1
0

Fix sytest CI

* Switch sytest-synapse to sytest-dinsic
* Be sure to invalidate our caches properly!
* Remove duplicate encryption state key definition
* Remove old config option name in comment
* Make dinsic the default in merge_base_branch
This commit is contained in:
Andrew Morgan
2020-05-15 15:14:33 +01:00
parent 6faa6521cb
commit 68f46e07f2
6 changed files with 14 additions and 9 deletions

View File

@@ -12,7 +12,7 @@ if [[ -z $BUILDKITE_PULL_REQUEST_BASE_BRANCH ]]; then
# It probably hasn't had a PR opened yet. Since all PRs land on develop, we
# can probably assume it's based on it and will be merged into it.
GITBASE="develop"
GITBASE="dinsic"
else
# Get the reference, using the GitHub API
GITBASE=$BUILDKITE_PULL_REQUEST_BASE_BRANCH

View File

@@ -252,7 +252,7 @@ steps:
- "bash /bootstrap.sh synapse"
plugins:
- docker#v3.0.1:
image: "matrixdotorg/sytest-synapse:py35"
image: "matrixdotorg/sytest-synapse:dinsic"
propagate-environment: true
always-pull: true
workdir: "/src"
@@ -285,7 +285,7 @@ steps:
- "bash /bootstrap.sh synapse"
plugins:
- docker#v3.0.1:
image: "matrixdotorg/sytest-synapse:py35"
image: "matrixdotorg/sytest-synapse:dinsic"
propagate-environment: true
always-pull: true
workdir: "/src"
@@ -322,7 +322,7 @@ steps:
- "bash /bootstrap.sh synapse"
plugins:
- docker#v3.0.1:
image: "matrixdotorg/sytest-synapse:py35"
image: "matrixdotorg/sytest-synapse:dinsic"
propagate-environment: true
always-pull: true
workdir: "/src"
@@ -356,7 +356,7 @@ steps:
- "bash /bootstrap.sh synapse"
plugins:
- docker#v3.0.1:
image: "matrixdotorg/sytest-synapse:py38"
image: "matrixdotorg/sytest-synapse:dinsic"
propagate-environment: true
always-pull: true
workdir: "/src"
@@ -393,7 +393,7 @@ steps:
- "bash /bootstrap.sh synapse"
plugins:
- docker#v3.0.1:
image: "matrixdotorg/sytest-synapse:py37"
image: "matrixdotorg/sytest-synapse:dinsic"
propagate-environment: true
always-pull: true
workdir: "/src"

View File

@@ -85,7 +85,6 @@ class EventTypes(object):
RoomAvatar = "m.room.avatar"
RoomEncryption = "m.room.encryption"
GuestAccess = "m.room.guest_access"
Encryption = "m.room.encryption"
# These are used for validation
Message = "m.room.message"

View File

@@ -493,7 +493,7 @@ class BaseProfileHandler(BaseHandler):
@defer.inlineCallbacks
def check_profile_query_allowed(self, target_user, requester=None):
"""Checks whether a profile query is allowed. If the
'limit_profile_requests_to_known_users' config flag is set to True and a
'require_auth_for_profile_requests' config flag is set to True and a
'requester' is provided, the query is only allowed if the two users
share a room.

View File

@@ -875,7 +875,7 @@ class RoomCreationHandler(BaseHandler):
if "encryption_alg" in config:
yield send(
etype=EventTypes.Encryption,
etype=EventTypes.RoomEncryption,
state_key="",
content={"algorithm": config["encryption_alg"]},
)

View File

@@ -126,6 +126,9 @@ class ProfileWorkerStore(SQLBaseStore):
)
def set_profile_displayname(self, user_localpart, new_displayname, batchnum):
# Invalidate the read cache for this user
self.get_profile_displayname.invalidate((user_localpart,))
return self.db.simple_upsert(
table="profiles",
keyvalues={"user_id": user_localpart},
@@ -135,6 +138,9 @@ class ProfileWorkerStore(SQLBaseStore):
)
def set_profile_avatar_url(self, user_localpart, new_avatar_url, batchnum):
# Invalidate the read cache for this user
self.get_profile_avatar_url.invalidate((user_localpart,))
return self.db.simple_upsert(
table="profiles",
keyvalues={"user_id": user_localpart},