Commit 3a962a14 authored by Carsten  Rose's avatar Carsten Rose
Browse files

F4922 / Excel Import: remove PHPExcel, new PhpSpreadsheet. The lib is not part...

F4922 / Excel Import: remove PHPExcel, new PhpSpreadsheet. The lib is not part of QFQ Repo - to install locally, do: make Bootstrap
parent eeb0b047
Pipeline #667 passed with stage
in 1 minute and 33 seconds
/.python_virtualenv
/.plantuml_install
# Created by .ignore support plugin (hsz.mobi)
.python_virtualenv/
.virtual_env
.bowerpackages
.doc_plantuml
.idea
.npmpackages
.phpdocinstall
.plantuml
.plantuml_install
.python_virtualenv
.sonar_scanner
.support
.support_plantuml
.support_sonar
/bower_components
/composer.phar
/css
/dist/
/doc/*.pdf
/.doc_plantuml
/.support
/.support_plantuml
/.plantuml
/doc/jsdoc
/doc/phpdoc
/doc/plantuml
/extension/Documentation/_make/build
/doc/phpdoc
/.idea
/extension/Documentation/html
/extension/Resources/Private/vendor
/extension/Resources/Public/Css
/extension/Resources/Public/fonts
/extension/Resources/Public/JavaScript
/fonts
/js
/node_modules
/packages
/bower_components
# Created by .ignore support plugin (hsz.mobi)
/.bowerpackages
/.npmpackages
/.phpdocinstall
/js
/css
/fonts
/qfq.flowchart.dia.autosave
/support
/extension/Resources/Public/fonts
/extension/Resources/Public/JavaScript
/extension/Resources/Public/Css
/doc/jsdoc
/dist/
.python_virtualenv/
.virtual_env
/.support_sonar
/.sonar_scanner
/extension/Documentation/html
\ No newline at end of file
/vendor
......@@ -73,6 +73,8 @@ plantuml:
bootstrap: .npmpackages .plantuml_install .virtual_env
npm update
grunt default
composer update
cp -rp vendor/phpoffice/phpspreadsheet/src/PhpSpreadsheet extension/Resources/Private/vendor/
basic: .npmpackages .virtual_env
npm update
......
{
"require-dev": {
"phpunit/phpunit": "^6.5"
},
"require": {
"phpoffice/phpspreadsheet": "^1.3"
}
}
This diff is collapsed.
......@@ -1277,20 +1277,22 @@ If the application uploads files, mostly it's not necessary and often a security
the uploaded files. Best is to create a directory, e.g. `<site path>/fileadmin/protected` and deny direct access via
webbrowser to it. E.g. for Apache set a rule: ::
<Directory "/var/www/html/fileadmin/protected">
Require all denied
</Directory>
<Directory "/var/www/html/fileadmin/protected">
Require all denied
</Directory>
If you only have access to `.htaccess`, create a file `<site path>/fileadmin/protected/.htaccess` with: ::
deny from all
<IfModule mod_authz_core.c>
Require all denied
</IfModule>
**Important**: all QFQ uploads should then save files in or below such a directory.
**Important**: all QFQ uploads should save files in or below such a directory.
To offer download of those files, use the reserved columnname '_download' (see `download`_) or variants.
To offer download of those files, use the reserved column name '_download' (see `download`_) or variants.
**Important**: To protect the installation against executing of uploaded malicious script code, disable PHP for the final upload
directory. E.g. `fileadmin` (Apache): ::
**Important**: To protect the installation against executing of uploaded malicious script code, disable PHP for the final
upload directory. E.g. `fileadmin` (Apache): ::
<Directory "/var/www/html/fileadmin">
php_admin_flag engine Off
......
Supports Markdown
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment