Index: chrome/common/extensions/docs/templates/articles/app_external.html |
diff --git a/chrome/common/extensions/docs/templates/articles/app_external.html b/chrome/common/extensions/docs/templates/articles/app_external.html |
index 609b3b9cfb4daa75d87375bbbb2b9e8711d6a379..2a375fbc90974a1d8ad08ee2898cf584b548fef4 100644 |
--- a/chrome/common/extensions/docs/templates/articles/app_external.html |
+++ b/chrome/common/extensions/docs/templates/articles/app_external.html |
@@ -2,7 +2,7 @@ |
<p> |
-The <a href="app_architecture.html#security">Chrome Apps security model</a> disallows |
+The <a href="app_architecture#security">Chrome Apps security model</a> disallows |
external content in iframes and |
the use of inline scripting and <code>eval()</code>. |
You can override these restrictions, |
@@ -27,7 +27,7 @@ Check out the |
<h2 id="external">Referencing external resources</h2> |
<p> |
-The <a href="contentSecurityPolicy.html">Content Security Policy</a> used by apps disallows |
+The <a href="contentSecurityPolicy">Content Security Policy</a> used by apps disallows |
the use of many kinds of remote URLs, so you can't directly reference external |
images, stylesheets, or fonts from an app page. Instead, you can use use |
cross-origin XMLHttpRequests to fetch these resources, |
@@ -68,7 +68,7 @@ xhr.onload = function(e) { |
xhr.send(); |
</pre> |
-<p>You may want to <a href="offline_apps.html#saving-locally">save</a> |
+<p>You may want to <a href="offline_apps#saving-locally">save</a> |
these resources locally, so that they are available offline.</p> |
<h2 id="webview">Embed external web pages</h2> |
@@ -127,7 +127,7 @@ These pages are then exempt from their Content Security Policy. |
Sandboxed pages can use iframes, inline scripting, |
and <code>eval()</code>. |
Check out the manifest field description for |
-<a href="manifest/sandbox.html">sandbox</a>. |
+<a href="manifest/sandbox">sandbox</a>. |
</p> |
<p> |