I have been developing my Vaadin application for about 6 months and recently I noticed that it has started producing the below log messages every few seconds. I am not sure when I actually started, but I guess it was in the last 1-2 weeks.
My App is using the latest Vaadin version 24.7 and is a PWA with Push enabled. My Application class extends the class as suggested in the error message. The messages are occurring during runtime of the application, so I do not know why I would look at the Unit tests.
I am not sure what research I should be doing to stop these messages now?
at com.vaadin.hilla.route.RouteUtil.isRouteAllowed(RouteUtil.java:64)
I find the above line regarding Hilla in the stack trace to be strange. I am not using Hilla at all in this project.
public class Application extends SpringBootServletInitializer implements AppShellConfigurator, VaadinServiceInitListener {
Mar 20, 2025 9:22:32 AM org.apache.catalina.core.StandardWrapperValve invoke
SEVERE: Servlet.service() for servlet [dispatcherServletRegistration] in context with path [] threw exception
java.lang.IllegalStateException: The application Lookup instance is not found in VaadinContext. The instance is supposed to be created by a ServletContainerInitializer. Issues known to cause this problem are:
- A Spring Boot application deployed as a war-file but the main application class does not extend SpringBootServletInitializer
- An embedded server that is not set up to execute ServletContainerInitializers
- Unit tests which do not properly set up the context for the test
at com.vaadin.flow.server.startup.ApplicationConfiguration.lambda$get$0(ApplicationConfiguration.java:53)
at com.vaadin.flow.server.VaadinServletContext.getAttribute(VaadinServletContext.java:73)
at com.vaadin.flow.server.startup.ApplicationConfiguration.get(ApplicationConfiguration.java:47)
at com.vaadin.hilla.route.RouteUtil.isRouteAllowed(RouteUtil.java:64)
at com.vaadin.flow.spring.security.RequestUtil.isAllowedHillaView(RequestUtil.java:123)
at org.springframework.security.web.util.matcher.RequestMatcher.matcher(RequestMatcher.java:48)
at org.springframework.security.web.access.intercept.RequestMatcherDelegatingAuthorizationManager.check(RequestMatcherDelegatingAuthorizationManager.java:82)
âŚ
at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1743)
at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:52)
at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1190)
at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659)
at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:63)
at java.base/java.lang.Thread.run(Thread.java:1583)