From acc0db1ce87528fb705047c195d3608efc4d8678 Mon Sep 17 00:00:00 2001 From: Philipp Schaefer Date: Wed, 17 Apr 2013 00:12:44 +0200 Subject: [PATCH] one more update for HACKING.md --- mobile/HACKING.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/mobile/HACKING.md b/mobile/HACKING.md index 71a9449e..cfa2a9ae 100644 --- a/mobile/HACKING.md +++ b/mobile/HACKING.md @@ -1,7 +1,7 @@ How does this basically work? ----------------------------- -At the moment, the Android App is a WebView which renders the normal web page. The IITC script is injected before page load and after this, it works the same way as on desktop browser. +At the moment, the Android App is a WebView which renders the normal web page. The IITC script is injected by calling the ```iitc_view.loadIITC_JS(Context)```. The app uses a local version of the script, which is located in the assets folder, if no external source is given (see "pref\_iitc\_source"). Communication from app to script is handled by loading Javascript function calls. For example: ```iitc_view.loadUrl("javascript: window.goBack();");```