|
25 | 25 | use OCP\ISession; |
26 | 26 | use OCP\IURLGenerator; |
27 | 27 | use OCP\IUserSession; |
| 28 | +use OCP\Util; |
28 | 29 | use Psr\Log\LoggerInterface; |
29 | 30 |
|
30 | 31 | #[OpenAPI(scope: OpenAPI::SCOPE_IGNORE)] |
@@ -89,6 +90,7 @@ public function selectChallenge($redirect_url) { |
89 | 90 | 'logout_url' => $this->getLogoutUrl(), |
90 | 91 | 'hasSetupProviders' => !empty($setupProviders), |
91 | 92 | ]; |
| 93 | + Util::addScript('core', 'twofactor-request-token'); |
92 | 94 | return new StandaloneTemplateResponse($this->appName, 'twofactorselectchallenge', $data, 'guest'); |
93 | 95 | } |
94 | 96 |
|
@@ -141,6 +143,7 @@ public function showChallenge($challengeProviderId, $redirect_url) { |
141 | 143 | if ($provider instanceof IProvidesCustomCSP) { |
142 | 144 | $response->setContentSecurityPolicy($provider->getCSP()); |
143 | 145 | } |
| 146 | + Util::addScript('core', 'twofactor-request-token'); |
144 | 147 | return $response; |
145 | 148 | } |
146 | 149 |
|
@@ -204,6 +207,7 @@ public function setupProviders(?string $redirect_url = null): StandaloneTemplate |
204 | 207 | 'redirect_url' => $redirect_url, |
205 | 208 | ]; |
206 | 209 |
|
| 210 | + Util::addScript('core', 'twofactor-request-token'); |
207 | 211 | return new StandaloneTemplateResponse($this->appName, 'twofactorsetupselection', $data, 'guest'); |
208 | 212 | } |
209 | 213 |
|
@@ -235,6 +239,7 @@ public function setupProvider(string $providerId, ?string $redirect_url = null) |
235 | 239 | 'template' => $tmpl->fetchPage(), |
236 | 240 | ]; |
237 | 241 | $response = new StandaloneTemplateResponse($this->appName, 'twofactorsetupchallenge', $data, 'guest'); |
| 242 | + Util::addScript('core', 'twofactor-request-token'); |
238 | 243 | return $response; |
239 | 244 | } |
240 | 245 |
|
|
0 commit comments