From d99a22d68d687c02ca50c175960fee17b56abf4f Mon Sep 17 00:00:00 2001 From: David Baker Date: Fri, 16 Nov 2018 14:46:18 +0000 Subject: [PATCH] Update to new API Also fix test & remove debug logging from test --- spec/unit/crypto.spec.js | 3 +-- src/crypto/index.js | 2 +- 2 files changed, 2 insertions(+), 3 deletions(-) diff --git a/spec/unit/crypto.spec.js b/spec/unit/crypto.spec.js index 47d7d2d67..e3cabbac6 100644 --- a/spec/unit/crypto.spec.js +++ b/spec/unit/crypto.spec.js @@ -69,6 +69,7 @@ describe("Crypto", function() { mockBaseApis = { sendToDevice: expect.createSpy(), + getKeyBackupVersion: expect.createSpy(), }; mockRoomList = {}; @@ -111,9 +112,7 @@ describe("Crypto", function() { getSender: expect.createSpy().andReturn('@bob:home.server'), }); - console.log("waiting"); await prom; - console.log("done"); }); }); }); diff --git a/src/crypto/index.js b/src/crypto/index.js index 89c152f5b..bcc5105e7 100644 --- a/src/crypto/index.js +++ b/src/crypto/index.js @@ -1459,7 +1459,7 @@ Crypto.prototype._onToDeviceBadEncrypted = async function(event) { // on a current session. // Note that an undecryptable message from another device could easily be spoofed - // is there anything we can do to mitigate this? - const device = this._deviceList.getDeviceByIdentityKey(sender, algorithm, deviceKey); + const device = this._deviceList.getDeviceByIdentityKey(algorithm, deviceKey); const devicesByUser = {}; devicesByUser[sender] = [device]; await olmlib.ensureOlmSessionsForDevices(