Steps to reproduce:
1) create same identiity say "j", in 2 clients.
2) send request authorization from 1 client to another.
3) on the other client, block this request. Now delete this contact from the contact list.
The identity in the second client becomes a contact.
Steps to reproduce: 1) create same identiity say "j", in 2 clients. 2) send request authorization from 1 client to another. 3) on the other client, block this request. Now delete this contact from the contact list.
The identity in the second client becomes a contact.
Tested in Debian and is always reproducible.