-
Notifications
You must be signed in to change notification settings - Fork 609
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix(share): Address Android 14 changes #1849
Conversation
Released dev build of share with dev version: 5.0.7-dev-1849-20231101T165859.0 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I don't think there is a risk for using FLAG_ALLOW_UNSAFE_IMPLICIT_INTENT
for our use case, especially since it's null before the share starts. LGTM
Sorry to comment on a closed PR, but can we please get this released in version 5.0.7? |
No, it’s a breaking change, targeting SDK 34 will only be supported in capacitor 6. |
This is the simpler solution I've found for addressing Android 14 changes.
I think
FLAG_ALLOW_UNSAFE_IMPLICIT_INTENT
is safe to use because we only use the pending intent for getting the package of the app the user selected to share, we null the value right before the share starts so if somebody managed to get ourBroadcastReceived
it will have no effect.But if somebody thinks this is unsafe I can try some different approach that doesn't use
FLAG_ALLOW_UNSAFE_IMPLICIT_INTENT
.