`
wangleifire
  • 浏览: 510852 次
  • 性别: Icon_minigender_1
  • 来自: 深圳
社区版块
存档分类
最新评论

Windows环境下配置+运行red5源码+AS3连接red5简单示例

    博客分类:
  • FLEX
阅读更多

Windows环境下配置+运行red5源码+AS3连接red5简单示例

Posted on 18 April 2010

Windows环境下+配置+运行red5源码

Red5发展很快,目前最新版本为0.9.1,与以前的版本(0.8.+、0.7.+、0.6.+)差别很大,中文资料奇缺,鉴于此,我写下这篇文章,希望能帮上您的忙。

由于没有下载到0.9.1的源码,我们现在以red5 0.9.0为例介绍如何配置、编译、运行Red5源码。Red5 0.9.0与red5 0.9.1差不多,你可以用本文所介绍的方式来配置red5 0.9.1。

1.打开red5 0.9.0的下载页面:http://red5.org/wiki/0_9_0

如下图所示:

我们点击“Windows”和”Source”两个链接来下载red5的安装包和red5的源码,我们下载安装包的目的是它包括了所有red5源码所依赖的jar包,这样很方便我们的配置。

2.下载完成之后,首先安装setup-Red5-0.9.0.exe,在安装过程中,如果提示你输入ip地址,则输入0.0.0.0,这样可以允许来自任何域的访问,如果提示输入端口,则输入8000,那么我们的web服务器将会绑定8000端口。

3.打开eclipse java开发环境,如果没有,则到http://eclipse.org/downloads/ 下载Eclipse IDE for Java Developers ,将下载后的压缩包解压到本机你喜欢的地方,然后双击eclipse.exe,如果不能运行,说明你需要一个jdk,就到http://java.sun.com/javase/downloads/widget/jdk6.jsp 下载一个适合你的操作系统的jdk,安装jdk之后,eclipse就可以运行了,打开eclipse开发 环境之后,选择一个你喜欢的工作空间。

4.新建一个Java Project,如下图所示:

5.在新建工程对话框中输入Red5,点击“Finish”按钮则新建一个名为Red5的java工程,如下图所示:

6.将red5安装目录下的所有文件夹拷贝到Red5工程根目录下,操作之后的Red5工程目录结构如下:

7.将下载的red5源文件解压并将org文件夹拷贝到我们的Red5工程的src目录下,操作之后的项目结构图如下所示:

8.这时我们看到工程中有些错误,说明缺少依赖的库,此时我们把lib文件夹中的所有jar文件添加构建路径中,操作如下图 所示:

此时我们可以看到,工程中不再提示错误。

9.我们找到org.red5.server.Bootstrap类,双击Bootstrap.java文件打开此类,按F11运行此工程。当你看到如下输出信息时,说明Red5服务器启动完成。

10.打开浏览器,在地址栏中输入http://localhost:8000,回车,如果你看到如下界面,说明你的Red5已经正在良好的运行。

11.接下来我们安装一个程序来测试一下,访问http://localhost:8000,点击“Install”链接,或者直接 在访问http://localhost:8000/installer/,则进入如下界面:

12.我们选择SOSample,点击“Install”按键安装它,等待安装完成,提示如下:

13.访问http://localhost:8000/,点击“Launch a demo”链接,或者直接访问http://localhost:8000/demos/进入如下界面:

14.在Shared Ball栏目下,我们点击“View demo”进入如下界面:

我们用此地址复制,多打开几个浏览器窗口,如下图所示:

将它们一一连接到red5服务器,尝试拖动Red5的图标,我们可以看到每个客户端的red5图标都被拖动。

15.下面我们一起来制作一个as3与red5通信的例子。

回到eclipse,在webapps目录下新建一个testred5目录,并将webapps里面的SOSample目录中所有内容拷贝到testred5目录中(如果看不见SOSample目录,请刷新一下webapps目录)。

16.在testred5目录下新建一个src目录,并将此目录做为源文件目录,操作如下图所示:

17.打开项目的属性面板,操作如下图所示:

选择Java Build Path,在Java Build Path面板中选择Source选择卡,然后我们将Default output folder指向到Red5/webapps/testred5/WEB-INF/classes 目录,你可以通过浏览来选择此目录,也可以直接在输入框中输入“Red5/webapps/testred5/WEB-INF/classes”。如下图 所示:

点击“OK”关闭此面板。

18.我们在webapps/testred5/src源文件夹下建立一个Java类叫MainApp,此时项目结构图如下所示:

19.在MainApp类中输入如下代码:

Code block      
import
 org.red5.server.adapter.ApplicationAdapter
;

 
public
 class
 MainApp extends
 ApplicationAdapter{

 
	public
 String

 getValue(
)
{

		return
 "Hello world"
;

	}

}

20.分别修改webapps/testred5/WEB-INF目录下的文件 web.xml、red5-web.xml、red5-web.properties 如下:

web.xml:

Code block      
<?xml
 version
="1.0"
 encoding
="ISO-8859-1"
?>


<web-app


   xmlns
="http://java.sun.com/xml/ns/j2ee"


   xmlns:xsi
="http://www.w3.org/2001/XMLSchema-instance"


   xsi:schemaLocation
="http://java.sun.com/xml/ns/j2ee http://java.sun.com/xml/ns/j2ee/web-app_2_4.xsd"


   version
="2.4"
>

 
 
	<display-name>


testred5</display-name>



 
	<context-param>



		<param-name>


webAppRootKey</param-name>



		<param-value>


/testred5</param-value>



	</context-param>



 
</web-app>


red5-web.xml:

Code block      
<?xml
 version
="1.0"
 encoding
="UTF-8"
?>


<!DOCTYPE beans PUBLIC "-//SPRING//DTD BEAN//EN" "http://www.springframework.org/dtd/spring-beans.dtd">

<beans>



 
	<bean
 id
="placeholderConfig"
 class
="org.springframework.beans.factory.config.PropertyPlaceholderConfigurer"
>


	    <property
 name
="location"
 value
="/WEB-INF/red5-web.properties"
 />


	</bean>



 
	<bean
 id
="web.context"
 class
="org.red5.server.Context"


		autowire
="byType"
 />


 
	<bean
 id
="web.scope"
 class
="org.red5.server.WebScope"


		 init-method
="register"
>


		<property
 name
="server"
 ref
="red5.server"
 />


		<property
 name
="parent"
 ref
="global.scope"
 />


		<property
 name
="context"
 ref
="web.context"
 />


		<property
 name
="handler"
 ref
="web.handler"
 />


		<property
 name
="contextPath"
 value
="${webapp.contextPath}"
 />


		<property
 name
="virtualHosts"
 value
="${webapp.virtualHosts}"
 />


	</bean>



 
	<bean
 id
="web.handler"


	    class
="MainApp"


		singleton
="true"
 />


 
</beans>


red5-web.properties:

Code block      
webapp.contextPath=/testred5
webapp.virtualHosts=*, localhost, localhost:8088, 127.0.0.1:8088

21.保存所有工程,按F11启动red5服务器。

22.打开FlashBuilder,创建一个名为Testred5client的ActionScript 项目,在生成的主文件中输入以下代码:

Code block      
package

{

	import
 flash.display
.
Sprite

;

	import
 flash.events
.
NetStatusEvent

;

	import
 flash.net
.
NetConnection

;

	import
 flash.net
.
Responder

;

 
	public
 class
 Testred5client extends
 Sprite


	{

 
		private
 var
 _nc:
NetConnection

;

 
		public
 function
 Testred5client(
)

		{

			_nc=new
 NetConnection

;

			_nc.
addEventListener
(
NetStatusEvent

.
NET_STATUS
,
netStatusHandler)
;

			_nc.
connect
(
"rtmp://localhost/testred5"
)
;

		}

 
		private
 function
 netStatusHandler(
event:
NetStatusEvent

)
:
void
{

			switch
(
event.
info
.
code
)
{

				case
 "NetConnection.Connect.Success"
:

					_nc.
call
(
"getValue"
,
new
 Responder

(
result)
)
;

					break
;

			}

		}

 
		private
 function
 result(
obj:
Object

)
:
void
{

			trace
(
obj)
;

		}

	}

}

23.按F11运行此代码,如果你看到输出面板中输出了Hello world,如下图所示,则说明你成功了。

分享到:
评论
7 楼 haray 2010-11-19  
怎么图片一个也打不开
6 楼 xiezhenxiang 2010-05-07  
我是按照你的步骤一步一步来的,怎么我打开多个网页时,拖到球时,其他的网面没有到,感觉球没有被共享,
在控制台的提示:
[http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:24:55.240 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase -   No applicable constraint located
16:24:55.240 [http-10.30.5.18-8000-2] DEBUG o.a.c.a.AuthenticatorBase -  Not subject to any constraint
16:24:55.481 [http-10.30.5.18-8000-2] DEBUG o.a.c.a.AuthenticatorBase - Security checking request GET /demos/xray.swf
16:24:55.481 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.481 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.481 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase -   No applicable constraint located
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG o.a.c.a.AuthenticatorBase -  Not subject to any constraint
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG o.a.c.a.AuthenticatorBase - Security checking request GET /demos/BallControl.html
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   No applicable constraint located
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG o.a.c.a.AuthenticatorBase -  Not subject to any constraint
16:25:31.963 [http-10.30.5.18-8000-1] DEBUG o.a.c.a.AuthenticatorBase - Security checking request GET /demos/assets/swfobject.js
16:25:31.963 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.963 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.963 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.983 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.983 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.983 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   No applicable constraint located
16:25:31.983 [http-10.30.5.18-8000-1] DEBUG o.a.c.a.AuthenticatorBase -  Not subject to any constraint
16:25:32.464 [http-10.30.5.18-8000-1] DEBUG o.a.c.a.AuthenticatorBase - Security checking request GET /demos/BallControl.swf
16:25:32.464 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.464 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.464 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   No applicable constraint located
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG o.a.c.a.AuthenticatorBase -  Not subject to any constraint
16:25:32.724 [http-10.30.5.18-8000-1] DEBUG o.a.c.a.AuthenticatorBase - Security checking request GET /demos/xray.swf
16:25:32.724 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.724 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.724 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   No applicable constraint located
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG o.a.c.a.AuthenticatorBase -  Not subject to any constraint
5 楼 huaz98 2010-05-07  
如果连不上可能存在的原因是什么??
4 楼 yuncpu 2010-04-30  
安装后启动不了 服务报错
3 楼 yuncpu 2010-04-30  
STATUS | wrapper  | 2010/04/30 17:40:53 | Red5 installed.
STATUS | wrapper  | 2010/04/30 17:41:52 | --> Wrapper Started as Service
STATUS | wrapper  | 2010/04/30 17:41:52 | Java Service Wrapper Community Edition 32-bit 3.3.6
STATUS | wrapper  | 2010/04/30 17:41:52 |   Copyright (C) 1999-2009 Tanuki Software, Ltd.  All Rights Reserved.
STATUS | wrapper  | 2010/04/30 17:41:52 |     http://wrapper.tanukisoftware.org
STATUS | wrapper  | 2010/04/30 17:41:52 |
STATUS | wrapper  | 2010/04/30 17:41:52 | Launching a JVM...
FATAL  | wrapper  | 2010/04/30 17:41:52 | Unable to execute Java command.  系统找不到指定的文件。 (0x2)
FATAL  | wrapper  | 2010/04/30 17:41:52 |     "java" -Xrs -XX:+AggressiveOpts -XX:+DisableExplicitGC -Djava.net.preferIPv4Stack=true -Dlogback.ContextSelector=org.red5.logging.LoggingContextSelector -Dcatalina.useNaming=true -Dpython.home=lib -Xverify:none -Xms256m -Xmx768m -Djava.library.path="lib" -classpath "lib/wrapper.jar;conf;boot.jar" -Dwrapper.key="hyLX_oT119mvXryB" -Dwrapper.port=32000 -Dwrapper.jvm.port.min=31000 -Dwrapper.jvm.port.max=31999 -Dwrapper.pid=368 -Dwrapper.version="3.3.6" -Dwrapper.native_library="wrapper" -Dwrapper.service="TRUE" -Dwrapper.cpu.timeout="10" -Dwrapper.jvmid=1 org.tanukisoftware.wrapper.WrapperSimpleApp org.red5.server.Bootstrap
ADVICE | wrapper  | 2010/04/30 17:41:52 |
ADVICE | wrapper  | 2010/04/30 17:41:52 | ------------------------------------------------------------------------
ADVICE | wrapper  | 2010/04/30 17:41:52 | Advice:
ADVICE | wrapper  | 2010/04/30 17:41:52 | Usually when the Wrapper fails to start the JVM process, it is because
ADVICE | wrapper  | 2010/04/30 17:41:52 | of a problem with the value of the configured Java command.  Currently:
ADVICE | wrapper  | 2010/04/30 17:41:52 | wrapper.java.command=java
ADVICE | wrapper  | 2010/04/30 17:41:52 | Please make sure that the PATH or any other referenced environment
ADVICE | wrapper  | 2010/04/30 17:41:52 | variables are correctly defined for the current environment.
ADVICE | wrapper  | 2010/04/30 17:41:52 | ------------------------------------------------------------------------
ADVICE | wrapper  | 2010/04/30 17:41:52 |
FATAL  | wrapper  | 2010/04/30 17:41:52 | Critical error: wait for JVM process failed
2 楼 xlhtc007 2010-04-21  
前面导入red5的source只是为了启动red5吗?
如果是这样的话,直接在dos命令下输入"net start red5"就启动red5服务了!
1 楼 xlhtc007 2010-04-21  
http://code.google.com/p/red5/可以下载red5最新版

相关推荐

    as3+flv播放器+源码示例

    这个"as3+flv播放器+源码示例"的压缩包提供了使用AS3实现的FLV播放器的源代码,对于学习如何在Flash环境中处理视频流非常有帮助。 1. AS3基础知识: AS3是ActionScript的第三个主要版本,它带来了许多改进,包括...

    red5_good

    知识点:在Windows环境下配置、运行RED5源码及AS3连接RED5的简易流程 一、RED5简介与版本更新 RED5是一个开源的、基于Java的媒体服务器,用于流媒体传输,支持RTMP协议,能够实现音视频的实时交互。随着版本的迭代...

    Red5 Example 实例源码

    6. **实例源码**:提供的"Red5 Example 实例源码"可能包含各种示例应用,例如简单的直播、录播、播放器实现等。这些源码可以帮助开发者了解如何在实际项目中集成Red5,以及如何编写处理流媒体的Java代码。 7. **...

    示例(as3red5电子白板)

    【标题】"示例(as3red5电子白板)"指的是一个使用ActionScript 3 (AS3) 和 Red5 服务器技术实现的电子白板应用程序。这个项目可能是一个开源或者共享的示例,允许用户下载源代码进行学习和研究。 【描述】提到"附件...

    red 5 配置解读(一)

    1. **启动Red5**:通常通过运行Red5的启动脚本来启动服务器,如`bin/startup.sh`(Unix/Linux)或`bin/startup.bat`(Windows)。 2. **部署应用**:应用部署涉及创建应用目录并在其中放置应用的配置文件和相关的类...

    red5 流媒体 源代码

    Red5的源代码是用Java语言编写的,这使得它具有良好的跨平台性,可以在多种操作系统上运行,包括Windows、Linux和Mac OS。 Red5的核心功能包括: 1. **实时流传输(RTMP)**:RTMP是一种广泛使用的协议,用于将...

    red5-server-1.0.6.zip 流媒体服务器

    在部署和使用Red5时,开发者需要了解如何配置服务器环境,例如Java运行环境(JRE或JDK)、安装并配置Tomcat(因为Red5基于Tomcat容器运行),以及根据需求调整配置文件。对于直播应用,还需要熟悉如何使用编码器将...

    red5 demo

    2. **安装与配置**:熟悉在不同操作系统(如Windows、Linux)上安装Red5的步骤,包括环境配置、服务器端口设置等。 3. **编程接口**:学习Red5的API,包括如何创建流、连接客户端、处理数据等。 4. **流媒体概念**:...

    类似FMS的RED5开源FLASH流媒体服务器源码

    RED5由Java编写,因此具有跨平台的特性,可以在运行Java环境的任何操作系统上部署,包括Windows、Linux、Mac OS等。 RED5的主要功能包括: 1. **直播流**:RED5可以接收来自不同源的实时视频流,并将其分发到多个...

    Red5 oflaDemo

    4. **启动Red5**:执行Red5的启动脚本(例如在Linux下是`bin/start.sh`,Windows下是`bin/start.bat`),启动Red5服务器。 5. **安装oflaDemo**:在部署过程中,如果不能自动安装oflaDemo,你可以手动完成。...

    myRed5Test

    这个项目旨在帮助开发者了解如何在自己的开发环境中配置和运行Red5服务器,以便进行流媒体处理和交互式应用程序的开发。 【描述】"red5整合到个人tomcat"指的是将Red5开源流媒体服务器与Apache Tomcat应用服务器相...

    在eclipse中使用tomcat开发RED5项目

    标题中的“在eclipse中使用tomcat开发RED5项目”是指使用流行的Java集成开发环境Eclipse,配合开源的Servlet容器Tomcat,来搭建并开发RED5流媒体服务器项目。RED5是一个基于Java语言的开放源代码流媒体服务器,能够...

    demo.zip_flex_flex red5 demo_java视频通话_red5_red5 flex

    标题中的“demo.zip_flex_flex red5 demo_java视频通话_red5_red5 flex”表明这是一个关于使用Flex和Java实现视频通话的示例项目,其中涉及的关键技术是Red5服务器。这个压缩包包含了运行此功能所需的全部源代码。 ...

    flex 视频聊天 基于red5

    在"flex video.txt"文件中,可能包含了关于如何设置Flex项目、配置Red5服务器、建立RTMP连接、实现视频捕捉和播放、处理音频同步等相关步骤和代码示例。学习这些内容可以帮助开发者了解如何利用Flex和Red5构建一个...

    Red5 Pro---Android demo

    4. **配置文件**:如服务器配置文件,包含了Red5 Pro服务器的URL和其他连接参数。 5. **测试代码**:可能包括单元测试和集成测试,用于验证代码的正确性和功能的完整性。 通过研究这个示例项目,开发者可以深入...

    flex-java-red5 即时聊天源码

    【标题】"flex-java-red5 即时聊天源码"涉及的是使用Adobe Flex、Java和Red5技术构建的即时通讯应用。Flex是一种基于ActionScript的开源框架,用于创建富互联网应用程序(RIA),而Java则是一种多平台的编程语言,常...

    red5chatv2.1 red5建的一个FLASH视频聊天会议例子

    3. "JAVA-RED5"目录可能包含RED5服务器端的源代码,这些代码处理连接管理、视频流处理、会议逻辑等。Java程序员可以研究这些代码以理解服务器的工作原理,并进行扩展或优化。 4. "PHP"可能用于提供一些后端服务,如...

    red5学习资料

    安装Red5通常包括下载源码或二进制包,配置环境变量,然后启动服务。在配置过程中,需要关注端口设置、应用域配置以及日志级别等参数。 4. **Red5应用开发** 开发Red5应用主要涉及编写Java代码,创建应用级的`....

    node-red-3.1.9.zip 2024最新

    3. **配置文件**:这些文件用于设置Node-RED的运行环境,如服务器端口、用户访问权限等。 4. **示例和教程**:帮助新手快速上手,展示如何使用Node-RED构建实际的应用。 5. **文档**:详细解释每个节点的功能、用法...

Global site tag (gtag.js) - Google Analytics