@@ -247,8 +247,7 @@ |
||
247 | 247 | return new JSONResponse($e->getReturnMessage(), Http::STATUS_BAD_REQUEST); |
248 | 248 | } catch (AuthenticationFailedException $e) { |
249 | 249 | return new JSONResponse(["message" => "RESOURCE_NOT_FOUND"], Http::STATUS_FORBIDDEN); |
250 | - } |
|
251 | - catch (\Exception $e) { |
|
250 | + } catch (\Exception $e) { |
|
252 | 251 | return new JSONResponse( |
253 | 252 | ['message' => 'Internal error at ' . $this->urlGenerator->getBaseUrl()], |
254 | 253 | Http::STATUS_BAD_REQUEST |
@@ -18,14 +18,20 @@ discard block |
||
18 | 18 | |
19 | 19 | <p> |
20 | 20 | <input type="checkbox" name="outgoing_server2server_share_enabled" id="outgoingServer2serverShareEnabled" class="checkbox" |
21 | - value="1" <?php if ($_['outgoingServer2serverShareEnabled']) print_unescaped('checked="checked"'); ?> /> |
|
21 | + value="1" <?php if ($_['outgoingServer2serverShareEnabled']) { |
|
22 | + print_unescaped('checked="checked"'); |
|
23 | +} |
|
24 | +?> /> |
|
22 | 25 | <label for="outgoingServer2serverShareEnabled"> |
23 | 26 | <?php p($l->t('Allow users on this server to send shares to other servers'));?> |
24 | 27 | </label> |
25 | 28 | </p> |
26 | 29 | <p> |
27 | 30 | <input type="checkbox" name="incoming_server2server_share_enabled" id="incomingServer2serverShareEnabled" class="checkbox" |
28 | - value="1" <?php if ($_['incomingServer2serverShareEnabled']) print_unescaped('checked="checked"'); ?> /> |
|
31 | + value="1" <?php if ($_['incomingServer2serverShareEnabled']) { |
|
32 | + print_unescaped('checked="checked"'); |
|
33 | +} |
|
34 | +?> /> |
|
29 | 35 | <label for="incomingServer2serverShareEnabled"> |
30 | 36 | <?php p($l->t('Allow users on this server to receive shares from other servers'));?> |
31 | 37 | </label><br/> |
@@ -33,14 +39,20 @@ discard block |
||
33 | 39 | <?php if($_['federatedGroupSharingSupported']): ?> |
34 | 40 | <p> |
35 | 41 | <input type="checkbox" name="outgoing_server2server_group_share_enabled" id="outgoingServer2serverGroupShareEnabled" class="checkbox" |
36 | - value="1" <?php if ($_['outgoingServer2serverGroupShareEnabled']) print_unescaped('checked="checked"'); ?> /> |
|
42 | + value="1" <?php if ($_['outgoingServer2serverGroupShareEnabled']) { |
|
43 | + print_unescaped('checked="checked"'); |
|
44 | +} |
|
45 | +?> /> |
|
37 | 46 | <label for="outgoingServer2serverGroupShareEnabled"> |
38 | 47 | <?php p($l->t('Allow users on this server to send shares to groups on other servers'));?> |
39 | 48 | </label> |
40 | 49 | </p> |
41 | 50 | <p> |
42 | 51 | <input type="checkbox" name="incoming_server2server_group_share_enabled" id="incomingServer2serverGroupShareEnabled" class="checkbox" |
43 | - value="1" <?php if ($_['incomingServer2serverGroupShareEnabled']) print_unescaped('checked="checked"'); ?> /> |
|
52 | + value="1" <?php if ($_['incomingServer2serverGroupShareEnabled']) { |
|
53 | + print_unescaped('checked="checked"'); |
|
54 | +} |
|
55 | +?> /> |
|
44 | 56 | <label for="incomingServer2serverGroupShareEnabled"> |
45 | 57 | <?php p($l->t('Allow users on this server to receive group shares from other servers'));?> |
46 | 58 | </label><br/> |
@@ -48,14 +60,20 @@ discard block |
||
48 | 60 | <?php endif; ?> |
49 | 61 | <p> |
50 | 62 | <input type="checkbox" name="lookupServerEnabled" id="lookupServerEnabled" class="checkbox" |
51 | - value="1" <?php if ($_['lookupServerEnabled']) print_unescaped('checked="checked"'); ?> /> |
|
63 | + value="1" <?php if ($_['lookupServerEnabled']) { |
|
64 | + print_unescaped('checked="checked"'); |
|
65 | +} |
|
66 | +?> /> |
|
52 | 67 | <label for="lookupServerEnabled"> |
53 | 68 | <?php p($l->t('Search global and public address book for users'));?> |
54 | 69 | </label><br/> |
55 | 70 | </p> |
56 | 71 | <p> |
57 | 72 | <input type="checkbox" name="lookupServerUploadEnabled" id="lookupServerUploadEnabled" class="checkbox" |
58 | - value="1" <?php if ($_['lookupServerUploadEnabled']) print_unescaped('checked="checked"'); ?> /> |
|
73 | + value="1" <?php if ($_['lookupServerUploadEnabled']) { |
|
74 | + print_unescaped('checked="checked"'); |
|
75 | +} |
|
76 | +?> /> |
|
59 | 77 | <label for="lookupServerUploadEnabled"> |
60 | 78 | <?php p($l->t('Allow users to publish their data to a global and public address book'));?> |
61 | 79 | </label><br/> |
@@ -226,7 +226,7 @@ |
||
226 | 226 | if ($share->getSharedWith() === null) { |
227 | 227 | throw new \InvalidArgumentException('SharedWith should not be empty'); |
228 | 228 | } |
229 | - } else if ($share->getShareType() === \OCP\Share::SHARE_TYPE_REMOTE_GROUP) { |
|
229 | + } else if ($share->getShareType() === \OCP\Share::SHARE_TYPE_REMOTE_GROUP) { |
|
230 | 230 | if ($share->getSharedWith() === null) { |
231 | 231 | throw new \InvalidArgumentException('SharedWith should not be empty'); |
232 | 232 | } |
@@ -96,7 +96,10 @@ discard block |
||
96 | 96 | <form data-can-create="<?php echo $canCreateMounts?'true':'false' ?>" id="files_external" class="section" data-encryption-enabled="<?php echo $_['encryptionEnabled']?'true': 'false'; ?>"> |
97 | 97 | <h2 data-anchor-name="external-storage"><?php p($l->t('External storages')); ?></h2> |
98 | 98 | <p class="settings-hint"><?php p($l->t('External storage enables you to mount external storage services and devices as secondary Nextcloud storage devices. You may also allow users to mount their own external storage services.')); ?></p> |
99 | - <?php if (isset($_['dependencies']) and ($_['dependencies'] !== '') and $canCreateMounts) print_unescaped(''.$_['dependencies'].''); ?> |
|
99 | + <?php if (isset($_['dependencies']) and ($_['dependencies'] !== '') and $canCreateMounts) { |
|
100 | + print_unescaped(''.$_['dependencies'].''); |
|
101 | +} |
|
102 | +?> |
|
100 | 103 | <table id="externalStorage" class="grid" data-admin='<?php print_unescaped(json_encode($_['visibilityType'] === BackendService::VISIBILITY_ADMIN)); ?>'> |
101 | 104 | <thead> |
102 | 105 | <tr> |
@@ -105,7 +108,10 @@ discard block |
||
105 | 108 | <th><?php p($l->t('External storage')); ?></th> |
106 | 109 | <th><?php p($l->t('Authentication')); ?></th> |
107 | 110 | <th><?php p($l->t('Configuration')); ?></th> |
108 | - <?php if ($_['visibilityType'] === BackendService::VISIBILITY_ADMIN) print_unescaped('<th>'.$l->t('Available for').'</th>'); ?> |
|
111 | + <?php if ($_['visibilityType'] === BackendService::VISIBILITY_ADMIN) { |
|
112 | + print_unescaped('<th>'.$l->t('Available for').'</th>'); |
|
113 | +} |
|
114 | +?> |
|
109 | 115 | <th> </th> |
110 | 116 | <th> </th> |
111 | 117 | <th> </th> |
@@ -138,7 +144,10 @@ discard block |
||
138 | 144 | }); |
139 | 145 | ?> |
140 | 146 | <?php foreach ($sortedBackends as $backend): ?> |
141 | - <?php if ($backend->getDeprecateTo()) continue; // ignore deprecated backends ?> |
|
147 | + <?php if ($backend->getDeprecateTo()) { |
|
148 | + continue; |
|
149 | +} |
|
150 | +// ignore deprecated backends ?> |
|
142 | 151 | <option value="<?php p($backend->getIdentifier()); ?>"><?php p($backend->getText()); ?></option> |
143 | 152 | <?php endforeach; ?> |
144 | 153 | </select> |
@@ -163,7 +172,10 @@ discard block |
||
163 | 172 | |
164 | 173 | <?php if ($_['visibilityType'] === BackendService::VISIBILITY_ADMIN): ?> |
165 | 174 | <input type="checkbox" name="allowUserMounting" id="allowUserMounting" class="checkbox" |
166 | - value="1" <?php if ($_['allowUserMounting']) print_unescaped(' checked="checked"'); ?> /> |
|
175 | + value="1" <?php if ($_['allowUserMounting']) { |
|
176 | + print_unescaped(' checked="checked"'); |
|
177 | +} |
|
178 | +?> /> |
|
167 | 179 | <label for="allowUserMounting"><?php p($l->t('Allow users to mount external storage')); ?></label> <span id="userMountingMsg" class="msg"></span> |
168 | 180 | |
169 | 181 | <p id="userMountingBackends"<?php if (!$_['allowUserMounting']): ?> class="hidden"<?php endif; ?>> |
@@ -175,8 +187,14 @@ discard block |
||
175 | 187 | <?php $i = 0; foreach ($userBackends as $backend): ?> |
176 | 188 | <?php if ($deprecateTo = $backend->getDeprecateTo()): ?> |
177 | 189 | <input type="hidden" id="allowUserMountingBackends<?php p($i); ?>" name="allowUserMountingBackends[]" value="<?php p($backend->getIdentifier()); ?>" data-deprecate-to="<?php p($deprecateTo->getIdentifier()); ?>" /> |
178 | - <?php else: ?> |
|
179 | - <input type="checkbox" id="allowUserMountingBackends<?php p($i); ?>" class="checkbox" name="allowUserMountingBackends[]" value="<?php p($backend->getIdentifier()); ?>" <?php if ($backend->isVisibleFor(BackendService::VISIBILITY_PERSONAL)) print_unescaped(' checked="checked"'); ?> /> |
|
190 | + <?php else { |
|
191 | + : ?> |
|
192 | + <input type="checkbox" id="allowUserMountingBackends<?php p($i); |
|
193 | +} |
|
194 | +?>" class="checkbox" name="allowUserMountingBackends[]" value="<?php p($backend->getIdentifier()); ?>" <?php if ($backend->isVisibleFor(BackendService::VISIBILITY_PERSONAL)) { |
|
195 | + print_unescaped(' checked="checked"'); |
|
196 | +} |
|
197 | +?> /> |
|
180 | 198 | <label for="allowUserMountingBackends<?php p($i); ?>"><?php p($backend->getText()); ?></label> <br /> |
181 | 199 | <?php endif; ?> |
182 | 200 | <?php $i++; ?> |
@@ -71,11 +71,17 @@ discard block |
||
71 | 71 | </select> |
72 | 72 | |
73 | 73 | <label id="mail_smtpsecure_label" for="mail_smtpsecure" |
74 | - <?php if ($_['mail_smtpmode'] !== 'smtp') print_unescaped(' class="hidden"'); ?>> |
|
74 | + <?php if ($_['mail_smtpmode'] !== 'smtp') { |
|
75 | + print_unescaped(' class="hidden"'); |
|
76 | +} |
|
77 | +?>> |
|
75 | 78 | <?php p($l->t('Encryption')); ?> |
76 | 79 | </label> |
77 | 80 | <select name="mail_smtpsecure" id="mail_smtpsecure" |
78 | - <?php if ($_['mail_smtpmode'] !== 'smtp') print_unescaped(' class="hidden"'); ?>> |
|
81 | + <?php if ($_['mail_smtpmode'] !== 'smtp') { |
|
82 | + print_unescaped(' class="hidden"'); |
|
83 | +} |
|
84 | +?>> |
|
79 | 85 | <?php foreach ($mail_smtpsecure as $secure => $name): |
80 | 86 | $selected = ''; |
81 | 87 | if ($secure == $_['mail_smtpsecure']): |
@@ -94,7 +100,10 @@ discard block |
||
94 | 100 | value="<?php p($_['mail_domain']) ?>" /> |
95 | 101 | </p> |
96 | 102 | |
97 | - <p id="setting_smtpauth" <?php if ($_['mail_smtpmode'] !== 'smtp') print_unescaped(' class="hidden"'); ?>> |
|
103 | + <p id="setting_smtpauth" <?php if ($_['mail_smtpmode'] !== 'smtp') { |
|
104 | + print_unescaped(' class="hidden"'); |
|
105 | +} |
|
106 | +?>> |
|
98 | 107 | <label for="mail_smtpauthtype"><?php p($l->t('Authentication method')); ?></label> |
99 | 108 | <select name="mail_smtpauthtype" id="mail_smtpauthtype"> |
100 | 109 | <?php foreach ($mail_smtpauthtype as $authtype => $name): |
@@ -107,11 +116,17 @@ discard block |
||
107 | 116 | </select> |
108 | 117 | |
109 | 118 | <input type="checkbox" name="mail_smtpauth" id="mail_smtpauth" class="checkbox" value="1" |
110 | - <?php if ($_['mail_smtpauth']) print_unescaped('checked="checked"'); ?> /> |
|
119 | + <?php if ($_['mail_smtpauth']) { |
|
120 | + print_unescaped('checked="checked"'); |
|
121 | +} |
|
122 | +?> /> |
|
111 | 123 | <label for="mail_smtpauth"><?php p($l->t('Authentication required')); ?></label> |
112 | 124 | </p> |
113 | 125 | |
114 | - <p id="setting_smtphost" <?php if ($_['mail_smtpmode'] !== 'smtp') print_unescaped(' class="hidden"'); ?>> |
|
126 | + <p id="setting_smtphost" <?php if ($_['mail_smtpmode'] !== 'smtp') { |
|
127 | + print_unescaped(' class="hidden"'); |
|
128 | +} |
|
129 | +?>> |
|
115 | 130 | <label for="mail_smtphost"><?php p($l->t('Server address')); ?></label> |
116 | 131 | <input type="text" name="mail_smtphost" id="mail_smtphost" placeholder="smtp.example.com" |
117 | 132 | value="<?php p($_['mail_smtphost']) ?>" /> |
@@ -121,7 +136,10 @@ discard block |
||
121 | 136 | </p> |
122 | 137 | </form> |
123 | 138 | <form class="mail_settings" id="mail_credentials_settings"> |
124 | - <p id="mail_credentials" <?php if (!$_['mail_smtpauth'] || $_['mail_smtpmode'] !== 'smtp') print_unescaped(' class="hidden"'); ?>> |
|
139 | + <p id="mail_credentials" <?php if (!$_['mail_smtpauth'] || $_['mail_smtpmode'] !== 'smtp') { |
|
140 | + print_unescaped(' class="hidden"'); |
|
141 | +} |
|
142 | +?>> |
|
125 | 143 | <label for="mail_smtpname"><?php p($l->t('Credentials')); ?></label> |
126 | 144 | <input type="text" name="mail_smtpname" id="mail_smtpname" placeholder="<?php p($l->t('SMTP Username'))?>" |
127 | 145 | value="<?php p($_['mail_smtpname']) ?>" /> |
@@ -14,10 +14,13 @@ |
||
14 | 14 | ?> |
15 | 15 | <?php if (isset($_['content'])): ?> |
16 | 16 | <?php print_unescaped($_['content']) ?> |
17 | -<?php else: ?> |
|
17 | +<?php else { |
|
18 | + : ?> |
|
18 | 19 | <div class="body-login-container update"> |
19 | 20 | <div class="icon-big icon-search icon-white"></div> |
20 | - <h2><?php p($l->t('File not found')); ?></h2> |
|
21 | + <h2><?php p($l->t('File not found')); |
|
22 | +} |
|
23 | +?></h2> |
|
21 | 24 | <p class="infogroup"><?php p($l->t('The document could not be found on the server. Maybe the share was deleted or has expired?')); ?></p> |
22 | 25 | <p><a class="button primary" href="<?php p(\OC::$server->getURLGenerator()->linkTo('', 'index.php')) ?>"> |
23 | 26 | <?php p($l->t('Back to %s', array($theme->getName()))); ?> |
@@ -16,11 +16,15 @@ discard block |
||
16 | 16 | <p> |
17 | 17 | <?php if (is_null($_['backupProvider'])): ?> |
18 | 18 | <strong><?php p($l->t('Two-factor authentication is enforced but has not been configured on your account. Contact your admin for assistance.')) ?></strong> |
19 | - <?php else: ?> |
|
19 | + <?php else { |
|
20 | + : ?> |
|
20 | 21 | <strong><?php p($l->t('Two-factor authentication is enforced but has not been configured on your account. Use one of your backup codes to log in or contact your admin for assistance.')) ?></strong> |
21 | - <?php endif; ?> |
|
22 | + <?php endif; |
|
23 | +} |
|
24 | +?> |
|
22 | 25 | </p> |
23 | - <?php else: ?> |
|
26 | + <?php else { |
|
27 | + : ?> |
|
24 | 28 | <ul> |
25 | 29 | <?php foreach ($_['providers'] as $provider): ?> |
26 | 30 | <li> |
@@ -34,6 +38,7 @@ discard block |
||
34 | 38 | <?php |
35 | 39 | if ($provider instanceof \OCP\Authentication\TwoFactorAuth\IProvidesIcons) { |
36 | 40 | $icon = $provider->getLightIcon(); |
41 | +} |
|
37 | 42 | } else { |
38 | 43 | $icon = image_path('core', 'actions/password-white.svg'); |
39 | 44 | } |
@@ -50,7 +55,8 @@ discard block |
||
50 | 55 | <?php endif ?> |
51 | 56 | <?php if (!is_null($_['backupProvider'])): ?> |
52 | 57 | <p> |
53 | - <a class="<?php if($noProviders): ?>button primary two-factor-primary<?php else: ?>two-factor-secondary<?php endif ?>" href="<?php p(\OC::$server->getURLGenerator()->linkToRoute('core.TwoFactorChallenge.showChallenge', |
|
58 | + <a class="<?php if($noProviders): ?>button primary two-factor-primary<?php else { |
|
59 | + : ?>two-factor-secondary<?php endif ?>" href="<?php p(\OC::$server->getURLGenerator()->linkToRoute('core.TwoFactorChallenge.showChallenge', |
|
54 | 60 | [ |
55 | 61 | 'challengeProviderId' => $_['backupProvider']->getId(), |
56 | 62 | 'redirect_url' => $_['redirect_url'], |
@@ -59,7 +65,9 @@ discard block |
||
59 | 65 | <?php p($l->t('Use backup code')) ?> |
60 | 66 | </a> |
61 | 67 | </p> |
62 | - <?php endif; ?> |
|
68 | + <?php endif; |
|
69 | +} |
|
70 | +?> |
|
63 | 71 | <p><a class="two-factor-secondary" href="<?php print_unescaped($_['logout_url']); ?>"> |
64 | 72 | <?php p($l->t('Cancel log in')) ?> |
65 | 73 | </a></p> |
@@ -35,7 +35,10 @@ discard block |
||
35 | 35 | <p id="enable"> |
36 | 36 | <input type="checkbox" |
37 | 37 | id="enableEncryption" class="checkbox" |
38 | - value="1" <?php if ($_['encryptionEnabled']) print_unescaped('checked="checked" disabled="disabled"'); ?> /> |
|
38 | + value="1" <?php if ($_['encryptionEnabled']) { |
|
39 | + print_unescaped('checked="checked" disabled="disabled"'); |
|
40 | +} |
|
41 | +?> /> |
|
39 | 42 | <label |
40 | 43 | for="enableEncryption"><?php p($l->t('Enable server-side encryption')); ?> <span id="startmigration_msg" class="msg"></span> </label><br/> |
41 | 44 | </p> |
@@ -54,8 +57,14 @@ discard block |
||
54 | 57 | value="<?php p($l->t("Enable encryption")); ?>" /></p> |
55 | 58 | </div> |
56 | 59 | |
57 | - <div id="EncryptionSettingsArea" class="<?php if (!$_['encryptionEnabled']) p('hidden'); ?>"> |
|
58 | - <div id='selectEncryptionModules' class="<?php if (!$_['encryptionReady']) p('hidden'); ?>"> |
|
60 | + <div id="EncryptionSettingsArea" class="<?php if (!$_['encryptionEnabled']) { |
|
61 | + p('hidden'); |
|
62 | +} |
|
63 | +?>"> |
|
64 | + <div id='selectEncryptionModules' class="<?php if (!$_['encryptionReady']) { |
|
65 | + p('hidden'); |
|
66 | +} |
|
67 | +?>"> |
|
59 | 68 | <?php |
60 | 69 | if (empty($_['encryptionModules'])) { |
61 | 70 | p($l->t('No encryption module loaded, please enable an encryption module in the app menu.')); |
@@ -76,7 +85,10 @@ discard block |
||
76 | 85 | </fieldset> |
77 | 86 | <?php } ?> |
78 | 87 | </div> |
79 | - <div id="migrationWarning" class="<?php if ($_['encryptionReady']) p('hidden'); ?>"> |
|
88 | + <div id="migrationWarning" class="<?php if ($_['encryptionReady']) { |
|
89 | + p('hidden'); |
|
90 | +} |
|
91 | +?>"> |
|
80 | 92 | <?php |
81 | 93 | if ($_['encryptionReady'] === false && $_['externalBackendsEnabled'] === true) { |
82 | 94 | p($l->t('You need to migrate your encryption keys from the old encryption (ownCloud <= 8.0) to the new one. Please enable the "Default encryption module" and run \'occ encryption:migrate\'')); |
@@ -498,7 +498,7 @@ |
||
498 | 498 | |
499 | 499 | $share->setSharedWith($shareWith); |
500 | 500 | $share->setPermissions($permissions); |
501 | - } else if ($shareType === Share::SHARE_TYPE_REMOTE_GROUP) { |
|
501 | + } else if ($shareType === Share::SHARE_TYPE_REMOTE_GROUP) { |
|
502 | 502 | if (!$this->shareManager->outgoingServer2ServerGroupSharesAllowed()) { |
503 | 503 | throw new OCSForbiddenException($this->l->t('Sharing %1$s failed because the back end does not allow shares from type %2$s', [$path->getPath(), $shareType])); |
504 | 504 | } |