diff options
5 files changed, 5 insertions, 3 deletions
diff --git a/chrome/browser/resources/webstore_app/manifest.json b/chrome/browser/resources/webstore_app/manifest.json index a56d574..c4568e4 100644 --- a/chrome/browser/resources/webstore_app/manifest.json +++ b/chrome/browser/resources/webstore_app/manifest.json @@ -7,7 +7,7 @@ }, "app": { "launch": { - "web_url": "https://chrome.google.com/extensions" + "web_url": "https://chrome.google.com/webstore" }, "urls": [ "*://chrome.google.com/extensions", diff --git a/chrome/common/extensions/docs/npapi.html b/chrome/common/extensions/docs/npapi.html index 19fdc3a..904bff2 100644 --- a/chrome/common/extensions/docs/npapi.html +++ b/chrome/common/extensions/docs/npapi.html @@ -320,6 +320,7 @@ allowing you to call into native binary code from JavaScript. </p><p>Code running in an NPAPI plugin has the full permissions of the current user and is not sandboxed or shielded from malicious input by Google Chrome in any way. You should be especially cautious when processing input from untrusted sources, such as when working with <a href="content_scripts.html#security-considerations">content scripts</a> or XMLHttpRequest. </p><p>Because of the additional security risks NPAPI poses to users, extensions that use it will require manual review before being accepted in the +<a href="https://chrome.google.com/webstore">web store</a> or <a href="https://chrome.google.com/extensions">extension gallery</a>. </p><h2>Details</h2> diff --git a/chrome/common/extensions/docs/static/npapi.html b/chrome/common/extensions/docs/static/npapi.html index 8490bb3..72f3bd0 100644 --- a/chrome/common/extensions/docs/static/npapi.html +++ b/chrome/common/extensions/docs/static/npapi.html @@ -16,6 +16,7 @@ allowing you to call into native binary code from JavaScript. <p>Code running in an NPAPI plugin has the full permissions of the current user and is not sandboxed or shielded from malicious input by Google Chrome in any way. You should be especially cautious when processing input from untrusted sources, such as when working with <a href="content_scripts.html#security-considerations">content scripts</a> or XMLHttpRequest. <p>Because of the additional security risks NPAPI poses to users, extensions that use it will require manual review before being accepted in the +<a href="https://chrome.google.com/webstore">web store</a> or <a href="https://chrome.google.com/extensions">extension gallery</a>. <h2>Details</h2> diff --git a/chrome/common/extensions/extension_constants.cc b/chrome/common/extensions/extension_constants.cc index 7ebc16b..5e00d35 100644 --- a/chrome/common/extensions/extension_constants.cc +++ b/chrome/common/extensions/extension_constants.cc @@ -280,7 +280,7 @@ const char* kIllegalPlugins = } // namespace extension_manifest_errors namespace extension_urls { -const char* kGalleryBrowsePrefix = "https://chrome.google.com/extensions"; +const char* kGalleryBrowsePrefix = "https://chrome.google.com/webstore"; const char* kMiniGalleryBrowsePrefix = "https://tools.google.com/chrome/"; const char* kMiniGalleryDownloadPrefix = "https://dl-ssl.google.com/chrome/"; } diff --git a/chrome/common/extensions/extension_manifests_unittest.cc b/chrome/common/extensions/extension_manifests_unittest.cc index 6b91c16..9d653fe 100644 --- a/chrome/common/extensions/extension_manifests_unittest.cc +++ b/chrome/common/extensions/extension_manifests_unittest.cc @@ -358,7 +358,7 @@ TEST_F(ExtensionManifestTest, GetHomepageURL) { // can be different in testing, so we just check the part before id. extension = LoadAndExpectSuccess("homepage_google_hosted.json"); EXPECT_TRUE(StartsWithASCII(extension->GetHomepageURL().spec(), - "https://chrome.google.com/extensions/detail/", + "https://chrome.google.com/webstore/detail/", false)); extension = LoadAndExpectSuccess("homepage_externally_hosted.json"); |