- 浏览: 510961 次
- 性别:
- 来自: 深圳
文章分类
最新评论
-
michao:
大哥,还有aperture.exe吗? 发我一份,找不到呀,m ...
使用aperture框架让AS3与C++通信,执行本地代码 -
Aaron-Joe-William:
文件被删除了。下不了。
SQLite 数据库加密的一种解决方案 -
hanmiao:
樓主的文章不就是來自IBM Developers里的http: ...
mina 入门 -
howesen:
断包与粘包问题,需要处理下就好了
mina接收数据不全(2) -
sniciq:
git clone --recursive git://git ...
ESB学习笔记(Spring Integration实战)
Windows环境下配置+运行red5源码+AS3连接red5简单示例
Posted on 18 April 2010
Windows环境下+配置+运行red5源码
Red5发展很快,目前最新版本为0.9.1,与以前的版本(0.8.+、0.7.+、0.6.+)差别很大,中文资料奇缺,鉴于此,我写下这篇文章,希望能帮上您的忙。
由于没有下载到0.9.1的源码,我们现在以red5 0.9.0为例介绍如何配置、编译、运行Red5源码。Red5 0.9.0与red5 0.9.1差不多,你可以用本文所介绍的方式来配置red5 0.9.1。
1.打开red5 0.9.0的下载页面:http://red5.org/wiki/0_9_0
如下图所示:
我们点击“Windows”和”Source”两个链接来下载red5的安装包和red5的源码,我们下载安装包的目的是它包括了所有red5源码所依赖的jar包,这样很方便我们的配置。
2.下载完成之后,首先安装setup-Red5-0.9.0.exe,在安装过程中,如果提示你输入ip地址,则输入0.0.0.0,这样可以允许来自任何域的访问,如果提示输入端口,则输入8000,那么我们的web服务器将会绑定8000端口。
3.打开eclipse java开发环境,如果没有,则到http://eclipse.org/downloads/ 下载Eclipse IDE for Java Developers ,将下载后的压缩包解压到本机你喜欢的地方,然后双击eclipse.exe,如果不能运行,说明你需要一个jdk,就到http://java.sun.com/javase/downloads/widget/jdk6.jsp 下载一个适合你的操作系统的jdk,安装jdk之后,eclipse就可以运行了,打开eclipse开发 环境之后,选择一个你喜欢的工作空间。
4.新建一个Java Project,如下图所示:
5.在新建工程对话框中输入Red5,点击“Finish”按钮则新建一个名为Red5的java工程,如下图所示:
6.将red5安装目录下的所有文件夹拷贝到Red5工程根目录下,操作之后的Red5工程目录结构如下:
7.将下载的red5源文件解压并将org文件夹拷贝到我们的Red5工程的src目录下,操作之后的项目结构图如下所示:
8.这时我们看到工程中有些错误,说明缺少依赖的库,此时我们把lib文件夹中的所有jar文件添加构建路径中,操作如下图 所示:
此时我们可以看到,工程中不再提示错误。
9.我们找到org.red5.server.Bootstrap类,双击Bootstrap.java文件打开此类,按F11运行此工程。当你看到如下输出信息时,说明Red5服务器启动完成。
10.打开浏览器,在地址栏中输入http://localhost:8000,回车,如果你看到如下界面,说明你的Red5已经正在良好的运行。
11.接下来我们安装一个程序来测试一下,访问http://localhost:8000,点击“Install”链接,或者直接 在访问http://localhost:8000/installer/,则进入如下界面:
12.我们选择SOSample,点击“Install”按键安装它,等待安装完成,提示如下:
13.访问http://localhost:8000/,点击“Launch a demo”链接,或者直接访问http://localhost:8000/demos/进入如下界面:
14.在Shared Ball栏目下,我们点击“View demo”进入如下界面:
我们用此地址复制,多打开几个浏览器窗口,如下图所示:
将它们一一连接到red5服务器,尝试拖动Red5的图标,我们可以看到每个客户端的red5图标都被拖动。
15.下面我们一起来制作一个as3与red5通信的例子。
回到eclipse,在webapps目录下新建一个testred5目录,并将webapps里面的SOSample目录中所有内容拷贝到testred5目录中(如果看不见SOSample目录,请刷新一下webapps目录)。
16.在testred5目录下新建一个src目录,并将此目录做为源文件目录,操作如下图所示:
17.打开项目的属性面板,操作如下图所示:
选择Java Build Path,在Java Build Path面板中选择Source选择卡,然后我们将Default output folder指向到Red5/webapps/testred5/WEB-INF/classes 目录,你可以通过浏览来选择此目录,也可以直接在输入框中输入“Red5/webapps/testred5/WEB-INF/classes”。如下图 所示:
点击“OK”关闭此面板。
18.我们在webapps/testred5/src源文件夹下建立一个Java类叫MainApp,此时项目结构图如下所示:
19.在MainApp类中输入如下代码:
import
org.red5.server.adapter.ApplicationAdapter
;
public
class
MainApp extends
ApplicationAdapter{
public
String
getValue(
)
{
return
"Hello world"
;
}
}
20.分别修改webapps/testred5/WEB-INF目录下的文件 web.xml、red5-web.xml、red5-web.properties 如下:
web.xml:
<?xml
version
="1.0"
encoding
="ISO-8859-1"
?>
<web-app
xmlns
="http://java.sun.com/xml/ns/j2ee"
xmlns:xsi
="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation
="http://java.sun.com/xml/ns/j2ee http://java.sun.com/xml/ns/j2ee/web-app_2_4.xsd"
version
="2.4"
>
<display-name>
testred5</display-name>
<context-param>
<param-name>
webAppRootKey</param-name>
<param-value>
/testred5</param-value>
</context-param>
</web-app>
red5-web.xml:
<?xml
version
="1.0"
encoding
="UTF-8"
?>
<!DOCTYPE beans PUBLIC "-//SPRING//DTD BEAN//EN" "http://www.springframework.org/dtd/spring-beans.dtd">
<beans>
<bean
id
="placeholderConfig"
class
="org.springframework.beans.factory.config.PropertyPlaceholderConfigurer"
>
<property
name
="location"
value
="/WEB-INF/red5-web.properties"
/>
</bean>
<bean
id
="web.context"
class
="org.red5.server.Context"
autowire
="byType"
/>
<bean
id
="web.scope"
class
="org.red5.server.WebScope"
init-method
="register"
>
<property
name
="server"
ref
="red5.server"
/>
<property
name
="parent"
ref
="global.scope"
/>
<property
name
="context"
ref
="web.context"
/>
<property
name
="handler"
ref
="web.handler"
/>
<property
name
="contextPath"
value
="${webapp.contextPath}"
/>
<property
name
="virtualHosts"
value
="${webapp.virtualHosts}"
/>
</bean>
<bean
id
="web.handler"
class
="MainApp"
singleton
="true"
/>
</beans>
red5-web.properties:
webapp.contextPath=/testred5
webapp.virtualHosts=*, localhost, localhost:8088, 127.0.0.1:8088
21.保存所有工程,按F11启动red5服务器。
22.打开FlashBuilder,创建一个名为Testred5client的ActionScript 项目,在生成的主文件中输入以下代码:
package
{
import
flash.display
.
Sprite
;
import
flash.events
.
NetStatusEvent
;
import
flash.net
.
NetConnection
;
import
flash.net
.
Responder
;
public
class
Testred5client extends
Sprite
{
private
var
_nc:
NetConnection
;
public
function
Testred5client(
)
{
_nc=new
NetConnection
;
_nc.
addEventListener
(
NetStatusEvent
.
NET_STATUS
,
netStatusHandler)
;
_nc.
connect
(
"rtmp://localhost/testred5"
)
;
}
private
function
netStatusHandler(
event:
NetStatusEvent
)
:
void
{
switch
(
event.
info
.
code
)
{
case
"NetConnection.Connect.Success"
:
_nc.
call
(
"getValue"
,
new
Responder
(
result)
)
;
break
;
}
}
private
function
result(
obj:
Object
)
:
void
{
trace
(
obj)
;
}
}
}
23.按F11运行此代码,如果你看到输出面板中输出了Hello world,如下图所示,则说明你成功了。
评论
在控制台的提示:
[http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:24:55.240 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase - No applicable constraint located
16:24:55.240 [http-10.30.5.18-8000-2] DEBUG o.a.c.a.AuthenticatorBase - Not subject to any constraint
16:24:55.481 [http-10.30.5.18-8000-2] DEBUG o.a.c.a.AuthenticatorBase - Security checking request GET /demos/xray.swf
16:24:55.481 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.481 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.481 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase - No applicable constraint located
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG o.a.c.a.AuthenticatorBase - Not subject to any constraint
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG o.a.c.a.AuthenticatorBase - Security checking request GET /demos/BallControl.html
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - No applicable constraint located
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG o.a.c.a.AuthenticatorBase - Not subject to any constraint
16:25:31.963 [http-10.30.5.18-8000-1] DEBUG o.a.c.a.AuthenticatorBase - Security checking request GET /demos/assets/swfobject.js
16:25:31.963 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.963 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.963 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.983 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.983 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.983 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - No applicable constraint located
16:25:31.983 [http-10.30.5.18-8000-1] DEBUG o.a.c.a.AuthenticatorBase - Not subject to any constraint
16:25:32.464 [http-10.30.5.18-8000-1] DEBUG o.a.c.a.AuthenticatorBase - Security checking request GET /demos/BallControl.swf
16:25:32.464 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.464 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.464 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - No applicable constraint located
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG o.a.c.a.AuthenticatorBase - Not subject to any constraint
16:25:32.724 [http-10.30.5.18-8000-1] DEBUG o.a.c.a.AuthenticatorBase - Security checking request GET /demos/xray.swf
16:25:32.724 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.724 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.724 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - No applicable constraint located
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG o.a.c.a.AuthenticatorBase - Not subject to any constraint
STATUS | wrapper | 2010/04/30 17:41:52 | --> Wrapper Started as Service
STATUS | wrapper | 2010/04/30 17:41:52 | Java Service Wrapper Community Edition 32-bit 3.3.6
STATUS | wrapper | 2010/04/30 17:41:52 | Copyright (C) 1999-2009 Tanuki Software, Ltd. All Rights Reserved.
STATUS | wrapper | 2010/04/30 17:41:52 | http://wrapper.tanukisoftware.org
STATUS | wrapper | 2010/04/30 17:41:52 |
STATUS | wrapper | 2010/04/30 17:41:52 | Launching a JVM...
FATAL | wrapper | 2010/04/30 17:41:52 | Unable to execute Java command. 系统找不到指定的文件。 (0x2)
FATAL | wrapper | 2010/04/30 17:41:52 | "java" -Xrs -XX:+AggressiveOpts -XX:+DisableExplicitGC -Djava.net.preferIPv4Stack=true -Dlogback.ContextSelector=org.red5.logging.LoggingContextSelector -Dcatalina.useNaming=true -Dpython.home=lib -Xverify:none -Xms256m -Xmx768m -Djava.library.path="lib" -classpath "lib/wrapper.jar;conf;boot.jar" -Dwrapper.key="hyLX_oT119mvXryB" -Dwrapper.port=32000 -Dwrapper.jvm.port.min=31000 -Dwrapper.jvm.port.max=31999 -Dwrapper.pid=368 -Dwrapper.version="3.3.6" -Dwrapper.native_library="wrapper" -Dwrapper.service="TRUE" -Dwrapper.cpu.timeout="10" -Dwrapper.jvmid=1 org.tanukisoftware.wrapper.WrapperSimpleApp org.red5.server.Bootstrap
ADVICE | wrapper | 2010/04/30 17:41:52 |
ADVICE | wrapper | 2010/04/30 17:41:52 | ------------------------------------------------------------------------
ADVICE | wrapper | 2010/04/30 17:41:52 | Advice:
ADVICE | wrapper | 2010/04/30 17:41:52 | Usually when the Wrapper fails to start the JVM process, it is because
ADVICE | wrapper | 2010/04/30 17:41:52 | of a problem with the value of the configured Java command. Currently:
ADVICE | wrapper | 2010/04/30 17:41:52 | wrapper.java.command=java
ADVICE | wrapper | 2010/04/30 17:41:52 | Please make sure that the PATH or any other referenced environment
ADVICE | wrapper | 2010/04/30 17:41:52 | variables are correctly defined for the current environment.
ADVICE | wrapper | 2010/04/30 17:41:52 | ------------------------------------------------------------------------
ADVICE | wrapper | 2010/04/30 17:41:52 |
FATAL | wrapper | 2010/04/30 17:41:52 | Critical error: wait for JVM process failed
如果是这样的话,直接在dos命令下输入"net start red5"就启动red5服务了!
发表评论
-
十个Flex/Air疑难杂症及解决方案简略
2010-05-31 17:17 3346最近去一家台企面 ... -
使用aperture框架让AS3与C++通信,执行本地代码
2010-04-08 16:48 3258我们都知道,AIR的效果是非常出色的,这也是大家喜欢她的原因, ... -
SQLITE入门至精通
2010-04-07 11:13 3026关键 ... -
教你解析FLEX JSON中的一个问题 关于键值 和键
2010-04-01 15:25 2326字符串:message = ' "param&quo ... -
air写文件保存在安装目录
2010-03-31 15:46 3223AIR中..保存文件我们般会像下面这样操作 var f ... -
弱弱的一个小问题,bitmapdata pngencoder base64 bytearray
2010-03-31 14:16 1155好久没写东东了,呵呵。随便写点点。关于bitmapdata如何 ... -
FLASH教程:SWF间的双向通信
2010-03-02 18:23 1363假设有一个主 SWf 名为 m ... -
如何把as文件生成swf格式文件
2010-03-02 18:22 5291一,从http://opensource.adobe.com/ ... -
Flex数据交互方法 :httpservice, webservice, RemoteObject, socket
2010-02-27 17:06 1913【转载】 文章分类:Flash编程 http://h ... -
理解Flash Player 9垃圾回收机制
2010-02-02 18:27 1089理解Flash Player 9垃圾回 ... -
BlazeDS入门教程-很详细-赞原创作者一个
2010-01-11 23:51 1723什么是BlazeDS呢?BlazeDS是一个基于服务器的Ja ... -
一些漂亮的Flex主题下载
2010-01-11 10:31 6178一些漂亮的Flex主题下载1Digg meWindows Cl ... -
通过Stratus 服务器在Flash Player中使用RTMFP 开发 点对点应用(一)
2010-01-08 17:43 5401作者:Jozsef Vass 译者:巴巴鲁 ... -
ActionScript 3.0著名开源库 大集合
2009-12-29 17:26 2046这篇文章开始于对Adrian ... -
Flex 读取XML配置文件总结
2009-11-19 11:45 1990在Flex中我 ... -
一个list定义组件,网上找了很久没有,自己做了一个。
2009-10-29 11:55 1252一个list定义组件,网上找了很久没有,自己做了一个。希望对大 ... -
如何使用Flex RemoteObject components 与JAVA交互
2009-10-08 18:04 53132008-12-25 | 22:53分类:前端开发 ... -
flex 在线录制视频语音
2009-09-12 17:45 3649<?xml version="1.0" ... -
flex 蒙板 遮罩
2009-09-11 17:09 3876方法一 <mx:Image source=&q ... -
如何自定义FLEX3的loading进度条
2009-09-05 10:17 1755第一种:修改下载进度的文字为中文 建立扩展至 mx.prel ...
相关推荐
这个"as3+flv播放器+源码示例"的压缩包提供了使用AS3实现的FLV播放器的源代码,对于学习如何在Flash环境中处理视频流非常有帮助。 1. AS3基础知识: AS3是ActionScript的第三个主要版本,它带来了许多改进,包括...
知识点:在Windows环境下配置、运行RED5源码及AS3连接RED5的简易流程 一、RED5简介与版本更新 RED5是一个开源的、基于Java的媒体服务器,用于流媒体传输,支持RTMP协议,能够实现音视频的实时交互。随着版本的迭代...
6. **实例源码**:提供的"Red5 Example 实例源码"可能包含各种示例应用,例如简单的直播、录播、播放器实现等。这些源码可以帮助开发者了解如何在实际项目中集成Red5,以及如何编写处理流媒体的Java代码。 7. **...
【标题】"示例(as3red5电子白板)"指的是一个使用ActionScript 3 (AS3) 和 Red5 服务器技术实现的电子白板应用程序。这个项目可能是一个开源或者共享的示例,允许用户下载源代码进行学习和研究。 【描述】提到"附件...
1. **启动Red5**:通常通过运行Red5的启动脚本来启动服务器,如`bin/startup.sh`(Unix/Linux)或`bin/startup.bat`(Windows)。 2. **部署应用**:应用部署涉及创建应用目录并在其中放置应用的配置文件和相关的类...
Red5的源代码是用Java语言编写的,这使得它具有良好的跨平台性,可以在多种操作系统上运行,包括Windows、Linux和Mac OS。 Red5的核心功能包括: 1. **实时流传输(RTMP)**:RTMP是一种广泛使用的协议,用于将...
在部署和使用Red5时,开发者需要了解如何配置服务器环境,例如Java运行环境(JRE或JDK)、安装并配置Tomcat(因为Red5基于Tomcat容器运行),以及根据需求调整配置文件。对于直播应用,还需要熟悉如何使用编码器将...
2. **安装与配置**:熟悉在不同操作系统(如Windows、Linux)上安装Red5的步骤,包括环境配置、服务器端口设置等。 3. **编程接口**:学习Red5的API,包括如何创建流、连接客户端、处理数据等。 4. **流媒体概念**:...
RED5由Java编写,因此具有跨平台的特性,可以在运行Java环境的任何操作系统上部署,包括Windows、Linux、Mac OS等。 RED5的主要功能包括: 1. **直播流**:RED5可以接收来自不同源的实时视频流,并将其分发到多个...
4. **启动Red5**:执行Red5的启动脚本(例如在Linux下是`bin/start.sh`,Windows下是`bin/start.bat`),启动Red5服务器。 5. **安装oflaDemo**:在部署过程中,如果不能自动安装oflaDemo,你可以手动完成。...
这个项目旨在帮助开发者了解如何在自己的开发环境中配置和运行Red5服务器,以便进行流媒体处理和交互式应用程序的开发。 【描述】"red5整合到个人tomcat"指的是将Red5开源流媒体服务器与Apache Tomcat应用服务器相...
标题中的“在eclipse中使用tomcat开发RED5项目”是指使用流行的Java集成开发环境Eclipse,配合开源的Servlet容器Tomcat,来搭建并开发RED5流媒体服务器项目。RED5是一个基于Java语言的开放源代码流媒体服务器,能够...
标题中的“demo.zip_flex_flex red5 demo_java视频通话_red5_red5 flex”表明这是一个关于使用Flex和Java实现视频通话的示例项目,其中涉及的关键技术是Red5服务器。这个压缩包包含了运行此功能所需的全部源代码。 ...
在"flex video.txt"文件中,可能包含了关于如何设置Flex项目、配置Red5服务器、建立RTMP连接、实现视频捕捉和播放、处理音频同步等相关步骤和代码示例。学习这些内容可以帮助开发者了解如何利用Flex和Red5构建一个...
4. **配置文件**:如服务器配置文件,包含了Red5 Pro服务器的URL和其他连接参数。 5. **测试代码**:可能包括单元测试和集成测试,用于验证代码的正确性和功能的完整性。 通过研究这个示例项目,开发者可以深入...
【标题】"flex-java-red5 即时聊天源码"涉及的是使用Adobe Flex、Java和Red5技术构建的即时通讯应用。Flex是一种基于ActionScript的开源框架,用于创建富互联网应用程序(RIA),而Java则是一种多平台的编程语言,常...
3. "JAVA-RED5"目录可能包含RED5服务器端的源代码,这些代码处理连接管理、视频流处理、会议逻辑等。Java程序员可以研究这些代码以理解服务器的工作原理,并进行扩展或优化。 4. "PHP"可能用于提供一些后端服务,如...
安装Red5通常包括下载源码或二进制包,配置环境变量,然后启动服务。在配置过程中,需要关注端口设置、应用域配置以及日志级别等参数。 4. **Red5应用开发** 开发Red5应用主要涉及编写Java代码,创建应用级的`....
3. **配置文件**:这些文件用于设置Node-RED的运行环境,如服务器端口、用户访问权限等。 4. **示例和教程**:帮助新手快速上手,展示如何使用Node-RED构建实际的应用。 5. **文档**:详细解释每个节点的功能、用法...