- 浏览: 500065 次
- 性别:
- 来自: 深圳
文章分类
最新评论
-
michao:
大哥,还有aperture.exe吗? 发我一份,找不到呀,m ...
使用aperture框架让AS3与C++通信,执行本地代码 -
Aaron-Joe-William:
文件被删除了。下不了。
SQLite 数据库加密的一种解决方案 -
hanmiao:
樓主的文章不就是來自IBM Developers里的http: ...
mina 入门 -
howesen:
断包与粘包问题,需要处理下就好了
mina接收数据不全(2) -
sniciq:
git clone --recursive git://git ...
ESB学习笔记(Spring Integration实战)
Windows环境下配置+运行red5源码+AS3连接red5简单示例
Posted on 18 April 2010
Windows环境下+配置+运行red5源码
Red5发展很快,目前最新版本为0.9.1,与以前的版本(0.8.+、0.7.+、0.6.+)差别很大,中文资料奇缺,鉴于此,我写下这篇文章,希望能帮上您的忙。
由于没有下载到0.9.1的源码,我们现在以red5 0.9.0为例介绍如何配置、编译、运行Red5源码。Red5 0.9.0与red5 0.9.1差不多,你可以用本文所介绍的方式来配置red5 0.9.1。
1.打开red5 0.9.0的下载页面:http://red5.org/wiki/0_9_0
如下图所示:
我们点击“Windows”和”Source”两个链接来下载red5的安装包和red5的源码,我们下载安装包的目的是它包括了所有red5源码所依赖的jar包,这样很方便我们的配置。
2.下载完成之后,首先安装setup-Red5-0.9.0.exe,在安装过程中,如果提示你输入ip地址,则输入0.0.0.0,这样可以允许来自任何域的访问,如果提示输入端口,则输入8000,那么我们的web服务器将会绑定8000端口。
3.打开eclipse java开发环境,如果没有,则到http://eclipse.org/downloads/ 下载Eclipse IDE for Java Developers ,将下载后的压缩包解压到本机你喜欢的地方,然后双击eclipse.exe,如果不能运行,说明你需要一个jdk,就到http://java.sun.com/javase/downloads/widget/jdk6.jsp 下载一个适合你的操作系统的jdk,安装jdk之后,eclipse就可以运行了,打开eclipse开发 环境之后,选择一个你喜欢的工作空间。
4.新建一个Java Project,如下图所示:
5.在新建工程对话框中输入Red5,点击“Finish”按钮则新建一个名为Red5的java工程,如下图所示:
6.将red5安装目录下的所有文件夹拷贝到Red5工程根目录下,操作之后的Red5工程目录结构如下:
7.将下载的red5源文件解压并将org文件夹拷贝到我们的Red5工程的src目录下,操作之后的项目结构图如下所示:
8.这时我们看到工程中有些错误,说明缺少依赖的库,此时我们把lib文件夹中的所有jar文件添加构建路径中,操作如下图 所示:
此时我们可以看到,工程中不再提示错误。
9.我们找到org.red5.server.Bootstrap类,双击Bootstrap.java文件打开此类,按F11运行此工程。当你看到如下输出信息时,说明Red5服务器启动完成。
10.打开浏览器,在地址栏中输入http://localhost:8000,回车,如果你看到如下界面,说明你的Red5已经正在良好的运行。
11.接下来我们安装一个程序来测试一下,访问http://localhost:8000,点击“Install”链接,或者直接 在访问http://localhost:8000/installer/,则进入如下界面:
12.我们选择SOSample,点击“Install”按键安装它,等待安装完成,提示如下:
13.访问http://localhost:8000/,点击“Launch a demo”链接,或者直接访问http://localhost:8000/demos/进入如下界面:
14.在Shared Ball栏目下,我们点击“View demo”进入如下界面:
我们用此地址复制,多打开几个浏览器窗口,如下图所示:
将它们一一连接到red5服务器,尝试拖动Red5的图标,我们可以看到每个客户端的red5图标都被拖动。
15.下面我们一起来制作一个as3与red5通信的例子。
回到eclipse,在webapps目录下新建一个testred5目录,并将webapps里面的SOSample目录中所有内容拷贝到testred5目录中(如果看不见SOSample目录,请刷新一下webapps目录)。
16.在testred5目录下新建一个src目录,并将此目录做为源文件目录,操作如下图所示:
17.打开项目的属性面板,操作如下图所示:
选择Java Build Path,在Java Build Path面板中选择Source选择卡,然后我们将Default output folder指向到Red5/webapps/testred5/WEB-INF/classes 目录,你可以通过浏览来选择此目录,也可以直接在输入框中输入“Red5/webapps/testred5/WEB-INF/classes”。如下图 所示:
点击“OK”关闭此面板。
18.我们在webapps/testred5/src源文件夹下建立一个Java类叫MainApp,此时项目结构图如下所示:
19.在MainApp类中输入如下代码:
import
org.red5.server.adapter.ApplicationAdapter
;
public
class
MainApp extends
ApplicationAdapter{
public
String
getValue(
)
{
return
"Hello world"
;
}
}
20.分别修改webapps/testred5/WEB-INF目录下的文件 web.xml、red5-web.xml、red5-web.properties 如下:
web.xml:
<?xml
version
="1.0"
encoding
="ISO-8859-1"
?>
<web-app
xmlns
="http://java.sun.com/xml/ns/j2ee"
xmlns:xsi
="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation
="http://java.sun.com/xml/ns/j2ee http://java.sun.com/xml/ns/j2ee/web-app_2_4.xsd"
version
="2.4"
>
<display-name>
testred5</display-name>
<context-param>
<param-name>
webAppRootKey</param-name>
<param-value>
/testred5</param-value>
</context-param>
</web-app>
red5-web.xml:
<?xml
version
="1.0"
encoding
="UTF-8"
?>
<!DOCTYPE beans PUBLIC "-//SPRING//DTD BEAN//EN" "http://www.springframework.org/dtd/spring-beans.dtd">
<beans>
<bean
id
="placeholderConfig"
class
="org.springframework.beans.factory.config.PropertyPlaceholderConfigurer"
>
<property
name
="location"
value
="/WEB-INF/red5-web.properties"
/>
</bean>
<bean
id
="web.context"
class
="org.red5.server.Context"
autowire
="byType"
/>
<bean
id
="web.scope"
class
="org.red5.server.WebScope"
init-method
="register"
>
<property
name
="server"
ref
="red5.server"
/>
<property
name
="parent"
ref
="global.scope"
/>
<property
name
="context"
ref
="web.context"
/>
<property
name
="handler"
ref
="web.handler"
/>
<property
name
="contextPath"
value
="${webapp.contextPath}"
/>
<property
name
="virtualHosts"
value
="${webapp.virtualHosts}"
/>
</bean>
<bean
id
="web.handler"
class
="MainApp"
singleton
="true"
/>
</beans>
red5-web.properties:
webapp.contextPath=/testred5
webapp.virtualHosts=*, localhost, localhost:8088, 127.0.0.1:8088
21.保存所有工程,按F11启动red5服务器。
22.打开FlashBuilder,创建一个名为Testred5client的ActionScript 项目,在生成的主文件中输入以下代码:
package
{
import
flash.display
.
Sprite
;
import
flash.events
.
NetStatusEvent
;
import
flash.net
.
NetConnection
;
import
flash.net
.
Responder
;
public
class
Testred5client extends
Sprite
{
private
var
_nc:
NetConnection
;
public
function
Testred5client(
)
{
_nc=new
NetConnection
;
_nc.
addEventListener
(
NetStatusEvent
.
NET_STATUS
,
netStatusHandler)
;
_nc.
connect
(
"rtmp://localhost/testred5"
)
;
}
private
function
netStatusHandler(
event:
NetStatusEvent
)
:
void
{
switch
(
event.
info
.
code
)
{
case
"NetConnection.Connect.Success"
:
_nc.
call
(
"getValue"
,
new
Responder
(
result)
)
;
break
;
}
}
private
function
result(
obj:
Object
)
:
void
{
trace
(
obj)
;
}
}
}
23.按F11运行此代码,如果你看到输出面板中输出了Hello world,如下图所示,则说明你成功了。
评论
在控制台的提示:
[http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:24:55.240 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase - No applicable constraint located
16:24:55.240 [http-10.30.5.18-8000-2] DEBUG o.a.c.a.AuthenticatorBase - Not subject to any constraint
16:24:55.481 [http-10.30.5.18-8000-2] DEBUG o.a.c.a.AuthenticatorBase - Security checking request GET /demos/xray.swf
16:24:55.481 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.481 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.481 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG org.apache.catalina.realm.RealmBase - No applicable constraint located
16:24:55.521 [http-10.30.5.18-8000-2] DEBUG o.a.c.a.AuthenticatorBase - Not subject to any constraint
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG o.a.c.a.AuthenticatorBase - Security checking request GET /demos/BallControl.html
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.html --> false
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - No applicable constraint located
16:25:31.923 [http-10.30.5.18-8000-1] DEBUG o.a.c.a.AuthenticatorBase - Not subject to any constraint
16:25:31.963 [http-10.30.5.18-8000-1] DEBUG o.a.c.a.AuthenticatorBase - Security checking request GET /demos/assets/swfobject.js
16:25:31.963 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.963 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.963 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.973 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.983 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.983 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/assets/swfobject.js --> false
16:25:31.983 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - No applicable constraint located
16:25:31.983 [http-10.30.5.18-8000-1] DEBUG o.a.c.a.AuthenticatorBase - Not subject to any constraint
16:25:32.464 [http-10.30.5.18-8000-1] DEBUG o.a.c.a.AuthenticatorBase - Security checking request GET /demos/BallControl.swf
16:25:32.464 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.464 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.464 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/BallControl.swf --> false
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - No applicable constraint located
16:25:32.474 [http-10.30.5.18-8000-1] DEBUG o.a.c.a.AuthenticatorBase - Not subject to any constraint
16:25:32.724 [http-10.30.5.18-8000-1] DEBUG o.a.c.a.AuthenticatorBase - Security checking request GET /demos/xray.swf
16:25:32.724 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.724 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.724 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - Checking constraint 'SecurityConstraint[Forbidden]' against GET /demos/xray.swf --> false
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG org.apache.catalina.realm.RealmBase - No applicable constraint located
16:25:32.774 [http-10.30.5.18-8000-1] DEBUG o.a.c.a.AuthenticatorBase - Not subject to any constraint
STATUS | wrapper | 2010/04/30 17:41:52 | --> Wrapper Started as Service
STATUS | wrapper | 2010/04/30 17:41:52 | Java Service Wrapper Community Edition 32-bit 3.3.6
STATUS | wrapper | 2010/04/30 17:41:52 | Copyright (C) 1999-2009 Tanuki Software, Ltd. All Rights Reserved.
STATUS | wrapper | 2010/04/30 17:41:52 | http://wrapper.tanukisoftware.org
STATUS | wrapper | 2010/04/30 17:41:52 |
STATUS | wrapper | 2010/04/30 17:41:52 | Launching a JVM...
FATAL | wrapper | 2010/04/30 17:41:52 | Unable to execute Java command. 系统找不到指定的文件。 (0x2)
FATAL | wrapper | 2010/04/30 17:41:52 | "java" -Xrs -XX:+AggressiveOpts -XX:+DisableExplicitGC -Djava.net.preferIPv4Stack=true -Dlogback.ContextSelector=org.red5.logging.LoggingContextSelector -Dcatalina.useNaming=true -Dpython.home=lib -Xverify:none -Xms256m -Xmx768m -Djava.library.path="lib" -classpath "lib/wrapper.jar;conf;boot.jar" -Dwrapper.key="hyLX_oT119mvXryB" -Dwrapper.port=32000 -Dwrapper.jvm.port.min=31000 -Dwrapper.jvm.port.max=31999 -Dwrapper.pid=368 -Dwrapper.version="3.3.6" -Dwrapper.native_library="wrapper" -Dwrapper.service="TRUE" -Dwrapper.cpu.timeout="10" -Dwrapper.jvmid=1 org.tanukisoftware.wrapper.WrapperSimpleApp org.red5.server.Bootstrap
ADVICE | wrapper | 2010/04/30 17:41:52 |
ADVICE | wrapper | 2010/04/30 17:41:52 | ------------------------------------------------------------------------
ADVICE | wrapper | 2010/04/30 17:41:52 | Advice:
ADVICE | wrapper | 2010/04/30 17:41:52 | Usually when the Wrapper fails to start the JVM process, it is because
ADVICE | wrapper | 2010/04/30 17:41:52 | of a problem with the value of the configured Java command. Currently:
ADVICE | wrapper | 2010/04/30 17:41:52 | wrapper.java.command=java
ADVICE | wrapper | 2010/04/30 17:41:52 | Please make sure that the PATH or any other referenced environment
ADVICE | wrapper | 2010/04/30 17:41:52 | variables are correctly defined for the current environment.
ADVICE | wrapper | 2010/04/30 17:41:52 | ------------------------------------------------------------------------
ADVICE | wrapper | 2010/04/30 17:41:52 |
FATAL | wrapper | 2010/04/30 17:41:52 | Critical error: wait for JVM process failed
如果是这样的话,直接在dos命令下输入"net start red5"就启动red5服务了!
发表评论
-
十个Flex/Air疑难杂症及解决方案简略
2010-05-31 17:17 3295最近去一家台企面 ... -
使用aperture框架让AS3与C++通信,执行本地代码
2010-04-08 16:48 3194我们都知道,AIR的效果是非常出色的,这也是大家喜欢她的原因, ... -
SQLITE入门至精通
2010-04-07 11:13 2961关键 ... -
教你解析FLEX JSON中的一个问题 关于键值 和键
2010-04-01 15:25 2266字符串:message = ' "param&quo ... -
air写文件保存在安装目录
2010-03-31 15:46 3173AIR中..保存文件我们般会像下面这样操作 var f ... -
弱弱的一个小问题,bitmapdata pngencoder base64 bytearray
2010-03-31 14:16 1116好久没写东东了,呵呵。随便写点点。关于bitmapdata如何 ... -
FLASH教程:SWF间的双向通信
2010-03-02 18:23 1315假设有一个主 SWf 名为 m ... -
如何把as文件生成swf格式文件
2010-03-02 18:22 5199一,从http://opensource.adobe.com/ ... -
Flex数据交互方法 :httpservice, webservice, RemoteObject, socket
2010-02-27 17:06 1880【转载】 文章分类:Flash编程 http://h ... -
理解Flash Player 9垃圾回收机制
2010-02-02 18:27 1037理解Flash Player 9垃圾回 ... -
BlazeDS入门教程-很详细-赞原创作者一个
2010-01-11 23:51 1678什么是BlazeDS呢?BlazeDS是一个基于服务器的Ja ... -
一些漂亮的Flex主题下载
2010-01-11 10:31 6113一些漂亮的Flex主题下载1Digg meWindows Cl ... -
通过Stratus 服务器在Flash Player中使用RTMFP 开发 点对点应用(一)
2010-01-08 17:43 5357作者:Jozsef Vass 译者:巴巴鲁 ... -
ActionScript 3.0著名开源库 大集合
2009-12-29 17:26 1988这篇文章开始于对Adrian ... -
Flex 读取XML配置文件总结
2009-11-19 11:45 1943在Flex中我 ... -
一个list定义组件,网上找了很久没有,自己做了一个。
2009-10-29 11:55 1192一个list定义组件,网上找了很久没有,自己做了一个。希望对大 ... -
如何使用Flex RemoteObject components 与JAVA交互
2009-10-08 18:04 52392008-12-25 | 22:53分类:前端开发 ... -
flex 在线录制视频语音
2009-09-12 17:45 3563<?xml version="1.0" ... -
flex 蒙板 遮罩
2009-09-11 17:09 3838方法一 <mx:Image source=&q ... -
如何自定义FLEX3的loading进度条
2009-09-05 10:17 1712第一种:修改下载进度的文字为中文 建立扩展至 mx.prel ...
相关推荐
示例,(as3red5电子白板),附件源码,欢迎下载,本不想要积分,...
开源搜索系统 Red-Piranha源码示例
Java 源码包 Applet钢琴模拟程序java源码 2个目标文件,提供基本的音乐编辑功能。编辑音乐软件的朋友,这款实例会对你有所帮助。 Calendar万年历 1个目标文件 EJB 模拟银行ATM流程及操作源代码 6个目标文件,EJB来...
C# 开发的modbus tcp通讯示例源码,可通过tcp方式与modbus的各种硬件设备进行通讯。本源码为测试demo,可帮助不熟悉tcp通讯的开发人员快速了解并熟悉程序开发。
Node-RED IBM Cloud Starter应用程序IBM Cloud上的Node-RED 此存储库是一个示例Node-RED应用程序,只需单击几次即可将其部署到IBM Cloud中。 点击以下网址,立即尝试一下:这是如何运作的? 单击按钮后,您将被带到...
Java 3DMenu 界面源码,有人说用到游戏中不错,其实平时我信编写Java应用程序时候也能用到吧,不一定非要局限于游戏吧,RES、SRC资源都有,都在压缩包内。 Java zip压缩包查看程序源码 1个目标文件 摘要:Java源码...
red5示例项目oflaDemo的源码。
4.6.1 Vi及其3种运行模式 4.6.2 普通模式下的操作 4.6.3 命令行模式下的操作 4.7 sed和awk 4.7.1 sed 4.7.2 awk 4.8 进程管理和作业控制 4.8.1 进程概述 4.8.2 进程管理 4.8.3 作业控制 4.9 Shell变量和Shell环境 ...
java实现文件复制源码JAVA_PRACTICE_2005 一些源代码文件,并带有Java虚拟机编程语言(口号“一次编写,随处运行”)和各种GNU的面向对象编程语言范式的Java虚拟机编程语言编写和解释的“ JAVA LAGUÍATOTAL DEL ...
前言: RPM包:Packages Manager(原RED HAT Packages Manager ) 由Red Hat 公司提出,被众多Linux发行版采用 也成二进制包(binary code),无需编译,直接可以使用...source code需要经过GCC、C++编译环境编译才能运行
[ini4j] 是一个简单的Java类库,用来读写Windows的ini配置文件。同时还包含一个 Java Perferences API 的实现。 拒绝服务测试工具 Port Groper PortGroper 是一款java写的开源拒绝服务测试工具,它不是僵尸网络类的...
可修改文本和背景色的 ListBox C# 源码 ListBox 自绘示例代码 var listBoxEx1 = new ListBoxEx(); listBoxEx1.AddItem("显示文本", Color.White, Color.Red);
[ini4j] 是一个简单的Java类库,用来读写Windows的ini配置文件。同时还包含一个 Java Perferences API 的实现。 拒绝服务测试工具 Port Groper PortGroper 是一款java写的开源拒绝服务测试工具,它不是僵尸网络类的...
[ini4j] 是一个简单的Java类库,用来读写Windows的ini配置文件。同时还包含一个 Java Perferences API 的实现。 拒绝服务测试工具 Port Groper PortGroper 是一款java写的开源拒绝服务测试工具,它不是僵尸网络类的...
有关最新的文档和用法示例,请参阅StartupJS框架和@startupjs/react-sharedb的@startupjs/react-sharedb软件包: 以下是已弃用的独立react-sharedb软件包的OLD文档: react-sharedb 在React运行ShareDB 它能做...
前端相关库逐行级别源码分析及仿写示例 Author :bust_in_silhouette: McChen Website: Github: :handshake: Contributing Contributions, issues and feature requests are welcome!Feel free to check . Show your ...
看不到源码为 OpenShift S2I 打开 Liberty UBI-min 镜像 此存储库包含使用 Red Hat Universal Base Image (UBI) 7 和 Java 8 或 Java 11 构建 Open Liberty Source to Image (S2I) 构建器和运行时映像的源代码。 ...
[ini4j] 是一个简单的Java类库,用来读写Windows的ini配置文件。同时还包含一个 Java Perferences API 的实现。 拒绝服务测试工具 Port Groper PortGroper 是一款java写的开源拒绝服务测试工具,它不是僵尸网络类的...
[ini4j] 是一个简单的Java类库,用来读写Windows的ini配置文件。同时还包含一个 Java Perferences API 的实现。 拒绝服务测试工具 Port Groper PortGroper 是一款java写的开源拒绝服务测试工具,它不是僵尸网络类的...