aboutsummaryrefslogtreecommitdiffstats
path: root/docs/content
diff options
context:
space:
mode:
authorLunny Xiao <xiaolunwen@gmail.com>2023-04-10 01:53:08 +0800
committerGitHub <noreply@github.com>2023-04-09 19:53:08 +0200
commit53439e5c7944b3dc2aa5974b7ea1659b0d6e61f1 (patch)
treefe79265de937869047f33cdf89f048260c5a8feb /docs/content
parent9f6bc7c6f4f657c3245db7cea44c85454d5d8606 (diff)
downloadgitea-53439e5c7944b3dc2aa5974b7ea1659b0d6e61f1.tar.gz
gitea-53439e5c7944b3dc2aa5974b7ea1659b0d6e61f1.zip
Fix https setup doc zh-cn (#24015)
Diffstat (limited to 'docs/content')
-rw-r--r--docs/content/doc/administration/https-support.zh-cn.md12
1 files changed, 6 insertions, 6 deletions
diff --git a/docs/content/doc/administration/https-support.zh-cn.md b/docs/content/doc/administration/https-support.zh-cn.md
index 58f96d5767..c7b7ec08c6 100644
--- a/docs/content/doc/administration/https-support.zh-cn.md
+++ b/docs/content/doc/administration/https-support.zh-cn.md
@@ -56,9 +56,9 @@ PORT_TO_REDIRECT = 3080
## 使用 ACME (默认: Let's Encrypt)
-[ACME](https://tools.ietf.org/html/rfc8555) 是一种证书颁发机构标准协议,允许您自动请求和续订 SSL/TLS 证书。[Let`s Encrypt](https://letsencrypt.org/) 是使用此标准的免费公开信任的证书颁发机构服务器。仅实施“HTTP-01”和“TLS-ALPN-01”挑战。为了使 ACME 质询通过并验证您的域所有权,“80”端口(“HTTP-01”)或“443”端口(“TLS-ALPN-01”)上 gitea 域的外部流量必须由 gitea 实例提供服务。可能需要设置 [HTTP 重定向](#setting-up-http-redirection) 和端口转发才能正确路由外部流量。否则,到端口“80”的正常流量将自动重定向到 HTTPS。**您必须同意**ACME提供商的服务条款(默认为Let's Encrypt的[服务条款](https://letsencrypt.org/documents/LE-SA-v1.2-2017年11月15日.pdf))。
+[ACME](https://tools.ietf.org/html/rfc8555) 是一种证书颁发机构标准协议,允许您自动请求和续订 SSL/TLS 证书。[Let`s Encrypt](https://letsencrypt.org/) 是使用此标准的免费公开信任的证书颁发机构服务器。仅实施“HTTP-01”和“TLS-ALPN-01”挑战。为了使 ACME 质询通过并验证您的域所有权,“80”端口(“HTTP-01”)或“443”端口(“TLS-ALPN-01”)上 gitea 域的外部流量必须由 gitea 实例提供服务。可能需要设置 [HTTP 重定向](#设置HTTP重定向) 和端口转发才能正确路由外部流量。否则,到端口“80”的正常流量将自动重定向到 HTTPS。**您必须同意**ACME提供商的服务条款(默认为Let's Encrypt的 [服务条款](https://letsencrypt.org/documents/LE-SA-v1.2-2017年11月15日.pdf)。
-Minimum setup using the default Let's Encrypt:
+实用默认 Let's Encrypt 的最小配置如下:
```ini
[server]
@@ -88,14 +88,14 @@ ACME_EMAIL=email@example.com
要了解关于配置, 请访问 [配置备忘单](../config-cheat-sheet#server-server)获取更多信息
-## Using a reverse proxy
+## 使用反向代理服务器
-Setup up your reverse proxy as shown in the [reverse proxy guide](../reverse-proxies).
+按照 [reverse proxy guide](../reverse-proxies) 的规则设置你的反向代理服务器
-After that, enable HTTPS by following one of these guides:
+然后,按照下面的想到启用 HTTPS:
- [nginx](https://nginx.org/en/docs/http/configuring_https_servers.html)
- [apache2/httpd](https://httpd.apache.org/docs/2.4/ssl/ssl_howto.html)
- [caddy](https://caddyserver.com/docs/tls)
-Note: Enabling HTTPS only at the proxy level is referred as [TLS Termination Proxy](https://en.wikipedia.org/wiki/TLS_termination_proxy). The proxy server accepts incoming TLS connections, decrypts the contents, and passes the now unencrypted contents to Gitea. This is normally fine as long as both the proxy and Gitea instances are either on the same machine, or on different machines within private network (with the proxy is exposed to outside network). If your Gitea instance is separated from your proxy over a public network, or if you want full end-to-end encryption, you can also [enable HTTPS support directly in Gitea using built-in server](#使用内置服务器) and forward the connections over HTTPS instead.
+注意:仅在代理层启用 HTTPS 被称为 [TLS 终止代理](https://en.wikipedia.org/wiki/TLS_termination_proxy)。代理服务器接受传入的 TLS 连接,解密内容,然后将现在未加密的内容传递给 Gitea。只要代理和 Gitea 实例在同一台计算机上或在私有网络中的不同计算机上(代理暴露给外部网络),这通常是可以接受的。如果您的 Gitea 实例与代理隔离在公共网络上,或者如果您想要全端到端的加密,您还可以直接在 Gitea 中 [启用内置服务器的 HTTPS 支持](#使用内置服务器),并将连接转发到 HTTPS 上。