Skip to content

Commit f4fd2eb

Browse files
Selim GurunAndroid (Google) Code Review
authored andcommitted
Merge "Minor update to addjavascriptinterface documentation" into jb-mr1-dev
2 parents 2cd3566 + b4c02e6 commit f4fd2eb

File tree

1 file changed

+6
-4
lines changed

1 file changed

+6
-4
lines changed

core/java/android/webkit/WebView.java

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1494,12 +1494,14 @@ public void setPictureListener(PictureListener listener) {
14941494
* Injects the supplied Java object into this WebView. The object is
14951495
* injected into the JavaScript context of the main frame, using the
14961496
* supplied name. This allows the Java object's methods to be
1497-
* accessed from JavaScript. For API level {@link android.os.Build.VERSION_CODES#JELLY_BEAN_MR1}
1497+
* accessed from JavaScript. For applications targeted to API
1498+
* level {@link android.os.Build.VERSION_CODES#JELLY_BEAN_MR1}
14981499
* and above, only public methods that are annotated with
14991500
* {@link android.webkit.JavascriptInterface} can be accessed from JavaScript.
1500-
* For API level {@link android.os.Build.VERSION_CODES#JELLY_BEAN} or below,
1501+
* For applications targeted to API level {@link android.os.Build.VERSION_CODES#JELLY_BEAN} or below,
15011502
* all public methods (including the inherited ones) can be accessed, see the
1502-
* important security note below for implications. Note that injected objects will not
1503+
* important security note below for implications.
1504+
* <p> Note that injected objects will not
15031505
* appear in JavaScript until the page is next (re)loaded. For example:
15041506
* <pre>
15051507
* class JsObject {
@@ -1514,7 +1516,7 @@ public void setPictureListener(PictureListener listener) {
15141516
* <ul>
15151517
* <li> This method can be used to allow JavaScript to control the host
15161518
* application. This is a powerful feature, but also presents a security
1517-
* risk for applications targeting API level
1519+
* risk for applications targeted to API level
15181520
* {@link android.os.Build.VERSION_CODES#JELLY_BEAN} or below, because
15191521
* JavaScript could use reflection to access an
15201522
* injected object's public fields. Use of this method in a WebView

0 commit comments

Comments
 (0)