I see this message:[XXX][nua_i_bye]: 200 Session Terminatedwhich means it's the other end that is sending a BYE, which in turn results in the PeerConnection being torn down on the WebRTC side (alert).
[XXX][nua_i_bye]: 200 Session Terminatedwhich means it's the other end that is sending a BYE, which in turn results in the PeerConnection being torn down on the WebRTC side (alert).I have captured a TCP dump and indeed, Twilio sends the BYE. I have assumed that Janus sends the BYE due to the DTLS alerts because this works fine with a desktop SIP client. Must be something else that Twilio doesn't like, will investigate further.
that I do see in your log:[33m[WARN] [0m Sending ACK (route=sip:54.172.60.2:5060;lr;ftag=FNSSpt82ZF8pF)Isn't that the address that had to be contacted? Where was the SIP message sent instead?
If you believe Janus is doing something wrong here, can you share the whole SIP transactions so that we can look into them?
Yeah, that's what I meant by setting the route value to NULL, which would have done the same thing (manual ACK but without overriding Route). At this point not sure what we should do in the plugin. Some say we were doing the right thing, others that we should override that. I guess the easiest way to handle this is to make it configurable via API, e.g., in the first REGISTER.
Done in this commit here: https://github.com/meetecho/janus-gateway/commit/1a4bc02f812349baa61536e9ad912b88dfbc8e5fIt adds a new "autoack" boolean property to call, which is TRUE by default: setting FALSE has Janus look at the Record-Route header to force sending NACKs there.