Last active
December 3, 2024 22:16
-
-
Save killshot13/8e776a3acb7760f8ebafe9a025e302f7 to your computer and use it in GitHub Desktop.
wsl2 port-forwarding PowerShell script
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
If (-NOT ([Security.Principal.WindowsPrincipal][Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator")) | |
{ | |
$arguments = "& '" + $myinvocation.mycommand.definition + "'" | |
Start-Process powershell -Verb runAs -ArgumentList $arguments | |
Break | |
} | |
$remoteport = bash.exe -c "ifconfig eth0 | grep 'inet '" | |
$found = $remoteport -match '\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}'; | |
if ( $found ) { | |
$remoteport = $matches[0]; | |
} | |
else { | |
Write-Output "The Script Exited, the ip address of WSL 2 cannot be found"; | |
exit; | |
} | |
$ports = @(3000, 3001, 3002, 5500, 19000, 19001); | |
Invoke-Expression "netsh interface portproxy reset"; | |
for ( $i = 0; $i -lt $ports.length; $i++ ) { | |
$port = $ports[$i]; | |
Invoke-Expression "netsh interface portproxy add v4tov4 listenport=$port connectport=$port connectaddress=$remoteport"; | |
} | |
Invoke-Expression "netsh interface portproxy show v4tov4"; |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment