Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Commit7958c52

Browse files
authored
docs: faq: restrict file transfers from workspaces (#13534)
1 parent1f9bdc3 commit7958c52

File tree

1 file changed

+33
-0
lines changed

1 file changed

+33
-0
lines changed

‎docs/faqs.md

Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -501,3 +501,36 @@ Note that the JetBrains Gateway configuration blocks for each host in your SSH
501501
config file will be overwritten by the JetBrains Gateway client when it
502502
re-authenticates to your Coder deployment so you must add the above config as a
503503
separate block and not add it to any existing ones.
504+
505+
### How can I restrict inbound/outbound file transfers from Coder workspaces?
506+
507+
In certain environments, it is essential to keep confidential files within
508+
workspaces and prevent users from uploading or downloading resources using tools
509+
like `scp` or `rsync`.
510+
511+
To achieve this, template admins can use the environment variable
512+
`CODER_AGENT_BLOCK_FILE_TRANSFER`to enable additional SSH command controls.
513+
This variable allows the system to check if the executed application is on the
514+
block list, which includes `scp`, `rsync`, `ftp`, and `nc`.
515+
516+
```hcl
517+
resource "docker_container" "workspace" {
518+
...
519+
env = [
520+
"CODER_AGENT_TOKEN=${coder_agent.main.token}",
521+
"CODER_AGENT_BLOCK_FILE_TRANSFER=true",
522+
...
523+
]
524+
}
525+
```
526+
527+
#### Important Notice
528+
529+
This control operates at the `ssh-exec` level or during `sftp` sessions. While
530+
it can help prevent automated file transfers using the specified tools, users
531+
can still SSH into the workspace and manually initiate file transfers. The
532+
primary purpose of this feature is to warn and discourage users from downloading
533+
confidential resources to their local machines.
534+
535+
For more advanced security needs, consider adopting an endpoint security
536+
solution.

0 commit comments

Comments
 (0)

[8]ページ先頭

©2009-2025 Movatter.jp