Henry,
I am using 3x container. I hit the following url:
*http://localhost:8080/samplecontainer/samplecontainer.html*
*
*
It is loaded properly, but no widgets are displayed. My web.xml file is
attached for your reference.

When i click "reset all" nothing happens. Following is the stack trace
related to Shindig

12:03:51,475 INFO  [TomcatDeployment] deploy, ctxPath=/
12:03:51,959 INFO  [StandardContext] Suspicious url pattern: "/xpc*" in
context [] - see section SRV.11.2 of the Servlet specification
12:03:53,302 ERROR [STDERR] SLF4J: Class path contains multiple SLF4J
bindings.
12:03:53,302 ERROR [STDERR] SLF4J: Found binding in
[vfs:/D:/JBoss_Tomcat/common/lib/slf4j-jboss-logmanager.jar/org/slf4j/impl/StaticLoggerBinder.class]
12:03:53,302 ERROR [STDERR] SLF4J: Found binding in
[vfs:/D:/JBoss_Tomcat/server/default/deploy/shindig3.war/WEB-INF/lib/slf4j-jdk14-1.5.11.jar/org/slf4j/impl/StaticLoggerBinder.class]
12:03:53,302 ERROR [STDERR] SLF4J: See
http://www.slf4j.org/codes.html#multiple_bindings for an explanation.
12:03:55,628 INFO  [FeatureRegistry] Loading resources from
res:features-extras/features.txt.
12:03:55,659 INFO  [XmlUtil] Not using secure XML processing.
12:03:55,659 INFO  [XmlUtil] Reusing document builders.
12:03:57,767 INFO  [FeatureRegistry] Loading resources from
res:features/features.txt.
12:03:57,876 INFO  [UpdateChecker] New update(s) found: 2.4.5 [
http://www.terracotta.org/confluence/display/release/Release+Notes+Ehcache+Core+2.4].
Please check http://ehcache.org for the latest version.
12:04:01,561 INFO  [JsonContainerConfigLoader] Loading resources from
containers/default/container.js.
12:04:01,561 INFO  [JsonContainerConfigLoader] Reading container config:
containers/default/container.js.
12:04:01,654 INFO  [CajaContentRewriter] Cajoled cache created
12:04:01,889 INFO  [CajaContentRewriter] Cajoled cache created
12:04:02,154 WARNING [OAuthModule] Couldn't load OAuth signing key.  To
create a key, run:
 openssl req -newkey rsa:1024 -days 365 -nodes -x509 -keyout testkey.pem \
 -out testkey.pem -subj /CN=mytestkey
 openssl pkcs8 -in testkey.pem -out oauthkey.pem -topk8 -nocrypt -outform
PEM

 Then edit shindig.properties and add these lines:
 shindig.signing.key-file =<path-to-oauthkey.pem>
 shindig.signing.key-name =mykey

12:04:02,154 INFO  [OAuthModule] Using random key for OAuth client-side
state encryption
12:04:02,154 INFO  [OAuthModule] Using random key for OAuth client-side
state encryption
12:04:02,185 INFO  [IniShiroFilter] Null or empty configuration specified
via 'config' init-param.  Checking path-based configuration.
12:04:02,185 INFO  [IniShiroFilter] Null or empty configuration specified
via 'config' or 'configPath' filter parameters.  Trying the default
classpath:shiro.ini file.

................
................
................

12:06:23,019 INFO  [org.apache.shindig.gadgets.servlet.CajaContentRewriter]
Cajoled cache created
12:06:23,597 INFO  [org.apache.shindig.gadgets.servlet.CajaContentRewriter]
Cajoled cache created




On Fri, Sep 16, 2011 at 11:39 AM, Henry Saputra <henry.sapu...@gmail.com>wrote:

> any error shown in browser or server logs?
>
> - Henry
>
> On Wed, Sep 14, 2011 at 5:49 AM, Naresh Chaurasia <nc.java...@gmail.com>
> wrote:
> > I have deployed shindig on my jboss server. When i hit
> >
> http://localhost:8180/shindig-server-2.0.0/samplecontainer/samplecontainer.html
> > ,
> > Gadget testing container page is loaded.
> > When i type
> >
> http://localhost:8180/shindig-server-2.0.0/samplecontainer/examples/SocialHelloWorld.xmlin
> > "Displaying gadget" field and click on "reset all" nothing happens.
> >
> > I was hoping that the a widget would be loaded but nothing happens. What
> > could be the possible problem.
> >
> > --
> > Regards,
> > Naresh C
> >
>



-- 
Regards,
Naresh C
<?xml version="1.0" encoding="UTF-8"?>
<!--
  Licensed to the Apache Software Foundation (ASF) under one
  or more contributor license agreements.  See the NOTICE file
  distributed with this work for additional information
  regarding copyright ownership.  The ASF licenses this file
  to you under the Apache License, Version 2.0 (the
  "License"); you may not use this file except in compliance
  with the License.  You may obtain a copy of the License at

      http://www.apache.org/licenses/LICENSE-2.0

  Unless required by applicable law or agreed to in writing,
  software distributed under the License is distributed on an
  "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
  KIND, either express or implied.  See the License for the
  specific language governing permissions and limitations
  under the License.
-->
<web-app xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance";
         xmlns="http://java.sun.com/xml/ns/javaee";
         xmlns:web="http://java.sun.com/xml/ns/javaee/web-app_2_5.xsd";
         xsi:schemaLocation="http://java.sun.com/xml/ns/javaee http://java.sun.com/xml/ns/javaee/web-app_2_5.xsd";
         id="Shindig"
         version="2.5">
  <display-name>Shindig</display-name>
  <!-- configuration -->
  <!-- If you have your own Guice module(s), put them here as a colon-separated list. -->
  <!-- Note that any extras modules are optional -->
  <context-param>
    <param-name>guice-modules</param-name>
    <param-value>
      org.apache.shindig.common.PropertiesModule:
      org.apache.shindig.gadgets.DefaultGuiceModule:
      org.apache.shindig.social.core.config.SocialApiGuiceModule:
      org.apache.shindig.social.sample.SampleModule:
      org.apache.shindig.gadgets.oauth.OAuthModule:
      org.apache.shindig.common.cache.ehcache.EhCacheModule:
      org.apache.shindig.sample.shiro.ShiroGuiceModule:
      org.apache.shindig.sample.container.SampleContainerGuiceModule:
      org.apache.shindig.extras.ShindigExtrasGuiceModule:
      org.apache.shindig.sample.commoncontainer.auth.CommonContainerAuthGuiceModule
    </param-value>
  </context-param>

  <!--
  Syntax: <key>=<value> separated by a newline

  system.properties specifies the environmental variables that will be set to the JVM System Properties at server startup time.
  Alternatively, you may add these values in your app server (ex: Tomcat) as
  VM arguments like this: -Dshindig.host="my.production.shindig.server.com".

  Here are a few properties that can be set for Shindig:
  shindig.host: the server name that Shindig is deployed and running on
  shindig.port: the port number of shindig.host server

  Make sure you escape all HTML values for the web.xml to be parsed correctly.
  -->
   <context-param>
  	<param-name>system.properties</param-name>
     <param-value>
        shindig.host=
        shindig.port=
    	<!--aKey=/shindig/gadgets/proxy?container=default&amp;url=-->
     </param-value>
  </context-param>

  <filter>
    <filter-name>hostFilter</filter-name>
    <filter-class>org.apache.shindig.common.servlet.HostFilter</filter-class>
  </filter>
  <filter-mapping>
    <filter-name>hostFilter</filter-name>
    <url-pattern>/gadgets/ifr</url-pattern>
    <url-pattern>/gadgets/js/*</url-pattern>
    <url-pattern>/gadgets/proxy/*</url-pattern>
    <url-pattern>/gadgets/concat</url-pattern>
    <url-pattern>/rpc/*</url-pattern>
    <url-pattern>/rest/*</url-pattern>
  </filter-mapping>

    <filter>
        <filter-name>ShiroFilter</filter-name>
        <filter-class>org.apache.shiro.web.servlet.IniShiroFilter</filter-class>
        <init-param>
            <param-name>config</param-name>
            <param-value>
                # The ShiroFilter configuration is very powerful and flexible, while still remaining succinct.
                # Please read the comprehensive example, with full comments and explanations, in the JavaDoc:
                #
                # http://www.jsecurity.org/api/org/jsecurity/web/servlet/JSecurityFilter.html
                [main]
                shindigSampleRealm = org.apache.shindig.sample.shiro.SampleShiroRealm
                securityManager.realm = $shindigSampleRealm
                authc.loginUrl = /login.jsp

                [urls]
                # The /login.jsp is not restricted to authenticated users (otherwise no one could log in!), but
                # the 'authc' filter must still be specified for it so it can process that url's
                # login submissions. It is 'smart' enough to allow those requests through as specified by the
                # shiro.loginUrl above.
                /login.jsp = authc

                /oauth/authorize/** = authc

            </param-value>
        </init-param>
    </filter>

  <filter>
    <filter-name>authFilter</filter-name>
    <filter-class>org.apache.shindig.auth.AuthenticationServletFilter</filter-class>
  </filter>

  <filter>
    <filter-name>etagFilter</filter-name>
    <filter-class>org.apache.shindig.gadgets.servlet.ETagFilter</filter-class>
  </filter>


  <filter-mapping>
      <filter-name>ShiroFilter</filter-name>
      <url-pattern>/oauth/authorize</url-pattern>
  </filter-mapping>

  <filter-mapping>
      <filter-name>ShiroFilter</filter-name>
      <url-pattern>*.jsp</url-pattern>
  </filter-mapping>

  <filter-mapping>
    <filter-name>authFilter</filter-name>
    <url-pattern>/social/*</url-pattern>
    <url-pattern>/gadgets/ifr</url-pattern>
    <url-pattern>/gadgets/makeRequest</url-pattern>
    <url-pattern>/gadgets/api/rpc/*</url-pattern>
    <url-pattern>/gadgets/api/rest/*</url-pattern>
    <url-pattern>/rpc/*</url-pattern>
    <url-pattern>/rest/*</url-pattern>
  </filter-mapping>

  <filter-mapping>
    <filter-name>etagFilter</filter-name>
    <url-pattern>*</url-pattern>
  </filter-mapping>

  <listener>
    <listener-class>org.apache.shindig.common.servlet.GuiceServletContextListener</listener-class>
  </listener>

  <!-- Render a Gadget -->
  <servlet>
    <servlet-name>xml-to-html</servlet-name>
    <servlet-class>
      org.apache.shindig.gadgets.servlet.GadgetRenderingServlet
    </servlet-class>
  </servlet>

  <servlet>
    <servlet-name>accel</servlet-name>
    <servlet-class>
      org.apache.shindig.gadgets.servlet.HtmlAccelServlet
    </servlet-class>
  </servlet>

  <!-- Proxy -->
  <servlet>
    <servlet-name>proxy</servlet-name>
    <servlet-class>
      org.apache.shindig.gadgets.servlet.ProxyServlet
    </servlet-class>
  </servlet>

  <!-- makeRequest -->
  <servlet>
    <servlet-name>makeRequest</servlet-name>
    <servlet-class>
      org.apache.shindig.gadgets.servlet.MakeRequestServlet
    </servlet-class>
  </servlet>

  <!-- Concat -->
  <servlet>
    <servlet-name>concat</servlet-name>
    <servlet-class>
      org.apache.shindig.gadgets.servlet.ConcatProxyServlet
    </servlet-class>
  </servlet>

  <!-- OAuth callback -->
  <servlet>
    <servlet-name>oauthCallback</servlet-name>
    <servlet-class>
      org.apache.shindig.gadgets.servlet.OAuthCallbackServlet
    </servlet-class>
  </servlet>

  <!-- Metadata RPC -->
  <servlet>
    <servlet-name>metadata</servlet-name>
    <servlet-class>
      org.apache.shindig.gadgets.servlet.RpcServlet
    </servlet-class>
  </servlet>

  <!-- javascript serving -->
  <servlet>
    <servlet-name>js</servlet-name>
    <servlet-class>org.apache.shindig.gadgets.servlet.JsServlet</servlet-class>
  </servlet>

  <servlet>
    <servlet-name>restapiServlet</servlet-name>
    <servlet-class>
      org.apache.shindig.protocol.DataServiceServlet
    </servlet-class>
    <init-param>
      <param-name>handlers</param-name>
      <param-value>org.apache.shindig.handlers</param-value>
    </init-param>
  </servlet>

  <!-- Serve social RPC api -->
  <servlet>
    <servlet-name>jsonRpcServlet</servlet-name>
    <servlet-class>
      org.apache.shindig.protocol.JsonRpcServlet
    </servlet-class>
    <init-param>
      <param-name>handlers</param-name>
      <param-value>org.apache.shindig.handlers</param-value>
    </init-param>
  </servlet>

  <!-- Serve sample OAuth apis -->
  <servlet>
    <servlet-name>sampleOAuth</servlet-name>
    <servlet-class>
      org.apache.shindig.social.sample.oauth.SampleOAuthServlet
    </servlet-class>
  </servlet>

  <servlet>
    <servlet-name>rpcSwf</servlet-name>
    <servlet-class>
      org.apache.shindig.gadgets.servlet.RpcSwfServlet
    </servlet-class>
  </servlet>

  <servlet-mapping>
    <servlet-name>js</servlet-name>
    <url-pattern>/gadgets/js/*</url-pattern>
  </servlet-mapping>

  <servlet-mapping>
    <servlet-name>proxy</servlet-name>
    <url-pattern>/gadgets/proxy/*</url-pattern>
  </servlet-mapping>

  <servlet-mapping>
    <servlet-name>makeRequest</servlet-name>
    <url-pattern>/gadgets/makeRequest</url-pattern>
  </servlet-mapping>

  <servlet-mapping>
    <servlet-name>jsonRpcServlet</servlet-name>
    <url-pattern>/rpc/*</url-pattern>
    <url-pattern>/gadgets/api/rpc/*</url-pattern>
    <url-pattern>/social/rpc/*</url-pattern>
  </servlet-mapping>

  <servlet-mapping>
    <servlet-name>restapiServlet</servlet-name>
    <url-pattern>/rest/*</url-pattern>
    <url-pattern>/gadgets/api/rest/*</url-pattern>
    <url-pattern>/social/rest/*</url-pattern>
  </servlet-mapping>

  <servlet-mapping>
    <servlet-name>concat</servlet-name>
    <url-pattern>/gadgets/concat</url-pattern>
  </servlet-mapping>

  <servlet-mapping>
    <servlet-name>oauthCallback</servlet-name>
    <url-pattern>/gadgets/oauthcallback</url-pattern>
  </servlet-mapping>

  <servlet-mapping>
    <servlet-name>xml-to-html</servlet-name>
    <url-pattern>/gadgets/ifr</url-pattern>
  </servlet-mapping>

  <servlet-mapping>
    <servlet-name>accel</servlet-name>
    <url-pattern>/gadgets/accel</url-pattern>
  </servlet-mapping>

  <servlet-mapping>
    <servlet-name>metadata</servlet-name>
    <url-pattern>/gadgets/metadata</url-pattern>
  </servlet-mapping>

  <servlet-mapping>
    <servlet-name>sampleOAuth</servlet-name>
    <url-pattern>/oauth/*</url-pattern>
  </servlet-mapping>

  <servlet-mapping>
    <servlet-name>rpcSwf</servlet-name>
    <url-pattern>/xpc*</url-pattern>
  </servlet-mapping>
</web-app>

Reply via email to