Status Update
Comments
pe...@google.com <pe...@google.com>
el...@jarofworms.com <el...@jarofworms.com> #2
Thanks for the report. I will route this to the appropriate internal team and update this when I hear back from them.
[Deleted User] <[Deleted User]> #3
wa...@ninua.com <wa...@ninua.com> #4
"2022-06-12 18:47:15.156 1841-4562/? W/PackageManager: Intent does not match component's intent filter: Intent { act=com.google.android.gms.wearable.BIND_LISTENER"
mi...@gmail.com <mi...@gmail.com> #5
da...@gmail.com <da...@gmail.com> #6
+1, can confirm it doesn't work on Android 13:=
2022-07-15 11:26:15.023 589-5347 PackageManager pid-589 W Intent does not match component's intent filter: Intent { act=com.google.android.gms.wearable.BIND_LISTENER cmp=xxx/xxx.WatchMessageReceiver }
2022-07-15 11:26:15.023 589-5347 PackageManager pid-589 W Access blocked: ComponentInfo{xxx/xxx.WatchMessageReceiver}
2022-07-15 11:26:15.023 589-5347 ActivityManager pid-589 W Unable to start service Intent { act=com.google.android.gms.wearable.BIND_LISTENER cmp=xxx/xxx.WatchMessageReceiver } U=0: not found
mi...@gmail.com <mi...@gmail.com> #7
Note that I've been able to make it work by:
- Adding
<action android:name="com.google.android.gms.wearable.BIND_LISTENER" />
in the intent filter - Removing
<data android:scheme="wear" android:host="*" />
But I feel like this is not something we should do
mi...@gmail.com <mi...@gmail.com> #8
I'm really afraid Android 13 might get released as-is, breaking WearOS app communication 😨😨
mi...@gmail.com <mi...@gmail.com> #9
If you're not targeting API 33 you're not affected by the bug. So it's a big bug, and yes we of course expected more from Google, but you can always target the api level later when it's fixed.
But I agree this is kind of desperating that more than 1.5 month after the first report nothing has changed.
or...@gmail.com <or...@gmail.com> #10
As an interim update on this issue: we've been already working on the fix that should be available by Android 13 release. The fix requires thorough testing, I'll keep this bug updated as soon as we have more to share. Thanks!
ma...@propger.com <ma...@propger.com> #11
@
Thank you for the update @
ma...@propger.com <ma...@propger.com> #12
Android 13 is out today and we still have no patch unlike what you said a month ago
[Deleted User] <[Deleted User]> #13
js...@google.com <js...@google.com>
ml...@squareup.com <ml...@squareup.com> #14
This issues has been already given high priority (updated external priority on this bug to reflect internal status). The fix is on the way and going through the final rounds of testing, so the roll out is slated to next couple of weeks.
To reiterate what have been mentioned earlier on this bug: this issue affects only apps targeting Android 13, so the apps won't break unless you bump targetSDK
version to 33
. In case if you want to start working on app compatibility for Android 13 behaviour changes, you could use
wa...@gmail.com <wa...@gmail.com> #15
- The report is 2 months old
- Google chose to release Android 13 with that bug
- There's no mention of this bug on the documentation so you can totally bump your targetSdk without noticing it
So thank you guys for working on this but it's still not a valid excuse for taking that long for such an important issue. Now that being said, let us know when a fix is available
wa...@gmail.com <wa...@gmail.com> #16
ca...@gmail.com <ca...@gmail.com> #17
That must be some really intense testing as we are 10 days later and still nothing on sight. I don't want to be a P2 issue if that's what a P1 is.
ju...@gmail.com <ju...@gmail.com> #18
[Deleted User] <[Deleted User]> #19
[Deleted User] <[Deleted User]> #20
fr...@futurefamily.com <fr...@futurefamily.com> #21
My bet is that Google still targets API 32 (or even lower) internally so they don't care and didn't even saw the issue before our report.
Description
GAE should offer a paid option to have all urlfetches come from an IP address which is not shared with other appengine applications. This frees us from having to spend $10/mo on a mindless vps somewhere and wiring together the proxy calls ourselves, adding latency and complexity to our apps.
This is similar to issue #1269 but for outbound requests, not inbound ones.