Thankyou Daniel, Yesterday I posted a comment to the Kamailio Github Issues including a patch which adds an optional parameter to the ipsec_destroy function. Although it’s a quick hack, the patch solves my problem, and I believe it has no impact on existing behaviour. All the best James Bishop European Commission Directorate-General Joint Research Centre E.2 Unit
Via E. Fermi 2749, TP 723 I-21027 Ispra (VA), Italy +39 0332 786225 ***@***.******@***.***>
From: Daniel-Constantin Mierla ***@***.***> Sent: Wednesday, September 20, 2023 11:44 AM To: kamailio/kamailio ***@***.***> Cc: BISHOP James (JRC-ISPRA) ***@***.***>; Author ***@***.***> Subject: Re: [kamailio/kamailio] ims_ipsec_pcscf: dummy AOR ***@***.*** prevents ipsec_destroy() from finding contact (Issue #3570)
The event route are executed with a fake message, because there could be situations when there is not SIP message received from the wire. The solution here is to enhance the function to get the value of the AoR as a parameter.
I am tagging this accordingly, maybe someone is going to code it (you are of course welcome to do it, as well), if not, it is going to be closed after a while.
— Reply to this email directly, view it on GitHubhttps://urldefense.com/v3/__https:/github.com/kamailio/kamailio/issues/3570*issuecomment-1727361903__;Iw!!DOxrgLBm!FNvbvjo89zJSce-Z4jBhDmITB6G395ok3xUtVkUElfTeWrARC1n8C2qsW30bBkPV0pxWWO15EsZmRThHZaCmj6pf60bnc9c$, or unsubscribehttps://urldefense.com/v3/__https:/github.com/notifications/unsubscribe-auth/AM4GRXIZGBNAQ2UN7XDC2TTX3K3FJANCNFSM6AAAAAA4XYHR6E__;!!DOxrgLBm!FNvbvjo89zJSce-Z4jBhDmITB6G395ok3xUtVkUElfTeWrARC1n8C2qsW30bBkPV0pxWWO15EsZmRThHZaCmj6pfvEFF80g$. You are receiving this because you authored the thread.Message ID: ***@***.***>