Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Element-R: User verification: janky behaviour when the client is restarted with a verification in flight (or when one is recently cancelled/completed?) #26653

Open
Tracked by #26258
richvdh opened this issue Nov 27, 2023 · 0 comments
Labels
A-Element-R Issues affecting the port of Element's crypto layer to Rust O-Uncommon Most users are unlikely to come across this or unexpected workflow S-Major Severely degrades major functionality or product features, with no satisfactory workaround T-Defect Z-Labs

Comments

@richvdh
Copy link
Member

richvdh commented Nov 27, 2023

Split out of #26258.

To test more.

@richvdh richvdh changed the title I think there is some janky behaviour when the client is restarted with a verification in flight (or when one is recently cancelled/completed?). To test more. Element-R: User verification: janky behaviour when the client is restarted with a verification in flight (or when one is recently cancelled/completed?) Nov 27, 2023
@richvdh richvdh added T-Defect A-Element-R Issues affecting the port of Element's crypto layer to Rust labels Nov 27, 2023
@weeman1337 weeman1337 added S-Major Severely degrades major functionality or product features, with no satisfactory workaround O-Uncommon Most users are unlikely to come across this or unexpected workflow labels Nov 29, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
A-Element-R Issues affecting the port of Element's crypto layer to Rust O-Uncommon Most users are unlikely to come across this or unexpected workflow S-Major Severely degrades major functionality or product features, with no satisfactory workaround T-Defect Z-Labs
Projects
None yet
Development

No branches or pull requests

2 participants