-
Updated
Jun 1, 2020 - Go
tunnel
Here are 334 public repositories matching this topic...
-
Updated
May 20, 2020 - Go
-
Updated
May 20, 2020 - Go
-
Updated
May 17, 2020 - Go
不能登陆
In the dockerfile
https://github.com/jpillora/chisel/blob/f3a8df20e389ce41cd49101408231c67c093f5af/Dockerfile#L9-L12
Is that normal that https://github.com/jpillora/chisel/share.BuildVersion=1.3.1 returns Not found because I see it is used in the dockerfile?
Also maybe you could help us with packaging chisel in BlackArch BlackArch/blackarch#2456
-
Updated
Jan 11, 2020 - C++
-
Updated
Nov 4, 2019 - C++
Right now we emit a message like
T: Error: Unable to find cluster information
T: No current-context set. Please use the --context option to
T: explicitly set the context.
This is all fine, but some higher-level explanation would be helpful as well, probably linking to documentation:
T: Telepresence uses kubectl/oc to access your Kubernetes/OpenShift
T: cluster. Ple
Using GitHub identity to share a session does not work for me!
Version: Teleconsole 0.4.0
SSH key pair was created with following command (without passphrase) and public key was successfully added to GitHub account:
ssh-keygen -t rsa -b 2048 -f .ssh/$github_user_keySession was created by running:
teleconsole -i $github_userWhen I try to join a pr
https://github.com/pirate/wireguard-docs/blob/master/README.md#dns-2
Currently it is described as if the setting will be somehow pushed/shared with peers. This is not the case. Instead, DNS servers listed in this key will just be populated on the local interface.
Error in README
- The example configuration of tunnel.yml: indent charaters uses both tab and spaces, which makes it not parsable.
2 After fixed 1, client throws the following error:
configuration error: tls invalid protocol "sni"
Client version: 2.1
-
Updated
Mar 8, 2020 - Go
-
Updated
May 31, 2020 - Go
-
Updated
Oct 14, 2019 - Go
-
Updated
Jul 24, 2019 - Python
-
Updated
May 30, 2020 - Shell
-
Updated
May 31, 2020 - Go
关于自动 ssl
简单看了一下代码,发现 ssl 自动那个不太自动。
是否可以实现像 caddy 那样的?提供域名就行,启动caddy后就自动获取证书了。
好像有些难度,我不了解 trojan 协议,能否这样改:
用 http 监听端口,用 certmagic 或者 autocert 获取证书,然后在 http.Handler 里面 hijack 拿到 connection, 再处理 trojan 协议。
这样再外层就是一个 http server, 不是现在的 trojan tcp server. 不知道是否可行。
@p4gefau1t
-
Updated
Aug 22, 2018 - PHP
Improve this page
Add a description, image, and links to the tunnel topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the tunnel topic, visit your repo's landing page and select "manage topics."
你好,我按照Readme配置好了server端,也成功的启动了, 但是登陆成功之后,直接又闪退回登陆界面.想问下是怎么回事. 具体操作我录了一个gif图片 如下.
http://linuxsogood.org/wp-content/uploads/2017/09/proxy.gif
github试了好几次都传不上来图片,所以放我个人博客了.
下面是日志.
`2017-09-11 03:17:54,741 INFO [org.fengfei.lanproxy.server.config.web.routes.RouteConfig] - <handle request for api /login>
2017-09-11 03:27:05,003 INFO [org.fengfei.lanproxy.server.config.web.routes.RouteConfig]