - <?php if ($_['mail_smtpmode'] !== 'smtp') print_unescaped(' class="hidden"'); ?>> |
|
| 81 | + <?php if ($_['mail_smtpmode'] !== 'smtp') { |
|
| 82 | + print_unescaped(' class="hidden"'); |
|
| 83 | +} |
|
| 84 | +?>> |
|
| 79 | 85 | <?php foreach ($mail_smtpsecure as $secure => $name): |
| 80 | 86 | $selected = ''; |
| 81 | 87 | if ($secure == $_['mail_smtpsecure']): |
@@ -94,7 +100,10 @@ discard block |
||
| 94 | 100 | value="<?php p($_['mail_domain']) ?>" /> |
| 95 | 101 | </p> |
| 96 | 102 | |
| 97 | - <p id="setting_smtpauth" <?php if ($_['mail_smtpmode'] !== 'smtp') print_unescaped(' class="hidden"'); ?>> |
|
| 103 | + <p id="setting_smtpauth" <?php if ($_['mail_smtpmode'] !== 'smtp') { |
|
| 104 | + print_unescaped(' class="hidden"'); |
|
| 105 | +} |
|
| 106 | +?>> |
|
| 98 | 107 | <label for="mail_smtpauthtype"><?php p($l->t('Authentication method')); ?></label> |
| 99 | 108 | <select name="mail_smtpauthtype" id="mail_smtpauthtype"> |
| 100 | 109 | <?php foreach ($mail_smtpauthtype as $authtype => $name): |
@@ -107,11 +116,17 @@ discard block |
||
| 107 | 116 | </select> |
| 108 | 117 | |
| 109 | 118 | <input type="checkbox" name="mail_smtpauth" id="mail_smtpauth" class="checkbox" value="1" |
| 110 | - <?php if ($_['mail_smtpauth']) print_unescaped('checked="checked"'); ?> /> |
|
| 119 | + <?php if ($_['mail_smtpauth']) { |
|
| 120 | + print_unescaped('checked="checked"'); |
|
| 121 | +} |
|
| 122 | +?> /> |
|
| 111 | 123 | <label for="mail_smtpauth"><?php p($l->t('Authentication required')); ?></label> |
| 112 | 124 | </p> |
| 113 | 125 | |
| 114 | - <p id="setting_smtphost" <?php if ($_['mail_smtpmode'] !== 'smtp') print_unescaped(' class="hidden"'); ?>> |
|
| 126 | + <p id="setting_smtphost" <?php if ($_['mail_smtpmode'] !== 'smtp') { |
|
| 127 | + print_unescaped(' class="hidden"'); |
|
| 128 | +} |
|
| 129 | +?>> |
|
| 115 | 130 | <label for="mail_smtphost"><?php p($l->t('Server address')); ?></label> |
| 116 | 131 | <input type="text" name="mail_smtphost" id="mail_smtphost" placeholder="smtp.example.com" |
| 117 | 132 | value="<?php p($_['mail_smtphost']) ?>" /> |
@@ -121,7 +136,10 @@ discard block |
||
| 121 | 136 | </p> |
| 122 | 137 | </form> |
| 123 | 138 | <form class="mail_settings" id="mail_credentials_settings"> |
| 124 | - <p id="mail_credentials" <?php if (!$_['mail_smtpauth'] || $_['mail_smtpmode'] !== 'smtp') print_unescaped(' class="hidden"'); ?>> |
|
| 139 | + <p id="mail_credentials" <?php if (!$_['mail_smtpauth'] || $_['mail_smtpmode'] !== 'smtp') { |
|
| 140 | + print_unescaped(' class="hidden"'); |
|
| 141 | +} |
|
| 142 | +?>> |
|
| 125 | 143 | <label for="mail_smtpname"><?php p($l->t('Credentials')); ?></label> |
| 126 | 144 | <input type="text" name="mail_smtpname" id="mail_smtpname" placeholder="<?php p($l->t('SMTP Username'))?>" |
| 127 | 145 | value="<?php p($_['mail_smtpname']) ?>" /> |
@@ -14,10 +14,13 @@ |
||
| 14 | 14 | ?> |
| 15 | 15 | <?php if (isset($_['content'])): ?> |
| 16 | 16 | <?php print_unescaped($_['content']) ?> |
| 17 | -<?php else: ?> |
|
| 17 | +<?php else { |
|
| 18 | + : ?> |
|
| 18 | 19 | <div class="body-login-container update"> |
| 19 | 20 | <div class="icon-big icon-search icon-white"></div> |
| 20 | - <h2><?php p($l->t('File not found')); ?></h2> |
|
| 21 | + <h2><?php p($l->t('File not found')); |
|
| 22 | +} |
|
| 23 | +?></h2> |
|
| 21 | 24 | <p class="infogroup"><?php p($l->t('The document could not be found on the server. Maybe the share was deleted or has expired?')); ?></p> |
| 22 | 25 | <p><a class="button primary" href="<?php p(\OC::$server->getURLGenerator()->linkTo('', 'index.php')) ?>"> |
| 23 | 26 | <?php p($l->t('Back to %s', array($theme->getName()))); ?> |
@@ -16,11 +16,15 @@ discard block |
||
| 16 | 16 | <p> |
| 17 | 17 | <?php if (is_null($_['backupProvider'])): ?> |
| 18 | 18 | <strong><?php p($l->t('Two-factor authentication is enforced but has not been configured on your account. Contact your admin for assistance.')) ?></strong> |
| 19 | - <?php else: ?> |
|
| 19 | + <?php else { |
|
| 20 | + : ?> |
|
| 20 | 21 | <strong><?php p($l->t('Two-factor authentication is enforced but has not been configured on your account. Use one of your backup codes to log in or contact your admin for assistance.')) ?></strong> |
| 21 | - <?php endif; ?> |
|
| 22 | + <?php endif; |
|
| 23 | +} |
|
| 24 | +?> |
|
| 22 | 25 | </p> |
| 23 | - <?php else: ?> |
|
| 26 | + <?php else { |
|
| 27 | + : ?> |
|
| 24 | 28 | <ul> |
| 25 | 29 | <?php foreach ($_['providers'] as $provider): ?> |
| 26 | 30 | <li> |
@@ -34,6 +38,7 @@ discard block |
||
| 34 | 38 | <?php |
| 35 | 39 | if ($provider instanceof \OCP\Authentication\TwoFactorAuth\IProvidesIcons) { |
| 36 | 40 | $icon = $provider->getLightIcon(); |
| 41 | +} |
|
| 37 | 42 | } else { |
| 38 | 43 | $icon = image_path('core', 'actions/password-white.svg'); |
| 39 | 44 | } |
@@ -50,7 +55,8 @@ discard block |
||
| 50 | 55 | <?php endif ?> |
| 51 | 56 | <?php if (!is_null($_['backupProvider'])): ?> |
| 52 | 57 | <p> |
| 53 | - <a class="<?php if($noProviders): ?>button primary two-factor-primary<?php else: ?>two-factor-secondary<?php endif ?>" href="<?php p(\OC::$server->getURLGenerator()->linkToRoute('core.TwoFactorChallenge.showChallenge', |
|
| 58 | + <a class="<?php if($noProviders): ?>button primary two-factor-primary<?php else { |
|
| 59 | + : ?>two-factor-secondary<?php endif ?>" href="<?php p(\OC::$server->getURLGenerator()->linkToRoute('core.TwoFactorChallenge.showChallenge', |
|
| 54 | 60 | [ |
| 55 | 61 | 'challengeProviderId' => $_['backupProvider']->getId(), |
| 56 | 62 | 'redirect_url' => $_['redirect_url'], |
@@ -59,7 +65,9 @@ discard block |
||
| 59 | 65 | <?php p($l->t('Use backup code')) ?> |
| 60 | 66 | </a> |
| 61 | 67 | </p> |
| 62 | - <?php endif; ?> |
|
| 68 | + <?php endif; |
|
| 69 | +} |
|
| 70 | +?> |
|
| 63 | 71 | <p><a class="two-factor-secondary" href="<?php print_unescaped($_['logout_url']); ?>"> |
| 64 | 72 | <?php p($l->t('Cancel log in')) ?> |
| 65 | 73 | </a></p> |
@@ -35,7 +35,10 @@ discard block |
||
| 35 | 35 | <p id="enable"> |
| 36 | 36 | <input type="checkbox" |
| 37 | 37 | id="enableEncryption" class="checkbox" |
| 38 | - value="1" <?php if ($_['encryptionEnabled']) print_unescaped('checked="checked" disabled="disabled"'); ?> /> |
|
| 38 | + value="1" <?php if ($_['encryptionEnabled']) { |
|
| 39 | + print_unescaped('checked="checked" disabled="disabled"'); |
|
| 40 | +} |
|
| 41 | +?> /> |
|
| 39 | 42 | <label |
| 40 | 43 | for="enableEncryption"><?php p($l->t('Enable server-side encryption')); ?> <span id="startmigration_msg" class="msg"></span> </label><br/> |
| 41 | 44 | </p> |
@@ -54,8 +57,14 @@ discard block |
||
| 54 | 57 | value="<?php p($l->t("Enable encryption")); ?>" /></p> |
| 55 | 58 | </div> |
| 56 | 59 | |
| 57 | - <div id="EncryptionSettingsArea" class="<?php if (!$_['encryptionEnabled']) p('hidden'); ?>"> |
|
| 58 | - <div id='selectEncryptionModules' class="<?php if (!$_['encryptionReady']) p('hidden'); ?>"> |
|
| 60 | + <div id="EncryptionSettingsArea" class="<?php if (!$_['encryptionEnabled']) { |
|
| 61 | + p('hidden'); |
|
| 62 | +} |
|
| 63 | +?>"> |
|
| 64 | + <div id='selectEncryptionModules' class="<?php if (!$_['encryptionReady']) { |
|
| 65 | + p('hidden'); |
|
| 66 | +} |
|
| 67 | +?>"> |
|
| 59 | 68 | <?php |
| 60 | 69 | if (empty($_['encryptionModules'])) { |
| 61 | 70 | p($l->t('No encryption module loaded, please enable an encryption module in the app menu.')); |
@@ -76,7 +85,10 @@ discard block |
||
| 76 | 85 | </fieldset> |
| 77 | 86 | <?php } ?> |
| 78 | 87 | </div> |
| 79 | - <div id="migrationWarning" class="<?php if ($_['encryptionReady']) p('hidden'); ?>"> |
|
| 88 | + <div id="migrationWarning" class="<?php if ($_['encryptionReady']) { |
|
| 89 | + p('hidden'); |
|
| 90 | +} |
|
| 91 | +?>"> |
|
| 80 | 92 | <?php |
| 81 | 93 | if ($_['encryptionReady'] === false && $_['externalBackendsEnabled'] === true) { |
| 82 | 94 | p($l->t('You need to migrate your encryption keys from the old encryption (ownCloud <= 8.0) to the new one. Please enable the "Default encryption module" and run \'occ encryption:migrate\'')); |
@@ -498,7 +498,7 @@ |
||
| 498 | 498 | |
| 499 | 499 | $share->setSharedWith($shareWith); |
| 500 | 500 | $share->setPermissions($permissions); |
| 501 | - } else if ($shareType === Share::SHARE_TYPE_REMOTE_GROUP) { |
|
| 501 | + } else if ($shareType === Share::SHARE_TYPE_REMOTE_GROUP) { |
|
| 502 | 502 | if (!$this->shareManager->outgoingServer2ServerGroupSharesAllowed()) { |
| 503 | 503 | throw new OCSForbiddenException($this->l->t('Sharing %1$s failed because the back end does not allow shares from type %2$s', [$path->getPath(), $shareType])); |
| 504 | 504 | } |