refactor: rename project from dgray.io to kashilo.com

This commit is contained in:
2026-02-10 18:43:49 +01:00
parent 4e77ce92f3
commit 9069404942
60 changed files with 260 additions and 260 deletions

View File

@@ -136,8 +136,8 @@ describe('DirectusClient token management', () => {
// Cleanup
client.clearTokens()
sessionStorage.removeItem('dgray_auth')
localStorage.removeItem('dgray_auth')
sessionStorage.removeItem('kashilo_auth')
localStorage.removeItem('kashilo_auth')
})
test('isAuthenticated returns true with valid token', () => {
@@ -145,8 +145,8 @@ describe('DirectusClient token management', () => {
assertTrue(client.isAuthenticated())
client.clearTokens()
sessionStorage.removeItem('dgray_auth')
localStorage.removeItem('dgray_auth')
sessionStorage.removeItem('kashilo_auth')
localStorage.removeItem('kashilo_auth')
})
test('isAuthenticated returns false when token expired', () => {
@@ -163,22 +163,22 @@ describe('DirectusClient token management', () => {
refreshToken: 'stored-refresh',
expiry: Date.now() + 600000
})
sessionStorage.setItem('dgray_auth', authData)
sessionStorage.setItem('kashilo_auth', authData)
client.loadTokens()
assertEquals(client.accessToken, 'stored-access')
assertEquals(client.refreshToken, 'stored-refresh')
client.clearTokens()
sessionStorage.removeItem('dgray_auth')
sessionStorage.removeItem('kashilo_auth')
})
test('loadTokens clears on invalid JSON', () => {
sessionStorage.setItem('dgray_auth', 'not-json')
sessionStorage.setItem('kashilo_auth', 'not-json')
client.loadTokens()
assertEquals(client.accessToken, null)
sessionStorage.removeItem('dgray_auth')
sessionStorage.removeItem('kashilo_auth')
})
})

View File

@@ -26,8 +26,8 @@ describe('CryptoService', () => {
})
asyncTest('unlock generates keypair and stores encrypted', async () => {
localStorage.removeItem('dgray_keypair')
localStorage.removeItem('dgray_keypair_salt')
localStorage.removeItem('kashilo_keypair')
localStorage.removeItem('kashilo_keypair_salt')
await cryptoService.unlock(TEST_UUID)
@@ -35,7 +35,7 @@ describe('CryptoService', () => {
assertTrue(cryptoService.getPublicKey() !== null)
assertTrue(cryptoService.getPublicKey().length > 10)
const stored = JSON.parse(localStorage.getItem('dgray_keypair'))
const stored = JSON.parse(localStorage.getItem('kashilo_keypair'))
assertTrue(stored.ct !== undefined, 'stored keypair should be encrypted (has ct)')
assertTrue(stored.iv !== undefined, 'stored keypair should be encrypted (has iv)')
assertFalse(stored.publicKey !== undefined, 'stored keypair should NOT have plaintext publicKey')
@@ -77,7 +77,7 @@ describe('CryptoService', () => {
cryptoService.lock()
assertEquals(cryptoService.keyPair, null)
assertTrue(localStorage.getItem('dgray_keypair') !== null)
assertTrue(localStorage.getItem('kashilo_keypair') !== null)
})
asyncTest('destroyKeyPair clears memory and storage', async () => {
@@ -85,8 +85,8 @@ describe('CryptoService', () => {
cryptoService.destroyKeyPair()
assertEquals(cryptoService.keyPair, null)
assertEquals(localStorage.getItem('dgray_keypair'), null)
assertEquals(localStorage.getItem('dgray_keypair_salt'), null)
assertEquals(localStorage.getItem('kashilo_keypair'), null)
assertEquals(localStorage.getItem('kashilo_keypair_salt'), null)
})
asyncTest('migrates plaintext keypair to encrypted on unlock', async () => {
@@ -96,14 +96,14 @@ describe('CryptoService', () => {
publicKey: cryptoService.naclUtil.encodeBase64(kp.publicKey),
secretKey: cryptoService.naclUtil.encodeBase64(kp.secretKey)
}
localStorage.setItem('dgray_keypair', JSON.stringify(plaintext))
localStorage.removeItem('dgray_keypair_salt')
localStorage.setItem('kashilo_keypair', JSON.stringify(plaintext))
localStorage.removeItem('kashilo_keypair_salt')
await cryptoService.unlock(TEST_UUID)
assertEquals(cryptoService.getPublicKey(), plaintext.publicKey)
const stored = JSON.parse(localStorage.getItem('dgray_keypair'))
const stored = JSON.parse(localStorage.getItem('kashilo_keypair'))
assertTrue(stored.ct !== undefined, 'should be migrated to encrypted format')
assertTrue(stored.iv !== undefined)
})
@@ -255,7 +255,7 @@ describe('ConversationsService.hashPublicKey', () => {
describe('Per-listing keypair management', () => {
asyncTest('generateListingKeyPair creates and stores keypair', async () => {
localStorage.removeItem('dgray_listing_keys')
localStorage.removeItem('kashilo_listing_keys')
await cryptoService.unlock(TEST_UUID)
const publicKey = await cryptoService.generateListingKeyPair('test-listing-1')
@@ -326,7 +326,7 @@ describe('Per-listing keypair management', () => {
await cryptoService.generateListingKeyPair('temp-listing')
cryptoService.destroyKeyPair()
assertEquals(localStorage.getItem('dgray_listing_keys'), null)
assertEquals(localStorage.getItem('kashilo_listing_keys'), null)
})
})

View File

@@ -3,7 +3,7 @@
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>dgray.io - Tests</title>
<title>kashilo.com - Tests</title>
<style>
:root {
--color-bg: #1a1a1a;
@@ -88,7 +88,7 @@
</head>
<body>
<div id="results">
<h1>🧪 dgray.io Test Suite</h1>
<h1>🧪 kashilo.com Test Suite</h1>
<p class="loading">Running tests...</p>
</div>
@@ -118,7 +118,7 @@
renderResults(container)
} catch (error) {
container.innerHTML = `
<h1>🧪 dgray.io Test Suite</h1>
<h1>🧪 kashilo.com Test Suite</h1>
<p style="color: var(--color-failed)">
Error loading tests: ${error.message}
</p>

View File

@@ -82,7 +82,7 @@ describe('getFileUrl', () => {
test('builds basic URL without options', () => {
const url = getFileUrl('abc-123')
assertEquals(url, 'https://api.dgray.io/assets/abc-123')
assertEquals(url, 'https://api.kashilo.com/assets/abc-123')
})
test('appends width parameter', () => {