1.聽聽聽 Get鏂规硶闀垮害闄愬埗
Http Get鏂规硶鎻愪氦鐨勬暟鎹ぇ灏忛暱搴﹀苟娌℃湁闄愬埗锛孒TTP鍗忚瑙勮寖娌℃湁瀵筓RL闀垮害杩涜闄愬埗銆傝繖涓檺鍒舵槸鐗瑰畾鐨勬祻瑙堝櫒鍙婃湇鍔″櫒瀵瑰畠鐨勯檺鍒躲��
濡傦細IE瀵筓RL闀垮害鐨勯檺鍒舵槸2083瀛楄妭(2K+35)銆�
涓嬮潰灏辨槸瀵瑰悇绉嶆祻瑙堝櫒鍜屾湇鍔″櫒鐨勬渶澶у鐞嗚兘鍔涘仛涓�浜涜鏄�.
Microsoft Internet Explorer (Browser)
IE娴忚鍣ㄥURL鐨勬渶澶ч檺鍒朵负2083涓瓧绗︼紝濡傛灉瓒呰繃杩欎釜鏁板瓧锛屾彁浜ゆ寜閽病鏈変换浣曞弽搴斻��
Firefox (Browser)
瀵逛簬Firefox娴忚鍣║RL鐨勯暱搴﹂檺鍒朵负65,536涓瓧绗︺��
Safari (Browser)
URL鏈�澶ч暱搴﹂檺鍒朵负 80,000涓瓧绗︺��
Opera (Browser)
URL鏈�澶ч暱搴﹂檺鍒朵负190,000涓瓧绗︺��
Google (chrome)
URL鏈�澶ч暱搴﹂檺鍒朵负8182涓瓧绗︺��
Apache (Server)
鑳芥帴鍙楁渶澶rl闀垮害涓�8,192涓瓧绗︺��
Microsoft Internet Information Server(IIS)
鑳芥帴鍙楁渶澶rl鐨勯暱搴︿负16,384涓瓧绗︺��
閫氳繃涓婇潰鐨勬暟鎹彲鐭ワ紝涓轰簡璁╂墍鏈夌殑鐢ㄦ埛閮借兘姝e父娴忚锛� URL鏈�濂戒笉瑕佽秴杩嘔E鐨勬渶澶ч暱搴﹂檺鍒�(2083涓瓧绗︼級锛屽綋鐒讹紝濡傛灉URL涓嶇洿鎺ユ彁渚涚粰鐢ㄦ埛锛岃�屾槸鎻愪緵缁欑▼搴忚皟鐢紝杩欐椂鐨勯暱搴﹀氨鍙彈Web鏈嶅姟鍣ㄥ奖鍝嶄簡銆�
娉細瀵逛簬涓枃鐨勪紶閫掞紝鏈�缁堜細涓簎rlencode鍚庣殑缂栫爜褰㈠紡杩涜浼犻�掞紝濡傛灉娴忚鍣ㄧ殑缂栫爜涓篣TF8鐨勮瘽锛屼竴涓眽瀛楁渶缁堢紪鐮佸悗鐨勫瓧绗﹂暱搴︿负9涓瓧绗︺��
鍥犳濡傛灉浣跨敤鐨� GET 鏂规硶锛屾渶澶ч暱搴︾瓑浜嶶RL鏈�澶ч暱搴﹀噺鍘诲疄闄呰矾寰勪腑鐨勫瓧绗︽暟銆�
2.聽聽聽 POST鏂规硶闀垮害闄愬埗
鐞嗚涓婅锛孭OST鏄病鏈夊ぇ灏忛檺鍒剁殑銆侶TTP鍗忚瑙勮寖涔熸病鏈夎繘琛屽ぇ灏忛檺鍒讹紝璧烽檺鍒朵綔鐢ㄧ殑鏄湇鍔″櫒鐨勫鐞嗙▼搴忕殑澶勭悊鑳藉姏銆�
濡傦細鍦═omcat涓嬪彇娑圥OST澶у皬鐨勯檺鍒讹紙Tomcat榛樿2M锛夛紱
棰濄�備紶浜嗕釜2.2m鐨勫浘鐗囪浆base64瀵煎嚭word甯﹀浘鐗囩敤鐩存帴post璇锋眰鎶ラ敊銆傞暱鐐瑰績銆�
鎵撳紑tomcat鐩綍涓嬬殑conf鐩綍锛屾墦寮�server.xml 鏂囦欢锛屼慨鏀�
debug="0"
acceptCount="100"
connectionTimeout="20000"
disableUploadTimeout="true"
port="8080"
redirectPort="8443"
enableLookups="false"
minSpareThreads="25"
maxSpareThreads="75"
maxThreads="150"
maxPostSize="0"
URIEncoding="GBK"
>聽
澧炲姞绾㈣壊瀛椾綋閮ㄥ垎 maxPostSize="0" (璁句负0鏄彇娑圥OST鐨勫ぇ灏忛檺鍒�)
鍒氱湅鍒扮兢閲屽張鏈夊悓瀛﹀湪璇� HTTP 鍗忚涓嬬殑聽Get 璇锋眰鍙傛暟闀垮害鏄湁澶у皬闄愬埗鐨勶紝鏈�澶т笉鑳借秴杩�
聽XX锛岃�� Post 鏄棤闄愬埗鐨勶紝鐪嬪埌杩欓噷锛屾垜鎯充粬浠畾鏄湅澶氫簡涓�浜涗互璁逛紶璁圭殑鍗氬鎴栬�呬功绫嶏紝
瀵艰嚧涓�绉嶇悊瑙d笂鐨勮鍖猴細
1銆侀鍏堝嵆浣挎湁闀垮害闄愬埗锛屼篃鏄檺鍒剁殑鏄暣涓� URI 闀垮害锛岃�屼笉浠呬粎鏄綘鐨勫弬鏁板�兼暟鎹暱搴︺��
2銆丠TTP 鍗忚浠庢湭瑙勫畾 GET/POST 鐨勮姹傞暱搴﹂檺鍒舵槸澶氬皯銆�
The HTTP protocol does not place any a priori limit on the length of a URI. Servers MUST be able to handle the URI of any resource they serve, and SHOULD be able to handle URIs of unbounded length if they provide GET-based forms that could generate such URIs. A server SHOULD return 414 (Request-URI Too Long) status if a URI is longer than the server can handle (see section 10.4.15).聽
聽Note: Servers ought to be cautious about depending on URI lengths above 255 bytes, because some older client or proxy implementations might not properly support these lengths.
3銆佹墍璋撶殑璇锋眰闀垮害闄愬埗鏄敱娴忚鍣ㄥ拰 web 鏈嶅姟鍣ㄥ喅瀹氬拰璁剧疆鐨勶紝鍚勭娴忚鍣ㄥ拰 web 鏈嶅姟鍣ㄧ殑璁惧畾
鍧囦笉涓�鏍凤紝杩欎緷璧栦簬鍚勪釜娴忚鍣ㄥ巶瀹剁殑瑙勫畾鎴栬�呭彲浠ユ牴鎹� web 鏈嶅姟鍣ㄧ殑澶勭悊鑳藉姏鏉ヨ瀹氥��
The limit is in MSIE and Safari about 2KB, in Opera about 4KB and in Firefox about 8KB, (255 bytes if we count very old browsers). We may thus assume that 8KB is the maximum possible length and that 2KB is a more affordable length to rely on at the server side and that 255 bytes is the safest length to assume that the entire URL will come in.
If the limit is exceeded in either the browser or the server, most will just truncate the characters outside the limit without any warning. Some servers however may send a HTTP 414 error. If you need to send large data, then better use POST instead of GET. Its limit is much higher, but more dependent on the server used than the client. Usually up to around 2GB is allowed by the average webserver. This is also configureable somewhere in the server settings. The average server will display a server-specific error/exception when the POST limit is exceeded, usually as HTTP 500 error.
HTTP 1.1 defines Status Code 414 Request-URI Too Long for the cases where a server-defined limit is reached. You can see further details on RFC 2616. For the case of client-defined limits, there is no sense on the server returning something, because the server won't receive the request at all.
The server is refusing to service the request because the Request-URI is longer than the server is willing to interpret. This rare condition is only likely to occur when a client has improperly converted a POST request to a GET request with long query information, when the client has descended into a URI "black hole" of redirection (e.g., a redirected URI prefix that points to a suffix of itself), or when the server is under attack by a client attempting to exploit security holes present in some servers using fixed-length buffers for reading or manipulating the Request-URI.
闄� GET VS POST锛�
1銆佸鏁版祻瑙堝櫒瀵逛簬POST閲囩敤涓ら樁娈靛彂閫佹暟鎹殑锛屽厛鍙戦�佽姹傚ご锛屽啀鍙戦�佽姹備綋锛屽嵆浣垮弬鏁板啀灏戝啀鐭紝涔熶細琚垎鎴愪袱涓楠ゆ潵鍙戦�侊紙鐩稿浜嶨ET锛夛紝涔熷氨鏄涓�姝ュ彂閫乭eader鏁版嵁锛岀浜屾鍐嶅彂閫乥ody閮ㄥ垎銆侶TTP鏄簲鐢ㄥ眰鐨勫崗璁紝鑰屽湪浼犺緭灞傛湁浜涙儏鍐礣CP浼氬嚭鐜颁袱娆¤繛缁撶殑杩囩▼锛孒TTP鍗忚鏈韩涓嶄繚瀛樼姸鎬佷俊鎭紝涓�娆¤姹備竴娆″搷搴斻�傚浜嶵CP鑰岃█锛岄�氫俊娆℃暟瓒婂鍙嶈�岄潬鎬ц秺浣庯紝鑳藉湪涓�娆¤繛缁撲腑浼犺緭瀹岄渶瑕佺殑娑堟伅鏄渶鍙潬鐨勶紝灏介噺浣跨敤GET璇锋眰鏉ュ噺灏戠綉缁滆�楁椂銆傚鏋滈�氫俊鏃堕棿澧炲姞锛岃繖娈垫椂闂村鎴风涓庢湇鍔″櫒绔竴鐩翠繚鎸佽繛鎺ョ姸鎬侊紝鍦ㄦ湇鍔″櫒渚ц礋杞藉彲鑳戒細澧炲姞锛屽彲闈犳�т細涓嬮檷銆�
Tips锛氬叧浜庤繖鐐逛綘鍙互鍙傝�冿細Yahoo缃戠珯鎬ц兘浼樺寲鎸囧崡涔嬫湇鍔″櫒绡�
http://segmentfault.com/a/1190000000353790
http://developer.yahoo.com/performance/rules.html
http://blogread.cn/it/article/6100?f=wbYSLOW娉曞垯涓紝涓轰粈涔坹ahoo鎺ㄨ崘鐢℅ET浠f浛POST锛�
涓婇潰杩欑瘒鏂囩珷浠嬬粛浜喡爓ireshark聽鎶撳寘楠岃瘉 post 涓ゆ鍙戝寘锛実et 涓�娆″彂鍖呯殑鍏ㄨ繃绋嬶紝鎺ㄨ崘闃呰銆�
2銆丟ET璇锋眰鑳藉琚玞ache锛孏ET璇锋眰鑳藉琚繚瀛樺湪娴忚鍣ㄧ殑娴忚鍘嗗彶閲岄潰锛堝瘑鐮佺瓑閲嶈鏁版嵁GET鎻愪氦锛屽埆浜烘煡鐪嬪巻鍙茶褰曪紝灏卞彲浠ョ洿鎺ョ湅鍒拌繖浜涚瀵嗘暟鎹級POST涓嶈繘琛岀紦瀛樸��
3銆丟ET鍙傛暟鏄甫鍦║RL鍚庨潰锛屼紶缁烮E涓璘RL鐨勬渶澶у彲鐢ㄩ暱搴︿负2048瀛楃锛屽叾浠栨祻瑙堝櫒瀵筓RL闀垮害闄愬埗瀹炵幇涓婃湁鎵�涓嶅悓銆侾OST璇锋眰鏃犻暱搴﹂檺鍒讹紙鐩墠鐞嗚涓婃槸杩欐牱鐨勶級銆�
4銆丟ET鎻愪氦鐨勬暟鎹ぇ灏忥紝涓嶅悓娴忚鍣ㄧ殑闄愬埗涓嶅悓锛屼竴鑸湪2k-8K涔嬮棿锛孭OST鎻愪氦鏁版嵁姣旇緝澶э紝澶у皬闈犳湇鍔″櫒鐨勮瀹氬�奸檺鍒讹紝鑰屼笖鏌愪簺鏁版嵁鍙兘鐢� POST 鏂规硶銆屾惡甯︺�嶏紝姣斿 file銆�
5銆佸叏閮ㄧ敤POST涓嶆槸鍗佸垎鍚堢悊锛屾渶濂藉厛鎶婅姹傛寜鍔熻兘鍜屽満鏅垎涓嬬被锛屽鏁版嵁璇锋眰棰戠箒锛屾暟鎹笉鏁忔劅涓旀暟鎹噺鍦ㄦ櫘閫氭祻瑙堝櫒鏈�灏忛檺瀹氱殑2k鑼冨洿鍐咃紝杩欐牱鐨勬儏鍐典娇鐢℅ET銆傚叾浠栧湴鏂逛娇鐢≒OST銆�
6銆丟ET 鐨勬湰璐ㄦ槸銆屽緱銆嶏紝鑰� POST 鐨勬湰璐ㄦ槸銆岀粰銆嶃�傝�屼笖锛孏ET 鏄�屽箓绛夈�嶇殑锛屽湪杩欎竴鐐逛笂锛孏ET 琚涓烘槸銆屽畨鍏ㄧ殑銆嶃�備絾瀹為檯涓� server 绔篃鍙互鐢ㄤ綔璧勬簮鏇存柊锛屼絾鏄繖绉嶇敤娉曡繚鍙嶄簡绾﹀畾锛屽鏄撻�犳垚 CSRF锛堣法绔欒姹備吉閫狅級銆�
tomcat7.0.63涔嬪墠锛�
maxPostSizeThe maximum size in bytes of the POST which will be handled by the container FORM URL parameter parsing. The limit can be disabled by setting this attribute to a value聽less than or equal to 0. If not specified, this attribute is set to 2097152 (2 megabytes).
璁剧疆涓�0鍜岃礋鏁板潎鍙互浠h〃涓嶉檺鍒�
tomcat7.0.63锛堝寘鍚級涔嬪悗锛�
maxPostSizeThe maximum size in bytes of the POST which will be handled by the container FORM URL parameter parsing. The limit can be disabled by setting this attribute to a value聽less than zero. If not specified, this attribute is set to 2097152 (2 megabytes).
涓嶅彲浠ヨ缃负0锛屽彧鑳芥槸璐熸暟浠h〃涓嶉檺鍒�
杩樻湁蹇呴』瑕伮�multipart/form-data鎵嶈兘璧锋晥銆�
鍥涚甯歌鐨� POST 鎻愪氦鏁版嵁鏂瑰紡瀵瑰簲鐨刢ontent-type鍙栧��
application/x-www-form-urlencoded
杩欏簲璇ユ槸鏈�甯歌鐨� POST 鎻愪氦鏁版嵁鐨勬柟寮忎簡銆傛祻瑙堝櫒鐨勫師鐢� form 琛ㄥ崟锛屽鏋滀笉璁剧疆 enctype 灞炴�э紝閭d箞鏈�缁堝氨浼氫互 application/x-www-form-urlencoded 鏂瑰紡鎻愪氦鏁版嵁銆傝姹傜被浼间簬涓嬮潰杩欐牱锛堟棤鍏崇殑璇锋眰澶村湪鏈枃涓兘鐪佺暐鎺変簡锛夛細
POST http://www.example.com HTTP/1.1
Content-Type: application/x-www-form-urlencoded;charset=utf-8
title=test&sub%5B%5D=1&sub%5B%5D=2&sub%5B%5D=3
棣栧厛锛孋ontent-Type 琚寚瀹氫负 application/x-www-form-urlencoded锛涘叾娆★紝鎻愪氦鐨勬暟鎹寜鐓� key1=val1&key2=val2 鐨勬柟寮忚繘琛岀紪鐮侊紝key 鍜� val 閮借繘琛屼簡 URL 杞爜銆傚ぇ閮ㄥ垎鏈嶅姟绔瑷�閮藉杩欑鏂瑰紡鏈夊緢濂界殑鏀寔銆�
寰堝鏃跺�欙紝鎴戜滑鐢� Ajax 鎻愪氦鏁版嵁鏃讹紝涔熸槸浣跨敤杩欑鏂瑰紡銆備緥濡� JQuery 鍜� QWrap 鐨� Ajax锛孋ontent-Type 榛樿鍊奸兘鏄�宎pplication/x-www-form-urlencoded;charset=utf-8銆嶃��
multipart/form-data
杩欏張鏄竴涓父瑙佺殑 POST 鏁版嵁鎻愪氦鐨勬柟寮忋�傛垜浠娇鐢ㄨ〃鍗曚笂浼犳枃浠舵椂锛屽繀椤昏 form 鐨� enctyped 绛変簬杩欎釜鍊笺�傜洿鎺ユ潵鐪嬩竴涓姹傜ず渚嬶細
POST http://www.example.com HTTP/1.1
Content-Type:multipart/form-data; boundary=----WebKitFormBoundaryrGKCBY7qhFd3TrwA
------WebKitFormBoundaryrGKCBY7qhFd3TrwA
Content-Disposition: form-data; name="text"
title
------WebKitFormBoundaryrGKCBY7qhFd3TrwA
Content-Disposition: form-data; name="file"; filename="chrome.png"
Content-Type: image/png
PNG ... content of chrome.png ...
------WebKitFormBoundaryrGKCBY7qhFd3TrwA--
杩欎釜渚嬪瓙绋嶅井澶嶆潅鐐广�傞鍏堢敓鎴愪簡涓�涓� boundary 鐢ㄤ簬鍒嗗壊涓嶅悓鐨勫瓧娈碉紝涓轰簡閬垮厤涓庢鏂囧唴瀹归噸澶嶏紝boundary 寰堥暱寰堝鏉傘�傜劧鍚� Content-Type 閲屾寚鏄庝簡鏁版嵁鏄互 mutipart/form-data 鏉ョ紪鐮侊紝鏈璇锋眰鐨� boundary 鏄粈涔堝唴瀹广�傛秷鎭富浣撻噷鎸夌収瀛楁涓暟鍙堝垎涓哄涓粨鏋勭被浼肩殑閮ㄥ垎锛屾瘡閮ㄥ垎閮芥槸浠� --boundary 寮�濮嬶紝绱ф帴鐫�鍐呭鎻忚堪淇℃伅锛岀劧鍚庢槸鍥炶溅锛屾渶鍚庢槸瀛楁鍏蜂綋鍐呭锛堟枃鏈垨浜岃繘鍒讹級銆傚鏋滀紶杈撶殑鏄枃浠讹紝杩樿鍖呭惈鏂囦欢鍚嶅拰鏂囦欢绫诲瀷淇℃伅銆傛秷鎭富浣撴渶鍚庝互 --boundary-- 鏍囩ず缁撴潫銆傚叧浜� mutipart/form-data 鐨勮缁嗗畾涔夛紝璇峰墠寰� rfc1867 鏌ョ湅銆�
杩欑鏂瑰紡涓�鑸敤鏉ヤ笂浼犳枃浠讹紝鍚勫ぇ鏈嶅姟绔瑷�瀵瑰畠涔熸湁鐫�鑹ソ鐨勬敮鎸併��
涓婇潰鎻愬埌鐨勮繖涓ょ POST 鏁版嵁鐨勬柟寮忥紝閮芥槸娴忚鍣ㄥ師鐢熸敮鎸佺殑锛岃�屼笖鐜伴樁娈靛師鐢� form 琛ㄥ崟涔熷彧鏀寔杩欎袱绉嶆柟寮忋�備絾鏄殢鐫�瓒婃潵瓒婂鐨� Web 绔欑偣锛屽挨鍏舵槸 WebApp锛屽叏閮ㄤ娇鐢� Ajax 杩涜鏁版嵁浜や簰涔嬪悗锛屾垜浠畬鍏ㄥ彲浠ュ畾涔夋柊鐨勬暟鎹彁浜ゆ柟寮忥紝缁欏紑鍙戝甫鏉ユ洿澶氫究鍒┿��
application/json
application/json 杩欎釜 Content-Type 浣滀负鍝嶅簲澶村ぇ瀹惰偗瀹氫笉闄岀敓銆傚疄闄呬笂锛岀幇鍦ㄨ秺鏉ヨ秺澶氱殑浜烘妸瀹冧綔涓鸿姹傚ご锛岀敤鏉ュ憡璇夋湇鍔$娑堟伅涓讳綋鏄簭鍒楀寲鍚庣殑 JSON 瀛楃涓层�傜敱浜� JSON 瑙勮寖鐨勬祦琛岋紝闄や簡浣庣増鏈� IE 涔嬪鐨勫悇澶ф祻瑙堝櫒閮藉師鐢熸敮鎸� JSON.stringify锛屾湇鍔$璇█涔熼兘鏈夊鐞� JSON 鐨勫嚱鏁帮紝浣跨敤 JSON 涓嶄細閬囦笂浠�涔堥夯鐑︺��
JSON 鏍煎紡鏀寔姣旈敭鍊煎澶嶆潅寰楀鐨勭粨鏋勫寲鏁版嵁锛岃繖涓�鐐逛篃寰堟湁鐢ㄣ�傝寰楁垜鍑犲勾鍓嶅仛涓�涓」鐩椂锛岄渶瑕佹彁浜ょ殑鏁版嵁灞傛闈炲父娣憋紝鎴戝氨鏄妸鏁版嵁 JSON 搴忓垪鍖栦箣鍚庢潵鎻愪氦鐨勩�備笉杩囧綋鏃舵垜鏄妸 JSON 瀛楃涓蹭綔涓� val锛屼粛鐒舵斁鍦ㄩ敭鍊煎閲岋紝浠� x-www-form-urlencoded 鏂瑰紡鎻愪氦銆�
Google 鐨� AngularJS 涓殑 Ajax 鍔熻兘锛岄粯璁ゅ氨鏄彁浜� JSON 瀛楃涓层�備緥濡備笅闈㈣繖娈典唬鐮侊細
var data = {'title':'test', 'sub' : [1,2,3]};
$http.post(url, data).success(function(result) {
...
});
鏈�缁堝彂閫佺殑璇锋眰鏄細
POST http://www.example.com HTTP/1.1
Content-Type: application/json;charset=utf-8
{"title":"test","sub":[1,2,3]}
杩欑鏂规锛屽彲浠ユ柟渚跨殑鎻愪氦澶嶆潅鐨勭粨鏋勫寲鏁版嵁锛岀壒鍒�傚悎 RESTful 鐨勬帴鍙c�傚悇澶ф姄鍖呭伐鍏峰 Chrome 鑷甫鐨勫紑鍙戣�呭伐鍏枫�丗irebug銆丗iddler锛岄兘浼氫互鏍戝舰缁撴瀯灞曠ず JSON 鏁版嵁锛岄潪甯稿弸濂姐�備絾涔熸湁浜涙湇鍔$璇█杩樻病鏈夋敮鎸佽繖绉嶆柟寮忥紝渚嬪 php 灏辨棤娉曢�氳繃 $_POST 瀵硅薄浠庝笂闈㈢殑璇锋眰涓幏寰楀唴瀹广�傝繖鏃跺�欙紝闇�瑕佽嚜宸卞姩鎵嬪鐞嗕笅锛氬湪璇锋眰澶翠腑 Content-Type 涓� application/json 鏃讹紝浠� php://input 閲岃幏寰楀師濮嬭緭鍏ユ祦锛屽啀 json_decode 鎴愬璞°�備竴浜� php 妗嗘灦宸茬粡寮�濮嬭繖涔堝仛浜嗐��
褰撶劧 AngularJS 涔熷彲浠ラ厤缃负浣跨敤 x-www-form-urlencoded 鏂瑰紡鎻愪氦鏁版嵁銆傚鏈夐渶瑕侊紝鍙互鍙傝�冭繖绡囨枃绔犮��
text/xml
鎴戠殑鍗氬涔嬪墠鎻愬埌杩� XML-RPC锛圶ML Remote Procedure Call锛夈�傚畠鏄竴绉嶄娇鐢� HTTP 浣滀负浼犺緭鍗忚锛孹ML 浣滀负缂栫爜鏂瑰紡鐨勮繙绋嬭皟鐢ㄨ鑼冦�傚吀鍨嬬殑 XML-RPC 璇锋眰鏄繖鏍风殑锛�
POST http://www.example.com HTTP/1.1
Content-Type: text/xml
examples.getStateName
41
XML-RPC 鍗忚绠�鍗曘�佸姛鑳藉鐢紝鍚勭璇█鐨勫疄鐜伴兘鏈夈�傚畠鐨勪娇鐢ㄤ篃寰堝箍娉涳紝濡� WordPress 鐨� XML-RPC Api锛屾悳绱㈠紩鎿庣殑 ping 鏈嶅姟绛夌瓑銆侸avaScript 涓紝涔熸湁鐜版垚鐨勫簱鏀寔浠ヨ繖绉嶆柟寮忚繘琛屾暟鎹氦浜掞紝鑳藉緢濂界殑鏀寔宸叉湁鐨� XML-RPC 鏈嶅姟銆備笉杩囷紝鎴戜釜浜鸿寰� XML 缁撴瀯杩樻槸杩囦簬鑷冭偪锛屼竴鑸満鏅敤 JSON 浼氭洿鐏垫椿鏂逛究銆�
REF锛�
maximum length of HTTP GET request?
http://stackoverflow.com/questions/2659952/maximum-length-of-http-get-request
http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html#sec10.4.15Request-URI Too Long
http://www.w3.org/Protocols/rfc2616/rfc2616-sec3.html#sec3.2.1General Syntax
http://www.cnblogs.com/xiaotaomaomao/articles/986070.html
http://www.cnblogs.com/TankXiao/archive/2012/02/13/2342672.htmlHTTP鍗忚璇﹁В
post鏂瑰紡鐩告瘮get瀹夊叏,鎼哄甫鏁版嵁鏇村ぇ锛屾垜鍑嗗鎵�鏈夋暟鎹兘鐢╬ost鏂瑰紡鑾峰彇锛岃繖鏍峰ソ鍚楋紵
http://segmentfault.com/q/1010000000213082
http://www.cnblogs.com/hyddd/archive/2009/04/09/1432744.html娴呰皥CSRF鏀诲嚮鏂瑰紡