Affected by GO-2024-3228
and 3 other vulnerabilities
GO-2024-3228: Coder vulnerable to post-auth URL redirection to untrusted site ('Open Redirect') in github.com/coder/coder
GO-2025-3921: Coder accepts an APIKey beyond the linked OIDC expiry if there is no refresh token in github.com/coder/coder
GO-2025-3938: Coder vulnerable to privilege escalation could lead to a cross workspace compromise in github.com/coder/coder
GO-2025-4182: Coder logs sensitive objects unsanitized in github.com/coder/coder

The highest tagged major version is
v2.
package
Version:
v0.5.7
Opens a new window with list of versions in this module.
Published: May 16, 2022
License: AGPL-3.0
Opens a new window with license information.
Imports: 31
Opens a new window with list of imports.
Imported by: 0
Opens a new window with list of known importers.
Documentation
¶
Conn wraps a peer connection with helper functions to
communicate with the agent.
ReconnectingPTY returns a connection serving a TTY that can
be reconnected to via ID.
SSH dials the built-in SSH server.
SSHClient calls SSH to create a client that uses a weak cipher
for high throughput.
type Metadata struct {
OwnerEmail string `json:"owner_email"`
OwnerUsername string `json:"owner_username"`
EnvironmentVariables map[string]string `json:"environment_variables"`
StartupScript string `json:"startup_script"`
Directory string `json:"directory"`
}
type ReconnectingPTYRequest struct {
Data string `json:"data"`
Height uint16 `json:"height"`
Width uint16 `json:"width"`
}
ReconnectingPTYRequest is sent from the client to the server
to pipe data to a PTY.
Source Files
¶
Directories
¶
Click to show internal directories.
Click to hide internal directories.