one more update for HACKING.md

This commit is contained in:
Philipp Schaefer 2013-04-17 00:12:44 +02:00
parent b7329a611c
commit acc0db1ce8

View File

@ -1,7 +1,7 @@
How does this basically work?
-----------------------------
At the moment, the Android App is a WebView which renders the normal web page. The IITC script is injected before page load and after this, it works the same way as on desktop browser.
At the moment, the Android App is a WebView which renders the normal web page. The IITC script is injected by calling the ```iitc_view.loadIITC_JS(Context)```. The app uses a local version of the script, which is located in the assets folder, if no external source is given (see "pref\_iitc\_source").
Communication from app to script is handled by loading Javascript function calls. For example: ```iitc_view.loadUrl("javascript: window.goBack();");```