You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
some mechanism to allow clients to discover an application's URLs.\
1611
+
</li>
1612
+
<li>
1603
1613
応用に利用されるべき~URL~scheme(たち)
1604
-
]および[
1614
+
◎
1615
+
Additionally, they need to specify which URL scheme(s) the application should be used with\
1616
+
</li>
1617
+
<li>
1605
1618
応用は[
1606
1619
専用な~port,
1607
1620
~HTTP用の既定の~port【!reuse HTTP's port(s)】
1608
1621
]どちらを利用するか
1609
-
]も指定する必要がある。
1610
1622
◎
1611
-
Therefore, the specification writer needs some mechanism to allow clients to discover an application's URLs. Additionally, they need to specify which URL scheme(s) the application should be used with and whether to use a dedicated port or to reuse HTTP's port(s).
1612
-
</p>
1623
+
and whether to use a dedicated port or to reuse HTTP's port(s).
1624
+
</li>
1625
+
</ul>
1613
1626
1614
1627
<sectionid="discovering-an-applications-urls">
1615
1628
<h4title="Discovering an Application's URLs">4.4.1. 応用の~URLの発見-法</h4>
@@ -1720,11 +1733,9 @@ <h4 title="Considering URI Schemes">4.4.2. ~URI~schemeを考慮するとき</h4>
1720
1733
]を使役することになる。
1721
1734
[
1722
1735
認証, 完全性, 機密性
1723
-
]を供する, および
1724
-
大規模な監視~攻撃を軽減するには、
1725
-
"`https^c" が`推奨される^2119
1726
-
`RFC7258$r
1727
-
。
1736
+
]を供するため, および
1737
+
大規模な監視~攻撃 `RFC7258$r を軽減するためには、
1738
+
"`https^c" が`推奨される^2119。
1728
1739
◎
1729
1740
Applications that use HTTP will typically employ the "http" and/or "https" URI schemes. "https" is RECOMMENDED to provide authentication, integrity, and confidentiality, as well as to mitigate pervasive monitoring attacks [RFC7258].
1730
1741
</p>
@@ -1742,7 +1753,7 @@ <h4 title="Considering URI Schemes">4.4.2. ~URI~schemeを考慮するとき</h4>
@@ -1765,8 +1776,9 @@ <h4 title="Considering URI Schemes">4.4.2. ~URI~schemeを考慮するとき</h4>
1765
1776
<li>
1766
1777
~URLは、
1767
1778
~HTTPによる産物~内で共通的に生じることに加え,
1768
-
自動的に(例: `Location$h 応答~header内で)`生成-$されることが多いので、
1769
-
新たな~schemeが一貫して利用されることを確保するのは,困難にもなり得る。
1779
+
自動的に(例: `Location$h 応答~header内で)`生成-$されることが多いので、[
1780
+
新たな~schemeが一貫して利用される
1781
+
]ことを確保することは,困難にもなり得る。
1770
1782
◎
1771
1783
Because URLs commonly occur in HTTP artefacts and are often generated automatically (e.g., in the Location response header field), it can be difficult to ensure that the new scheme is used consistently.
1772
1784
</li>
@@ -1776,10 +1788,10 @@ <h4 title="Considering URI Schemes">4.4.2. ~URI~schemeを考慮するとき</h4>
1776
1788
]~URLを利用して可用になる。
1777
1789
それらの~URLは、[
1778
1790
~security/運用能
1779
-
]の課題が在り得るような利用に “漏洩し得る”。
1791
+
]の課題が在り得るような利用に “漏洩-” し得る。
1780
1792
例えば,新たな~schemeを利用しても、[
1781
1793
要請が “通常の” ~Web~siteへは送信されない
1782
-
]ことを確保するのは,失敗する見込みが高い。
1794
+
]ことを確保することは,失敗する見込みが高い。
1783
1795
◎
1784
1796
The resources identified by the new scheme will still be available using "http" and/or "https" URLs. Those URLs can "leak" into use, which can present security and operability issues. For example, using a new scheme to ensure that requests don't get sent to a "normal" Web site is likely to fail.
1785
1797
</li>
@@ -1834,8 +1846,8 @@ <h4 title="Choosing Transport Ports">4.4.3. ~transport用の~portを選ぶとき
1834
1846
— あるいは、
1835
1847
他の~portにも配備できる。
1836
1848
この裁定は、
1837
-
配備~時点に下されることもあれば,応用の仕様により奨励されることもあろう
1838
-
(例:ある~portを,その応用~用として登録することにより)。
1849
+
配備~時点に為されることもあれば,応用の仕様により奨励されることもあろう
1850
+
(例:ある~portを,当の応用~用として登録することにより)。
1839
1851
◎
1840
1852
Applications can use the applicable default port (80 for HTTP, 443 for HTTPS), or they can be deployed upon other ports. This decision can be made at deployment time or might be encouraged by the application's specification (e.g., by registering a port for that application).
In these cases, an application using HTTP might consider using POST to express queries in the request's content; doing so avoids encoding overhead and URL length limits in implementations. However, in doing so, it should be noted that the benefits of GET such as caching and linking to query results are lost. Therefore, applications using HTTP that require support for POST queries ought to consider allowing both methods.
<h3title="Using HTTP Status Codes">4.6. ~HTTP状態s~codeの利用-法</h3>
2124
2140
2125
2141
<p>
2126
-
`状態s~code$は、
2142
+
`状態s~code$は、[
2127
2143
汎用な~HTTP~component
2128
2144
— `~cache$, `媒介者$, `~client$など —
2129
-
の便益, および応用~自身のために意味論を伝達する。
2145
+
および,応用~自身
2146
+
]の便益のために意味論を伝達する。
2130
2147
しかしながら、
2131
-
それらの利用にあたって応用が遭遇し得る陥穽がいくつかある。
2148
+
それらの利用にあたっては,応用が遭遇し得る陥穽もいくつかある。
2132
2149
◎
2133
2150
HTTP status codes convey semantics both for the benefit of generic HTTP components -- such as caches, intermediaries, and clients -- and applications themselves. However, applications can encounter a number of pitfalls in their use.
2134
2151
</p>
@@ -2164,8 +2181,8 @@ <h3 title="Using HTTP Status Codes">4.6. ~HTTP状態s~codeの利用-法</h3>
Furthermore, mapping application errors to individual HTTP status codes one-to-one often leads to a situation where the finite space of applicable HTTP status codes is exhausted. This, in turn, leads to a number of bad practices -- including minting new, application-specific status codes or using existing status codes even though the link between their semantics and the application's is tenuous at best.
Whether they are permanent or temporary. Permanent redirects can be used to update links stored in the client (e.g., bookmarks), whereas temporary ones cannot. Note that this has no effect on HTTP caching; it is completely separate.
Assigning even a short freshness lifetime ([HTTP-CACHING], Section 4.2) -- e.g., 5 seconds -- allows a response to be reused to satisfy multiple clients and/or a single client making the same request repeatedly. In general, if it is safe to reuse something, consider assigning a freshness lifetime.
It is not necessary to add the public response directive ([HTTP-CACHING], Section 5.2.2.9) to cache most responses; it is only necessary when it's desirable to store an authenticated response, or when the status code isn't understood by the cache and there isn't explicit freshness information available.
Modern Web browsers constrain the ability of content from one origin to access resources from another to avoid leaking private information. As a result, applications that wish to expose cross-origin data to browsers will need to implement the CORS protocol; see [FETCH].
0 commit comments