Select a .docx file to scan for Centralpoint hyperlink matches.
What This Proof of Concept Validates
This tool demonstrates the core hyperlink-injection pipeline for a Centralpoint Word Add-in. In the production add-in, the entire process happens live inside Microsoft Word — no file upload required. The add-in reads the open document's OOXML, compares every text phrase against Centralpoint record titles, and writes the hyperlinked version back into Word in a single operation. This POC uses a file upload to simulate that pipeline so the matching and OOXML manipulation logic can be validated independently.
1Extract OOXMLcontext.document.body.getOoxml()The add-in reads the active document's raw OOXML directly from Word's JavaScript API. This POC simulates this by extracting word/document.xml from the uploaded .docx.
→
2Compare & MatchCP_RECORDS[] title lookupDocument text is compared against Centralpoint record titles. Exact whole-word matches are identified and presented for approval.
→
3Inject Hyperlinksbody.insertOoxml(updatedXml, Word.InsertLocation.replace)Approved matches are injected as <w:hyperlink> elements and the modified OOXML is written back into Word, replacing the document body.
POC ↔ Add-in Mapping: Tab 1 (Upload) simulates getOoxml() — Tab 2 (Match) runs the comparison engine — Tab 3 (Result) simulates insertOoxml() and offers a download to verify — Tab 4 (Source) shows the Centralpoint records powering the scan.