@@ -225,9 +225,10 @@ def test_backfill_with_many_backward_extremities(self) -> None:
225225
226226 # we need a user on the remote server to be a member, so that we can send
227227 # extremity-causing events.
228+ remote_server_user_id = f"@user:{ self .OTHER_SERVER_NAME } "
228229 self .get_success (
229230 event_injection .inject_member_event (
230- self .hs , room_id , f"@user: { self . OTHER_SERVER_NAME } " , "join"
231+ self .hs , room_id , remote_server_user_id , "join"
231232 )
232233 )
233234
@@ -247,6 +248,12 @@ def test_backfill_with_many_backward_extremities(self) -> None:
247248 # create more than is 5 which corresponds to the number of backward
248249 # extremities we slice off in `_maybe_backfill_inner`
249250 federation_event_handler = self .hs .get_federation_event_handler ()
251+ auth_events = [
252+ ev
253+ for ev in current_state
254+ if (ev .type , ev .state_key )
255+ in {("m.room.create" , "" ), ("m.room.member" , remote_server_user_id )}
256+ ]
250257 for _ in range (0 , 8 ):
251258 event = make_event_from_dict (
252259 self .add_hashes_and_signatures (
@@ -258,15 +265,14 @@ def test_backfill_with_many_backward_extremities(self) -> None:
258265 "body" : "message connected to fake event" ,
259266 },
260267 "room_id" : room_id ,
261- "sender" : f"@user: { self . OTHER_SERVER_NAME } " ,
268+ "sender" : remote_server_user_id ,
262269 "prev_events" : [
263270 ev1 .event_id ,
264271 # We're creating an backward extremity each time thanks
265272 # to this fake event
266273 generate_fake_event_id (),
267274 ],
268- # lazy: *everything* is an auth event
269- "auth_events" : [ev .event_id for ev in current_state ],
275+ "auth_events" : [ev .event_id for ev in auth_events ],
270276 "depth" : ev1 .depth + 1 ,
271277 },
272278 room_version ,
0 commit comments