-
-
Save waptik/fce34ad6bce753ed4ba00e85ba715f66 to your computer and use it in GitHub Desktop.
Get ngrok hostname from command line
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/sh | |
# ngrok's web interface is HTML, but configuration is bootstrapped as a JSON | |
# string. We can hack out the forwarded hostname by extracting the next | |
# `*.ngrok.io` string from the JSON | |
# | |
# Brittle as all get out--YMMV. If you're still reading, usage is: | |
# | |
# $ ./ngrok_hostname.sh <proto> <addr> | |
# | |
# To retrieve the ngrok'd URL of an HTTP service running locally on :3332, use: | |
# | |
# $ ./ngrok_hostname.sh http localhost:3332 | |
# | |
# The protocol (http, https, etc) of the forwarded service | |
PROTO=$1 | |
# The address of the forwarded service | |
ADDR=$2 | |
# Hack JSON out of the web interface bootstrap | |
json=$(curl -s localhost:4040/inspect/http \ | |
| grep -oP 'window.common[^;]+' \ | |
| sed 's/^[^\(]*("//' \ | |
| sed 's/")\s*$//' \ | |
| sed 's/\\"/"/g') | |
# Parse JSON for the URLs matching the configured `$ADDR` | |
hosts=$(echo $json \ | |
| jq -r ".Session.Tunnels \ | |
| values \ | |
| map(select(.Config.addr == \"$ADDR\") | .URL) | .[]") | |
echo "$hosts" | grep "^${PROTO}:" |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
https://gist.github.com/rjz/af40158c529d7c407420fc0de490758b?permalink_comment_id=3561680#gistcomment-3561680