Based on ministryofjustice/cloud-platform-port-forward-docker-image
This image uses socat to forward network traffic as defined by the environment variables.
It runs as a non-root user, which limits the attack surface.
Define the following environment variables to configure port-forwarding.
| Variable | Description | Optional |
|---|---|---|
| REMOTE_HOST | IP or address of the host you want to forward traffic to | no |
| REMOTE_PORT | Port on remote host to forward traffic to | yes (80) |
| LOCAL_PORT | Port where container listens. Must be non-privileged (i.e. >1024) | yes (8080) |
docker run -e REMOTE_HOST=<remote_host> -e REMOTE_PORT=<remote_port> -e LOCAL_PORT=<local_port> -p <exposed_local_port>:<local_port> ghcr.io/schueco/port-forwardThe following command will forward all traffic from the remote port 80 on the remote host www.example.com to port 8080 on localhost:
docker run -e REMOTE_HOST=www.example.com -e REMOTE_PORT=80 -e LOCAL_PORT=8080 -p 8080:8080 ghcr.io/schueco/port-forward