1
- # SOME DESCRIPTIVE TITLE.
2
- # Copyright (C) 2001-2022, Python Software Foundation
1
+ # Copyright (C) 2001-2023, Python Software Foundation
3
2
# This file is distributed under the same license as the Python package.
4
3
#
5
4
# Translators:
6
5
# Leon H., 2017
6
+ # Matt Wang <mattwang44@gmail.com>, 2023
7
7
msgid ""
8
8
msgstr ""
9
9
"Project-Id-Version : Python 3.12\n "
10
10
"Report-Msgid-Bugs-To : \n "
11
11
"POT-Creation-Date : 2023-07-29 10:36+0000\n "
12
- "PO-Revision-Date : 2018-05-23 16 :16+0000\n "
13
- "Last-Translator : Adrian Liaw <adrianliaw2000 @gmail.com>\n "
12
+ "PO-Revision-Date : 2023-08-21 02 :16+0000\n "
13
+ "Last-Translator : Matt Wang <mattwang44 @gmail.com>\n "
14
14
"Language-Team : Chinese - TAIWAN (https://github.com/python/python-docs-zh- "
15
15
"tw)\n "
16
16
"Language : zh_TW\n "
@@ -30,14 +30,16 @@ msgstr "**原始碼:**\\ :source:`Lib/xml/`"
30
30
#: ../../library/xml.rst:16
31
31
msgid ""
32
32
"Python's interfaces for processing XML are grouped in the ``xml`` package."
33
- msgstr ""
33
+ msgstr "Python 處理 XML 的介面被歸類於 ``xml`` 套件中。 "
34
34
35
35
#: ../../library/xml.rst:20
36
36
msgid ""
37
37
"The XML modules are not secure against erroneous or maliciously constructed "
38
38
"data. If you need to parse untrusted or unauthenticated data see the :ref:"
39
39
"`xml-vulnerabilities` and :ref:`defusedxml-package` sections."
40
40
msgstr ""
41
+ "XML 模組無法抵禦錯誤或惡意建構的資料。如果你需要剖析不受信任或未經身份驗證的"
42
+ "資料,請參閱 :ref:`xml-vulnerabilities` 和 :ref:`defusedxml-package` 段落。"
41
43
42
44
#: ../../library/xml.rst:25
43
45
msgid ""
@@ -46,46 +48,52 @@ msgid ""
46
48
"is included with Python, so the :mod:`xml.parsers.expat` module will always "
47
49
"be available."
48
50
msgstr ""
51
+ "請務必注意 :mod:`xml` 套件中的模組要求至少有一個可用的 SAX 相容 XML 剖析器。"
52
+ "Expat 剖析器包含在 Python 中,所以總是可以使用 :mod:`xml.parsers.expat` 模"
53
+ "組。"
49
54
50
55
#: ../../library/xml.rst:30
51
56
msgid ""
52
57
"The documentation for the :mod:`xml.dom` and :mod:`xml.sax` packages are the "
53
58
"definition of the Python bindings for the DOM and SAX interfaces."
54
59
msgstr ""
60
+ ":mod:`xml.dom` 和 :mod:`xml.sax` 套件的文件為 DOM 和 SAX 介面的 Python 繫結的"
61
+ "定義。"
55
62
56
63
#: ../../library/xml.rst:33
57
64
msgid "The XML handling submodules are:"
58
- msgstr ""
65
+ msgstr "以下是 XML 處理子模組: "
59
66
60
67
#: ../../library/xml.rst:35
61
68
msgid ""
62
69
":mod:`xml.etree.ElementTree`: the ElementTree API, a simple and lightweight "
63
70
"XML processor"
64
71
msgstr ""
72
+ ":mod:`xml.etree.ElementTree`:ElementTree API,一個簡單且輕量級的 XML 處理器"
65
73
66
74
#: ../../library/xml.rst:40
67
75
msgid ":mod:`xml.dom`: the DOM API definition"
68
- msgstr ""
76
+ msgstr ":mod:`xml.dom`:DOM API 定義 "
69
77
70
78
#: ../../library/xml.rst:41
71
79
msgid ":mod:`xml.dom.minidom`: a minimal DOM implementation"
72
- msgstr ""
80
+ msgstr ":mod:`xml.dom.minidom`:最小的 DOM 實作 "
73
81
74
82
#: ../../library/xml.rst:42
75
83
msgid ":mod:`xml.dom.pulldom`: support for building partial DOM trees"
76
- msgstr ""
84
+ msgstr ":mod:`xml.dom.pulldom`:支援建置部分 DOM 樹 "
77
85
78
86
#: ../../library/xml.rst:46
79
87
msgid ":mod:`xml.sax`: SAX2 base classes and convenience functions"
80
- msgstr ""
88
+ msgstr ":mod:`xml.sax`:SAX2 基底類別和便利函式 "
81
89
82
90
#: ../../library/xml.rst:47
83
91
msgid ":mod:`xml.parsers.expat`: the Expat parser binding"
84
- msgstr ""
92
+ msgstr ":mod:`xml.parsers.expat`:Expat 剖析器繫結 "
85
93
86
94
#: ../../library/xml.rst:53
87
95
msgid "XML vulnerabilities"
88
- msgstr ""
96
+ msgstr "XML 漏洞 "
89
97
90
98
#: ../../library/xml.rst:55
91
99
msgid ""
@@ -94,16 +102,19 @@ msgid ""
94
102
"attacks, access local files, generate network connections to other machines, "
95
103
"or circumvent firewalls."
96
104
msgstr ""
105
+ "XML 處理模組無法抵禦惡意建構的資料。攻擊者可以濫用 XML 功能來執行阻斷服務攻"
106
+ "擊 (denial of service attack)、存取本地檔案、生成與其他機器的網路連接或繞過防"
107
+ "火牆。"
97
108
98
109
#: ../../library/xml.rst:60
99
110
msgid ""
100
111
"The following table gives an overview of the known attacks and whether the "
101
112
"various modules are vulnerable to them."
102
- msgstr ""
113
+ msgstr "下表概述了已知的攻擊以及各個模組是否易有漏洞。 "
103
114
104
115
#: ../../library/xml.rst:64
105
116
msgid "kind"
106
- msgstr ""
117
+ msgstr "種類 "
107
118
108
119
#: ../../library/xml.rst:64
109
120
msgid "sax"
@@ -127,51 +138,51 @@ msgstr "xmlrpc"
127
138
128
139
#: ../../library/xml.rst:66
129
140
msgid "billion laughs"
130
- msgstr ""
141
+ msgstr "十億笑聲 (billion laughs) "
131
142
132
143
#: ../../library/xml.rst:66 ../../library/xml.rst:67
133
144
msgid "**Vulnerable** (1)"
134
- msgstr ""
145
+ msgstr "**脆弱** (1) "
135
146
136
147
#: ../../library/xml.rst:67
137
148
msgid "quadratic blowup"
138
- msgstr ""
149
+ msgstr "二次爆炸 (quadratic blowup) "
139
150
140
151
#: ../../library/xml.rst:68 ../../library/xml.rst:103
141
152
msgid "external entity expansion"
142
- msgstr ""
153
+ msgstr "外部實體擴展 (external entity expansion) "
143
154
144
155
#: ../../library/xml.rst:68 ../../library/xml.rst:69
145
156
msgid "Safe (5)"
146
- msgstr ""
157
+ msgstr "安全 (5) "
147
158
148
159
#: ../../library/xml.rst:68
149
160
msgid "Safe (2)"
150
- msgstr ""
161
+ msgstr "安全 (2) "
151
162
152
163
#: ../../library/xml.rst:68
153
164
msgid "Safe (3)"
154
- msgstr ""
165
+ msgstr "安全 (3) "
155
166
156
167
#: ../../library/xml.rst:68
157
168
msgid "Safe (4)"
158
- msgstr ""
169
+ msgstr "安全 (4) "
159
170
160
171
#: ../../library/xml.rst:69 ../../library/xml.rst:108
161
172
msgid "`DTD`_ retrieval"
162
- msgstr ""
173
+ msgstr "`DTD`_ 檢索 "
163
174
164
175
#: ../../library/xml.rst:69 ../../library/xml.rst:70
165
176
msgid "Safe"
166
- msgstr ""
177
+ msgstr "安全 "
167
178
168
179
#: ../../library/xml.rst:70 ../../library/xml.rst:115
169
180
msgid "decompression bomb"
170
- msgstr ""
181
+ msgstr "解壓縮炸彈 (decompression bomb) "
171
182
172
183
#: ../../library/xml.rst:70
173
184
msgid "**Vulnerable**"
174
- msgstr ""
185
+ msgstr "**脆弱** "
175
186
176
187
#: ../../library/xml.rst:73
177
188
msgid ""
@@ -180,32 +191,37 @@ msgid ""
180
191
"to potential reliance on system-provided libraries. Check :const:`pyexpat."
181
192
"EXPAT_VERSION`."
182
193
msgstr ""
194
+ "Expat 2.4.1 及更新的版本不易受到「十億笑聲」和「二次爆炸」漏洞的影響。但仍可"
195
+ "能由於依賴系統提供的函式庫而被列為易受攻擊的項目。請檢查 :const:`pyexpat."
196
+ "EXPAT_VERSION`。"
183
197
184
198
#: ../../library/xml.rst:77
185
199
msgid ""
186
200
":mod:`xml.etree.ElementTree` doesn't expand external entities and raises a :"
187
201
"exc:`~xml.etree.ElementTree.ParseError` when an entity occurs."
188
202
msgstr ""
203
+ ":mod:`xml.etree.ElementTree` 不會擴展外部實體,並在實體出現時引發 :exc:`~xml."
204
+ "etree.ElementTree.ParseError`。"
189
205
190
206
#: ../../library/xml.rst:79
191
207
msgid ""
192
208
":mod:`xml.dom.minidom` doesn't expand external entities and simply returns "
193
209
"the unexpanded entity verbatim."
194
- msgstr ""
210
+ msgstr ":mod:`xml.dom.minidom` 不會擴展外部實體,只會逐字回傳未擴展的實體。 "
195
211
196
212
#: ../../library/xml.rst:81
197
213
msgid ":mod:`xmlrpc.client` doesn't expand external entities and omits them."
198
- msgstr ""
214
+ msgstr ":mod:`xmlrpc.client` 不會擴展外部實體且會忽略它們。 "
199
215
200
216
#: ../../library/xml.rst:82
201
217
msgid ""
202
218
"Since Python 3.7.1, external general entities are no longer processed by "
203
219
"default."
204
- msgstr ""
220
+ msgstr "從 Python 3.7.1 開始,預設情況下不再處理外部通用實體。 "
205
221
206
222
#: ../../library/xml.rst:91
207
223
msgid "billion laughs / exponential entity expansion"
208
- msgstr ""
224
+ msgstr "十億笑聲 / 指數實體擴展 "
209
225
210
226
#: ../../library/xml.rst:87
211
227
msgid ""
@@ -215,10 +231,13 @@ msgid ""
215
231
"string. The exponential expansion results in several gigabytes of text and "
216
232
"consumes lots of memory and CPU time."
217
233
msgstr ""
234
+ "`十億笑聲 <Billion Laughs_>`_\\ 攻擊(也稱為指數實體擴展 (exponential entity "
235
+ "expansion))使用多層巢狀實體。每個實體多次引用另一個實體,最終的實體定義包含"
236
+ "一個小字串。指數擴展會產生數 GB 的文本,並消耗大量記憶體和 CPU 時間。"
218
237
219
238
#: ../../library/xml.rst:98
220
239
msgid "quadratic blowup entity expansion"
221
- msgstr ""
240
+ msgstr "二次爆炸實體擴展 "
222
241
223
242
#: ../../library/xml.rst:94
224
243
msgid ""
@@ -228,20 +247,27 @@ msgid ""
228
247
"isn't as efficient as the exponential case but it avoids triggering parser "
229
248
"countermeasures that forbid deeply nested entities."
230
249
msgstr ""
250
+ "二次爆炸攻擊類似於\\ `十億笑聲 <Billion Laughs_>`_\\ 攻擊;它也濫用實體擴展。"
251
+ "它不是巢狀實體,而是一遍又一遍地重複一個具有幾千個字元的大型實體。該攻擊不如"
252
+ "指數擴展那麼有效率,但它不會觸發那些用來防止深度巢狀實體的剖析器對策。"
231
253
232
254
#: ../../library/xml.rst:101
233
255
msgid ""
234
256
"Entity declarations can contain more than just text for replacement. They "
235
257
"can also point to external resources or local files. The XML parser accesses "
236
258
"the resource and embeds the content into the XML document."
237
259
msgstr ""
260
+ "實體聲明不僅僅可以包含用於替換的文本,它們還可以指向外部資源或本地檔案。XML "
261
+ "剖析器會存取資源並將內容嵌入到 XML 文件中。"
238
262
239
263
#: ../../library/xml.rst:106
240
264
msgid ""
241
265
"Some XML libraries like Python's :mod:`xml.dom.pulldom` retrieve document "
242
266
"type definitions from remote or local locations. The feature has similar "
243
267
"implications as the external entity expansion issue."
244
268
msgstr ""
269
+ "一些 XML 函式庫(例如 Python 的 :mod:`xml.dom.pulldom`)從遠端或本地位置檢索"
270
+ "文件類型定義。該功能與外部實體擴展問題具有類似的含義。"
245
271
246
272
#: ../../library/xml.rst:111
247
273
msgid ""
@@ -250,12 +276,17 @@ msgid ""
250
276
"files. For an attacker it can reduce the amount of transmitted data by three "
251
277
"magnitudes or more."
252
278
msgstr ""
279
+ "解壓縮炸彈(又名 `ZIP bomb`_\\ )適用於所有可以剖析壓縮 XML 串流(例如 gzip "
280
+ "壓縮的 HTTP 串流或 LZMA 壓縮檔案)的 XML 函式庫。對於攻擊者來說,它可以將傳輸"
281
+ "的資料量減少三個或更多數量級。"
253
282
254
283
#: ../../library/xml.rst:117
255
284
msgid ""
256
285
"The documentation for `defusedxml`_ on PyPI has further information about "
257
286
"all known attack vectors with examples and references."
258
287
msgstr ""
288
+ "PyPI 上的 `defusedxml`_ 文件包含有關所有已知攻擊媒介 (attack vector) 的更多資"
289
+ "訊以及範例和參考資料。"
259
290
260
291
#: ../../library/xml.rst:123
261
292
msgid "The :mod:`!defusedxml` Package"
@@ -269,3 +300,7 @@ msgid ""
269
300
"data. The package also ships with example exploits and extended "
270
301
"documentation on more XML exploits such as XPath injection."
271
302
msgstr ""
303
+ "`defusedxml`_ 是一個純 Python 套件,其中包含所有標準函式庫中 XML 剖析器的修正"
304
+ "版本子類別,可防止任何潛在的惡意操作。當伺服器程式會剖析任何不受信任的 XML 資"
305
+ "料時建議使用此套件。該套件還附帶了更多有關 XML 漏洞(例如 XPath 注入)的範例"
306
+ "和延伸文件。"
0 commit comments