Index: chrome/common/extensions/docs/templates/articles/app_external.html |
diff --git a/chrome/common/extensions/docs/templates/articles/app_external.html b/chrome/common/extensions/docs/templates/articles/app_external.html |
index 3023a4b22755211abe3db568975b239233fbccf7..9f1f63cc55cf8688d67e31382f13136954f52110 100644 |
--- a/chrome/common/extensions/docs/templates/articles/app_external.html |
+++ b/chrome/common/extensions/docs/templates/articles/app_external.html |
@@ -2,7 +2,7 @@ |
<p> |
-The <a href="app_architecture.html#security">Chrome Apps security model</a> disallows |
+The <a href="app_architecture#security">Chrome Apps security model</a> disallows |
external content in iframes and |
the use of inline scripting and <code>eval()</code>. |
You can override these restrictions, |
@@ -27,7 +27,7 @@ Check out the |
<h2 id="external">Referencing external resources</h2> |
<p> |
-The <a href="contentSecurityPolicy.html">Content Security Policy</a> used by apps disallows |
+The <a href="contentSecurityPolicy">Content Security Policy</a> used by apps disallows |
the use of many kinds of remote URLs, so you can't directly reference external |
images, stylesheets, or fonts from an app page. Instead, you can use use |
cross-origin XMLHttpRequests to fetch these resources, |
@@ -68,7 +68,7 @@ xhr.onload = function(e) { |
xhr.send(); |
</pre> |
-<p>You may want to <a href="offline_apps.html#saving-locally">save</a> |
+<p>You may want to <a href="offline_apps#saving-locally">save</a> |
these resources locally, so that they are available offline.</p> |
<h2 id="webview">Embed external web pages</h2> |
@@ -97,7 +97,7 @@ Your <code>webview</code> element must include the URL to the source content |
and specify its dimensions. |
</p> |
-<pre data-filename="browser.html"> |
+<pre data-filename="browser"> |
mkearney1
2014/04/09 19:43:30
Keep .html as it refers to a filename.
|
<webview src="http://news.google.com/" width="640" height="480"></webview> |
</pre> |
@@ -127,7 +127,7 @@ These pages are then exempt from their Content Security Policy. |
Sandboxed pages can use iframes, inline scripting, |
and <code>eval()</code>. |
Check out the manifest field description for |
-<a href="manifest/sandbox.html">sandbox</a>. |
+<a href="manifest/sandbox">sandbox</a>. |
</p> |
<p> |
@@ -145,7 +145,7 @@ Here's a sample sandboxed page |
which uses an inline script and <code>eval()</code>: |
</p> |
-<pre data-filename="sandboxed.html"> |
+<pre data-filename="sandboxed"> |
mkearney1
2014/04/09 19:43:30
Keep .html as it refers to a filename.
|
<html> |
<body> |
<h1>Woot</h1> |
@@ -166,7 +166,7 @@ and list the app pages to be served in a sandbox: |
<pre data-filename="manifest.json"> |
"sandbox": { |
- "pages": ["sandboxed.html"] |
+ "pages": ["sandboxed"] |
mkearney1
2014/04/09 19:43:30
Keep .html as it refers to a filename.
|
} |
</pre> |
@@ -192,7 +192,7 @@ with a window object. However, the sandbox page is created as a new window. |
<pre data-filename="background.js"> |
chrome.app.runtime.onLaunched.addListener(function() { |
- chrome.app.window.create('window.html', { |
+ chrome.app.window.create('window', { |
mkearney1
2014/04/09 19:43:30
Keep .html as it refers to a filename.
|
'bounds': { |
'width': 400, |
'height': 400, |
@@ -201,7 +201,7 @@ chrome.app.runtime.onLaunched.addListener(function() { |
} |
}); |
- chrome.app.window.create('sandboxed.html', { |
+ chrome.app.window.create('sandboxed', { |
'bounds': { |
mkearney1
2014/04/09 19:43:30
Keep .html as it refers to a filename.
|
'width': 400, |
'height': 400, |
@@ -217,7 +217,7 @@ chrome.app.runtime.onLaunched.addListener(function() { |
<p>Sandboxed pages can also be embedded within another app page |
using an <code>iframe</code>:</p> |
-<pre data-filename="window.html"> |
+<pre data-filename="window"> |
mkearney1
2014/04/09 19:43:30
Keep .html as it refers to a filename.
|
<!DOCTYPE html> |
<html> |
<head> |
@@ -225,7 +225,7 @@ chrome.app.runtime.onLaunched.addListener(function() { |
<body> |
<p>I am normal app window.</p> |
- <iframe src="sandboxed.html" width="300" height="200"></iframe> |
+ <iframe src="sandboxed" width="300" height="200"></iframe> |
mkearney1
2014/04/09 19:43:30
Keep .html as it refers to a filename.
|
</body> |
</html> |
</pre> |
@@ -253,7 +253,7 @@ opens: |
var myWin = null; |
chrome.app.runtime.onLaunched.addListener(function() { |
- chrome.app.window.create('sandboxed.html', { |
+ chrome.app.window.create('sandboxed', { |
'bounds': { |
mkearney1
2014/04/09 19:43:30
Keep .html as it refers to a filename.
|
'width': 400, |
'height': 400 |
@@ -288,7 +288,7 @@ Here's a sample message receiver |
that gets added to your sandboxed page: |
</p> |
mkearney1
2014/04/09 19:43:30
Keep .html as it refers to a filename.
|
-<pre data-filename="sandboxed.html"> |
+<pre data-filename="sandboxed"> |
var messageHandler = function(e) { |
console.log('Background script says hello.', e.data); |
}; |