Index: chrome/common/extensions/docs/templates/articles/content_scripts.html |
diff --git a/chrome/common/extensions/docs/templates/articles/content_scripts.html b/chrome/common/extensions/docs/templates/articles/content_scripts.html |
index c1bb6a6c6391c519551348457d0a35255420477a..fcccef4be2f1e9a19ed6c5dc48595600ce6a4a32 100644 |
--- a/chrome/common/extensions/docs/templates/articles/content_scripts.html |
+++ b/chrome/common/extensions/docs/templates/articles/content_scripts.html |
@@ -29,7 +29,7 @@ They <b>cannot</b>: |
<li> |
Use chrome.* APIs |
(except for parts of |
- <a href="extension.html"><code>chrome.extension</code></a>) |
+ <a href="extension"><code>chrome.extension</code></a>) |
</li> |
<li> |
Use variables or functions defined by their extension's pages |
@@ -44,10 +44,10 @@ These limitations aren't as bad as they sound. |
Content scripts can <em>indirectly</em> use the chrome.* APIs, |
get access to extension data, |
and request extension actions |
-by exchanging <a href="messaging.html">messages</a> |
+by exchanging <a href="messaging">messages</a> |
with their parent extension. |
Content scripts can also |
-make <a href="xhr.html">cross-site XMLHttpRequests</a> |
+make <a href="xhr">cross-site XMLHttpRequests</a> |
to the same sites as their parent extensions, |
and they can |
<a href="#host-page-communication">communicate with web pages</a> |
@@ -61,7 +61,7 @@ learn about the |
<p>If your content script's code should always be injected, |
register it in the |
-<a href="manifest.html">extension manifest</a> |
+<a href="manifest">extension manifest</a> |
using the <code>content_scripts</code> field, |
as in the following example. |
</p> |
@@ -84,7 +84,7 @@ as in the following example. |
<p> |
If you want to inject the code only sometimes, |
use the |
-<a href="declare_permissions.html"><code>permissions</code></a> field instead, |
+<a href="declare_permissions"><code>permissions</code></a> field instead, |
as described in <a href="#pi">Programmatic injection</a>. |
</p> |
@@ -117,7 +117,7 @@ can have the following properties:</p> |
<td>array of strings</td> |
<td><em>Required.</em> |
Specifies which pages this content script will be injected into. |
- See <a href="match_patterns.html">Match Patterns</a> |
+ See <a href="match_patterns">Match Patterns</a> |
for more details on the syntax of these strings |
and <a href="#match-patterns-globs">Match patterns and globs</a> |
for information on how to exclude URLs.</td> |
@@ -128,7 +128,7 @@ can have the following properties:</p> |
<td><em>Optional.</em> |
Excludes pages that this content script would otherwise be |
injected into. |
- See <a href="match_patterns.html">Match Patterns</a> |
+ See <a href="match_patterns">Match Patterns</a> |
for more details on the syntax of these strings |
and <a href="#match-patterns-globs">Match patterns and globs</a> |
for information on how to exclude URLs.</td> |
@@ -224,7 +224,7 @@ For example, assume <code>matches</code> is <code>["http://*.nytimes.com/*"]</co |
<p> |
<p> |
-Glob properties follow a different, more flexible syntax than <a href="match_patterns.html">match patterns</a>. Acceptable glob strings are URLs that may contain "wildcard" asterisks and question marks. The asterisk (*) matches any string of any length (including the empty string); the question mark (?) matches any single character. |
+Glob properties follow a different, more flexible syntax than <a href="match_patterns">match patterns</a>. Acceptable glob strings are URLs that may contain "wildcard" asterisks and question marks. The asterisk (*) matches any string of any length (including the empty string); the question mark (?) matches any single character. |
</p> |
<p> |
@@ -257,12 +257,12 @@ only when the user clicks a browser action's icon. |
<p> |
To insert code into a page, |
your extension must have |
-<a href="xhr.html#requesting-permission">cross-origin permissions</a> |
+<a href="xhr#requesting-permission">cross-origin permissions</a> |
for the page. |
It also must be able to use the <code>chrome.tabs</code> module. |
You can get both kinds of permission |
using the manifest file's |
-<a href="declare_permissions.html">permissions</a> field. |
+<a href="declare_permissions">permissions</a> field. |
</p> |
<p> |
@@ -383,7 +383,7 @@ document.getElementById("theButton").addEventListener("click", |
First, be careful not to introduce security vulnerabilities into the web site |
your content script is injected into. For example, if your content script |
receives content from another web site (for example, by making an <a |
-href="xhr.html">XMLHttpRequest</a>), |
+href="xhr">XMLHttpRequest</a>), |
be careful to filter that content for <a |
href="http://en.wikipedia.org/wiki/Cross-site_scripting">cross-site |
scripting</a> attacks before injecting the content into the current page. |
@@ -442,11 +442,11 @@ document.getElementById("someImage").src = imgURL; |
<p> |
You can find many |
-<a href="samples.html#script">examples that use content scripts</a>. |
+<a href="samples#script">examples that use content scripts</a>. |
A simple example of communication via messages is in the |
-<a href="samples.html#message-timer">Message Timer</a>. |
-See <a href="samples.html#page-redder">Page Redder</a> and |
-<a href="samples.html#email-this-page-(by-google)">Email This Page</a> |
+<a href="samples#message-timer">Message Timer</a>. |
+See <a href="samples#page-redder">Page Redder</a> and |
+<a href="samples#email-this-page-(by-google)">Email This Page</a> |
for examples of programmatic injection. |
</p> |