Skip to content

Commit 67b30ee

Browse files
committed
translate library/xml.po
1 parent a1e5917 commit 67b30ee

File tree

1 file changed

+65
-31
lines changed

1 file changed

+65
-31
lines changed

library/xml.po

+65-31
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,16 @@
1-
# SOME DESCRIPTIVE TITLE.
2-
# Copyright (C) 2001-2022, Python Software Foundation
1+
# Copyright (C) 2001-2023, Python Software Foundation
32
# This file is distributed under the same license as the Python package.
43
#
54
# Translators:
65
# Leon H., 2017
6+
# Matt Wang <mattwang44@gmail.com>, 2023
77
msgid ""
88
msgstr ""
99
"Project-Id-Version: Python 3.12\n"
1010
"Report-Msgid-Bugs-To: \n"
1111
"POT-Creation-Date: 2023-07-29 10:36+0000\n"
12-
"PO-Revision-Date: 2018-05-23 16:16+0000\n"
13-
"Last-Translator: Adrian Liaw <adrianliaw2000@gmail.com>\n"
12+
"PO-Revision-Date: 2023-08-21 02:16+0000\n"
13+
"Last-Translator: Matt Wang <mattwang44@gmail.com>\n"
1414
"Language-Team: Chinese - TAIWAN (https://github.com/python/python-docs-zh-"
1515
"tw)\n"
1616
"Language: zh_TW\n"
@@ -30,14 +30,16 @@ msgstr "**原始碼:**\\ :source:`Lib/xml/`"
3030
#: ../../library/xml.rst:16
3131
msgid ""
3232
"Python's interfaces for processing XML are grouped in the ``xml`` package."
33-
msgstr ""
33+
msgstr "Python 處理 XML 的介面被歸類於 ``xml`` 套件中。"
3434

3535
#: ../../library/xml.rst:20
3636
msgid ""
3737
"The XML modules are not secure against erroneous or maliciously constructed "
3838
"data. If you need to parse untrusted or unauthenticated data see the :ref:"
3939
"`xml-vulnerabilities` and :ref:`defusedxml-package` sections."
4040
msgstr ""
41+
"XML 模組不能防止錯誤或惡意建構的資料。如果你需要剖析不受信任或未經身份驗證的"
42+
"資料,請參閱 :ref:`xml-vulnerabilities` 和 :ref:`defusedxml-package` 部分。"
4143

4244
#: ../../library/xml.rst:25
4345
msgid ""
@@ -46,46 +48,51 @@ msgid ""
4648
"is included with Python, so the :mod:`xml.parsers.expat` module will always "
4749
"be available."
4850
msgstr ""
51+
"請務必注意 :mod:`xml` 套件中的模組要求至少有一個可用的 SAX 相容 XML 剖析器。"
52+
"Expat 剖析器包含在 Python 中,所以 :mod:`xml.parsers.expat` 模組都可被使用。"
4953

5054
#: ../../library/xml.rst:30
5155
msgid ""
5256
"The documentation for the :mod:`xml.dom` and :mod:`xml.sax` packages are the "
5357
"definition of the Python bindings for the DOM and SAX interfaces."
5458
msgstr ""
59+
":mod:`xml.dom` 和 :mod:`xml.sax` 套件的文件為 DOM 和 SAX 介面的 Python 繫結的"
60+
"定義。"
5561

5662
#: ../../library/xml.rst:33
5763
msgid "The XML handling submodules are:"
58-
msgstr ""
64+
msgstr "XML 處理子模組是:"
5965

6066
#: ../../library/xml.rst:35
6167
msgid ""
6268
":mod:`xml.etree.ElementTree`: the ElementTree API, a simple and lightweight "
6369
"XML processor"
6470
msgstr ""
71+
":mod:`xml.etree.ElementTree`:ElementTree API,一個簡單且輕量級的 XML 處理器"
6572

6673
#: ../../library/xml.rst:40
6774
msgid ":mod:`xml.dom`: the DOM API definition"
68-
msgstr ""
75+
msgstr ":mod:`xml.dom`:DOM API 定義"
6976

7077
#: ../../library/xml.rst:41
7178
msgid ":mod:`xml.dom.minidom`: a minimal DOM implementation"
72-
msgstr ""
79+
msgstr ":mod:`xml.dom.minidom`:最小的 DOM 實作"
7380

7481
#: ../../library/xml.rst:42
7582
msgid ":mod:`xml.dom.pulldom`: support for building partial DOM trees"
76-
msgstr ""
83+
msgstr ":mod:`xml.dom.pulldom`:支援建置部分 DOM 樹"
7784

7885
#: ../../library/xml.rst:46
7986
msgid ":mod:`xml.sax`: SAX2 base classes and convenience functions"
80-
msgstr ""
87+
msgstr ":mod:`xml.sax`:SAX2 基底類別和便利函式"
8188

8289
#: ../../library/xml.rst:47
8390
msgid ":mod:`xml.parsers.expat`: the Expat parser binding"
84-
msgstr ""
91+
msgstr ":mod:`xml.parsers.expat`:Expat 剖析器繫結"
8592

8693
#: ../../library/xml.rst:53
8794
msgid "XML vulnerabilities"
88-
msgstr ""
95+
msgstr "XML 漏洞"
8996

9097
#: ../../library/xml.rst:55
9198
msgid ""
@@ -94,16 +101,19 @@ msgid ""
94101
"attacks, access local files, generate network connections to other machines, "
95102
"or circumvent firewalls."
96103
msgstr ""
104+
"XML 處理模組無法抵禦惡意建構的資料。攻擊者可以濫用 XML 功能來執行阻斷服務攻"
105+
"擊 (denial of service attack)、存取本地檔案、生成與其他機器的網路連接或繞過防"
106+
"火牆。"
97107

98108
#: ../../library/xml.rst:60
99109
msgid ""
100110
"The following table gives an overview of the known attacks and whether the "
101111
"various modules are vulnerable to them."
102-
msgstr ""
112+
msgstr "下表概述了已知的攻擊以及各個模組是否易有漏洞。"
103113

104114
#: ../../library/xml.rst:64
105115
msgid "kind"
106-
msgstr ""
116+
msgstr "種類"
107117

108118
#: ../../library/xml.rst:64
109119
msgid "sax"
@@ -127,51 +137,51 @@ msgstr "xmlrpc"
127137

128138
#: ../../library/xml.rst:66
129139
msgid "billion laughs"
130-
msgstr ""
140+
msgstr "billion laughs"
131141

132142
#: ../../library/xml.rst:66 ../../library/xml.rst:67
133143
msgid "**Vulnerable** (1)"
134-
msgstr ""
144+
msgstr "**脆弱** (1)"
135145

136146
#: ../../library/xml.rst:67
137147
msgid "quadratic blowup"
138-
msgstr ""
148+
msgstr "二次爆炸 (quadratic blowup)"
139149

140150
#: ../../library/xml.rst:68 ../../library/xml.rst:103
141151
msgid "external entity expansion"
142-
msgstr ""
152+
msgstr "外部實體擴展 (external entity expansion)"
143153

144154
#: ../../library/xml.rst:68 ../../library/xml.rst:69
145155
msgid "Safe (5)"
146-
msgstr ""
156+
msgstr "安全 (5)"
147157

148158
#: ../../library/xml.rst:68
149159
msgid "Safe (2)"
150-
msgstr ""
160+
msgstr "安全 (2)"
151161

152162
#: ../../library/xml.rst:68
153163
msgid "Safe (3)"
154-
msgstr ""
164+
msgstr "安全 (3)"
155165

156166
#: ../../library/xml.rst:68
157167
msgid "Safe (4)"
158-
msgstr ""
168+
msgstr "安全 (4)"
159169

160170
#: ../../library/xml.rst:69 ../../library/xml.rst:108
161171
msgid "`DTD`_ retrieval"
162-
msgstr ""
172+
msgstr "`DTD`_ 檢索"
163173

164174
#: ../../library/xml.rst:69 ../../library/xml.rst:70
165175
msgid "Safe"
166-
msgstr ""
176+
msgstr "安全"
167177

168178
#: ../../library/xml.rst:70 ../../library/xml.rst:115
169179
msgid "decompression bomb"
170-
msgstr ""
180+
msgstr "解壓縮炸彈"
171181

172182
#: ../../library/xml.rst:70
173183
msgid "**Vulnerable**"
174-
msgstr ""
184+
msgstr "**脆弱**"
175185

176186
#: ../../library/xml.rst:73
177187
msgid ""
@@ -180,32 +190,37 @@ msgid ""
180190
"to potential reliance on system-provided libraries. Check :const:`pyexpat."
181191
"EXPAT_VERSION`."
182192
msgstr ""
193+
"Expat 2.4.1 及更新的版本不易受到「billion laughs」和「二次爆炸」漏洞的影響。"
194+
"但仍可能由於依賴系統提供的函式庫而被列為易受攻擊的項目。請檢查 :const:"
195+
"`pyexpat.EXPAT_VERSION`。"
183196

184197
#: ../../library/xml.rst:77
185198
msgid ""
186199
":mod:`xml.etree.ElementTree` doesn't expand external entities and raises a :"
187200
"exc:`~xml.etree.ElementTree.ParseError` when an entity occurs."
188201
msgstr ""
202+
":mod:`xml.etree.ElementTree` 不會擴展外部實體,並在實體出現時引發 :exc:`~xml."
203+
"etree.ElementTree.ParseError`。"
189204

190205
#: ../../library/xml.rst:79
191206
msgid ""
192207
":mod:`xml.dom.minidom` doesn't expand external entities and simply returns "
193208
"the unexpanded entity verbatim."
194-
msgstr ""
209+
msgstr ":mod:`xml.dom.minidom` 不會擴展外部實體,只會逐字回傳未擴展的實體。"
195210

196211
#: ../../library/xml.rst:81
197212
msgid ":mod:`xmlrpc.client` doesn't expand external entities and omits them."
198-
msgstr ""
213+
msgstr ":mod:`xmlrpc.client` 不會擴展外部實體且會忽略它們。"
199214

200215
#: ../../library/xml.rst:82
201216
msgid ""
202217
"Since Python 3.7.1, external general entities are no longer processed by "
203218
"default."
204-
msgstr ""
219+
msgstr "從 Python 3.7.1 開始,預設情況下不再處理外部通用實體。"
205220

206221
#: ../../library/xml.rst:91
207222
msgid "billion laughs / exponential entity expansion"
208-
msgstr ""
223+
msgstr "billion laughs / 指數實體擴展"
209224

210225
#: ../../library/xml.rst:87
211226
msgid ""
@@ -215,10 +230,13 @@ msgid ""
215230
"string. The exponential expansion results in several gigabytes of text and "
216231
"consumes lots of memory and CPU time."
217232
msgstr ""
233+
"`Billion Laughs`_ 攻擊(也稱為指數實體擴展)使用多層巢狀實體。每個實體多次引"
234+
"用另一個實體,最終的實體定義包含一個小字串。指數擴展會產生數 GB 的文本,並消"
235+
"耗大量記憶體和 CPU 時間。"
218236

219237
#: ../../library/xml.rst:98
220238
msgid "quadratic blowup entity expansion"
221-
msgstr ""
239+
msgstr "二次爆炸實體擴展"
222240

223241
#: ../../library/xml.rst:94
224242
msgid ""
@@ -228,20 +246,27 @@ msgid ""
228246
"isn't as efficient as the exponential case but it avoids triggering parser "
229247
"countermeasures that forbid deeply nested entities."
230248
msgstr ""
249+
"二次爆炸攻擊類似於 `Billion Laughs`_ 攻擊;它也濫用實體擴展。它不是巢狀實體,"
250+
"而是一遍又一遍地重複一個具有幾千個字元的大型實體。該攻擊不如指數情況那麼有"
251+
"效,但它不會觸發那些用來防止深度巢狀實體的剖析器對策。"
231252

232253
#: ../../library/xml.rst:101
233254
msgid ""
234255
"Entity declarations can contain more than just text for replacement. They "
235256
"can also point to external resources or local files. The XML parser accesses "
236257
"the resource and embeds the content into the XML document."
237258
msgstr ""
259+
"實體聲明不僅僅可以包含用於替換的文本,它們還可以指向外部資源或本地檔案。XML "
260+
"剖析器會存取資源並將內容嵌入到 XML 文件中。"
238261

239262
#: ../../library/xml.rst:106
240263
msgid ""
241264
"Some XML libraries like Python's :mod:`xml.dom.pulldom` retrieve document "
242265
"type definitions from remote or local locations. The feature has similar "
243266
"implications as the external entity expansion issue."
244267
msgstr ""
268+
"一些 XML 函式庫(例如 Python 的 :mod:`xml.dom.pulldom`)從遠端或本地位置檢索"
269+
"文件類型定義。該功能與外部實體擴展問題具有類似的含義。"
245270

246271
#: ../../library/xml.rst:111
247272
msgid ""
@@ -250,12 +275,17 @@ msgid ""
250275
"files. For an attacker it can reduce the amount of transmitted data by three "
251276
"magnitudes or more."
252277
msgstr ""
278+
"解壓縮炸彈(又名 `ZIP bomb`_\\ )適用於所有可以剖析壓縮 XML 串流(例如 gzip "
279+
"壓縮的 HTTP 串流或 LZMA 壓縮檔案)的 XML 函式庫。對於攻擊者來說,它可以將傳輸"
280+
"的資料量減少三個或更多數量級。"
253281

254282
#: ../../library/xml.rst:117
255283
msgid ""
256284
"The documentation for `defusedxml`_ on PyPI has further information about "
257285
"all known attack vectors with examples and references."
258286
msgstr ""
287+
"PyPI 上的 `defusedxml`_ 文件包含有關所有已知攻擊媒介 (attack vector) 的更多資"
288+
"訊以及範例和參考資料。"
259289

260290
#: ../../library/xml.rst:123
261291
msgid "The :mod:`!defusedxml` Package"
@@ -269,3 +299,7 @@ msgid ""
269299
"data. The package also ships with example exploits and extended "
270300
"documentation on more XML exploits such as XPath injection."
271301
msgstr ""
302+
"`defusedxml`_ 是一個純 Python 套件,其中包含所有標準函式庫中 XML 剖析器的修正"
303+
"版本子類別,可防止任何潛在的惡意操作。當伺服器程式會剖析任何不受信任的 XML 資"
304+
"料時建議使用此套件。該套件還附帶了更多有關 XML 漏洞(例如 XPath 注入)的範例"
305+
"漏洞和延伸文件。"

0 commit comments

Comments
 (0)