0.0
No commit activity in last 3 years
No release in over 3 years
Extract secrets from hipchat configuration files
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
2025
 Dependencies

Development

Runtime

>= 0
 Project Readme

hipchat-secrets

Decode the weakly crypted password from the hipchat configuration file. The API allows decoding/encoding but the wrapper script only decodes passwords. See the specs, if you care.

Prerequsite: Find the HipChat Secret

  1. Discover Hipchat's Secret Hashing key. You're on your own for this.
  2. Put the secret in ~/.hipchat_secret or in your environment, HIPCHAT_SECRET
  3. Profit!

Example Usage

Automagical:

$ hipchat-secrets
Analyzing HipChat config: /Users/xxx/Library/Preferences/com.hipchat.xxx/Local Store/hipchatConfig.json

xxx@xxx.com's password is xxx

With non-standard config file location:

$ hipchat-secrets /some/other/file/that/was/a/hipchatConfig.json
Analyzing HipChat config: /some/other/file/that/was/a/hipchatConfig.json

xxx@xxx.com's password is xxx

With secret from environment:

$ HIPCHAT_SECRET=IFoundTheSecret hipchat-secrets

Windows:

> env HIPCHAT_SECRET=IFoundTheSecret hipchat-secrets

Tested against

  • 1.8.7-p371
  • 1.9.2-p320
  • 1.9.3-p374
  • 2.0.0-rc1
  • jruby-1.7.0
  • jruby-1.7.2

Contributing

  1. Fork it
  2. Create your feature branch (git checkout -b my-new-feature)
  3. Commit your changes (git commit -am 'Add some feature')
  4. Push to the branch (git push origin my-new-feature)
  5. Create new Pull Request

Come on Atlassian

Seriously. Your password encryption is hardly better than plaintext. Use real encryption to protect secrets.