@@ -36,7 +36,7 @@ func (asuite *AclTestSuite) TestPasswordReturn() {
36
36
hc , err := asuite .dc .HTTPClient ()
37
37
require .NoError (t , err )
38
38
require .NoError (t , hc .LoginIntoNamespace (dgraphapi .DefaultUser ,
39
- dgraphapi .DefaultPassword , x .GalaxyNamespace ))
39
+ dgraphapi .DefaultPassword , x .RootNamespace ))
40
40
query := dgraphapi.GraphQLParams {
41
41
Query : `
42
42
query {
@@ -56,18 +56,18 @@ func (asuite *AclTestSuite) TestHealthForAcl() {
56
56
hc , err := asuite .dc .HTTPClient ()
57
57
require .NoError (t , err )
58
58
require .NoError (t , hc .LoginIntoNamespace (dgraphapi .DefaultUser ,
59
- dgraphapi .DefaultPassword , x .GalaxyNamespace ))
59
+ dgraphapi .DefaultPassword , x .RootNamespace ))
60
60
61
61
resetUser (t , hc )
62
- require .NoError (t , hc .LoginIntoNamespace (userid , userpassword , x .GalaxyNamespace ))
62
+ require .NoError (t , hc .LoginIntoNamespace (userid , userpassword , x .RootNamespace ))
63
63
gqlResp , err := hc .HealthForInstance ()
64
64
require .Error (t , err )
65
65
// assert errors for non-guardians
66
66
assertNonGuardianFailure (t , "health" , false , gqlResp , err )
67
67
68
68
// assert data for guardians
69
69
require .NoError (t , hc .LoginIntoNamespace (dgraphapi .DefaultUser ,
70
- dgraphapi .DefaultPassword , x .GalaxyNamespace ))
70
+ dgraphapi .DefaultPassword , x .RootNamespace ))
71
71
72
72
resp , err := hc .HealthForInstance ()
73
73
require .NoError (t , err , "health request failed" )
@@ -313,10 +313,10 @@ func (asuite *AclTestSuite) TestGuardianOnlyAccessForAdminEndpoints() {
313
313
hc , err := asuite .dc .HTTPClient ()
314
314
require .NoError (t , err )
315
315
require .NoError (t , hc .LoginIntoNamespace (dgraphapi .DefaultUser ,
316
- dgraphapi .DefaultPassword , x .GalaxyNamespace ))
316
+ dgraphapi .DefaultPassword , x .RootNamespace ))
317
317
318
318
resetUser (t , hc )
319
- require .NoError (t , hc .LoginIntoNamespace (userid , userpassword , x .GalaxyNamespace ))
319
+ require .NoError (t , hc .LoginIntoNamespace (userid , userpassword , x .RootNamespace ))
320
320
gqlResp , err := hc .RunGraphqlQuery (params , true )
321
321
require .Error (t , err )
322
322
// assert ACL error for non-guardians
@@ -325,7 +325,7 @@ func (asuite *AclTestSuite) TestGuardianOnlyAccessForAdminEndpoints() {
325
325
// for guardians, assert non-ACL error or success
326
326
if tcase .testGuardianAccess {
327
327
require .NoError (t , hc .LoginIntoNamespace (dgraphapi .DefaultUser ,
328
- dgraphapi .DefaultPassword , x .GalaxyNamespace ))
328
+ dgraphapi .DefaultPassword , x .RootNamespace ))
329
329
330
330
resp , err := hc .RunGraphqlQuery (params , true )
331
331
if tcase .guardianErr == "" {
@@ -352,26 +352,26 @@ func (asuite *AclTestSuite) TestFailedLogin() {
352
352
require .NoError (t , err )
353
353
defer cleanup ()
354
354
require .NoError (t , gc .LoginIntoNamespace (ctx , dgraphapi .DefaultUser ,
355
- dgraphapi .DefaultPassword , x .GalaxyNamespace ))
355
+ dgraphapi .DefaultPassword , x .RootNamespace ))
356
356
357
357
hc , err := asuite .dc .HTTPClient ()
358
358
require .NoError (t , err )
359
359
require .NoError (t , hc .LoginIntoNamespace (dgraphapi .DefaultUser ,
360
- dgraphapi .DefaultPassword , x .GalaxyNamespace ))
360
+ dgraphapi .DefaultPassword , x .RootNamespace ))
361
361
362
362
require .NoError (t , gc .DropAll ())
363
363
364
364
client , _ , err := asuite .dc .Client ()
365
365
require .NoError (t , err )
366
366
367
367
// User is not present
368
- err = client .LoginIntoNamespace (ctx , userid , "simplepassword" , x .GalaxyNamespace )
368
+ err = client .LoginIntoNamespace (ctx , userid , "simplepassword" , x .RootNamespace )
369
369
require .Error (t , err )
370
370
require .Contains (t , err .Error (), x .ErrorInvalidLogin .Error ())
371
371
372
372
resetUser (t , hc )
373
373
// User is present
374
- require .Error (t , client .LoginIntoNamespace (ctx , userid , "randomstring" , x .GalaxyNamespace ))
374
+ require .Error (t , client .LoginIntoNamespace (ctx , userid , "randomstring" , x .RootNamespace ))
375
375
require .Contains (t , err .Error (), x .ErrorInvalidLogin .Error ())
376
376
}
377
377
@@ -384,7 +384,7 @@ func (asuite *AclTestSuite) TestWrongPermission() {
384
384
require .NoError (t , err )
385
385
defer cleanup ()
386
386
require .NoError (t , gc .LoginIntoNamespace (ctx , dgraphapi .DefaultUser ,
387
- dgraphapi .DefaultPassword , x .GalaxyNamespace ))
387
+ dgraphapi .DefaultPassword , x .RootNamespace ))
388
388
require .NoError (t , gc .DropAll ())
389
389
390
390
mu := & api.Mutation {SetNquads : []byte (`
@@ -418,7 +418,7 @@ func (asuite *AclTestSuite) TestACLNamespaceEdge() {
418
418
require .NoError (t , err )
419
419
defer cleanup ()
420
420
require .NoError (t , gc .LoginIntoNamespace (context .Background (),
421
- dgraphapi .DefaultUser , dgraphapi .DefaultPassword , x .GalaxyNamespace ))
421
+ dgraphapi .DefaultUser , dgraphapi .DefaultPassword , x .RootNamespace ))
422
422
423
423
json := `
424
424
{
@@ -449,7 +449,7 @@ func (asuite *AclTestSuite) TestACLDuplicateGrootUser() {
449
449
require .NoError (t , err )
450
450
defer cleanup ()
451
451
require .NoError (t , gc .LoginIntoNamespace (context .Background (),
452
- dgraphapi .DefaultUser , dgraphapi .DefaultPassword , x .GalaxyNamespace ))
452
+ dgraphapi .DefaultUser , dgraphapi .DefaultPassword , x .RootNamespace ))
453
453
454
454
rdfs := `_:a <dgraph.xid> "groot" .
455
455
_:a <dgraph.type> "dgraph.type.User" .`
0 commit comments