Thank you for your inquiry. DVSR_Sarma Krovi is no longer with the firm. For immediate assistance, please contact Reception at +91-40-6639-0000.
Sincerely, The D. E. Shaw Group -- 8< --- CUT HERE -------------------------- CUT HERE --- >8 -- From: [email protected] To: [email protected] cc: Subject: svn commit: r1207899 - in /shindig/trunk: config/container.js php/test/gadgets/ContainerConfigTest.php Author: ddumont Date: Tue Nov 29 15:07:31 2011 New Revision: 1207899 URL: http://svn.apache.org/viewvc?rev=1207899&view=rev Log: Update container config values, comments. Make things easier to configure for locked domains. Modified: shindig/trunk/config/container.js shindig/trunk/php/test/gadgets/ContainerConfigTest.php Modified: shindig/trunk/config/container.js URL: http://svn.apache.org/viewvc/shindig/trunk/config/container.js?rev=1207899&r1=1207898&r2=1207899&view=diff ============================================================================== --- shindig/trunk/config/container.js (original) +++ shindig/trunk/config/container.js Tue Nov 29 15:07:31 2011 @@ -58,17 +58,6 @@ // value matching this set will return a 404 error. "gadgets.parent" : null, -// Should all gadgets be forced on to a locked domain? -"gadgets.uri.iframe.lockedDomainRequired" : false, - -// DNS domain on which gadgets should render. -// Default Uri config: these must be overridden - specified here for testing purposes -"gadgets.uri.iframe.unlockedDomain": "${Cur['defaultShindigTestAuthority']}", -// When setting up the server to enable locked domains, you should set this to something that does not -// attempt to use the authority at all. Ideally it would be another hostname that points to this server. -// Example: unlockedDomain="shindig.example.com" lockedDomainSuffix="-locked.gadgets.example.com" -"gadgets.uri.iframe.lockedDomainSuffix": "${Cur['defaultShindigTestAuthority']}", - // Origins for CORS requests and/or Referer validation // Indicate a set of origins or an entry with * to indicate that all origins are allowed "gadgets.parentOrigins" : ["*"], @@ -80,14 +69,6 @@ "gadgets.iframeBaseUri" : "${CONTEXT_ROOT}/gadgets/ifr", "gadgets.uri.iframe.basePath" : "${CONTEXT_ROOT}/gadgets/ifr", -// jsUriTemplate will have %host% and %js% substituted. -// No locked domain special cases, but jsUriTemplate must -// never conflict with a lockedDomainSuffix. -"gadgets.jsUriTemplate" : "http://%host%${CONTEXT_ROOT}/gadgets/js/%js%", - -"gadgets.uri.js.host" : "http://www.example.com/", -"gadgets.uri.js.path" : "${CONTEXT_ROOT}/gadgets/js", - // Callback URL. Scheme relative URL for easy switch between https/http. "gadgets.uri.oauth.callbackTemplate" : "//%host%${CONTEXT_ROOT}/gadgets/oauthcallback", @@ -115,30 +96,48 @@ "gadgets.doctype_pubid" : "", "gadgets.doctype_sysid" : "", +// In a locked domain config, these can remain as-is in order to have requests encountered use the +// host they came in on (locked host). +"default.domain.locked.client" : "%host%", +"default.domain.locked.server" : "%authority%", + +// IMPORTANT: EDITME: In a locked domain configuration, these should be changed to explicit values of +// your unlocked host. You should not use %host% or %authority% replacements or these defaults in a +// locked domain deployment. +// Both of these values will likely be identical in a real locked domain deployment. +"default.domain.unlocked.client" : "${Cur['default.domain.locked.client']}", +"default.domain.unlocked.server" : "${Cur['default.domain.locked.server']}", + +// You can change this if you wish unlocked gadgets to render on a different domain from the default. +"gadgets.uri.iframe.unlockedDomain" : "${Cur['default.domain.unlocked.server']}", // DNS domain on which *unlocked* gadgets should render. + +// IMPORTANT: EDITME: In a locked domain configuration, this suffix should be provided explicitly. +// It is recommended that it be a separate top-level-domain (TLD) than the unlocked TLD. +// You should not use replacement here (avoid %authority%) +// Example: unlockedDomain="shindig.example.com" lockedDomainSuffix="-locked.example-gadgets.com" +"gadgets.uri.iframe.lockedDomainSuffix" : "${Cur['default.domain.locked.server']}", // DNS domain on which *locked* gadgets should render. -// Authority (host:port without scheme) for the default shindig test instance. -"defaultShindigTestAuthority":"%authority%", - -// Authority (host:port without scheme) for the proxy and concat servlets. -"defaultShindigProxyConcatAuthority":"%authority%", +// Should all gadgets be forced on to a locked domain? +"gadgets.uri.iframe.lockedDomainRequired" : false, // Default Js Uri config: also must be overridden. -"gadgets.uri.js.host": "//${Cur['defaultShindigTestAuthority']}", -"gadgets.uri.js.path": "${CONTEXT_ROOT}/gadgets/js", +// gadgets.uri.js.host should be protocol relative. +"gadgets.uri.js.host" : "//${Cur['default.domain.unlocked.server']}", // Use unlocked host for better caching. +"gadgets.uri.js.path" : "${CONTEXT_ROOT}/gadgets/js", // Default concat Uri config; used for testing. -"gadgets.uri.concat.host" : "${Cur['defaultShindigProxyConcatAuthority']}", +"gadgets.uri.concat.host" : "${Cur['default.domain.unlocked.server']}", // Use unlocked host for better caching. "gadgets.uri.concat.path" : "${CONTEXT_ROOT}/gadgets/concat", "gadgets.uri.concat.js.splitToken" : "false", // Default proxy Uri config; used for testing. -"gadgets.uri.proxy.host" : "${Cur['defaultShindigProxyConcatAuthority']}", +"gadgets.uri.proxy.host" : "${Cur['default.domain.unlocked.server']}", // Use unlocked host for better caching. "gadgets.uri.proxy.path" : "${CONTEXT_ROOT}/gadgets/proxy", -//Enables/Disables feature administration +// Enables/Disables feature administration "gadgets.admin.enableFeatureAdministration" : "false", -//Enables whitelist checks +// Enables whitelist checks "gadgets.admin.enableGadgetWhitelist" : "false", // This config data will be passed down to javascript. Please @@ -149,11 +148,10 @@ // See individual feature.xml files for configuration details. "gadgets.features" : { "core.io" : { - // Note: /proxy is an open proxy. Be careful how you expose this! - // Note: Here // is replaced with the current protocol http/https - //"proxyUrl" : "//%host%${CONTEXT_ROOT}/gadgets/proxy?container=%container%%rewriteMime%&refresh=%refresh%&gadget=%gadget%/%rawurl%", - "proxyUrl" : "//%host%${CONTEXT_ROOT}/gadgets/proxy?container=%container%&refresh=%refresh%&url=%url%%rewriteMime%", - "jsonProxyUrl" : "//%host%${CONTEXT_ROOT}/gadgets/makeRequest" + // Note: ${Cur['gadgets.uri.proxy.path']} is an open proxy. Be careful how you expose this! + // Note: These urls should be protocol relative (start with //) + "proxyUrl" : "//${Cur['default.domain.unlocked.client']}${Cur['gadgets.uri.proxy.path']}?container=%container%&refresh=%refresh%&url=%url%%rewriteMime%", + "jsonProxyUrl" : "//${Cur['default.domain.locked.client']}${CONTEXT_ROOT}/gadgets/makeRequest" }, "views" : { "profile" : { @@ -276,7 +274,7 @@ "enableCaja" : false, "supportedFields" : { "person" : ["id", {"name" : ["familyName", "givenName", "unstructured"]}, "thumbnailUrl", "profileUrl"], - "activity" : ["appId", "body", "bodyId", "externalId", "id", "mediaItems", "postedTime", "priority", + "activity" : ["appId", "body", "bodyId", "externalId", "id", "mediaItems", "postedTime", "priority", "streamFaviconUrl", "streamSourceUrl", "streamTitle", "streamUrl", "templateParams", "title", "url", "userId"], "activityEntry" : ["actor", "content", "generator", "icon", "id", "object", "published", "provider", "target", Modified: shindig/trunk/php/test/gadgets/ContainerConfigTest.php URL: http://svn.apache.org/viewvc/shindig/trunk/php/test/gadgets/ContainerConfigTest.php?rev=1207899&r1=1207898&r2=1207899&view=diff ============================================================================== --- shindig/trunk/php/test/gadgets/ContainerConfigTest.php (original) +++ shindig/trunk/php/test/gadgets/ContainerConfigTest.php Tue Nov 29 15:07:31 2011 @@ -65,7 +65,6 @@ class ContainerConfigTest extends PHPUni "gadgets.parent" : null, "gadgets.uri.iframe.lockedDomainSuffix" : "-a.example.com:8080", "gadgets.iframeBaseUri" : "/gadgets/ifr", -"gadgets.jsUriTemplate" : "http://%host%/gadgets/js/%js%", "gadgets.uri.oauth.callbackTemplate" : "//%host%/gadgets/oauthcallback" } EOD; @@ -77,7 +76,6 @@ EOD; $this->assertEquals(null, $jsonObj["gadgets.parent"]); $this->assertEquals("-a.example.com:8080", $jsonObj["gadgets.uri.iframe.lockedDomainSuffix"]); $this->assertEquals("/gadgets/ifr", $jsonObj["gadgets.iframeBaseUri"]); - $this->assertEquals("http://%host%/gadgets/js/%js%", $jsonObj["gadgets.jsUriTemplate"]); $this->assertEquals("//%host%/gadgets/oauthcallback", $jsonObj["gadgets.uri.oauth.callbackTemplate"]); } }
