August 7, 2025, we refactored a single monolithic Devproxy management script into a modular architecture, splitting functionality into five dedicated scripts. This improves maintainability and clarity by separating concerns: firewall management, SSH tunnel handling, socat proxy control, and container lifecycle operations.
When the SSH reverse-tunnel from a laptop to the server dies unexpectedly, the sshd process on the server may remain listening on port 4000. In this scenario, you must kill the stale SSH process on port 4000 before re-establishing the tunnel from the laptop. The modular scripts allow you to detect and resolve this by safely checking and killing the server-side SSH listener before retrying the connection
310_firewall_toggle.sh (1 310 bytes)
320_devproxy_check_ssh_tunnel.sh (1 196 bytes)
sshd
)330_devproxy_socat_container.sh (2 430 bytes)
$HOME/socat_devproxy.log
340_devproxy_container_enable.sh (427 bytes)
docker-compose.yml
existsservice.devproxy.site
is running; offers to stop350_devproxy_container_disable.sh (315 bytes)
service.devproxy.site
containerSeparation of concerns Each script has a single responsibility (firewall, SSH, socat, container enable/disable).
Interactive safety Prompts prevent accidental kills or configuration changes.
Revalidation Every action is followed by a recheck of system state.
Logging & diagnostics Proxy logs are captured for easier troubleshooting.
© 2019–2025 Weplex Comunicação. Atendemos presencialmente em Ribeirão Preto, na Maurílio Biagi 800, Sala 1104 (SP) ou remotamente, profissionais liberais de todo Brasil e do mundo. Meplex Comunicações, Weplex Comunicações, Weplex Communications e xBio são marcas registradas de Weplex Comunicações. Todo o conteúdo deste site está protegido por direitos autorais © 2019–2025 Weplex Comunicações. Todos os direitos reservados.