one more update for HACKING.md
This commit is contained in:
parent
b7329a611c
commit
acc0db1ce8
@ -1,7 +1,7 @@
|
||||
How does this basically work?
|
||||
-----------------------------
|
||||
|
||||
At the moment, the Android App is a WebView which renders the normal web page. The IITC script is injected before page load and after this, it works the same way as on desktop browser.
|
||||
At the moment, the Android App is a WebView which renders the normal web page. The IITC script is injected by calling the ```iitc_view.loadIITC_JS(Context)```. The app uses a local version of the script, which is located in the assets folder, if no external source is given (see "pref\_iitc\_source").
|
||||
|
||||
Communication from app to script is handled by loading Javascript function calls. For example: ```iitc_view.loadUrl("javascript: window.goBack();");```
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user