Thankyou Daniel,
Yesterday I posted a comment to the Kamailio Github Issues including a patch which adds an optional parameter to the ipsec_destroy function.
Although it’s a quick hack, the patch solves my problem, and I believe it has no impact on existing behaviour.
All the best
James Bishop
European Commission
Directorate-General Joint Research Centre
E.2 Unit

Via E. Fermi 2749, TP 723
I-21027 Ispra (VA), Italy
+39 0332 786225
***@***.******@***.***>

From: Daniel-Constantin Mierla ***@***.***>
Sent: Wednesday, September 20, 2023 11:44 AM
To: kamailio/kamailio ***@***.***>
Cc: BISHOP James (JRC-ISPRA) ***@***.***>; Author ***@***.***>
Subject: Re: [kamailio/kamailio] ims_ipsec_pcscf: dummy AOR ***@***.*** prevents ipsec_destroy() from finding contact (Issue #3570)


The event route are executed with a fake message, because there could be situations when there is not SIP message received from the wire. The solution here is to enhance the function to get the value of the AoR as a parameter.

I am tagging this accordingly, maybe someone is going to code it (you are of course welcome to do it, as well), if not, it is going to be closed after a while.


Reply to this email directly, view it on GitHub<https://urldefense.com/v3/__https:/github.com/kamailio/kamailio/issues/3570*issuecomment-1727361903__;Iw!!DOxrgLBm!FNvbvjo89zJSce-Z4jBhDmITB6G395ok3xUtVkUElfTeWrARC1n8C2qsW30bBkPV0pxWWO15EsZmRThHZaCmj6pf60bnc9c$>, or unsubscribe<https://urldefense.com/v3/__https:/github.com/notifications/unsubscribe-auth/AM4GRXIZGBNAQ2UN7XDC2TTX3K3FJANCNFSM6AAAAAA4XYHR6E__;!!DOxrgLBm!FNvbvjo89zJSce-Z4jBhDmITB6G395ok3xUtVkUElfTeWrARC1n8C2qsW30bBkPV0pxWWO15EsZmRThHZaCmj6pfvEFF80g$>.
You are receiving this because you authored the thread.Message ID: ***@***.***>


Reply to this email directly, view it on GitHub, or unsubscribe.
You are receiving this because you are subscribed to this thread.Message ID: <kamailio/kamailio/issues/3570/1744392656@github.com>