Skip to content

Instantly share code, notes, and snippets.

@deborahly
Created April 21, 2023 04:35
Show Gist options
  • Save deborahly/707a59303e149e6cd074dab5eca2b5a5 to your computer and use it in GitHub Desktop.
Save deborahly/707a59303e149e6cd074dab5eca2b5a5 to your computer and use it in GitHub Desktop.
Procedure to expose Expo Go ports from WSL on Windows Firewall
  1. Save the content below to C:\scripts\wslbridge.ps1
  2. Run Powershell as Administrator
  3. From within Powershell, run powershell -ExecutionPolicy Bypass -File C:\scripts\wslbridge.ps1
  4. Get your windows IP with ipconfig
  5. Connect to your Windows IP (NOT THE WSL ONE) from the expo go on exp://<IP>:19000
# [Configuration]
# All the ports you want to forward separated by coma
$ports=@(7700,8088,8089,19000);
# You can change the addr to your ip
# config to listen to a specific address
$addr='0.0.0.0';
# [Init]
$remoteport = bash.exe -c "ip addr | grep -Ee 'inet.*eth0'"
$found = $remoteport -match '\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}';
if( $found ){
  $remoteport = $matches[0];
} else{
  echo "The Script Exited, the ip address of WSL 2 cannot be found";
  exit;
}
$ports_a = $ports -join ",";
# Remove Firewall Exception Rules
iex "Remove-NetFireWallRule -DisplayName 'WSL 2 Firewall Unlock' ";
# adding Exception Rules for inbound and outbound Rules
iex "New-NetFireWallRule -DisplayName 'WSL 2 Firewall Unlock' -Direction Outbound -LocalPort $ports_a -Action Allow -Protocol TCP";
iex "New-NetFireWallRule -DisplayName 'WSL 2 Firewall Unlock' -Direction Inbound -LocalPort $ports_a -Action Allow -Protocol TCP";
for( $i = 0; $i -lt $ports.length; $i++ ){
  $port = $ports[$i];
  iex "netsh interface portproxy delete v4tov4 listenport=$port listenaddress=$addr";
  iex "netsh interface portproxy add v4tov4 listenport=$port listenaddress=$addr connectport=$port connectaddress=$remoteport";
}
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment