| Index: chrome/common/extensions/docs/templates/articles/manifest/sandbox.html
|
| diff --git a/chrome/common/extensions/docs/templates/articles/manifest/sandbox.html b/chrome/common/extensions/docs/templates/articles/manifest/sandbox.html
|
| index 495061d1155a3577096c9da939e2de2262ddd716..1eb29a7beff2ba1dc5f2ec9a144aa6758274d337 100644
|
| --- a/chrome/common/extensions/docs/templates/articles/manifest/sandbox.html
|
| +++ b/chrome/common/extensions/docs/templates/articles/manifest/sandbox.html
|
| @@ -12,7 +12,7 @@ direct access to non-sandboxed pages (it may communicate with them via
|
| <code>postMessage()</code>).</li>
|
| <li>
|
| <p>A sandboxed page is not subject to the
|
| - <a href="http://developer.chrome.com/extensions/contentSecurityPolicy.html">Content Security Policy
|
| + <a href="http://developer.chrome.com/extensions/contentSecurityPolicy">Content Security Policy
|
| (CSP)</a> used by the rest of the app or extension (it has its own separate
|
| CSP value). This means that, for example, it can use inline script and
|
| <code>eval</code>.</p>
|
| @@ -25,8 +25,8 @@ direct access to non-sandboxed pages (it may communicate with them via
|
| ...
|
| "sandbox": {
|
| "pages": [
|
| - "page1.html",
|
| - "directory/page2.html"
|
| + "page1",
|
| + "directory/page2"
|
| ]
|
| // content_security_policy is optional.
|
| "content_security_policy":
|
| @@ -41,7 +41,7 @@ direct access to non-sandboxed pages (it may communicate with them via
|
| <code>sandbox allow-scripts allow-forms</code>. You can specify your CSP
|
| value to restrict the sandbox even further, but it must have the <code>sandbox</code>
|
| directive and may not have the <code>allow-same-origin</code> token (see
|
| - <a href="http://www.whatwg.org/specs/web-apps/current-work/multipage/the-iframe-element.html#attr-iframe-sandbox">the
|
| + <a href="http://www.whatwg.org/specs/web-apps/current-work/multipage/the-iframe-element#attr-iframe-sandbox">the
|
| HTML5 specification</a> for possible sandbox tokens).
|
| </p>
|
| </li>
|
| @@ -56,14 +56,14 @@ that embeds them.
|
| </p>
|
|
|
| <p>
|
| -<a href="http://developer.chrome.com/extensions/sandboxingEval.html">"Using eval in Chrome Extensions. Safely."</a>
|
| +<a href="http://developer.chrome.com/extensions/sandboxingEval">"Using eval in Chrome Extensions. Safely."</a>
|
| goes into more detail about implementing a sandboxing workflow that enables use
|
| of libraries that would otherwise have issues executing under extension's
|
| -<a href="http://developer.chrome.com/extensions/contentSecurityPolicy.html">default Content Security
|
| +<a href="http://developer.chrome.com/extensions/contentSecurityPolicy">default Content Security
|
| Policy</a>.
|
| </p>
|
|
|
| <p>
|
| Sandboxed page may only be specified when using
|
| -<a href="http://developer.chrome.com/extensions/manifest.html#manifest_version"><code>manifest_version</code></a> 2 or above.
|
| +<a href="http://developer.chrome.com/extensions/manifest#manifest_version"><code>manifest_version</code></a> 2 or above.
|
| </p>
|
|
|