After updating to WCS 5.2.1109 and checking the demo's in the admin console to see if everything works, a ghost session is left on the server which I cannot kill with /rest-api/connection/terminate
Session info is limited to the following:
{
"appKey": "defaultApp",
"sessionId": "xxxxx-xxxx-xxxx-xxxx-xxxxxxxxx",
"sipRegisterRequired": false,
"sipLogin": "xxxxxxxxxxxx",
"sipPort": 0,
"width": 0,
"height": 0,
"supportedResolutions": "0x0",
"useDTLS": true,
"useWsTunnel": false,
"useWsTunnelPacketization2": false,
"msePacketizationVersion": 1,
"useBase64BinaryEncoding": false,
"mediaProviders": [
"WebRTC"
],
"authToken": "xxxxxx-xxxx-xxxxx-xxxx-xxxxx",
"keepAlive": false
}
Normal sessions also contain an authtoken with IP, client info, origin and other info.
This session does not time out, nor can it be terminated with the rest api (returns normal HTTP 200 code with empty response).
This is the case on both EC2 instances that have been successfully updated to 1109 version yesterday. Every other session is terminated normally.
Session info is limited to the following:
{
"appKey": "defaultApp",
"sessionId": "xxxxx-xxxx-xxxx-xxxx-xxxxxxxxx",
"sipRegisterRequired": false,
"sipLogin": "xxxxxxxxxxxx",
"sipPort": 0,
"width": 0,
"height": 0,
"supportedResolutions": "0x0",
"useDTLS": true,
"useWsTunnel": false,
"useWsTunnelPacketization2": false,
"msePacketizationVersion": 1,
"useBase64BinaryEncoding": false,
"mediaProviders": [
"WebRTC"
],
"authToken": "xxxxxx-xxxx-xxxxx-xxxx-xxxxx",
"keepAlive": false
}
Normal sessions also contain an authtoken with IP, client info, origin and other info.
This session does not time out, nor can it be terminated with the rest api (returns normal HTTP 200 code with empty response).
This is the case on both EC2 instances that have been successfully updated to 1109 version yesterday. Every other session is terminated normally.