`
wangleifire
  • 浏览: 500065 次
  • 性别: Icon_minigender_1
  • 来自: 深圳
社区版块
存档分类
最新评论

Windows环境下配置+运行red5源码+AS3连接red5简单示例

    博客分类:
  • FLEX
阅读更多

Windows环境下配置+运行red5源码+AS3连接red5简单示例

Posted on 18 April 2010

Windows环境下+配置+运行red5源码

Red5发展很快,目前最新版本为0.9.1,与以前的版本(0.8.+、0.7.+、0.6.+)差别很大,中文资料奇缺,鉴于此,我写下这篇文章,希望能帮上您的忙。

由于没有下载到0.9.1的源码,我们现在以red5 0.9.0为例介绍如何配置、编译、运行Red5源码。Red5 0.9.0与red5 0.9.1差不多,你可以用本文所介绍的方式来配置red5 0.9.1。

1.打开red5 0.9.0的下载页面:http://red5.org/wiki/0_9_0

如下图所示:

我们点击“Windows”和”Source”两个链接来下载red5的安装包和red5的源码,我们下载安装包的目的是它包括了所有red5源码所依赖的jar包,这样很方便我们的配置。

2.下载完成之后,首先安装setup-Red5-0.9.0.exe,在安装过程中,如果提示你输入ip地址,则输入0.0.0.0,这样可以允许来自任何域的访问,如果提示输入端口,则输入8000,那么我们的web服务器将会绑定8000端口。

3.打开eclipse java开发环境,如果没有,则到http://eclipse.org/downloads/ 下载Eclipse IDE for Java Developers ,将下载后的压缩包解压到本机你喜欢的地方,然后双击eclipse.exe,如果不能运行,说明你需要一个jdk,就到http://java.sun.com/javase/downloads/widget/jdk6.jsp 下载一个适合你的操作系统的jdk,安装jdk之后,eclipse就可以运行了,打开eclipse开发 环境之后,选择一个你喜欢的工作空间。

4.新建一个Java Project,如下图所示:

5.在新建工程对话框中输入Red5,点击“Finish”按钮则新建一个名为Red5的java工程,如下图所示:

6.将red5安装目录下的所有文件夹拷贝到Red5工程根目录下,操作之后的Red5工程目录结构如下:

7.将下载的red5源文件解压并将org文件夹拷贝到我们的Red5工程的src目录下,操作之后的项目结构图如下所示:

8.这时我们看到工程中有些错误,说明缺少依赖的库,此时我们把lib文件夹中的所有jar文件添加构建路径中,操作如下图 所示:

此时我们可以看到,工程中不再提示错误。

9.我们找到org.red5.server.Bootstrap类,双击Bootstrap.java文件打开此类,按F11运行此工程。当你看到如下输出信息时,说明Red5服务器启动完成。

10.打开浏览器,在地址栏中输入http://localhost:8000,回车,如果你看到如下界面,说明你的Red5已经正在良好的运行。

11.接下来我们安装一个程序来测试一下,访问http://localhost:8000,点击“Install”链接,或者直接 在访问http://localhost:8000/installer/,则进入如下界面:

12.我们选择SOSample,点击“Install”按键安装它,等待安装完成,提示如下:

13.访问http://localhost:8000/,点击“Launch a demo”链接,或者直接访问http://localhost:8000/demos/进入如下界面:

14.在Shared Ball栏目下,我们点击“View demo”进入如下界面:

我们用此地址复制,多打开几个浏览器窗口,如下图所示:

将它们一一连接到red5服务器,尝试拖动Red5的图标,我们可以看到每个客户端的red5图标都被拖动。

15.下面我们一起来制作一个as3与red5通信的例子。

回到eclipse,在webapps目录下新建一个testred5目录,并将webapps里面的SOSample目录中所有内容拷贝到testred5目录中(如果看不见SOSample目录,请刷新一下webapps目录)。

16.在testred5目录下新建一个src目录,并将此目录做为源文件目录,操作如下图所示:

17.打开项目的属性面板,操作如下图所示:

选择Java Build Path,在Java Build Path面板中选择Source选择卡,然后我们将Default output folder指向到Red5/webapps/testred5/WEB-INF/classes 目录,你可以通过浏览来选择此目录,也可以直接在输入框中输入“Red5/webapps/testred5/WEB-INF/classes”。如下图 所示:

点击“OK”关闭此面板。

18.我们在webapps/testred5/src源文件夹下建立一个Java类叫MainApp,此时项目结构图如下所示:

19.在MainApp类中输入如下代码:

Code block      
import
 org.red5.server.adapter.ApplicationAdapter
;

 
public
 class
 MainApp extends
 ApplicationAdapter{

 
	public
 String

 getValue(
)
{

		return
 "Hello world"
;

	}

}

20.分别修改webapps/testred5/WEB-INF目录下的文件 web.xml、red5-web.xml、red5-web.properties 如下:

web.xml:

Code block      
<?xml
 version
="1.0"
 encoding
="ISO-8859-1"
?>


<web-app


   xmlns
="http://java.sun.com/xml/ns/j2ee"


   xmlns:xsi
="http://www.w3.org/2001/XMLSchema-instance"


   xsi:schemaLocation
="http://java.sun.com/xml/ns/j2ee http://java.sun.com/xml/ns/j2ee/web-app_2_4.xsd"


   version
="2.4"
>

 
 
	<display-name>


testred5</display-name>



 
	<context-param>



		<param-name>


webAppRootKey</param-name>



		<param-value>


/testred5</param-value>



	</context-param>



 
</web-app>


red5-web.xml:

Code block      
<?xml
 version
="1.0"
 encoding
="UTF-8"
?>


<!DOCTYPE beans PUBLIC "-//SPRING//DTD BEAN//EN" "http://www.springframework.org/dtd/spring-beans.dtd">

<beans>



 
	<bean
 id
="placeholderConfig"
 class
="org.springframework.beans.factory.config.PropertyPlaceholderConfigurer"
>


	    <property
 name
="location"
 value
="/WEB-INF/red5-web.properties"
 />


	</bean>



 
	<bean
 id
="web.context"
 class
="org.red5.server.Context"


		autowire
="byType"
 />


 
	<bean
 id
="web.scope"
 class
="org.red5.server.WebScope"


		 init-method
="register"
>


		<property
 name
="server"
 ref
="red5.server"
 />


		<property
 name
="parent"
 ref
="global.scope"
 />


		<property
 name
="context"
 ref
="web.context"
 />


		<property
 name
="handler"
 ref
="web.handler"
 />


		<property
 name
="contextPath"
 value
="${webapp.contextPath}"
 />


		<property
 name
="virtualHosts"
 value
="${webapp.virtualHosts}"
 />


	</bean>



 
	<bean
 id
="web.handler"


	    class
="MainApp"


		singleton
="true"
 />


 
</beans>


red5-web.properties:

Code block      
webapp.contextPath=/testred5
webapp.virtualHosts=*, localhost, localhost:8088, 127.0.0.1:8088

21.保存所有工程,按F11启动red5服务器。

22.打开FlashBuilder,创建一个名为Testred5client的ActionScript 项目,在生成的主文件中输入以下代码:

Code block      
package

{

	import
 flash.display
.
Sprite

;

	import
 flash.events
.
NetStatusEvent

;

	import
 flash.net
.
NetConnection

;

	import
 flash.net
.
Responder

;

 
	public
 class
 Testred5client extends
 Sprite


	{

 
		private
 var
 _nc:
NetConnection

;

 
		public
 function
 Testred5client(
)

		{

			_nc=new
 NetConnection

;

			_nc.
addEventListener
(
NetStatusEvent

.
NET_STATUS
,
netStatusHandler)
;

			_nc.
connect
(
"rtmp://localhost/testred5"
)
;

		}

 
		private
 function
 netStatusHandler(
event:
NetStatusEvent

)
:
void
{

			switch
(
event.
info
.
code
)
{

				case
 "NetConnection.Connect.Success"
:

					_nc.
call
(
"getValue"
,
new
 Responder

(
result)
)
;

					break
;

			}

		}

 
		private
 function
 result(
obj:
Object

)
:
void
{

			trace
(
obj)
;

		}

	}

}

23.按F11运行此代码,如果你看到输出面板中输出了Hello world,如下图所示,则说明你成功了。

分享到:
评论
7 楼 haray 2010-11-19  
怎么图片一个也打不开
6 楼 xiezhenxiang 2010-05-07  
我是按照你的步骤一步一步来的,怎么我打开多个网页时,拖到球时,其他的网面没有到,感觉球没有被共享,
在控制台的提示:
[http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:24:55.240 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase -   No applicable constraint located
16:24:55.240 [http-10.30.5.18-8000-2] DEBUG o.a.c.a.AuthenticatorBase -  Not subject to any constraint
16:24:55.481 [http-10.30.5.18-8000-2] DEBUG o.a.c.a.AuthenticatorBase - Security checking request GET /demos/xray.swf
16:24:55.481 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.481 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.481 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase -   No applicable constraint located
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG o.a.c.a.AuthenticatorBase -  Not subject to any constraint
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG o.a.c.a.AuthenticatorBase - Security checking request GET /demos/BallControl.html
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   No applicable constraint located
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG o.a.c.a.AuthenticatorBase -  Not subject to any constraint
16:25:31.963 [http-10.30.5.18-8000-1] DEBUG o.a.c.a.AuthenticatorBase - Security checking request GET /demos/assets/swfobject.js
16:25:31.963 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.963 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.963 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.983 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.983 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.983 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   No applicable constraint located
16:25:31.983 [http-10.30.5.18-8000-1] DEBUG o.a.c.a.AuthenticatorBase -  Not subject to any constraint
16:25:32.464 [http-10.30.5.18-8000-1] DEBUG o.a.c.a.AuthenticatorBase - Security checking request GET /demos/BallControl.swf
16:25:32.464 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.464 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.464 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   No applicable constraint located
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG o.a.c.a.AuthenticatorBase -  Not subject to any constraint
16:25:32.724 [http-10.30.5.18-8000-1] DEBUG o.a.c.a.AuthenticatorBase - Security checking request GET /demos/xray.swf
16:25:32.724 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.724 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.724 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase -   No applicable constraint located
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG o.a.c.a.AuthenticatorBase -  Not subject to any constraint
5 楼 huaz98 2010-05-07  
如果连不上可能存在的原因是什么??
4 楼 yuncpu 2010-04-30  
安装后启动不了 服务报错
3 楼 yuncpu 2010-04-30  
STATUS | wrapper  | 2010/04/30 17:40:53 | Red5 installed.
STATUS | wrapper  | 2010/04/30 17:41:52 | --> Wrapper Started as Service
STATUS | wrapper  | 2010/04/30 17:41:52 | Java Service Wrapper Community Edition 32-bit 3.3.6
STATUS | wrapper  | 2010/04/30 17:41:52 |   Copyright (C) 1999-2009 Tanuki Software, Ltd.  All Rights Reserved.
STATUS | wrapper  | 2010/04/30 17:41:52 |     http://wrapper.tanukisoftware.org
STATUS | wrapper  | 2010/04/30 17:41:52 |
STATUS | wrapper  | 2010/04/30 17:41:52 | Launching a JVM...
FATAL  | wrapper  | 2010/04/30 17:41:52 | Unable to execute Java command.  系统找不到指定的文件。 (0x2)
FATAL  | wrapper  | 2010/04/30 17:41:52 |     "java" -Xrs -XX:+AggressiveOpts -XX:+DisableExplicitGC -Djava.net.preferIPv4Stack=true -Dlogback.ContextSelector=org.red5.logging.LoggingContextSelector -Dcatalina.useNaming=true -Dpython.home=lib -Xverify:none -Xms256m -Xmx768m -Djava.library.path="lib" -classpath "lib/wrapper.jar;conf;boot.jar" -Dwrapper.key="hyLX_oT119mvXryB" -Dwrapper.port=32000 -Dwrapper.jvm.port.min=31000 -Dwrapper.jvm.port.max=31999 -Dwrapper.pid=368 -Dwrapper.version="3.3.6" -Dwrapper.native_library="wrapper" -Dwrapper.service="TRUE" -Dwrapper.cpu.timeout="10" -Dwrapper.jvmid=1 org.tanukisoftware.wrapper.WrapperSimpleApp org.red5.server.Bootstrap
ADVICE | wrapper  | 2010/04/30 17:41:52 |
ADVICE | wrapper  | 2010/04/30 17:41:52 | ------------------------------------------------------------------------
ADVICE | wrapper  | 2010/04/30 17:41:52 | Advice:
ADVICE | wrapper  | 2010/04/30 17:41:52 | Usually when the Wrapper fails to start the JVM process, it is because
ADVICE | wrapper  | 2010/04/30 17:41:52 | of a problem with the value of the configured Java command.  Currently:
ADVICE | wrapper  | 2010/04/30 17:41:52 | wrapper.java.command=java
ADVICE | wrapper  | 2010/04/30 17:41:52 | Please make sure that the PATH or any other referenced environment
ADVICE | wrapper  | 2010/04/30 17:41:52 | variables are correctly defined for the current environment.
ADVICE | wrapper  | 2010/04/30 17:41:52 | ------------------------------------------------------------------------
ADVICE | wrapper  | 2010/04/30 17:41:52 |
FATAL  | wrapper  | 2010/04/30 17:41:52 | Critical error: wait for JVM process failed
2 楼 xlhtc007 2010-04-21  
前面导入red5的source只是为了启动red5吗?
如果是这样的话,直接在dos命令下输入"net start red5"就启动red5服务了!
1 楼 xlhtc007 2010-04-21  
http://code.google.com/p/red5/可以下载red5最新版

相关推荐

    示例(as3red5电子白板)

    示例,(as3red5电子白板),附件源码,欢迎下载,本不想要积分,...

    开源搜索系统 Red-Piranha源码示例

    开源搜索系统 Red-Piranha源码示例

    JAVA上百实例源码以及开源项目源代码

    Java 源码包 Applet钢琴模拟程序java源码 2个目标文件,提供基本的音乐编辑功能。编辑音乐软件的朋友,这款实例会对你有所帮助。 Calendar万年历 1个目标文件 EJB 模拟银行ATM流程及操作源代码 6个目标文件,EJB来...

    modbus tcp通讯示例源码.rar

    C# 开发的modbus tcp通讯示例源码,可通过tcp方式与modbus的各种硬件设备进行通讯。本源码为测试demo,可帮助不熟悉tcp通讯的开发人员快速了解并熟悉程序开发。

    node-red-app:只需单击几下即可将Node-RED应用程序部署到IBM Cloud

    Node-RED IBM Cloud Starter应用程序IBM Cloud上的Node-RED 此存储库是一个示例Node-RED应用程序,只需单击几次即可将其部署到IBM Cloud中。 点击以下网址,立即尝试一下:这是如何运作的? 单击按钮后,您将被带到...

    JAVA上百实例源码以及开源项目

     Java 3DMenu 界面源码,有人说用到游戏中不错,其实平时我信编写Java应用程序时候也能用到吧,不一定非要局限于游戏吧,RES、SRC资源都有,都在压缩包内。 Java zip压缩包查看程序源码 1个目标文件 摘要:Java源码...

    oflaDemo_src

    red5示例项目oflaDemo的源码。

    CentOS.5系统管理-part1

    4.6.1 Vi及其3种运行模式 4.6.2 普通模式下的操作 4.6.3 命令行模式下的操作 4.7 sed和awk 4.7.1 sed 4.7.2 awk 4.8 进程管理和作业控制 4.8.1 进程概述 4.8.2 进程管理 4.8.3 作业控制 4.9 Shell变量和Shell环境 ...

    java实现文件复制源码-JAVA_PRACTICE_2005:某些源代码文件,以及《Java机器语言》一书的示例中的示例,该书由Java虚拟

    java实现文件复制源码JAVA_PRACTICE_2005 一些源代码文件,并带有Java虚拟机编程语言(口号“一次编写,随处运行”)和各种GNU的面向对象编程语言范式的Java虚拟机编程语言编写和解释的“ JAVA LAGUÍATOTAL DEL ...

    RPM包管理和源码包管理

    前言: RPM包:Packages Manager(原RED HAT Packages Manager ) 由Red Hat 公司提出,被众多Linux发行版采用 也成二进制包(binary code),无需编译,直接可以使用...source code需要经过GCC、C++编译环境编译才能运行

    java开源包4

    [ini4j] 是一个简单的Java类库,用来读写Windows的ini配置文件。同时还包含一个 Java Perferences API 的实现。 拒绝服务测试工具 Port Groper PortGroper 是一款java写的开源拒绝服务测试工具,它不是僵尸网络类的...

    可修改文本和背景色的 ListBox C# 源码

    可修改文本和背景色的 ListBox C# 源码 ListBox 自绘示例代码 var listBoxEx1 = new ListBoxEx(); listBoxEx1.AddItem("显示文本", Color.White, Color.Red);

    java开源包5

    [ini4j] 是一个简单的Java类库,用来读写Windows的ini配置文件。同时还包含一个 Java Perferences API 的实现。 拒绝服务测试工具 Port Groper PortGroper 是一款java写的开源拒绝服务测试工具,它不是僵尸网络类的...

    java开源包8

    [ini4j] 是一个简单的Java类库,用来读写Windows的ini配置文件。同时还包含一个 Java Perferences API 的实现。 拒绝服务测试工具 Port Groper PortGroper 是一款java写的开源拒绝服务测试工具,它不是僵尸网络类的...

    react-sharedb:React + ShareDB =:red_heart:

    有关最新的文档和用法示例,请参阅StartupJS框架和@startupjs/react-sharedb的@startupjs/react-sharedb软件包: 以下是已弃用的独立react-sharedb软件包的OLD文档: react-sharedb 在React运行ShareDB 它能做...

    code-analysis:前端相关库逐行级别源码分析及仿写示例

    前端相关库逐行级别源码分析及仿写示例 Author :bust_in_silhouette: McChen Website: Github: :handshake: Contributing Contributions, issues and feature requests are welcome!Feel free to check . Show your ...

    java8看不到源码-open-liberty-s2i:开放自由-s2i

    看不到源码为 OpenShift S2I 打开 Liberty UBI-min 镜像 此存储库包含使用 Red Hat Universal Base Image (UBI) 7 和 Java 8 或 Java 11 构建 Open Liberty Source to Image (S2I) 构建器和运行时映像的源代码。 ...

    java开源包3

    [ini4j] 是一个简单的Java类库,用来读写Windows的ini配置文件。同时还包含一个 Java Perferences API 的实现。 拒绝服务测试工具 Port Groper PortGroper 是一款java写的开源拒绝服务测试工具,它不是僵尸网络类的...

    java开源包7

    [ini4j] 是一个简单的Java类库,用来读写Windows的ini配置文件。同时还包含一个 Java Perferences API 的实现。 拒绝服务测试工具 Port Groper PortGroper 是一款java写的开源拒绝服务测试工具,它不是僵尸网络类的...

Global site tag (gtag.js) - Google Analytics