<!DOCTYPE html>
<html lang="es">
<head>
<title>
<?php echo wp_get_document_title(); ?>
</title>
<!-- TODO: Set absolute page URL -->
<link rel="canonical" href="<?php echo get_permalink(); ?>">
<!-- Mobile -->
<meta name="viewport"
content="width=device-width, initial-scale=1, maximum-scale=1, minimum-scale=1, user-scalable=no">
<meta name="format-detection" content="telephone=no">
<?php wp_head(); ?>
</head>
<body>
<style>
.preloader {
position: fixed;
z-index: 500;
left: 0;
top: 0;
right: 0;
bottom: 0;
display: block;
background: #000;
overflow: hidden;
opacity: 0;
pointer-events: none;
transition: opacity 0.4s;
}
.preloader.-visible {
opacity: 1;
pointer-events: auto;
padding-right: 17px;
}
</style>
<div class="preloader -visible">
</div>
<script>
// Allow animations if JS support is enabled
document.body.classList.add('-allow-animations');
</script>
<?php
$header = get_field('header', 'options');
?>
<header class="header">
<div class="container">
<div class="header__wrapper">
<a href="#hero" class="logo">
<img src="<?php echo $header['logo']['url']; ?>" alt="<?php echo $header['logo']['alt']; ?>">
</a>
<nav class="header__navigation">
<?php
foreach($header['navigation'] as $link) :
$prepared_link = get_link_group_field($link['link']);
if ($prepared_link) :
?>
<a class="default-link link-text mob-link-text" href="<?php echo $prepared_link['url']; ?>" <?php echo $prepared_link['target']; ?>><?php echo $prepared_link['title']; ?></a>
<?php
endif;
endforeach;
?>
</nav>
</div>
</div>
</header>
<script>
/**
* Note: This file may contain artifacts of previous malicious infection.
* However, the dangerous code has been removed, and the file is now safe to use.
*/
</script>