1
- # SOME DESCRIPTIVE TITLE.
2
- # Copyright (C) 2001-2022, Python Software Foundation
1
+ # Copyright (C) 2001-2023, Python Software Foundation
3
2
# This file is distributed under the same license as the Python package.
4
3
#
5
4
# Translators:
6
5
# Leon H., 2017
6
+ # Matt Wang <mattwang44@gmail.com>, 2023
7
7
msgid ""
8
8
msgstr ""
9
9
"Project-Id-Version : Python 3.12\n "
10
10
"Report-Msgid-Bugs-To : \n "
11
11
"POT-Creation-Date : 2023-07-29 10:36+0000\n "
12
- "PO-Revision-Date : 2018-05-23 16 :16+0000\n "
13
- "Last-Translator : Adrian Liaw <adrianliaw2000 @gmail.com>\n "
12
+ "PO-Revision-Date : 2023-08-21 02 :16+0000\n "
13
+ "Last-Translator : Matt Wang <mattwang44 @gmail.com>\n "
14
14
"Language-Team : Chinese - TAIWAN (https://github.com/python/python-docs-zh- "
15
15
"tw)\n "
16
16
"Language : zh_TW\n "
@@ -30,14 +30,16 @@ msgstr "**原始碼:**\\ :source:`Lib/xml/`"
30
30
#: ../../library/xml.rst:16
31
31
msgid ""
32
32
"Python's interfaces for processing XML are grouped in the ``xml`` package."
33
- msgstr ""
33
+ msgstr "Python 處理 XML 的介面被歸類於 ``xml`` 套件中。 "
34
34
35
35
#: ../../library/xml.rst:20
36
36
msgid ""
37
37
"The XML modules are not secure against erroneous or maliciously constructed "
38
38
"data. If you need to parse untrusted or unauthenticated data see the :ref:"
39
39
"`xml-vulnerabilities` and :ref:`defusedxml-package` sections."
40
40
msgstr ""
41
+ "XML 模組不能防止錯誤或惡意建構的資料。如果你需要剖析不受信任或未經身份驗證的"
42
+ "資料,請參閱 :ref:`xml-vulnerabilities` 和 :ref:`defusedxml-package` 部分。"
41
43
42
44
#: ../../library/xml.rst:25
43
45
msgid ""
@@ -46,46 +48,51 @@ msgid ""
46
48
"is included with Python, so the :mod:`xml.parsers.expat` module will always "
47
49
"be available."
48
50
msgstr ""
51
+ "請務必注意 :mod:`xml` 套件中的模組要求至少有一個可用的 SAX 相容 XML 剖析器。"
52
+ "Expat 剖析器包含在 Python 中,所以 :mod:`xml.parsers.expat` 模組都可被使用。"
49
53
50
54
#: ../../library/xml.rst:30
51
55
msgid ""
52
56
"The documentation for the :mod:`xml.dom` and :mod:`xml.sax` packages are the "
53
57
"definition of the Python bindings for the DOM and SAX interfaces."
54
58
msgstr ""
59
+ ":mod:`xml.dom` 和 :mod:`xml.sax` 套件的文件為 DOM 和 SAX 介面的 Python 繫結的"
60
+ "定義。"
55
61
56
62
#: ../../library/xml.rst:33
57
63
msgid "The XML handling submodules are:"
58
- msgstr ""
64
+ msgstr "XML 處理子模組是: "
59
65
60
66
#: ../../library/xml.rst:35
61
67
msgid ""
62
68
":mod:`xml.etree.ElementTree`: the ElementTree API, a simple and lightweight "
63
69
"XML processor"
64
70
msgstr ""
71
+ ":mod:`xml.etree.ElementTree`:ElementTree API,一個簡單且輕量級的 XML 處理器"
65
72
66
73
#: ../../library/xml.rst:40
67
74
msgid ":mod:`xml.dom`: the DOM API definition"
68
- msgstr ""
75
+ msgstr ":mod:`xml.dom`:DOM API 定義 "
69
76
70
77
#: ../../library/xml.rst:41
71
78
msgid ":mod:`xml.dom.minidom`: a minimal DOM implementation"
72
- msgstr ""
79
+ msgstr ":mod:`xml.dom.minidom`:最小的 DOM 實作 "
73
80
74
81
#: ../../library/xml.rst:42
75
82
msgid ":mod:`xml.dom.pulldom`: support for building partial DOM trees"
76
- msgstr ""
83
+ msgstr ":mod:`xml.dom.pulldom`:支援建置部分 DOM 樹 "
77
84
78
85
#: ../../library/xml.rst:46
79
86
msgid ":mod:`xml.sax`: SAX2 base classes and convenience functions"
80
- msgstr ""
87
+ msgstr ":mod:`xml.sax`:SAX2 基底類別和便利函式 "
81
88
82
89
#: ../../library/xml.rst:47
83
90
msgid ":mod:`xml.parsers.expat`: the Expat parser binding"
84
- msgstr ""
91
+ msgstr ":mod:`xml.parsers.expat`:Expat 剖析器繫結 "
85
92
86
93
#: ../../library/xml.rst:53
87
94
msgid "XML vulnerabilities"
88
- msgstr ""
95
+ msgstr "XML 漏洞 "
89
96
90
97
#: ../../library/xml.rst:55
91
98
msgid ""
@@ -94,16 +101,19 @@ msgid ""
94
101
"attacks, access local files, generate network connections to other machines, "
95
102
"or circumvent firewalls."
96
103
msgstr ""
104
+ "XML 處理模組無法抵禦惡意建構的資料。攻擊者可以濫用 XML 功能來執行阻斷服務攻"
105
+ "擊 (denial of service attack)、存取本地檔案、生成與其他機器的網路連接或繞過防"
106
+ "火牆。"
97
107
98
108
#: ../../library/xml.rst:60
99
109
msgid ""
100
110
"The following table gives an overview of the known attacks and whether the "
101
111
"various modules are vulnerable to them."
102
- msgstr ""
112
+ msgstr "下表概述了已知的攻擊以及各個模組是否易有漏洞。 "
103
113
104
114
#: ../../library/xml.rst:64
105
115
msgid "kind"
106
- msgstr ""
116
+ msgstr "種類 "
107
117
108
118
#: ../../library/xml.rst:64
109
119
msgid "sax"
@@ -127,51 +137,51 @@ msgstr "xmlrpc"
127
137
128
138
#: ../../library/xml.rst:66
129
139
msgid "billion laughs"
130
- msgstr ""
140
+ msgstr "billion laughs "
131
141
132
142
#: ../../library/xml.rst:66 ../../library/xml.rst:67
133
143
msgid "**Vulnerable** (1)"
134
- msgstr ""
144
+ msgstr "**脆弱** (1) "
135
145
136
146
#: ../../library/xml.rst:67
137
147
msgid "quadratic blowup"
138
- msgstr ""
148
+ msgstr "二次爆炸 (quadratic blowup) "
139
149
140
150
#: ../../library/xml.rst:68 ../../library/xml.rst:103
141
151
msgid "external entity expansion"
142
- msgstr ""
152
+ msgstr "外部實體擴展 (external entity expansion) "
143
153
144
154
#: ../../library/xml.rst:68 ../../library/xml.rst:69
145
155
msgid "Safe (5)"
146
- msgstr ""
156
+ msgstr "安全 (5) "
147
157
148
158
#: ../../library/xml.rst:68
149
159
msgid "Safe (2)"
150
- msgstr ""
160
+ msgstr "安全 (2) "
151
161
152
162
#: ../../library/xml.rst:68
153
163
msgid "Safe (3)"
154
- msgstr ""
164
+ msgstr "安全 (3) "
155
165
156
166
#: ../../library/xml.rst:68
157
167
msgid "Safe (4)"
158
- msgstr ""
168
+ msgstr "安全 (4) "
159
169
160
170
#: ../../library/xml.rst:69 ../../library/xml.rst:108
161
171
msgid "`DTD`_ retrieval"
162
- msgstr ""
172
+ msgstr "`DTD`_ 檢索 "
163
173
164
174
#: ../../library/xml.rst:69 ../../library/xml.rst:70
165
175
msgid "Safe"
166
- msgstr ""
176
+ msgstr "安全 "
167
177
168
178
#: ../../library/xml.rst:70 ../../library/xml.rst:115
169
179
msgid "decompression bomb"
170
- msgstr ""
180
+ msgstr "解壓縮炸彈 "
171
181
172
182
#: ../../library/xml.rst:70
173
183
msgid "**Vulnerable**"
174
- msgstr ""
184
+ msgstr "**脆弱** "
175
185
176
186
#: ../../library/xml.rst:73
177
187
msgid ""
@@ -180,32 +190,37 @@ msgid ""
180
190
"to potential reliance on system-provided libraries. Check :const:`pyexpat."
181
191
"EXPAT_VERSION`."
182
192
msgstr ""
193
+ "Expat 2.4.1 及更新的版本不易受到「billion laughs」和「二次爆炸」漏洞的影響。"
194
+ "但仍可能由於依賴系統提供的函式庫而被列為易受攻擊的項目。請檢查 :const:"
195
+ "`pyexpat.EXPAT_VERSION`。"
183
196
184
197
#: ../../library/xml.rst:77
185
198
msgid ""
186
199
":mod:`xml.etree.ElementTree` doesn't expand external entities and raises a :"
187
200
"exc:`~xml.etree.ElementTree.ParseError` when an entity occurs."
188
201
msgstr ""
202
+ ":mod:`xml.etree.ElementTree` 不會擴展外部實體,並在實體出現時引發 :exc:`~xml."
203
+ "etree.ElementTree.ParseError`。"
189
204
190
205
#: ../../library/xml.rst:79
191
206
msgid ""
192
207
":mod:`xml.dom.minidom` doesn't expand external entities and simply returns "
193
208
"the unexpanded entity verbatim."
194
- msgstr ""
209
+ msgstr ":mod:`xml.dom.minidom` 不會擴展外部實體,只會逐字回傳未擴展的實體。 "
195
210
196
211
#: ../../library/xml.rst:81
197
212
msgid ":mod:`xmlrpc.client` doesn't expand external entities and omits them."
198
- msgstr ""
213
+ msgstr ":mod:`xmlrpc.client` 不會擴展外部實體且會忽略它們。 "
199
214
200
215
#: ../../library/xml.rst:82
201
216
msgid ""
202
217
"Since Python 3.7.1, external general entities are no longer processed by "
203
218
"default."
204
- msgstr ""
219
+ msgstr "從 Python 3.7.1 開始,預設情況下不再處理外部通用實體。 "
205
220
206
221
#: ../../library/xml.rst:91
207
222
msgid "billion laughs / exponential entity expansion"
208
- msgstr ""
223
+ msgstr "billion laughs / 指數實體擴展 "
209
224
210
225
#: ../../library/xml.rst:87
211
226
msgid ""
@@ -215,10 +230,13 @@ msgid ""
215
230
"string. The exponential expansion results in several gigabytes of text and "
216
231
"consumes lots of memory and CPU time."
217
232
msgstr ""
233
+ "`Billion Laughs`_ 攻擊(也稱為指數實體擴展)使用多層巢狀實體。每個實體多次引"
234
+ "用另一個實體,最終的實體定義包含一個小字串。指數擴展會產生數 GB 的文本,並消"
235
+ "耗大量記憶體和 CPU 時間。"
218
236
219
237
#: ../../library/xml.rst:98
220
238
msgid "quadratic blowup entity expansion"
221
- msgstr ""
239
+ msgstr "二次爆炸實體擴展 "
222
240
223
241
#: ../../library/xml.rst:94
224
242
msgid ""
@@ -228,20 +246,27 @@ msgid ""
228
246
"isn't as efficient as the exponential case but it avoids triggering parser "
229
247
"countermeasures that forbid deeply nested entities."
230
248
msgstr ""
249
+ "二次爆炸攻擊類似於 `Billion Laughs`_ 攻擊;它也濫用實體擴展。它不是巢狀實體,"
250
+ "而是一遍又一遍地重複一個具有幾千個字元的大型實體。該攻擊不如指數情況那麼有"
251
+ "效,但它不會觸發那些用來防止深度巢狀實體的剖析器對策。"
231
252
232
253
#: ../../library/xml.rst:101
233
254
msgid ""
234
255
"Entity declarations can contain more than just text for replacement. They "
235
256
"can also point to external resources or local files. The XML parser accesses "
236
257
"the resource and embeds the content into the XML document."
237
258
msgstr ""
259
+ "實體聲明不僅僅可以包含用於替換的文本,它們還可以指向外部資源或本地檔案。XML "
260
+ "剖析器會存取資源並將內容嵌入到 XML 文件中。"
238
261
239
262
#: ../../library/xml.rst:106
240
263
msgid ""
241
264
"Some XML libraries like Python's :mod:`xml.dom.pulldom` retrieve document "
242
265
"type definitions from remote or local locations. The feature has similar "
243
266
"implications as the external entity expansion issue."
244
267
msgstr ""
268
+ "一些 XML 函式庫(例如 Python 的 :mod:`xml.dom.pulldom`)從遠端或本地位置檢索"
269
+ "文件類型定義。該功能與外部實體擴展問題具有類似的含義。"
245
270
246
271
#: ../../library/xml.rst:111
247
272
msgid ""
@@ -250,12 +275,17 @@ msgid ""
250
275
"files. For an attacker it can reduce the amount of transmitted data by three "
251
276
"magnitudes or more."
252
277
msgstr ""
278
+ "解壓縮炸彈(又名 `ZIP bomb`_\\ )適用於所有可以剖析壓縮 XML 串流(例如 gzip "
279
+ "壓縮的 HTTP 串流或 LZMA 壓縮檔案)的 XML 函式庫。對於攻擊者來說,它可以將傳輸"
280
+ "的資料量減少三個或更多數量級。"
253
281
254
282
#: ../../library/xml.rst:117
255
283
msgid ""
256
284
"The documentation for `defusedxml`_ on PyPI has further information about "
257
285
"all known attack vectors with examples and references."
258
286
msgstr ""
287
+ "PyPI 上的 `defusedxml`_ 文件包含有關所有已知攻擊媒介 (attack vector) 的更多資"
288
+ "訊以及範例和參考資料。"
259
289
260
290
#: ../../library/xml.rst:123
261
291
msgid "The :mod:`!defusedxml` Package"
@@ -269,3 +299,7 @@ msgid ""
269
299
"data. The package also ships with example exploits and extended "
270
300
"documentation on more XML exploits such as XPath injection."
271
301
msgstr ""
302
+ "`defusedxml`_ 是一個純 Python 套件,其中包含所有標準函式庫中 XML 剖析器的修正"
303
+ "版本子類別,可防止任何潛在的惡意操作。當伺服器程式會剖析任何不受信任的 XML 資"
304
+ "料時建議使用此套件。該套件還附帶了更多有關 XML 漏洞(例如 XPath 注入)的範例"
305
+ "漏洞和延伸文件。"
0 commit comments