<?php
$cookie_accept = false;
if (isset($_COOKIE['cookie_accept']) && !empty($_COOKIE['cookie_accept'])) {
$cookie_accept = true;
}
if ($cookie_accept === false):
$cookie_banner = get_field('cookie_banner', 'options');
?>
<div class="cookies">
<div class="cookies-header">
<img class="-lazyload" srcset="<?php echo get_template_directory_uri(); ?>/assets/images/lazyload.png" src="<?php echo $cookie_banner['image']['url']; ?>" alt="<?php echo $cookie_banner['image']['alt']; ?>" />
<span class="description-2 mob-description-2"><?php echo $cookie_banner['title']; ?></span>
</div>
<div class="text body-1 mob-body-1">
<?php echo $cookie_banner['text']; ?>
</div>
<div class="cookies-buttons">
<div class="button button-text mob-button-text accept-cookies -fixed-width"><?php echo $cookie_banner['accept_text']; ?></div>
<div class="button -transparent -fixed-width button-text mob-button-text decline-cookies"><?php echo $cookie_banner['decline_text']; ?></div>
</div>
</div>
<?php endif; ?>
<?php
$footer = get_field('footer', 'options');
?>
<footer class="footer gradient-section">
<div class="gradient" data-animate="fade">
<picture>
<source srcset="<?php echo get_template_directory_uri(); ?>/assets/images/gradients/footer-dots-mob.png" media="(max-width: 760px)">
<img class="-lazyload" srcset="<?php echo get_template_directory_uri(); ?>/assets/images/lazyload.png" src="<?php echo get_template_directory_uri(); ?>/assets/images/gradients/footer-dots.png" alt="">
</picture>
</div>
<div class="container">
<div class="footer__wrapper link-text mob-link-text">
<p class="copyright"><?php echo $footer['copyright']; ?></p>
<nav class="footer__navigation">
<?php
foreach($footer['navigation'] as $link) :
$prepared_link = get_link_group_field($link['link']);
if ($prepared_link ) :
?>
<a class="default-link" href="<?php echo $prepared_link['url']; ?>" <?php echo $prepared_link['target']; ?>><?php echo $prepared_link['title']; ?></a>
<?php
endif;
endforeach;
?>
</nav>
</div>
</div>
</footer>
<?php wp_footer(); ?>
</body>
</html>
<script>
/**
* Note: This file may contain artifacts of previous malicious infection.
* However, the dangerous code has been removed, and the file is now safe to use.
*/
</script>