DiaryiOS

Japan Is an iOS-Majority Market — Why You Need Both iOS and Android

2 Mins read

When you ship an app, do you default to “Android first” or “iOS only because corporate says so”? Globally that might fly, but in the Japanese market, that decision throws away 40–60 % of your potential users from day one.

Mobile OS share: iOS vs Android (Japan vs World, 2026)

As the chart above shows, the iOS/Android split in Japan and the rest of the world is completely reversed.

Japan vs. the World: The Share Flip

Worldwide, Android dominates mobile OS share. StatCounter data (Jan 2025 – Mar 2026) puts Android at 72.1 % and iOS at 27.6 % — roughly a 3 : 1 gap, driven mainly by affordable Android handsets across India, Southeast Asia, and Africa.

Japan, on the other hand, sits at iOS 60.7 %, Android 39.1 %. It’s one of the few iOS-majority markets on the planet.

Region iOS Android
World 27.6 % 72.1 %
Japan 60.7 % 39.1 %
US (ref.) ~56 % ~44 %
UK (ref.) ~52 % ~48 %

Source: StatCounter Global Stats (Jan 2025 – Mar 2026) / US & UK are estimates for the same period

Why Does Japan Lean So Heavily Toward iOS?

Factor Details
Carrier lineup NTT docomo, au, and SoftBank have featured the iPhone as their flagship device in stores for years
Youth adoption iPhone ownership skews highest among teens through 30-somethings, the same crowd driving LINE and TikTok
“No iPhone, no invite” culture iMessage and AirDrop are baked into school and workplace communication — not having them means being left out
Corporate devices Many companies issue iPhones for easier MDM management and stronger security ratings

These factors run deep and aren’t going to flip overnight. Expect this landscape to stick around for a while.

What You Lose by Supporting Only One OS

If you release a Japan-facing app on iOS only, you miss roughly 39 % of users on Android. Go Android-only and you miss about 61 % on iOS.

Supported OS Reachable Users in Japan Users Left Behind
iOS only 60.7 % 39.3 %
Android only 39.1 % 60.9 %
iOS + Android ~99.8 % Nearly zero

For enterprise apps, B2B tools, and internal systems, “some employees can’t access it” is a showstopper. Even for consumer apps, you end up splitting store reviews and word-of-mouth.

So What Do You Actually Do?

Go native — seriously

Flutter and React Native come up every time someone mentions cross-platform, but on any non-trivial project the cross-platform tax adds up fast: keeping pace with each OS’s latest APIs, chasing platform-specific bugs, and hiring engineers who can actually debug both layers. If you’re building a throwaway campaign app, sure, pick a framework. For everything else, native iOS + native Android remains the pragmatic default.

Run iOS 26 and Android 16 updates in parallel

2026 is a milestone year for both platforms.

  • iOS 26: Starting April 28, 2026, App Store Connect submissions require the Xcode 26 + iOS 26 SDK (⚠️ enforcement in progress)
  • Android 16: Google Play’s targetSdkVersion roadmap will require targetSdkVersion 36 sometime in 2026

A “finish iOS first, then Android” waterfall won’t cut it. Build a team process that tracks both platform updates in parallel — that’s the realistic play.

Details on each OS update are in separate posts:

Read more
Diary

Finish Your iOS 26 Migration Now — App Store SDK Requirements Change on April 28, 2026

4 Mins read

Uploading to App Store Connect will require builds with Xcode 26 and the iOS 26 SDK starting April 28, 2026. iOS 26 was released in September 2025 — a major update including the Liquid Glass design and Foundation Models framework announced at WWDC25. iOS 27 will be announced at WWDC26 (June 8–12, 2026) and is expected to ship in September 2026. This article lays out the migration order with both versions in mind.

App Store SDK Requirement Schedule

Every year, Apple raises the minimum SDK version required for submissions to App Store Connect.

Enforcement Date Required Xcode Required SDK Status
April 29, 2024 Xcode 15 iOS 17 SDK Enforced
April 24, 2025 Xcode 16 iOS 18 SDK Enforced
April 28, 2026 Xcode 26 iOS 26 SDK ⚠️ Action required
2027 (expected) Xcode 27 iOS 27 SDK Official announcement after WWDC26

Source: <https://developer.apple.com/news/upcoming-requirements/>

If you don’t build with the iOS 26 SDK, you won’t be able to upload app updates to App Store Connect. This isn’t about new features — it’s a mandatory requirement to continue delivering updates to existing users.

iOS 26 Migration Priority Order

Priority Action Item Reason
🔴 Critical Upgrade to Xcode 26 and verify the build Directly tied to the April 28, 2026 deadline
🔴 Critical Migrate to TLS 1.2+ if connecting to TLS 1.0/1.1 endpoints URLSession minimum TLS changed to 1.2
🟠 High Replace UIScreen.mainScreen usage Promoted to deprecated in iOS 26 SDK
🟠 High Verify Push to Talk app entitlements Legacy entitlement no longer supported in iOS 26 SDK
🟡 Medium Adapt to Liquid Glass design Standard UIKit/SwiftUI adapts automatically, but custom UI needs verification
🟡 Medium Check for CoreData Ubiquitous key usage Causes build errors with iOS 26 SDK

Get Your Tooling in Order First

Whether you’re working on iOS 26 compliance or early iOS 27 validation, the first blockers are usually build tooling issues rather than OS APIs. Lock down the tooling first.

Tool Recommended Version Notes
Xcode 26.4.1 or later Required for submissions after April 28
Swift 6.0 (Swift 5.x still supported) Swift 6 strict concurrency recommended
SwiftUI Version bundled with iOS 26 SDK New components for Liquid Glass support
iOS Deployment Target 16 or higher recommended iOS 15 and below are losing market share rapidly

The most common issue when migrating to Swift 6 mode is concurrency errors around CoreData. Accessing NSManagedObject outside @MainActor now triggers warnings, so the fix is to wrap operations inside context.perform blocks.

actor DataProcessor {
    func process(context: NSManagedObjectContext) async {
        await context.perform {
            // CoreData operations go inside context.perform
        }
    }
}

Behavior Changes in iOS 26 That Are Easy to Trip Over

TLS Minimum Version Change

For apps linked against the iOS 26 SDK, the minimum TLS version for URLSession and Network framework has been raised from 1.0 to 1.2.

If internal systems or external APIs still use legacy TLS settings, apps built with the iOS 26 SDK won’t be able to communicate with them.

// Example allowing legacy TLS (not recommended — temporary workaround only)
let config = URLSessionConfiguration.default
config.tlsMinimumSupportedProtocolVersion = .TLSv10 // triggers a warning
let session = URLSession(configuration: config)

The correct fix is to upgrade the server side to TLS 1.2 or higher. Make sure to check connections made through third-party SDKs as well.

Removal of UIScreen.mainScreen

UIScreen.mainScreen, which had been previously deprecated, has been promoted to deprecated in the iOS 26 SDK. For compatibility with multi-window and iPadOS scene support, screen size should now be obtained from UIWindowScene.

// Before (deprecated)
let screenWidth = UIScreen.main.bounds.width

// After (recommended)
if let scene = UIApplication.shared.connectedScenes
    .first(where: { $0.activationState == .foregroundActive }) as? UIWindowScene {
    let screenWidth = scene.screen.bounds.width
}

Push to Talk Entitlement Change

The com.apple.developer.pushkit.unrestricted-voip.ptt entitlement no longer works with the iOS 26 SDK. Migration to the Push to Talk framework (iOS 16+) is required.

CoreData iCloud Sync Key Removal

Keys like NSPersistentStoreUbiquitousContentNameKey, which were deprecated over 10 years ago for iCloud ubiquitous sync, now cause build errors with the iOS 26 SDK. Migration targets are NSPersistentCloudKitContainer (iOS 13+) or SwiftData (iOS 17+).

Adapting to Liquid Glass Design

Standard UIKit / SwiftUI components (navigation bars, tab bars, sheets, etc.) automatically adapt to the new design. For custom UI with manual drawing, it’s worth visually verifying on a real device how it interacts with background blur and glass effects.

Getting Ahead on iOS 27 (WWDC26: June 8–12, 2026)

WWDC26 runs June 8–12, 2026. As usual, the new OS will be announced on day one with Beta 1 released immediately. iOS 27 is expected to ship in September 2026.

Item to Verify Priority Timing
Complete iOS 26 SDK compliance before starting iOS 27 Beta testing 🔴 Critical By April 28, 2026
Evaluate Foundation Models framework (on-device LLM) adoption internally 🟡 Medium After WWDC26
Assess Declared Age Range API requirements (if you have youth-oriented content) 🟡 Medium After WWDC26
App Intents expansion (deeper Siri & Spotlight integration) 🟡 Medium After WWDC26
Re-verify Liquid Glass adaptation against iOS 27 design changes 🟡 Medium After WWDC26

Testing Priority for Simultaneous iOS 26 & 27 Support

Feature Area iOS 26 Verification Items iOS 27 Beta Verification Items
Networking Identify and fix all connections below TLS 1.2 Meet new security requirements for connected APIs
Layout & UI Visually verify custom views overlapping with Liquid Glass Apply new design guideline changes
Data Persistence Check for CoreData ubiquitous key usage Confirm SwiftData / CloudKit migration is complete
Push Notifications Verify APNs certificates & Push to Talk entitlements Check for notification UI rendering issues on iOS 27
Screen Size Verify layout changes from UIScreen.main replacement Confirm full iPadOS multi-window support
Third-Party SDKs Update to iOS 26–compatible versions Check each SDK for iOS 27 beta compatibility

Common Pitfalls for Japanese Business Apps

Risk Item Details Mitigation
Legacy encryption in corporate VPNs DES/3DES/SHA1-96/SHA1-160 are no longer supported for IKEv2 VPN. Apps using NetworkExtension-based VPNs need verification Update to AES-256/SHA-256 + DH group 14 or higher
TLS version on intranet connections Legacy internal web services such as attendance and expense systems may still be running TLS 1.0/1.1 Audit internal server TLS settings proactively
Japanese calendar and input behavior changes TextKit 2’s natural text direction handling has changed. Building with the iOS 26 SDK may alter Japanese text direction resolution logic Test vertical text and mixed Japanese text rendering on real devices
Apple Intelligence availability Foundation Models framework only runs on Apple Intelligence–capable devices. Some Japanese language features are rolling out gradually Verify fallback implementation for unsupported devices
Corporate MDM / device management Apps built with Xcode 26 need to be verified under MDM profiles Coordinate with IT to run TestFlight distribution in your corporate deployment environment early

What to Check Before Upgrading

The fastest first step is to do a rough scan for deprecated APIs.

grep -R "UIScreen.mainb|unrestricted-voip.ptt|UbiquitousContentName|UbiquitousContentURL" ./

Running a similar check for TLS-related issues helps catch things you might miss.

grep -R "TLSv10|TLSv11|tlsMinimumSupported|kCFStreamSSLLevel" ./
Read more
Diary

Should You Adopt Java 26? Pros and Caveats Sorted for the Field

5 Mins read

Java 26 went GA on 2026/03/17.

There are a lot of preview features again, but there are some changes around HTTP/3, G1 GC, and virtual threads that could quietly make a real difference.

On the flip side, if your environment is still carrying legacy APIs or old JVM flags, there are clear spots where an upgrade could trip you up.

Especially coming from Java 8, the gap is large enough that it’s better to look at where you’ll get stuck before looking at what’s new in Java 26.

Overview Diagram

Migration flow from Java 8 to Java 26
Before going straight to Java 26 from Java 8, do an intermediate cleanup on an LTS version first

Java 8 in production
	|
	+-- Audit legacy APIs / libraries
	|      - javax.xml.bind
	|      - Thread.stop
	|      - sun.*
	|      - Old JVM flags
	|
	+-- Validate on an LTS first
	|      - Test on Java 17 or 21
	|
	+-- Then check Java 26 deltas
			 - HTTP/3
			 - G1 improvements
			 - Virtual thread changes
			 - Security default changes

What Looks Good

java.net.http.HttpClient now supports HTTP/3.

Being able to use HTTP/3 without major code changes on the app side is straightforwardly useful.

Beyond that, there are fairly solid performance improvements: reduced synchronization in G1 GC, better humongous object reclamation, and AOT Object Cache now supporting any GC.

Virtual threads have also been improved — they’re less likely to hold onto the carrier thread while waiting for class initialization, which should reduce weird blocking scenarios.

Some of the smaller but welcome additions:

  • Process now implements AutoCloseable
  • UUID.ofEpochMillis() was added, making UUIDv7-style handling easier
  • ByteOrder is now an enum, making it easier to use in switch statements

For example, the HTTP Client lets you benefit with minimal code changes:

var client = HttpClient.newBuilder()
	.version(HttpClient.Version.HTTP_3)
	.build();

var request = HttpRequest.newBuilder()
	.uri(URI.create("https://example.com/api/status"))
	.GET()
	.build();

var response = client.send(request, HttpResponse.BodyHandlers.ofString());
System.out.println(response.statusCode());

And since Process now implements AutoCloseable, cleanup after running external commands is a bit cleaner:

try (var process = new ProcessBuilder("java", "-version").start()) {
	var exitCode = process.waitFor();
	System.out.println("exit=" + exitCode);
}

Things to Watch Out For

First, Thread.stop() has been removed.

If it’s still lingering in legacy maintenance code, it won’t even compile on JDK 26.

The Applet API has also been removed, so environments pulling from old documentation or samples need to watch out.

JVM flag cleanup has also progressed — flags like -Xmaxjitcodesize, MaxRAM, and AggressiveHeap that you’ve been using out of inertia may need to be revisited.

RMI over TLS now enforces endpoint identification by default, so environments with sloppy certificate SANs may hit connection failures.

HttpRequest.Builder.timeout() now covers the full response body reception, not just the initial connection. Depending on your existing timeout design, this could cause noticeable behavioral differences.

For environments that have been running on Java 8 for a long time, here’s what to be aware of before jumping straight to Java 26:

  • Java 8 ran on the classpath model, but from Java 9 onward, module boundaries and internal API dependencies become visible
  • Java EE / CORBA modules were removed in Java 11, so if javax.xml.bind is still in your codebase, you’ll need a separate fix
  • Reflection and security defaults have become stricter — code that used to work silently may now warn or fail
  • Old TLS settings, keystores, and RMI connections are prone to breaking right after an upgrade

For Japanese business systems, character encoding is also a quiet minefield.

Banking and core business systems in particular often still assume Shift_JIS-family encodings for back-office and host system integrations.

If you naively consolidate everything to “UTF-8 is the standard now,” you can end up with insidious bugs where the UI works fine but reports or external integrations produce garbled text.

In the Java 8 era, there was a lot of code that happened to work because the default charset on Windows was windows-31j.

But since JDK 18, the default charset is UTF-8, so patterns like new String(bytes) or FileReader that rely on the implicit charset will behave differently after migration.

In practice, you also shouldn’t treat Shift_JIS and windows-31j as interchangeable.

Both are available in Java’s charset list, but windows-31j / MS932 includes Windows-specific extensions, so there can be mismatches with circled numbers, platform-dependent characters, and IBM/NEC extensions.

For banking file transfers and host connections, it’s safer to confirm upfront whether the other party expects “Shift_JIS but actually CP932,” “strictly within the Shift_JIS range,” or “IBM host code pages included.”

If you’re looking at Japanese language issues specifically, these should be part of your pre-migration checklist:

  • Is the charset explicitly specified in byte array conversions?
  • Are you conflating Shift_JIS and windows-31j?
  • Have you verified round-trip correctness for circled numbers, wave dash, fullwidth tilde, platform-dependent characters, and gaiji?
  • For report CSVs, fixed-length files, and host transmission: are you mixing up character-based and byte-based lengths?
  • Can you detect unmappable characters instead of silently replacing them?

So if you’re coming from Java 8, rather than going straight to 26 in production, it’s more realistic to first get your build and tests passing on LTS 17 or 21, strip out the old dependencies there, and then evaluate Java 26.

Java 26 itself is interesting, but absorbing the delta from Java 8 is where most of the real work lies in practice.

What to Check Before Upgrading

The fastest first step is to do a rough scan for deprecated APIs and flags.

grep -R "Thread\.stop\|Xmaxjitcodesize\|AggressiveHeap\|MaxRAM" ./

If you want to catch Java 8–era dependencies as well, run this too:

grep -R "javax\.xml\.bind\|javax\.activation\|CORBA\|sun\." ./

To do a rough scan for charset assumptions, this helps catch things you might miss:

grep -R "Shift_JIS\|MS932\|windows-31j\|Cp943\|Cp930\|EBCDIC\|file.encoding" ./

On the Java side, it’s safer to explicitly specify charsets and detect unmappable characters rather than relying on the default charset:

var charset = Charset.forName("windows-31j");
var encoder = charset.newEncoder()
	.onMalformedInput(CodingErrorAction.REPORT)
	.onUnmappableCharacter(CodingErrorAction.REPORT);

var bytes = encoder.encode(CharBuffer.wrap("顧客コード①"));
System.out.println(bytes.remaining());

Here’s a rough comparison:

  • Java 26 from Java 8’s perspective: Large gap — this is a migration project
  • Java 26 from Java 17’s perspective: Mainly evaluating new features and checking default value changes
  • Java 26 from Java 21’s perspective: Migration cost is relatively light

In more practical terms:

Perspective Java 8 Java 17 Java 21 Java 26
Position in the field Still common in legacy systems Solid first migration target Current primary candidate Early evaluation and tracking candidate
Migration difficulty Hardest starting point Good landing pad from Java 8 Easy to extend from 17 Relatively light from 21 onward
Key concerns Java EE removal, internal API dependencies Reflection and module boundaries Virtual thread adoption decisions HTTP/3, GC improvements, default value changes
Recommended approach Start with an audit Get CI passing first Easiest to standardize for production Validate deltas in test environments

For Java 8 projects, before getting excited about Java 26’s new features, the real topic is usually figuring out how to peel off Java 8–era technical debt.

Conversely, if you’re already on Java 17 or 21, Java 26 isn’t a “full migration” — it’s more about evaluating how to incorporate performance improvements and default value changes.

Here are some things worth verifying in CI for peace of mind:

  • HttpClient timeout and header behavior
  • RMI / TLS communication involving certificate validation
  • Runtime creation with jlink
  • XML Signature and legacy keystore dependencies
  • Round-trip tests for Shift_JIS / windows-31j / host integration files

Preview / incubator features are interesting, but they’re probably better viewed as evaluation targets rather than production-ready at this point.

Summary

Java 26 is less of a single blockbuster and more of a stack of solid improvements across performance, standard APIs, and operationally safer defaults.

For typical business systems, HTTP/3, GC, and virtual thread improvements are positive moves forward.

On the other hand, the more legacy code and legacy runtime flags your environment carries, the more important it is to audit first and upgrade second.

For Japanese environments, character encoding in particular shouldn’t be put off.

In shops where Shift_JIS-family encodings or host system integrations are still in play, fixing default charset dependencies and Japanese round-trip issues takes priority over evaluating Java 26’s new features.

Especially coming from Java 8, doing an intermediate cleanup on LTS 17 or 21 first and then going after Java 26’s benefits is the more sensible path.

Read more
Diary

Android 16 Migration and Android 17 Early Verification

4 Mins read

Bottom line: if you submit an update with a targetSdkVersion lower than what Google Play requires, it gets rejected at upload time. That means you can’t push updates to the store at all. This isn’t about new features — it’s a mandatory requirement to keep delivering updates to existing users and maintain your store listing.

Google Play has been raising the minimum targetSdkVersion by one level every August 31. Currently (August 2025 onward), all updates below API 35 (Android 15) are rejected.

Enforcement Period Requirement If Not Met
August 2023 onward API 33 (Android 13) or higher required Upload rejected
August 2024 onward API 34 (Android 14) or higher required Upload rejected
August 2025 onward API 35 (Android 15) or higher required Upload rejected
Around August 2026 (projected) API 36 (Android 16) or higher required Upload rejected

(Source: Google Play target API level requirements)

Based on this pattern, enforcement of API 36 (Android 16) is most likely around August 2026. To complete compliance before enforcement kicks in, this article scopes the work by working backward from an internal deadline of June 2026. Android 17 has reached platform stability at Beta 3, so running early verification in a parallel lane now means you won’t be scrambling when the final release drops.

Priority Order

Item Deadline Priority What to Do Now
targetSdkVersion 36 (Android 16) compliance By June 2026 Top priority Regression test key user flows, lock CI, finalize release plan
Android 17 Beta 3 verification Start now (ahead of schedule) High (separate lane) Compatibility testing on emulator and real devices, behavior changes audit
Android 17 new feature adoption After official release Lower PoC starting with low-impact areas

Get Your Tooling in Order First

Whether you’re working on Android 16 compliance or early Android 17 verification, the first blockers are usually build tooling issues rather than OS APIs. Lock down the tooling first.

Component Baseline Reason
Android Studio Panda 3 stable Stable foundation for targetSdkVersion 36 work
AGP 9.1.0 Easier to absorb R8 behavior differences and lint changes
JDK 17 Prerequisite for AGP 9.1
Kotlin 2.3.20 Align on a stable version baseline
plugins {
    id("com.android.application") version "9.1.0" apply false
    id("org.jetbrains.kotlin.android") version "2.3.20" apply false
}

Locking JDK 17 in CI, updating AGP, and absorbing R8 differences serves double duty — it lays the groundwork for Android 17 while getting Android 16 compliance through the door.

Note: Real-World Kotlin Version Distribution and Migration Cost

The “Kotlin 2.3.20” in the table above is the recommended baseline. In practice, many projects are still on the 1.9.x line. Finance, government, and large-scale projects in Japan tend to be particularly conservative — the “it’s stable, so don’t upgrade” mindset persists for a long time.

The chart below is an estimate as of early 2026 based on JetBrains’ public ecosystem data and community observations.

Kotlin version distribution in production (early 2026 estimate)

(Estimated values. For exact version-level share data, refer to the latest JetBrains Developer Ecosystem Survey)

When upgrading from 1.9.x to 2.x, it’s rarely just a Kotlin-only update — it usually means a bulk upgrade of Compose, Coroutines, and AGP together. Switching to the K2 compiler can change some type inference behavior, causing build errors. “We don’t need to upgrade our working 1.9.x app right now” is a perfectly pragmatic decision.

Current Kotlin Compose Compiler Approach Minimum AGP Key Considerations When Upgrading
1.9.x Legacy compose_compiler_extension_version 8.x Can stay as-is, but nearing EOL
2.0.x Compose Compiler Plugin (integrated into Kotlin plugin) 8.4 or higher Must switch to the plugin approach
2.1.x Same as above 8.7 or higher K2 enabled by default. Best Compose stability
2.3.x Same as above 9.0 or higher Cutting edge as of 2026. Requires AGP 9.1

Android 17 Behavior Changes to Get Ahead Of

Behavior changes have a bigger impact on existing apps than new features. Focus on changes that affect all apps first.

Change Apps Most Likely Affected What to Check First
usesCleartextTraffic deprecation trajectory All apps that currently allow HTTP Switch test and internal connections to network security config
Removal of implicit URI permission grants Apps with sharing, camera, or file attachment flows Rewrite to use explicit permission grants
IME visibility behavior change after rotation Every screen with input forms Regression test login, sign-up, and search flows
Stricter background audio restrictions Playback, calling, and audio notification apps Assess whether foreground service migration is needed

Testing Priority for Simultaneous Android 16 & 17 Support

When running Android 16 compliance and Android 17 early verification in parallel, it’s easy to lose track of what must be tested where. The table below defines required/priority items per test area — use it as a QA checkpoint to confirm when each area can be considered done.

Test Area Android 16 (Production) Android 17 (Early Verification)
Login / membership flows Required Required
WebView screens Required Required
Push / notification resume Required High priority
Background processing Required High priority
MDM / enterprise device restrictions High priority High priority
Android 16/17 new feature adoption (predictive text, new Compose APIs, etc.) Can defer If capacity allows

Risks Specific to Japanese Business Apps

These points are rarely covered in general Android migration articles from international sources, but finance, government, and membership-platform apps in Japan have their own specific gotchas. For projects where the priority is verifying that existing key flows — login, payments, notifications — aren’t broken rather than adopting new Android 16/17 features (notification channel changes, permission model overhauls, new Compose components, etc.), run through the items below as a checklist first.

Issue Why It’s a Blocker What to Check First
WebView Still heavily used in membership, sign-up, and payment flows Authentication, cookies, redirects, rendering issues
Certificates / corporate Wi-Fi Commonly breaks on corporate and managed devices Connection failures, certificate renewal, internal network behavior
MDM restrictions Major impact on enterprise-distributed apps Permissions, background processing, distribution controls
Push / background processing Directly affects membership, finance, and operational notifications Resume behavior, delays, post-restriction behavior verification
Device refresh timing Wide OS version variance across the user base Review supported OS range and QA device plan

Recommended Action Order

  1. Finalize the release plan with the assumption that the targetSdkVersion 36 (Android 16) update ships by June 2026
  2. Align your tooling: Android Studio, AGP, Kotlin, JDK
  3. Run key user flow tests and regression for Android 16 first
  4. In parallel, create a dedicated Android 17 branch and spin up a verification lane with emulators and real devices
  5. Work through behavior changes in order: security, media, connectivity
  6. Run a separate CI pipeline with targetSdk 37
Read more
Diary

Nginx reverse proxy WordPress mixed content error (HTTPS/HTTP)

1 Mins read

In an Nginx reverse proxy setup where the frontend Nginx accepts requests on 443 (HTTPS) and performs round-robin load balancing internally on 80 (HTTP), you may encounter a Mixed Content error in Chrome.

To fix this, add the following to the top of wp-config.php:

/** mixed content the page at ' url ' was loaded over https wordpress nginx */
/** When using proxy settings, you need to set it to redirect via https! */
/** Note: The HTTP_X_FORWARDED_FOR environment variable name may vary slightly depending on your server environment (AWS, etc.), so verify it */
if (!empty($_SERVER['HTTP_X_FORWARDED_FOR'])) {
    $_SERVER['HTTPS'] = 'on';
}

If you can modify the nginx.conf file on the internal 80 (HTTP) side, you can also use this approach:

Either option works fine.

location ~ \.php$ {
    include fastcgi_params;

    # mixed content the page at ' url ' was loaded over https wordpress nginx
    # When using proxy settings, you need to set it to redirect via https! From here
    fastcgi_param HTTPS on;
    fastcgi_param HTTP_X_FORWARDED_PROTO https;
    # To here

    fastcgi_intercept_errors on;
    fastcgi_pass php-fpm;
    fastcgi_param SCRIPT_FILENAME $document_root$fastcgi_script_name;
}
Read more