- Save the content below to
C:\scripts\wslbridge.ps1
- Run
Powershell
as Administrator
- From within Powershell, run
powershell -ExecutionPolicy Bypass -File C:\scripts\wslbridge.ps1
- Get your windows IP with
ipconfig
- Connect to your Windows IP (NOT THE WSL ONE) from the expo go on
exp://<IP>:19000
# [Configuration]
# All the ports you want to forward separated by coma
$ports=@(7700,8088,8089,19000);
# You can change the addr to your ip
# config to listen to a specific address
$addr='0.0.0.0';
# [Init]
$remoteport = bash.exe -c "ip addr | grep -Ee 'inet.*eth0'"
$found = $remoteport -match '\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}';
if( $found ){
$remoteport = $matches[0];
} else{
echo "The Script Exited, the ip address of WSL 2 cannot be found";
exit;
}
$ports_a = $ports -join ",";
# Remove Firewall Exception Rules
iex "Remove-NetFireWallRule -DisplayName 'WSL 2 Firewall Unlock' ";
# adding Exception Rules for inbound and outbound Rules
iex "New-NetFireWallRule -DisplayName 'WSL 2 Firewall Unlock' -Direction Outbound -LocalPort $ports_a -Action Allow -Protocol TCP";
iex "New-NetFireWallRule -DisplayName 'WSL 2 Firewall Unlock' -Direction Inbound -LocalPort $ports_a -Action Allow -Protocol TCP";
for( $i = 0; $i -lt $ports.length; $i++ ){
$port = $ports[$i];
iex "netsh interface portproxy delete v4tov4 listenport=$port listenaddress=$addr";
iex "netsh interface portproxy add v4tov4 listenport=$port listenaddress=$addr connectport=$port connectaddress=$remoteport";
}