<!doctype html>
<html lang="en">
    <head>
        <script>
            var script = document.createElement('script');
            // Don't do this at home kids! The "document.referrer" part is actually inserting a XSS security.
            // We are OK in this precise case because the HTML page is hosted on the "maps" domain that contains only static files.
            script.setAttribute('src', document.referrer + 'iframe_api.js');
            document.head.appendChild(script);
            window.addEventListener('load', () => {
                WA.room.setProperty('iframeTest', 'openWebsite', 'https://www.wikipedia.org/');
                WA.room.setProperty('metadata', 'openWebsite', 'https://www.wikipedia.org/');
            })
        </script>
    </head>
    <body>
        <p>Change the url of this iframe and add the 'openWebsite' property to the red tile layer</p>
    </body>
</html>