## 部署Saber 1. 本章节以Saber为例进行部署,其实Sword方式也是一致的 2. 进入Saber根目录执行` yarn run build`,并进入dist目录,将目录文件打成压缩包 ![image-20210211153326007](../../../images/image-20210211153326007.png) 3. 将压缩包上传至宝塔创建的站点根目录后点击`解压` ![image-20210211153448921](../../../images/image-20210211153448921.png) ![image-20210211153529342](../../../images/image-20210211153529342.png) ![image-20210211153559063](../../../images/image-20210211153559063.png) ![image-20210211153640778](../../../images/image-20210211153640778.png) 4. 解压后目录如下 ![image-20210211153702951](../../../images/image-20210211153702951.png) 5. 返回站点目录点击设置,找到`伪静态`栏目,填入后端反向代理配置 ~~~shell location ^~ /api { proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; rewrite ^/api/(.*)$ /$1 break; proxy_pass http://127.0.0.1:88; } ~~~ ![image-20210211153830861](../../../images/image-20210211153830861.png) ![image-20210211154044129](../../../images/image-20210211154044129.png) 6. 刷新地址,发现Saber正确展示,验证码也正确展示 ![image-20210211154314522](../../../images/image-20210211154314522.png) 7. 点击登录,可以正确展示,至此BladeX的部署就已经全部完工 ![image-20210211154450655](../../../images/image-20210211154450655.png)