session.go 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610
  1. package registry
  2. import (
  3. "bytes"
  4. "crypto/sha256"
  5. // this is required for some certificates
  6. _ "crypto/sha512"
  7. "encoding/hex"
  8. "encoding/json"
  9. "fmt"
  10. "io"
  11. "io/ioutil"
  12. "net/http"
  13. "net/http/cookiejar"
  14. "net/url"
  15. "strconv"
  16. "strings"
  17. "time"
  18. log "github.com/Sirupsen/logrus"
  19. "github.com/docker/docker/pkg/httputils"
  20. "github.com/docker/docker/pkg/tarsum"
  21. "github.com/docker/docker/utils"
  22. )
  23. type Session struct {
  24. authConfig *AuthConfig
  25. reqFactory *utils.HTTPRequestFactory
  26. indexEndpoint *Endpoint
  27. jar *cookiejar.Jar
  28. timeout TimeoutType
  29. }
  30. func NewSession(authConfig *AuthConfig, factory *utils.HTTPRequestFactory, endpoint *Endpoint, timeout bool) (r *Session, err error) {
  31. r = &Session{
  32. authConfig: authConfig,
  33. indexEndpoint: endpoint,
  34. }
  35. if timeout {
  36. r.timeout = ReceiveTimeout
  37. }
  38. r.jar, err = cookiejar.New(nil)
  39. if err != nil {
  40. return nil, err
  41. }
  42. // If we're working with a standalone private registry over HTTPS, send Basic Auth headers
  43. // alongside our requests.
  44. if r.indexEndpoint.VersionString(1) != IndexServerAddress() && r.indexEndpoint.URL.Scheme == "https" {
  45. info, err := r.indexEndpoint.Ping()
  46. if err != nil {
  47. return nil, err
  48. }
  49. if info.Standalone {
  50. log.Debugf("Endpoint %s is eligible for private registry registry. Enabling decorator.", r.indexEndpoint.String())
  51. dec := utils.NewHTTPAuthDecorator(authConfig.Username, authConfig.Password)
  52. factory.AddDecorator(dec)
  53. }
  54. }
  55. r.reqFactory = factory
  56. return r, nil
  57. }
  58. func (r *Session) doRequest(req *http.Request) (*http.Response, *http.Client, error) {
  59. return doRequest(req, r.jar, r.timeout, r.indexEndpoint.secure)
  60. }
  61. // Retrieve the history of a given image from the Registry.
  62. // Return a list of the parent's json (requested image included)
  63. func (r *Session) GetRemoteHistory(imgID, registry string, token []string) ([]string, error) {
  64. req, err := r.reqFactory.NewRequest("GET", registry+"images/"+imgID+"/ancestry", nil)
  65. if err != nil {
  66. return nil, err
  67. }
  68. setTokenAuth(req, token)
  69. res, _, err := r.doRequest(req)
  70. if err != nil {
  71. return nil, err
  72. }
  73. defer res.Body.Close()
  74. if res.StatusCode != 200 {
  75. if res.StatusCode == 401 {
  76. return nil, errLoginRequired
  77. }
  78. return nil, utils.NewHTTPRequestError(fmt.Sprintf("Server error: %d trying to fetch remote history for %s", res.StatusCode, imgID), res)
  79. }
  80. jsonString, err := ioutil.ReadAll(res.Body)
  81. if err != nil {
  82. return nil, fmt.Errorf("Error while reading the http response: %s", err)
  83. }
  84. log.Debugf("Ancestry: %s", jsonString)
  85. history := new([]string)
  86. if err := json.Unmarshal(jsonString, history); err != nil {
  87. return nil, err
  88. }
  89. return *history, nil
  90. }
  91. // Check if an image exists in the Registry
  92. func (r *Session) LookupRemoteImage(imgID, registry string, token []string) error {
  93. req, err := r.reqFactory.NewRequest("GET", registry+"images/"+imgID+"/json", nil)
  94. if err != nil {
  95. return err
  96. }
  97. setTokenAuth(req, token)
  98. res, _, err := r.doRequest(req)
  99. if err != nil {
  100. return err
  101. }
  102. res.Body.Close()
  103. if res.StatusCode != 200 {
  104. return utils.NewHTTPRequestError(fmt.Sprintf("HTTP code %d", res.StatusCode), res)
  105. }
  106. return nil
  107. }
  108. // Retrieve an image from the Registry.
  109. func (r *Session) GetRemoteImageJSON(imgID, registry string, token []string) ([]byte, int, error) {
  110. // Get the JSON
  111. req, err := r.reqFactory.NewRequest("GET", registry+"images/"+imgID+"/json", nil)
  112. if err != nil {
  113. return nil, -1, fmt.Errorf("Failed to download json: %s", err)
  114. }
  115. setTokenAuth(req, token)
  116. res, _, err := r.doRequest(req)
  117. if err != nil {
  118. return nil, -1, fmt.Errorf("Failed to download json: %s", err)
  119. }
  120. defer res.Body.Close()
  121. if res.StatusCode != 200 {
  122. return nil, -1, utils.NewHTTPRequestError(fmt.Sprintf("HTTP code %d", res.StatusCode), res)
  123. }
  124. // if the size header is not present, then set it to '-1'
  125. imageSize := -1
  126. if hdr := res.Header.Get("X-Docker-Size"); hdr != "" {
  127. imageSize, err = strconv.Atoi(hdr)
  128. if err != nil {
  129. return nil, -1, err
  130. }
  131. }
  132. jsonString, err := ioutil.ReadAll(res.Body)
  133. if err != nil {
  134. return nil, -1, fmt.Errorf("Failed to parse downloaded json: %s (%s)", err, jsonString)
  135. }
  136. return jsonString, imageSize, nil
  137. }
  138. func (r *Session) GetRemoteImageLayer(imgID, registry string, token []string, imgSize int64) (io.ReadCloser, error) {
  139. var (
  140. retries = 5
  141. statusCode = 0
  142. client *http.Client
  143. res *http.Response
  144. imageURL = fmt.Sprintf("%simages/%s/layer", registry, imgID)
  145. )
  146. req, err := r.reqFactory.NewRequest("GET", imageURL, nil)
  147. if err != nil {
  148. return nil, fmt.Errorf("Error while getting from the server: %s\n", err)
  149. }
  150. setTokenAuth(req, token)
  151. for i := 1; i <= retries; i++ {
  152. statusCode = 0
  153. res, client, err = r.doRequest(req)
  154. if err != nil {
  155. log.Debugf("Error contacting registry: %s", err)
  156. if res != nil {
  157. if res.Body != nil {
  158. res.Body.Close()
  159. }
  160. statusCode = res.StatusCode
  161. }
  162. if i == retries {
  163. return nil, fmt.Errorf("Server error: Status %d while fetching image layer (%s)",
  164. statusCode, imgID)
  165. }
  166. time.Sleep(time.Duration(i) * 5 * time.Second)
  167. continue
  168. }
  169. break
  170. }
  171. if res.StatusCode != 200 {
  172. res.Body.Close()
  173. return nil, fmt.Errorf("Server error: Status %d while fetching image layer (%s)",
  174. res.StatusCode, imgID)
  175. }
  176. if res.Header.Get("Accept-Ranges") == "bytes" && imgSize > 0 {
  177. log.Debugf("server supports resume")
  178. return httputils.ResumableRequestReaderWithInitialResponse(client, req, 5, imgSize, res), nil
  179. }
  180. log.Debugf("server doesn't support resume")
  181. return res.Body, nil
  182. }
  183. func (r *Session) GetRemoteTags(registries []string, repository string, token []string) (map[string]string, error) {
  184. if strings.Count(repository, "/") == 0 {
  185. // This will be removed once the Registry supports auto-resolution on
  186. // the "library" namespace
  187. repository = "library/" + repository
  188. }
  189. for _, host := range registries {
  190. endpoint := fmt.Sprintf("%srepositories/%s/tags", host, repository)
  191. req, err := r.reqFactory.NewRequest("GET", endpoint, nil)
  192. if err != nil {
  193. return nil, err
  194. }
  195. setTokenAuth(req, token)
  196. res, _, err := r.doRequest(req)
  197. if err != nil {
  198. return nil, err
  199. }
  200. log.Debugf("Got status code %d from %s", res.StatusCode, endpoint)
  201. defer res.Body.Close()
  202. if res.StatusCode != 200 && res.StatusCode != 404 {
  203. continue
  204. } else if res.StatusCode == 404 {
  205. return nil, fmt.Errorf("Repository not found")
  206. }
  207. result := make(map[string]string)
  208. if err := json.NewDecoder(res.Body).Decode(&result); err != nil {
  209. return nil, err
  210. }
  211. return result, nil
  212. }
  213. return nil, fmt.Errorf("Could not reach any registry endpoint")
  214. }
  215. func buildEndpointsList(headers []string, indexEp string) ([]string, error) {
  216. var endpoints []string
  217. parsedURL, err := url.Parse(indexEp)
  218. if err != nil {
  219. return nil, err
  220. }
  221. var urlScheme = parsedURL.Scheme
  222. // The Registry's URL scheme has to match the Index'
  223. for _, ep := range headers {
  224. epList := strings.Split(ep, ",")
  225. for _, epListElement := range epList {
  226. endpoints = append(
  227. endpoints,
  228. fmt.Sprintf("%s://%s/v1/", urlScheme, strings.TrimSpace(epListElement)))
  229. }
  230. }
  231. return endpoints, nil
  232. }
  233. func (r *Session) GetRepositoryData(remote string) (*RepositoryData, error) {
  234. repositoryTarget := fmt.Sprintf("%srepositories/%s/images", r.indexEndpoint.VersionString(1), remote)
  235. log.Debugf("[registry] Calling GET %s", repositoryTarget)
  236. req, err := r.reqFactory.NewRequest("GET", repositoryTarget, nil)
  237. if err != nil {
  238. return nil, err
  239. }
  240. if r.authConfig != nil && len(r.authConfig.Username) > 0 {
  241. req.SetBasicAuth(r.authConfig.Username, r.authConfig.Password)
  242. }
  243. req.Header.Set("X-Docker-Token", "true")
  244. res, _, err := r.doRequest(req)
  245. if err != nil {
  246. return nil, err
  247. }
  248. defer res.Body.Close()
  249. if res.StatusCode == 401 {
  250. return nil, errLoginRequired
  251. }
  252. // TODO: Right now we're ignoring checksums in the response body.
  253. // In the future, we need to use them to check image validity.
  254. if res.StatusCode != 200 {
  255. return nil, utils.NewHTTPRequestError(fmt.Sprintf("HTTP code: %d", res.StatusCode), res)
  256. }
  257. var tokens []string
  258. if res.Header.Get("X-Docker-Token") != "" {
  259. tokens = res.Header["X-Docker-Token"]
  260. }
  261. var endpoints []string
  262. if res.Header.Get("X-Docker-Endpoints") != "" {
  263. endpoints, err = buildEndpointsList(res.Header["X-Docker-Endpoints"], r.indexEndpoint.VersionString(1))
  264. if err != nil {
  265. return nil, err
  266. }
  267. } else {
  268. // Assume the endpoint is on the same host
  269. endpoints = append(endpoints, fmt.Sprintf("%s://%s/v1/", r.indexEndpoint.URL.Scheme, req.URL.Host))
  270. }
  271. remoteChecksums := []*ImgData{}
  272. if err := json.NewDecoder(res.Body).Decode(&remoteChecksums); err != nil {
  273. return nil, err
  274. }
  275. // Forge a better object from the retrieved data
  276. imgsData := make(map[string]*ImgData)
  277. for _, elem := range remoteChecksums {
  278. imgsData[elem.ID] = elem
  279. }
  280. return &RepositoryData{
  281. ImgList: imgsData,
  282. Endpoints: endpoints,
  283. Tokens: tokens,
  284. }, nil
  285. }
  286. func (r *Session) PushImageChecksumRegistry(imgData *ImgData, registry string, token []string) error {
  287. log.Debugf("[registry] Calling PUT %s", registry+"images/"+imgData.ID+"/checksum")
  288. req, err := r.reqFactory.NewRequest("PUT", registry+"images/"+imgData.ID+"/checksum", nil)
  289. if err != nil {
  290. return err
  291. }
  292. setTokenAuth(req, token)
  293. req.Header.Set("X-Docker-Checksum", imgData.Checksum)
  294. req.Header.Set("X-Docker-Checksum-Payload", imgData.ChecksumPayload)
  295. res, _, err := r.doRequest(req)
  296. if err != nil {
  297. return fmt.Errorf("Failed to upload metadata: %s", err)
  298. }
  299. defer res.Body.Close()
  300. if len(res.Cookies()) > 0 {
  301. r.jar.SetCookies(req.URL, res.Cookies())
  302. }
  303. if res.StatusCode != 200 {
  304. errBody, err := ioutil.ReadAll(res.Body)
  305. if err != nil {
  306. return fmt.Errorf("HTTP code %d while uploading metadata and error when trying to parse response body: %s", res.StatusCode, err)
  307. }
  308. var jsonBody map[string]string
  309. if err := json.Unmarshal(errBody, &jsonBody); err != nil {
  310. errBody = []byte(err.Error())
  311. } else if jsonBody["error"] == "Image already exists" {
  312. return ErrAlreadyExists
  313. }
  314. return fmt.Errorf("HTTP code %d while uploading metadata: %s", res.StatusCode, errBody)
  315. }
  316. return nil
  317. }
  318. // Push a local image to the registry
  319. func (r *Session) PushImageJSONRegistry(imgData *ImgData, jsonRaw []byte, registry string, token []string) error {
  320. log.Debugf("[registry] Calling PUT %s", registry+"images/"+imgData.ID+"/json")
  321. req, err := r.reqFactory.NewRequest("PUT", registry+"images/"+imgData.ID+"/json", bytes.NewReader(jsonRaw))
  322. if err != nil {
  323. return err
  324. }
  325. req.Header.Add("Content-type", "application/json")
  326. setTokenAuth(req, token)
  327. res, _, err := r.doRequest(req)
  328. if err != nil {
  329. return fmt.Errorf("Failed to upload metadata: %s", err)
  330. }
  331. defer res.Body.Close()
  332. if res.StatusCode == 401 && strings.HasPrefix(registry, "http://") {
  333. return utils.NewHTTPRequestError("HTTP code 401, Docker will not send auth headers over HTTP.", res)
  334. }
  335. if res.StatusCode != 200 {
  336. errBody, err := ioutil.ReadAll(res.Body)
  337. if err != nil {
  338. return utils.NewHTTPRequestError(fmt.Sprintf("HTTP code %d while uploading metadata and error when trying to parse response body: %s", res.StatusCode, err), res)
  339. }
  340. var jsonBody map[string]string
  341. if err := json.Unmarshal(errBody, &jsonBody); err != nil {
  342. errBody = []byte(err.Error())
  343. } else if jsonBody["error"] == "Image already exists" {
  344. return ErrAlreadyExists
  345. }
  346. return utils.NewHTTPRequestError(fmt.Sprintf("HTTP code %d while uploading metadata: %s", res.StatusCode, errBody), res)
  347. }
  348. return nil
  349. }
  350. func (r *Session) PushImageLayerRegistry(imgID string, layer io.Reader, registry string, token []string, jsonRaw []byte) (checksum string, checksumPayload string, err error) {
  351. log.Debugf("[registry] Calling PUT %s", registry+"images/"+imgID+"/layer")
  352. tarsumLayer, err := tarsum.NewTarSum(layer, false, tarsum.Version0)
  353. if err != nil {
  354. return "", "", err
  355. }
  356. h := sha256.New()
  357. h.Write(jsonRaw)
  358. h.Write([]byte{'\n'})
  359. checksumLayer := io.TeeReader(tarsumLayer, h)
  360. req, err := r.reqFactory.NewRequest("PUT", registry+"images/"+imgID+"/layer", checksumLayer)
  361. if err != nil {
  362. return "", "", err
  363. }
  364. req.Header.Add("Content-Type", "application/octet-stream")
  365. req.ContentLength = -1
  366. req.TransferEncoding = []string{"chunked"}
  367. setTokenAuth(req, token)
  368. res, _, err := r.doRequest(req)
  369. if err != nil {
  370. return "", "", fmt.Errorf("Failed to upload layer: %s", err)
  371. }
  372. if rc, ok := layer.(io.Closer); ok {
  373. if err := rc.Close(); err != nil {
  374. return "", "", err
  375. }
  376. }
  377. defer res.Body.Close()
  378. if res.StatusCode != 200 {
  379. errBody, err := ioutil.ReadAll(res.Body)
  380. if err != nil {
  381. return "", "", utils.NewHTTPRequestError(fmt.Sprintf("HTTP code %d while uploading metadata and error when trying to parse response body: %s", res.StatusCode, err), res)
  382. }
  383. return "", "", utils.NewHTTPRequestError(fmt.Sprintf("Received HTTP code %d while uploading layer: %s", res.StatusCode, errBody), res)
  384. }
  385. checksumPayload = "sha256:" + hex.EncodeToString(h.Sum(nil))
  386. return tarsumLayer.Sum(jsonRaw), checksumPayload, nil
  387. }
  388. // push a tag on the registry.
  389. // Remote has the format '<user>/<repo>
  390. func (r *Session) PushRegistryTag(remote, revision, tag, registry string, token []string) error {
  391. // "jsonify" the string
  392. revision = "\"" + revision + "\""
  393. path := fmt.Sprintf("repositories/%s/tags/%s", remote, tag)
  394. req, err := r.reqFactory.NewRequest("PUT", registry+path, strings.NewReader(revision))
  395. if err != nil {
  396. return err
  397. }
  398. req.Header.Add("Content-type", "application/json")
  399. setTokenAuth(req, token)
  400. req.ContentLength = int64(len(revision))
  401. res, _, err := r.doRequest(req)
  402. if err != nil {
  403. return err
  404. }
  405. res.Body.Close()
  406. if res.StatusCode != 200 && res.StatusCode != 201 {
  407. return utils.NewHTTPRequestError(fmt.Sprintf("Internal server error: %d trying to push tag %s on %s", res.StatusCode, tag, remote), res)
  408. }
  409. return nil
  410. }
  411. func (r *Session) PushImageJSONIndex(remote string, imgList []*ImgData, validate bool, regs []string) (*RepositoryData, error) {
  412. cleanImgList := []*ImgData{}
  413. if validate {
  414. for _, elem := range imgList {
  415. if elem.Checksum != "" {
  416. cleanImgList = append(cleanImgList, elem)
  417. }
  418. }
  419. } else {
  420. cleanImgList = imgList
  421. }
  422. imgListJSON, err := json.Marshal(cleanImgList)
  423. if err != nil {
  424. return nil, err
  425. }
  426. var suffix string
  427. if validate {
  428. suffix = "images"
  429. }
  430. u := fmt.Sprintf("%srepositories/%s/%s", r.indexEndpoint.VersionString(1), remote, suffix)
  431. log.Debugf("[registry] PUT %s", u)
  432. log.Debugf("Image list pushed to index:\n%s", imgListJSON)
  433. headers := map[string][]string{
  434. "Content-type": {"application/json"},
  435. "X-Docker-Token": {"true"},
  436. }
  437. if validate {
  438. headers["X-Docker-Endpoints"] = regs
  439. }
  440. // Redirect if necessary
  441. var res *http.Response
  442. for {
  443. if res, err = r.putImageRequest(u, headers, imgListJSON); err != nil {
  444. return nil, err
  445. }
  446. if !shouldRedirect(res) {
  447. break
  448. }
  449. res.Body.Close()
  450. u = res.Header.Get("Location")
  451. log.Debugf("Redirected to %s", u)
  452. }
  453. defer res.Body.Close()
  454. var tokens, endpoints []string
  455. if !validate {
  456. if res.StatusCode != 200 && res.StatusCode != 201 {
  457. errBody, err := ioutil.ReadAll(res.Body)
  458. if err != nil {
  459. return nil, err
  460. }
  461. return nil, utils.NewHTTPRequestError(fmt.Sprintf("Error: Status %d trying to push repository %s: %s", res.StatusCode, remote, errBody), res)
  462. }
  463. if res.Header.Get("X-Docker-Token") != "" {
  464. tokens = res.Header["X-Docker-Token"]
  465. log.Debugf("Auth token: %v", tokens)
  466. } else {
  467. return nil, fmt.Errorf("Index response didn't contain an access token")
  468. }
  469. if res.Header.Get("X-Docker-Endpoints") != "" {
  470. endpoints, err = buildEndpointsList(res.Header["X-Docker-Endpoints"], r.indexEndpoint.VersionString(1))
  471. if err != nil {
  472. return nil, err
  473. }
  474. } else {
  475. return nil, fmt.Errorf("Index response didn't contain any endpoints")
  476. }
  477. }
  478. if validate {
  479. if res.StatusCode != 204 {
  480. errBody, err := ioutil.ReadAll(res.Body)
  481. if err != nil {
  482. return nil, err
  483. }
  484. return nil, utils.NewHTTPRequestError(fmt.Sprintf("Error: Status %d trying to push checksums %s: %s", res.StatusCode, remote, errBody), res)
  485. }
  486. }
  487. return &RepositoryData{
  488. Tokens: tokens,
  489. Endpoints: endpoints,
  490. }, nil
  491. }
  492. func (r *Session) putImageRequest(u string, headers map[string][]string, body []byte) (*http.Response, error) {
  493. req, err := r.reqFactory.NewRequest("PUT", u, bytes.NewReader(body))
  494. if err != nil {
  495. return nil, err
  496. }
  497. req.SetBasicAuth(r.authConfig.Username, r.authConfig.Password)
  498. req.ContentLength = int64(len(body))
  499. for k, v := range headers {
  500. req.Header[k] = v
  501. }
  502. response, _, err := r.doRequest(req)
  503. if err != nil {
  504. return nil, err
  505. }
  506. return response, nil
  507. }
  508. func shouldRedirect(response *http.Response) bool {
  509. return response.StatusCode >= 300 && response.StatusCode < 400
  510. }
  511. func (r *Session) SearchRepositories(term string) (*SearchResults, error) {
  512. log.Debugf("Index server: %s", r.indexEndpoint)
  513. u := r.indexEndpoint.VersionString(1) + "search?q=" + url.QueryEscape(term)
  514. req, err := r.reqFactory.NewRequest("GET", u, nil)
  515. if err != nil {
  516. return nil, err
  517. }
  518. if r.authConfig != nil && len(r.authConfig.Username) > 0 {
  519. req.SetBasicAuth(r.authConfig.Username, r.authConfig.Password)
  520. }
  521. req.Header.Set("X-Docker-Token", "true")
  522. res, _, err := r.doRequest(req)
  523. if err != nil {
  524. return nil, err
  525. }
  526. defer res.Body.Close()
  527. if res.StatusCode != 200 {
  528. return nil, utils.NewHTTPRequestError(fmt.Sprintf("Unexpected status code %d", res.StatusCode), res)
  529. }
  530. result := new(SearchResults)
  531. err = json.NewDecoder(res.Body).Decode(result)
  532. return result, err
  533. }
  534. func (r *Session) GetAuthConfig(withPasswd bool) *AuthConfig {
  535. password := ""
  536. if withPasswd {
  537. password = r.authConfig.Password
  538. }
  539. return &AuthConfig{
  540. Username: r.authConfig.Username,
  541. Password: password,
  542. Email: r.authConfig.Email,
  543. }
  544. }
  545. func setTokenAuth(req *http.Request, token []string) {
  546. if req.Header.Get("Authorization") == "" { // Don't override
  547. req.Header.Set("Authorization", "Token "+strings.Join(token, ","))
  548. }
  549. }