mirror of
https://codeberg.org/forgejo/forgejo.git
synced 2024-11-28 09:21:13 -05:00
Fix https setup doc zh-cn (#24015)
This commit is contained in:
parent
9f6bc7c6f4
commit
53439e5c79
1 changed files with 6 additions and 6 deletions
|
@ -56,9 +56,9 @@ PORT_TO_REDIRECT = 3080
|
||||||
|
|
||||||
## 使用 ACME (默认: Let's Encrypt)
|
## 使用 ACME (默认: Let's Encrypt)
|
||||||
|
|
||||||
[ACME](https://tools.ietf.org/html/rfc8555) 是一种证书颁发机构标准协议,允许您自动请求和续订 SSL/TLS 证书。[Let`s Encrypt](https://letsencrypt.org/) 是使用此标准的免费公开信任的证书颁发机构服务器。仅实施“HTTP-01”和“TLS-ALPN-01”挑战。为了使 ACME 质询通过并验证您的域所有权,“80”端口(“HTTP-01”)或“443”端口(“TLS-ALPN-01”)上 gitea 域的外部流量必须由 gitea 实例提供服务。可能需要设置 [HTTP 重定向](#setting-up-http-redirection) 和端口转发才能正确路由外部流量。否则,到端口“80”的正常流量将自动重定向到 HTTPS。**您必须同意**ACME提供商的服务条款(默认为Let's Encrypt的[服务条款](https://letsencrypt.org/documents/LE-SA-v1.2-2017年11月15日.pdf))。
|
[ACME](https://tools.ietf.org/html/rfc8555) 是一种证书颁发机构标准协议,允许您自动请求和续订 SSL/TLS 证书。[Let`s Encrypt](https://letsencrypt.org/) 是使用此标准的免费公开信任的证书颁发机构服务器。仅实施“HTTP-01”和“TLS-ALPN-01”挑战。为了使 ACME 质询通过并验证您的域所有权,“80”端口(“HTTP-01”)或“443”端口(“TLS-ALPN-01”)上 gitea 域的外部流量必须由 gitea 实例提供服务。可能需要设置 [HTTP 重定向](#设置HTTP重定向) 和端口转发才能正确路由外部流量。否则,到端口“80”的正常流量将自动重定向到 HTTPS。**您必须同意**ACME提供商的服务条款(默认为Let's Encrypt的 [服务条款](https://letsencrypt.org/documents/LE-SA-v1.2-2017年11月15日.pdf)。
|
||||||
|
|
||||||
Minimum setup using the default Let's Encrypt:
|
实用默认 Let's Encrypt 的最小配置如下:
|
||||||
|
|
||||||
```ini
|
```ini
|
||||||
[server]
|
[server]
|
||||||
|
@ -88,14 +88,14 @@ ACME_EMAIL=email@example.com
|
||||||
|
|
||||||
要了解关于配置, 请访问 [配置备忘单](../config-cheat-sheet#server-server)获取更多信息
|
要了解关于配置, 请访问 [配置备忘单](../config-cheat-sheet#server-server)获取更多信息
|
||||||
|
|
||||||
## Using a reverse proxy
|
## 使用反向代理服务器
|
||||||
|
|
||||||
Setup up your reverse proxy as shown in the [reverse proxy guide](../reverse-proxies).
|
按照 [reverse proxy guide](../reverse-proxies) 的规则设置你的反向代理服务器
|
||||||
|
|
||||||
After that, enable HTTPS by following one of these guides:
|
然后,按照下面的想到启用 HTTPS:
|
||||||
|
|
||||||
- [nginx](https://nginx.org/en/docs/http/configuring_https_servers.html)
|
- [nginx](https://nginx.org/en/docs/http/configuring_https_servers.html)
|
||||||
- [apache2/httpd](https://httpd.apache.org/docs/2.4/ssl/ssl_howto.html)
|
- [apache2/httpd](https://httpd.apache.org/docs/2.4/ssl/ssl_howto.html)
|
||||||
- [caddy](https://caddyserver.com/docs/tls)
|
- [caddy](https://caddyserver.com/docs/tls)
|
||||||
|
|
||||||
Note: Enabling HTTPS only at the proxy level is referred as [TLS Termination Proxy](https://en.wikipedia.org/wiki/TLS_termination_proxy). The proxy server accepts incoming TLS connections, decrypts the contents, and passes the now unencrypted contents to Gitea. This is normally fine as long as both the proxy and Gitea instances are either on the same machine, or on different machines within private network (with the proxy is exposed to outside network). If your Gitea instance is separated from your proxy over a public network, or if you want full end-to-end encryption, you can also [enable HTTPS support directly in Gitea using built-in server](#使用内置服务器) and forward the connections over HTTPS instead.
|
注意:仅在代理层启用 HTTPS 被称为 [TLS 终止代理](https://en.wikipedia.org/wiki/TLS_termination_proxy)。代理服务器接受传入的 TLS 连接,解密内容,然后将现在未加密的内容传递给 Gitea。只要代理和 Gitea 实例在同一台计算机上或在私有网络中的不同计算机上(代理暴露给外部网络),这通常是可以接受的。如果您的 Gitea 实例与代理隔离在公共网络上,或者如果您想要全端到端的加密,您还可以直接在 Gitea 中 [启用内置服务器的 HTTPS 支持](#使用内置服务器),并将连接转发到 HTTPS 上。
|
||||||
|
|
Loading…
Reference in a new issue