Status Update
Comments
ke...@google.com <ke...@google.com> #2
Thanks for the report. I will route this to the appropriate internal team and update this when I hear back from them.
ya...@google.com <ya...@google.com> #3
er...@tausight.com <er...@tausight.com> #4
"2022-06-12 18:47:15.156 1841-4562/? W/PackageManager: Intent does not match component's intent filter: Intent { act=com.google.android.gms.wearable.BIND_LISTENER"
bg...@google.com <bg...@google.com> #5
er...@tausight.com <er...@tausight.com> #6
+1, can confirm it doesn't work on Android 13:=
2022-07-15 11:26:15.023 589-5347 PackageManager pid-589 W Intent does not match component's intent filter: Intent { act=com.google.android.gms.wearable.BIND_LISTENER cmp=xxx/xxx.WatchMessageReceiver }
2022-07-15 11:26:15.023 589-5347 PackageManager pid-589 W Access blocked: ComponentInfo{xxx/xxx.WatchMessageReceiver}
2022-07-15 11:26:15.023 589-5347 ActivityManager pid-589 W Unable to start service Intent { act=com.google.android.gms.wearable.BIND_LISTENER cmp=xxx/xxx.WatchMessageReceiver } U=0: not found
jm...@securetrust.com <jm...@securetrust.com> #7
Note that I've been able to make it work by:
- Adding
<action android:name="com.google.android.gms.wearable.BIND_LISTENER" />
in the intent filter - Removing
<data android:scheme="wear" android:host="*" />
But I feel like this is not something we should do
gr...@google.com <gr...@google.com> #8
I'm really afraid Android 13 might get released as-is, breaking WearOS app communication 😨😨
[Deleted User] <[Deleted User]> #9
If you're not targeting API 33 you're not affected by the bug. So it's a big bug, and yes we of course expected more from Google, but you can always target the api level later when it's fixed.
But I agree this is kind of desperating that more than 1.5 month after the first report nothing has changed.
re...@gmail.com <re...@gmail.com> #10
As an interim update on this issue: we've been already working on the fix that should be available by Android 13 release. The fix requires thorough testing, I'll keep this bug updated as soon as we have more to share. Thanks!
ko...@google.com <ko...@google.com>
ko...@google.com <ko...@google.com> #11
@
Thank you for the update @
Description
How this might work:
Extended Validation (EV) Code Signing Certificates extends the safety of digitally signed code adding hardware security requirement.
Cloud KMS provides an API for retrieving attestation keys from HSMs, which is useful for this purpose.