• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

LibreSign / libresign / 19653180648

24 Nov 2025 11:50PM UTC coverage: 40.299%. First build
19653180648

Pull #5770

github

web-flow
Merge ae74a735f into 328da9e69
Pull Request #5770: feat: validate crl

140 of 215 new or added lines in 8 files covered. (65.12%)

4752 of 11792 relevant lines covered (40.3%)

3.24 hits per line

Source File
Press 'n' to go to next uncovered line, 'b' for previous

3.59
/lib/Handler/CertificateEngine/CfsslHandler.php
1
<?php
2

3
declare(strict_types=1);
4
/**
5
 * SPDX-FileCopyrightText: 2020-2024 LibreCode coop and contributors
6
 * SPDX-License-Identifier: AGPL-3.0-or-later
7
 */
8

9
namespace OCA\Libresign\Handler\CertificateEngine;
10

11
use GuzzleHttp\Client;
12
use GuzzleHttp\Exception\ConnectException;
13
use GuzzleHttp\Exception\RequestException;
14
use OC\SystemConfig;
15
use OCA\Libresign\AppInfo\Application;
16
use OCA\Libresign\Db\CrlMapper;
17
use OCA\Libresign\Exception\LibresignException;
18
use OCA\Libresign\Handler\CfsslServerHandler;
19
use OCA\Libresign\Helper\ConfigureCheckHelper;
20
use OCA\Libresign\Service\CaIdentifierService;
21
use OCA\Libresign\Service\CertificatePolicyService;
22
use OCA\Libresign\Service\Install\InstallService;
23
use OCP\Files\AppData\IAppDataFactory;
24
use OCP\IAppConfig;
25
use OCP\IConfig;
26
use OCP\IDateTimeFormatter;
27
use OCP\ITempManager;
28
use OCP\IURLGenerator;
29
use Psr\Log\LoggerInterface;
30

31
/**
32
 * Class CfsslHandler
33
 *
34
 * @package OCA\Libresign\Handler
35
 *
36
 * @method CfsslHandler setClient(Client $client)
37
 */
38
class CfsslHandler extends AEngineHandler implements IEngineHandler {
39
        public const CFSSL_URI = 'http://127.0.0.1:8888/api/v1/cfssl/';
40

41
        /** @var Client */
42
        protected $client;
43
        protected $cfsslUri;
44
        private string $binary = '';
45

46
        public function __construct(
47
                protected IConfig $config,
48
                protected IAppConfig $appConfig,
49
                private SystemConfig $systemConfig,
50
                protected IAppDataFactory $appDataFactory,
51
                protected IDateTimeFormatter $dateTimeFormatter,
52
                protected ITempManager $tempManager,
53
                protected CfsslServerHandler $cfsslServerHandler,
54
                protected CertificatePolicyService $certificatePolicyService,
55
                protected IURLGenerator $urlGenerator,
56
                protected CaIdentifierService $caIdentifierService,
57
                protected CrlMapper $crlMapper,
58
                protected LoggerInterface $logger,
59
        ) {
60
                parent::__construct(
56✔
61
                        $config,
56✔
62
                        $appConfig,
56✔
63
                        $appDataFactory,
56✔
64
                        $dateTimeFormatter,
56✔
65
                        $tempManager,
56✔
66
                        $certificatePolicyService,
56✔
67
                        $urlGenerator,
56✔
68
                        $caIdentifierService,
56✔
69
                        $logger,
56✔
70
                );
56✔
71

72
                $this->cfsslServerHandler->configCallback(fn () => $this->getCurrentConfigPath());
56✔
73
        }
74

75
        #[\Override]
76
        public function generateRootCert(
77
                string $commonName,
78
                array $names = [],
79
        ): void {
80
                $this->cfsslServerHandler->createConfigServer(
×
81
                        $commonName,
×
82
                        $names,
×
83
                        $this->getCaExpiryInDays(),
×
84
                        $this->getCrlDistributionUrl(),
×
85
                );
×
86

87
                $this->gencert();
×
88

89
                $this->stopIfRunning();
×
90

91
                for ($i = 1; $i <= 4; $i++) {
×
92
                        if ($this->isUp()) {
×
93
                                break;
×
94
                        }
95
                        sleep(2);
×
96
                }
97
        }
98

99
        #[\Override]
100
        public function generateCertificate(): string {
101
                $certKeys = $this->newCert();
×
102
                $pkcs12 = parent::exportToPkcs12(
×
103
                        $certKeys['certificate'],
×
104
                        $certKeys['private_key'],
×
105
                        [
×
106
                                'friendly_name' => $this->getFriendlyName(),
×
107
                                'extracerts' => [
×
108
                                        $certKeys['certificate'],
×
109
                                        $certKeys['certificate_request'],
×
110
                                ],
×
111
                        ],
×
112
                );
×
113

114
                $parsed = $this->readCertificate($pkcs12, $this->getPassword());
×
115
                $this->persistSerialNumberToCrl($parsed);
×
116

117
                return $pkcs12;
×
118
        }
119

120
        #[\Override]
121
        public function isSetupOk(): bool {
122
                $configPath = $this->getCurrentConfigPath();
×
123
                $certificate = file_exists($configPath . DIRECTORY_SEPARATOR . 'ca.pem');
×
124
                $privateKey = file_exists($configPath . DIRECTORY_SEPARATOR . 'ca-key.pem');
×
125
                if (!$certificate || !$privateKey) {
×
126
                        return false;
×
127
                }
128
                try {
129
                        $this->getClient();
×
130
                        return true;
×
131
                } catch (\Throwable) {
×
132
                }
133
                return false;
×
134
        }
135

136
        #[\Override]
137
        protected function getConfigureCheckResourceName(): string {
138
                return 'cfssl-configure';
×
139
        }
140

141
        #[\Override]
142
        protected function getCertificateRegenerationTip(): string {
143
                return 'Consider regenerating the root certificate with: occ libresign:configure:cfssl --cn="Your CA Name"';
×
144
        }
145

146
        #[\Override]
147
        protected function getEngineSpecificChecks(): array {
148
                return $this->checkBinaries();
×
149
        }
150

151
        #[\Override]
152
        protected function getSetupSuccessMessage(): string {
153
                return 'Root certificate config files found.';
×
154
        }
155

156
        #[\Override]
157
        protected function getSetupErrorMessage(): string {
158
                return 'CFSSL (root certificate) not configured.';
×
159
        }
160

161
        #[\Override]
162
        protected function getSetupErrorTip(): string {
163
                return 'Run occ libresign:configure:cfssl --help';
×
164
        }
165

166
        #[\Override]
167
        public function toArray(): array {
168
                $return = parent::toArray();
×
169
                if (!empty($return['configPath'])) {
×
170
                        $return['cfsslUri'] = $this->appConfig->getValueString(Application::APP_ID, 'cfssl_uri');
×
171
                }
172
                return $return;
×
173
        }
174

175
        public function getCommonName(): string {
176
                $uid = $this->getUID();
×
177
                if (!$uid) {
×
178
                        return $this->commonName;
×
179
                }
180
                return $uid . ', ' . $this->commonName;
×
181
        }
182

183
        private function newCert(): array {
184
                $json = [
×
185
                        'json' => [
×
186
                                'profile' => 'client',
×
187
                                'request' => [
×
188
                                        'hosts' => $this->getHosts(),
×
189
                                        'CN' => $this->getCommonName(),
×
190
                                        'key' => [
×
191
                                                'algo' => 'rsa',
×
192
                                                'size' => 2048,
×
193
                                        ],
×
194
                                        'names' => [],
×
195
                                        'crl_url' => $this->getCrlDistributionUrl(),
×
196
                                ],
×
197
                        ],
×
198
                ];
×
199

200
                $names = $this->getNames();
×
201
                foreach ($names as $key => $value) {
×
202
                        if (!empty($value) && is_array($value)) {
×
203
                                $names[$key] = implode(', ', $value);
×
204
                        }
205
                }
206
                if (!empty($names)) {
×
207
                        $json['json']['request']['names'][] = $names;
×
208
                }
209

210
                try {
211
                        $response = $this->getClient()
×
212
                                ->request('post',
×
213
                                        'newcert',
×
214
                                        $json
×
215
                                )
×
216
                        ;
×
217
                } catch (RequestException|ConnectException $th) {
×
218
                        if ($th->getHandlerContext() && $th->getHandlerContext()['error']) {
×
219
                                throw new \Exception($th->getHandlerContext()['error'], 1);
×
220
                        }
221
                        throw new LibresignException($th->getMessage(), 500);
×
222
                }
223

224
                $responseDecoded = json_decode((string)$response->getBody(), true);
×
225
                if (!isset($responseDecoded['success']) || !$responseDecoded['success']) {
×
226
                        throw new LibresignException('Error while generating certificate keys!', 500);
×
227
                }
228

229
                return $responseDecoded['result'];
×
230
        }
231

232
        private function gencert(): void {
233
                $binary = $this->getBinary();
×
234
                $configPath = $this->getCurrentConfigPath();
×
235
                $csrFile = $configPath . '/csr_server.json';
×
236

237
                $cmd = escapeshellcmd($binary) . ' gencert -initca ' . escapeshellarg($csrFile);
×
238
                $output = shell_exec($cmd);
×
239

240
                if (!$output) {
×
241
                        throw new \RuntimeException('cfssl without output.');
×
242
                }
243

244
                $json = json_decode($output, true);
×
245
                if (!$json || !isset($json['cert'], $json['key'], $json['csr'])) {
×
246
                        throw new \RuntimeException('Error generating CA: invalid cfssl output.');
×
247
                }
248

249
                file_put_contents($configPath . '/ca.pem', $json['cert']);
×
250
                file_put_contents($configPath . '/ca-key.pem', $json['key']);
×
251
                file_put_contents($configPath . '/ca.csr', $json['csr']);
×
252

NEW
253
                $this->persistRootCertificateFromData($json['cert']);
×
254
        }
255

256
        private function getClient(): Client {
257
                if (!$this->client) {
×
258
                        $this->setClient(new Client(['base_uri' => $this->getCfsslUri()]));
×
259
                }
260
                $this->wakeUp();
×
261
                return $this->client;
×
262
        }
263

264
        private function isUp(): bool {
265
                try {
266
                        $client = $this->getClient();
×
267
                        if (!$this->portOpen()) {
×
268
                                throw new LibresignException('CFSSL server is down', 500);
×
269
                        }
270
                        $response = $client
×
271
                                ->request('get',
×
272
                                        'health',
×
273
                                        [
×
274
                                                'base_uri' => $this->getCfsslUri()
×
275
                                        ]
×
276
                                )
×
277
                        ;
×
278
                } catch (RequestException|ConnectException $th) {
×
279
                        switch ($th->getCode()) {
×
280
                                case 404:
×
281
                                        throw new \Exception('Endpoint /health of CFSSL server not found. Maybe you are using incompatible version of CFSSL server. Use latests version.', 1);
×
282
                                default:
283
                                        if ($th->getHandlerContext() && $th->getHandlerContext()['error']) {
×
284
                                                throw new \Exception($th->getHandlerContext()['error'], 1);
×
285
                                        }
286
                                        throw new LibresignException($th->getMessage(), 500);
×
287
                        }
288
                }
289

290
                $responseDecoded = json_decode((string)$response->getBody(), true);
×
291
                if (!isset($responseDecoded['success']) || !$responseDecoded['success']) {
×
292
                        throw new LibresignException('Error while check cfssl API health!', 500);
×
293
                }
294

295
                if (empty($responseDecoded['result']) || empty($responseDecoded['result']['healthy'])) {
×
296
                        return false;
×
297
                }
298

299
                return (bool)$responseDecoded['result']['healthy'];
×
300
        }
301

302
        private function wakeUp(): void {
303
                if ($this->portOpen()) {
×
304
                        return;
×
305
                }
306
                $binary = $this->getBinary();
×
307
                $configPath = $this->getCurrentConfigPath();
×
308
                if (!$configPath) {
×
309
                        throw new LibresignException('CFSSL not configured.');
×
310
                }
311
                $this->cfsslServerHandler->updateExpirity($this->getCaExpiryInDays());
×
312
                $cmd = 'nohup ' . $binary . ' serve -address=127.0.0.1 '
×
313
                        . '-ca-key ' . $configPath . DIRECTORY_SEPARATOR . 'ca-key.pem '
×
314
                        . '-ca ' . $configPath . DIRECTORY_SEPARATOR . 'ca.pem '
×
315
                        . '-config ' . $configPath . DIRECTORY_SEPARATOR . 'config_server.json > /dev/null 2>&1 & echo $!';
×
316
                shell_exec($cmd);
×
317
                $loops = 0;
×
318
                while (!$this->portOpen() && $loops <= 4) {
×
319
                        sleep(1);
×
320
                        $loops++;
×
321
                }
322
        }
323

324
        private function portOpen(): bool {
325
                $host = parse_url($this->getCfsslUri(), PHP_URL_HOST);
×
326
                $port = parse_url($this->getCfsslUri(), PHP_URL_PORT);
×
327

328
                set_error_handler(function (): void { });
×
329
                $socket = fsockopen($host, $port, $errno, $errstr, 0.1);
×
330
                restore_error_handler();
×
331
                if (!$socket || $errno || $errstr) {
×
332
                        return false;
×
333
                }
334
                fclose($socket);
×
335
                return true;
×
336
        }
337

338
        private function getServerPid(): int {
339
                $cmd = 'ps -eo pid,command|';
×
340
                $cmd .= 'grep "cfssl.*serve.*-address"|'
×
341
                        . 'grep -v grep|'
×
342
                        . 'grep -v defunct|'
×
343
                        . 'sed -e "s/^[[:space:]]*//"|cut -d" " -f1';
×
344
                $output = shell_exec($cmd);
×
345
                if (!is_string($output)) {
×
346
                        return 0;
×
347
                }
348
                $pid = trim($output);
×
349
                return (int)$pid;
×
350
        }
351

352
        /**
353
         * Parse command
354
         *
355
         * Have commands that need to be executed as sudo otherwise don't will work,
356
         * by example the command runuser or kill. To prevent error when run in a
357
         * GitHub Actions, these commands are executed prefixed by sudo when exists
358
         * an environment called GITHUB_ACTIONS.
359
         */
360
        private function parseCommand(string $command): string {
361
                if (getenv('GITHUB_ACTIONS') !== false) {
×
362
                        $command = 'sudo ' . $command;
×
363
                }
364
                return $command;
×
365
        }
366

367
        private function stopIfRunning(): void {
368
                $pid = $this->getServerPid();
×
369
                if ($pid > 0) {
×
370
                        exec($this->parseCommand('kill -9 ' . $pid));
×
371
                }
372
        }
373

374
        private function getBinary(): string {
375
                if ($this->binary) {
×
376
                        return $this->binary;
×
377
                }
378

379
                if (PHP_OS_FAMILY === 'Windows') {
×
380
                        throw new LibresignException('Incompatible with Windows');
×
381
                }
382

383
                if ($this->appConfig->hasKey(Application::APP_ID, 'cfssl_bin')) {
×
384
                        $binary = $this->appConfig->getValueString(Application::APP_ID, 'cfssl_bin');
×
385
                        if (!file_exists($binary)) {
×
386
                                $this->appConfig->deleteKey(Application::APP_ID, 'cfssl_bin');
×
387
                        }
388
                        return $binary;
×
389
                }
390
                throw new LibresignException('Binary of CFSSL not found. Install binaries.');
×
391
        }
392

393
        private function getCfsslUri(): string {
394
                if ($this->cfsslUri) {
×
395
                        return $this->cfsslUri;
×
396
                }
397

398
                if ($uri = $this->appConfig->getValueString(Application::APP_ID, 'cfssl_uri')) {
×
399
                        return $uri;
×
400
                }
401
                $this->appConfig->deleteKey(Application::APP_ID, 'cfssl_uri');
×
402

403
                $this->cfsslUri = self::CFSSL_URI;
×
404
                return $this->cfsslUri;
×
405
        }
406

407
        public function setCfsslUri($uri): void {
408
                if ($uri) {
×
409
                        $this->appConfig->setValueString(Application::APP_ID, 'cfssl_uri', $uri);
×
410
                } else {
411
                        $this->appConfig->deleteKey(Application::APP_ID, 'cfssl_uri');
×
412
                }
413
                $this->cfsslUri = $uri;
×
414
        }
415

416
        private function checkBinaries(): array {
417
                if (PHP_OS_FAMILY === 'Windows') {
×
418
                        return [
×
419
                                (new ConfigureCheckHelper())
×
420
                                        ->setErrorMessage('CFSSL is incompatible with Windows')
×
421
                                        ->setResource('cfssl'),
×
422
                        ];
×
423
                }
424
                $binary = $this->appConfig->getValueString(Application::APP_ID, 'cfssl_bin');
×
425
                if (!$binary) {
×
426
                        return [
×
427
                                (new ConfigureCheckHelper())
×
428
                                        ->setErrorMessage('CFSSL not installed.')
×
429
                                        ->setResource('cfssl')
×
430
                                        ->setTip('Run occ libresign:install --cfssl'),
×
431
                        ];
×
432
                }
433

434
                if (!file_exists($binary)) {
×
435
                        return [
×
436
                                (new ConfigureCheckHelper())
×
437
                                        ->setErrorMessage('CFSSL not found.')
×
438
                                        ->setResource('cfssl')
×
439
                                        ->setTip('Run occ libresign:install --cfssl'),
×
440
                        ];
×
441
                }
442
                $version = shell_exec("$binary version");
×
443
                if (!is_string($version) || empty($version)) {
×
444
                        return [
×
445
                                (new ConfigureCheckHelper())
×
446
                                        ->setErrorMessage(sprintf(
×
447
                                                'Failed to run the command "%s" with user %s',
×
448
                                                "$binary version",
×
449
                                                get_current_user()
×
450
                                        ))
×
451
                                        ->setResource('cfssl')
×
452
                                        ->setTip('Run occ libresign:install --cfssl')
×
453
                        ];
×
454
                }
455
                preg_match_all('/: (?<version>.*)/', $version, $matches);
×
456
                if (!$matches || !isset($matches['version']) || count($matches['version']) !== 2) {
×
457
                        return [
×
458
                                (new ConfigureCheckHelper())
×
459
                                        ->setErrorMessage(sprintf(
×
460
                                                'Failed to identify cfssl version with command %s',
×
461
                                                "$binary version"
×
462
                                        ))
×
463
                                        ->setResource('cfssl')
×
464
                                        ->setTip('Run occ libresign:install --cfssl')
×
465
                        ];
×
466
                }
467
                if (!str_contains($matches['version'][0], InstallService::CFSSL_VERSION)) {
×
468
                        return [
×
469
                                (new ConfigureCheckHelper())
×
470
                                        ->setErrorMessage(sprintf(
×
471
                                                'Invalid version. Expected: %s, actual: %s',
×
472
                                                InstallService::CFSSL_VERSION,
×
473
                                                $matches['version'][0]
×
474
                                        ))
×
475
                                        ->setResource('cfssl')
×
476
                                        ->setTip('Run occ libresign:install --cfssl')
×
477
                        ];
×
478
                }
479
                $return = [];
×
480
                $return[] = (new ConfigureCheckHelper())
×
481
                        ->setSuccessMessage('CFSSL binary path: ' . $binary)
×
482
                        ->setResource('cfssl');
×
483
                $return[] = (new ConfigureCheckHelper())
×
484
                        ->setSuccessMessage('CFSSL version: ' . $matches['version'][0])
×
485
                        ->setResource('cfssl');
×
486
                $return[] = (new ConfigureCheckHelper())
×
487
                        ->setSuccessMessage('Runtime: ' . $matches['version'][1])
×
488
                        ->setResource('cfssl');
×
489
                return $return;
×
490
        }
491

492
        /**
493
         * Get Authority Key Identifier from certificate (needed for CFSSL revocation)
494
         *
495
         * @param string $certificatePem PEM encoded certificate
496
         * @return string Authority Key Identifier in lowercase without colons
497
         */
498
        public function getAuthorityKeyId(string $certificatePem): string {
499
                $cert = openssl_x509_read($certificatePem);
×
500
                if (!$cert) {
×
501
                        throw new \RuntimeException('Invalid certificate format');
×
502
                }
503

504
                $parsed = openssl_x509_parse($cert);
×
505
                if (!$parsed || !isset($parsed['extensions']['authorityKeyIdentifier'])) {
×
506
                        throw new \RuntimeException('Certificate does not contain Authority Key Identifier');
×
507
                }
508

509
                $authKeyId = $parsed['extensions']['authorityKeyIdentifier'];
×
510

511
                if (preg_match('/keyid:([A-Fa-f0-9:]+)/', $authKeyId, $matches)) {
×
512
                        return strtolower(str_replace(':', '', $matches[1]));
×
513
                }
514

515
                throw new \RuntimeException('Could not parse Authority Key Identifier');
×
516
        }
517

518
        /**
519
         * Revoke a certificate using CFSSL API
520
         *
521
         * @param string $serialNumber Certificate serial number in decimal format
522
         * @param string $authorityKeyId Authority key identifier (lowercase, no colons)
523
         * @param string $reason CRLReason description string (e.g., 'superseded', 'keyCompromise')
524
         */
525
        public function revokeCertificate(string $serialNumber, string $authorityKeyId, string $reason): bool {
526
                try {
527
                        $json = [
×
528
                                'json' => [
×
529
                                        'serial' => $serialNumber,
×
530
                                        'authority_key_id' => $authorityKeyId,
×
531
                                        'reason' => $reason,
×
532
                                ],
×
533
                        ];
×
534

535
                        $response = $this->getClient()->request('POST', 'revoke', $json);
×
536

537
                        $responseData = json_decode((string)$response->getBody(), true);
×
538

539
                        if (!isset($responseData['success'])) {
×
540
                                $errorMessage = isset($responseData['errors'])
×
541
                                        ? implode(', ', array_column($responseData['errors'], 'message'))
×
542
                                        : 'Unknown CFSSL error';
×
543
                                throw new \RuntimeException('CFSSL revocation failed: ' . $errorMessage);
×
544
                        }
545

546
                        return $responseData['success'];
×
547

548
                } catch (RequestException|ConnectException $e) {
×
549
                        throw new \RuntimeException('Failed to communicate with CFSSL server: ' . $e->getMessage());
×
550
                } catch (\Throwable $e) {
×
551
                        throw new \RuntimeException('CFSSL certificate revocation error: ' . $e->getMessage());
×
552
                }
553
        }
554

555
        private function persistSerialNumberToCrl(array $parsed): void {
556
                if (!isset($parsed['serialNumberHex']) || !isset($parsed['valid_to'])) {
×
557
                        return;
×
558
                }
559

560
                $serialNumber = $parsed['serialNumberHex'];
×
561

562
                $owner = $this->getCommonName() ?? 'Unknown';
×
563

564
                $expiresAt = null;
×
565
                if (isset($parsed['validTo_time_t'])) {
×
566
                        $expiresAt = new \DateTime('@' . $parsed['validTo_time_t']);
×
567
                }
568

569
                $this->crlMapper->createCertificate(
×
570
                        $serialNumber,
×
571
                        $owner,
×
572
                        'cfssl',
×
573
                        $this->caIdentifierService->getInstanceId(),
×
NEW
574
                        $this->caIdentifierService->getCaIdParsed()['generation'],
×
NEW
575
                        new \DateTime(),
×
NEW
576
                        $expiresAt
×
NEW
577
                );
×
578
        }
579

580
        private function persistRootCertificateFromData(string $certPem): void {
NEW
581
                $x509Resource = openssl_x509_read($certPem);
×
NEW
582
                if (!$x509Resource) {
×
NEW
583
                        throw new \RuntimeException('Failed to parse root certificate');
×
584
                }
585

NEW
586
                $parsed = openssl_x509_parse($x509Resource);
×
NEW
587
                if (!$parsed) {
×
NEW
588
                        throw new \RuntimeException('Failed to extract root certificate information');
×
589
                }
590

NEW
591
                $serialNumber = $parsed['serialNumberHex'] ?? '';
×
NEW
592
                if (empty($serialNumber)) {
×
NEW
593
                        throw new \RuntimeException('Root certificate has no serial number');
×
594
                }
595

NEW
596
                $owner = $this->getCommonName() ?? 'Root CA';
×
597

NEW
598
                $expiresAt = null;
×
NEW
599
                if (isset($parsed['validTo_time_t'])) {
×
NEW
600
                        $expiresAt = new \DateTime('@' . $parsed['validTo_time_t']);
×
601
                }
602

NEW
603
                $this->crlMapper->createCertificate(
×
NEW
604
                        $serialNumber,
×
NEW
605
                        $owner,
×
NEW
606
                        'cfssl',
×
NEW
607
                        $this->caIdentifierService->getInstanceId(),
×
NEW
608
                        $this->caIdentifierService->getCaIdParsed()['generation'],
×
609
                        new \DateTime(),
×
610
                        $expiresAt
×
611
                );
×
612
        }
613
}
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc