Fix sytest CI
* Switch sytest-synapse to sytest-dinsic * Be sure to invalidate our caches properly! * Remove duplicate encryption state key definition * Remove old config option name in comment * Make dinsic the default in merge_base_branch
This commit is contained in:
@@ -12,7 +12,7 @@ if [[ -z $BUILDKITE_PULL_REQUEST_BASE_BRANCH ]]; then
|
||||
|
||||
# It probably hasn't had a PR opened yet. Since all PRs land on develop, we
|
||||
# can probably assume it's based on it and will be merged into it.
|
||||
GITBASE="develop"
|
||||
GITBASE="dinsic"
|
||||
else
|
||||
# Get the reference, using the GitHub API
|
||||
GITBASE=$BUILDKITE_PULL_REQUEST_BASE_BRANCH
|
||||
|
||||
@@ -252,7 +252,7 @@ steps:
|
||||
- "bash /bootstrap.sh synapse"
|
||||
plugins:
|
||||
- docker#v3.0.1:
|
||||
image: "matrixdotorg/sytest-synapse:py35"
|
||||
image: "matrixdotorg/sytest-synapse:dinsic"
|
||||
propagate-environment: true
|
||||
always-pull: true
|
||||
workdir: "/src"
|
||||
@@ -285,7 +285,7 @@ steps:
|
||||
- "bash /bootstrap.sh synapse"
|
||||
plugins:
|
||||
- docker#v3.0.1:
|
||||
image: "matrixdotorg/sytest-synapse:py35"
|
||||
image: "matrixdotorg/sytest-synapse:dinsic"
|
||||
propagate-environment: true
|
||||
always-pull: true
|
||||
workdir: "/src"
|
||||
@@ -322,7 +322,7 @@ steps:
|
||||
- "bash /bootstrap.sh synapse"
|
||||
plugins:
|
||||
- docker#v3.0.1:
|
||||
image: "matrixdotorg/sytest-synapse:py35"
|
||||
image: "matrixdotorg/sytest-synapse:dinsic"
|
||||
propagate-environment: true
|
||||
always-pull: true
|
||||
workdir: "/src"
|
||||
@@ -356,7 +356,7 @@ steps:
|
||||
- "bash /bootstrap.sh synapse"
|
||||
plugins:
|
||||
- docker#v3.0.1:
|
||||
image: "matrixdotorg/sytest-synapse:py38"
|
||||
image: "matrixdotorg/sytest-synapse:dinsic"
|
||||
propagate-environment: true
|
||||
always-pull: true
|
||||
workdir: "/src"
|
||||
@@ -393,7 +393,7 @@ steps:
|
||||
- "bash /bootstrap.sh synapse"
|
||||
plugins:
|
||||
- docker#v3.0.1:
|
||||
image: "matrixdotorg/sytest-synapse:py37"
|
||||
image: "matrixdotorg/sytest-synapse:dinsic"
|
||||
propagate-environment: true
|
||||
always-pull: true
|
||||
workdir: "/src"
|
||||
|
||||
@@ -85,7 +85,6 @@ class EventTypes(object):
|
||||
RoomAvatar = "m.room.avatar"
|
||||
RoomEncryption = "m.room.encryption"
|
||||
GuestAccess = "m.room.guest_access"
|
||||
Encryption = "m.room.encryption"
|
||||
|
||||
# These are used for validation
|
||||
Message = "m.room.message"
|
||||
|
||||
@@ -493,7 +493,7 @@ class BaseProfileHandler(BaseHandler):
|
||||
@defer.inlineCallbacks
|
||||
def check_profile_query_allowed(self, target_user, requester=None):
|
||||
"""Checks whether a profile query is allowed. If the
|
||||
'limit_profile_requests_to_known_users' config flag is set to True and a
|
||||
'require_auth_for_profile_requests' config flag is set to True and a
|
||||
'requester' is provided, the query is only allowed if the two users
|
||||
share a room.
|
||||
|
||||
|
||||
@@ -875,7 +875,7 @@ class RoomCreationHandler(BaseHandler):
|
||||
|
||||
if "encryption_alg" in config:
|
||||
yield send(
|
||||
etype=EventTypes.Encryption,
|
||||
etype=EventTypes.RoomEncryption,
|
||||
state_key="",
|
||||
content={"algorithm": config["encryption_alg"]},
|
||||
)
|
||||
|
||||
@@ -126,6 +126,9 @@ class ProfileWorkerStore(SQLBaseStore):
|
||||
)
|
||||
|
||||
def set_profile_displayname(self, user_localpart, new_displayname, batchnum):
|
||||
# Invalidate the read cache for this user
|
||||
self.get_profile_displayname.invalidate((user_localpart,))
|
||||
|
||||
return self.db.simple_upsert(
|
||||
table="profiles",
|
||||
keyvalues={"user_id": user_localpart},
|
||||
@@ -135,6 +138,9 @@ class ProfileWorkerStore(SQLBaseStore):
|
||||
)
|
||||
|
||||
def set_profile_avatar_url(self, user_localpart, new_avatar_url, batchnum):
|
||||
# Invalidate the read cache for this user
|
||||
self.get_profile_avatar_url.invalidate((user_localpart,))
|
||||
|
||||
return self.db.simple_upsert(
|
||||
table="profiles",
|
||||
keyvalues={"user_id": user_localpart},
|
||||
|
||||
Reference in New Issue
Block a user