Merge pull request '6497_redirect_firewall' (!2239) from 6497_redirect_firewall into dev
gitea/salix/pipeline/head There was a failure building this commit
Details
gitea/salix/pipeline/head There was a failure building this commit
Details
Reviewed-on: #2239 Reviewed-by: Juan Ferrer <juan@verdnatura.es>
This commit is contained in:
commit
6014db75ea
|
@ -0,0 +1,18 @@
|
|||
# win
|
||||
|
||||
In this folder, there are two scripts:
|
||||
1- 'addRule' : adds a rule to the Windows firewall to accept requests on ports 3000 and 5000.
|
||||
2- 'redirect' : allows redirecting ports 3000 and 5000 so that our machine processes them with our local Salix server.
|
||||
|
||||
|
||||
## Run
|
||||
|
||||
Two ways:
|
||||
|
||||
1-Search the project of Salix in WSL with the explorer of windows, for example: \\wsl.localhost\Debian\home\your_user\projects\salix and with a terminal Powershell with administrator permissions execute addRule.ps1 only one time and execute redirect.ps1 every time you need redirect ports when the project is running.
|
||||
|
||||
2-Search the project of Salix in WSL with the explorer of windows and edit the files with .lnk with the path of your installation of Salix. So , you will have a direct link for execute.
|
||||
|
||||
## Server
|
||||
|
||||
To access your Salix server, you can directly enter the IP or name of your computer along with the corresponding port
|
|
@ -0,0 +1,26 @@
|
|||
# Definir las propiedades de la nueva regla
|
||||
# Define el nombre de la regla
|
||||
$ruleName = "salixRule"
|
||||
|
||||
# Define el perfil de la regla (Dominio, Privado, P<>blico)
|
||||
$profile = "Domain,Private,Public"
|
||||
|
||||
# Define la acción (Permitir/Bloquear)
|
||||
$action = "Allow"
|
||||
|
||||
# Define el protocolo (TCP/UDP)
|
||||
$protocol = "TCP"
|
||||
|
||||
# Define el puerto local
|
||||
$port = 3000, 5000
|
||||
|
||||
# Define una descripción (opcional)
|
||||
$description = "Permitir tráfico HTTP.Frontend y backend Salix."
|
||||
|
||||
# Crea la regla de firewall
|
||||
New-NetFirewallRule -DisplayName $ruleName -Profile $profile -Action $action -Protocol $protocol -LocalPort $port -Description $description
|
||||
|
||||
# Imprime un mensaje de confirmación
|
||||
Write-Host "Regla de firewall creada exitosamente: $ruleName"
|
||||
|
||||
pause
|
Binary file not shown.
Binary file not shown.
|
@ -0,0 +1,5 @@
|
|||
# Redireccionar ports
|
||||
|
||||
$wslip = ((wsl hostname -I) -split " ")[0]
|
||||
netsh interface portproxy set v4tov4 listenport=3000 listenaddress=0.0.0.0 connectport=3000 connectaddress=$wslip
|
||||
netsh interface portproxy set v4tov4 listenport=5000 listenaddress=0.0.0.0 connectport=5000 connectaddress=$wslip
|
Loading…
Reference in New Issue