diff --git a/packages/snjs/mocha/lib/VaultsContext.js b/packages/snjs/mocha/lib/VaultsContext.js index 17315d10d..0542a7f10 100644 --- a/packages/snjs/mocha/lib/VaultsContext.js +++ b/packages/snjs/mocha/lib/VaultsContext.js @@ -65,15 +65,10 @@ export class VaultsContext extends AppContext { } /** - * Run a request to keep refresh token from expiring due to long bouts of inactivity for contact context + * Keep refresh token from expiring due to long bouts of inactivity for contact context * while main context changes password. Tests have a refresh token age of 10s typically, and changing password * on CI environment may be time consuming. */ - async runAnyRequestToPreventRefreshTokenFromExpiring() { - await this.asymmetric.getInboundMessages() - } - - /** Used for long running tests to avoid 498 responses */ async forceRefreshSession() { await this.application.http.refreshSession() } diff --git a/packages/snjs/mocha/vaults/keypair-change.test.js b/packages/snjs/mocha/vaults/keypair-change.test.js index 22249fa9f..323e17160 100644 --- a/packages/snjs/mocha/vaults/keypair-change.test.js +++ b/packages/snjs/mocha/vaults/keypair-change.test.js @@ -39,19 +39,19 @@ describe('keypair change', function () { publicKeyChain.push(context.publicKey) signingPublicKeyChain.push(context.signingPublicKey) - await contactContext.runAnyRequestToPreventRefreshTokenFromExpiring() + await contactContext.forceRefreshSession() await context.changePassword('new_password-2') publicKeyChain.push(context.publicKey) signingPublicKeyChain.push(context.signingPublicKey) - await contactContext.runAnyRequestToPreventRefreshTokenFromExpiring() + await contactContext.forceRefreshSession() await context.changePassword('new_password-3') publicKeyChain.push(context.publicKey) signingPublicKeyChain.push(context.signingPublicKey) - await contactContext.runAnyRequestToPreventRefreshTokenFromExpiring() + await contactContext.forceRefreshSession() await context.changeNoteTitleAndSync(note, 'new title') @@ -74,7 +74,7 @@ describe('keypair change', function () { expect(receivedNote.signatureData.result.passes).to.be.true await deinitContactContext() - }).timeout(Factory.ThirtySecondTimeout) + }).timeout(Factory.SixtySecondTimeout) it('should not trust messages sent with previous key pair', async () => { const { sharedVault, contactContext, deinitContactContext } =