Skip to content

Instantly share code, notes, and snippets.

@killshot13
Last active December 3, 2024 22:16
Show Gist options
  • Save killshot13/8e776a3acb7760f8ebafe9a025e302f7 to your computer and use it in GitHub Desktop.
Save killshot13/8e776a3acb7760f8ebafe9a025e302f7 to your computer and use it in GitHub Desktop.
wsl2 port-forwarding PowerShell script
If (-NOT ([Security.Principal.WindowsPrincipal][Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator"))
{
$arguments = "& '" + $myinvocation.mycommand.definition + "'"
Start-Process powershell -Verb runAs -ArgumentList $arguments
Break
}
$remoteport = bash.exe -c "ifconfig eth0 | grep 'inet '"
$found = $remoteport -match '\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}';
if ( $found ) {
$remoteport = $matches[0];
}
else {
Write-Output "The Script Exited, the ip address of WSL 2 cannot be found";
exit;
}
$ports = @(3000, 3001, 3002, 5500, 19000, 19001);
Invoke-Expression "netsh interface portproxy reset";
for ( $i = 0; $i -lt $ports.length; $i++ ) {
$port = $ports[$i];
Invoke-Expression "netsh interface portproxy add v4tov4 listenport=$port connectport=$port connectaddress=$remoteport";
}
Invoke-Expression "netsh interface portproxy show v4tov4";
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment