refs #6497:rdirect

This commit is contained in:
Sergio De la torre 2024-04-03 09:30:18 +02:00
parent 7aeb9e4f32
commit 642d280386
5 changed files with 49 additions and 0 deletions

18
win/README.md Normal file
View File

@ -0,0 +1,18 @@
# win
In this folder, there are two scripts:
1- 'addRule' : adds a rule to the Windows firewall to accept requests on ports 3000 and 5000.
2- 'redirect' : allows redirecting ports 3000 and 5000 so that our machine processes them with our local Salix server.
## Run
Two ways:
1-Search the project of Salix in WSL with the explorer of windows, for example: \\wsl.localhost\Debian\home\your_user\projects\salix and with a terminal with administrator permissions execute addRule only one time and execute redirect.ps1 every time you need redirect ports.
2-Search the project of Salix in WSL with the explorer of windows and edit the .lnk with the path of your installation of Salix. So , you will have a direct link for execute.
## Server
To access your Salix server, you can directly enter the IP or name of your computer along with the corresponding port

26
win/addRule.ps1 Normal file
View File

@ -0,0 +1,26 @@
# Definir las propiedades de la nueva regla
# Define el nombre de la regla
$ruleName = "salixRule"
# Define el perfil de la regla (Dominio, Privado, P<>blico)
$profile = "Domain,Private,Public"
# Define la acción (Permitir/Bloquear)
$action = "Allow"
# Define el protocolo (TCP/UDP)
$protocol = "TCP"
# Define el puerto local
$port = 3000, 5000
# Define una descripción (opcional)
$description = "Permitir tráfico HTTP.Frontend y backend Salix."
# Crea la regla de firewall
New-NetFirewallRule -DisplayName $ruleName -Profile $profile -Action $action -Protocol $protocol -LocalPort $port -Description $description
# Imprime un mensaje de confirmación
Write-Host "Regla de firewall creada exitosamente: $ruleName"
pause

BIN
win/powershellAddRule.lnk Normal file

Binary file not shown.

BIN
win/powershellRedirect.lnk Normal file

Binary file not shown.

5
win/redirect.ps1 Normal file
View File

@ -0,0 +1,5 @@
# Redireccionar ports
$wslip = ((wsl hostname -I) -split " ")[0]
netsh interface portproxy set v4tov4 listenport=3000 listenaddress=0.0.0.0 connectport=3000 connectaddress=$wslip
netsh interface portproxy set v4tov4 listenport=5000 listenaddress=0.0.0.0 connectport=5000 connectaddress=$wslip