Simple tunneling reverse proxy with a fast web UI and auto HTTPS. Designed for self-hosters.
Go to file
Anders Pitman 85a5004cc7 Implement raw TCP tunnels
Just needed to add an option to allow external connections to the
ports from the server, then set the proper values in the
authorized_keys file and on the client.
2020-10-20 19:14:04 -06:00
webui Implement raw TCP tunnels 2020-10-20 19:14:04 -06:00
api.go Implement raw TCP tunnels 2020-10-20 19:14:04 -06:00
auth.go Automatically create admin user on first start 2020-10-13 09:48:03 -06:00
boringproxy.go Implement request logging 2020-10-18 19:29:57 -06:00
client.go Implement raw TCP tunnels 2020-10-20 19:14:04 -06:00
database.go Implement raw TCP tunnels 2020-10-20 19:14:04 -06:00
go.mod Add QR code login URLs for tokens 2020-10-18 18:39:30 -06:00
go.sum Add QR code login URLs for tokens 2020-10-18 18:39:30 -06:00
main.go Start implementing remote-controlled clients 2020-10-09 10:05:31 -06:00
notes.md Update notes and todo 2020-10-18 10:48:23 -06:00
README.md Remove SirTunnel stuff from readme 2020-09-29 15:53:10 -06:00
todo.md Clean up UI a ton 2020-10-19 12:25:04 -06:00
tunnel_manager.go Implement raw TCP tunnels 2020-10-20 19:14:04 -06:00
tunnel.sh Clean up unused attributes 2020-10-12 18:22:08 -06:00
ui_handler.go Add ClientAddress 2020-10-20 18:52:32 -06:00
utils.go Automatically create admin user on first start 2020-10-13 09:48:03 -06:00

What is it?

If you have a webserver running on one computer (say your development laptop), and you want to expose it securely (ie HTTPS) via a public URL, boringproxy allows you to easily do that.