0.0
No commit activity in last 3 years
No release in over 3 years
Extract secrets from hipchat configuration files
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
 Dependencies

Development

Runtime

>= 0
 Project Readme

hipchat-secrets

Decode the weakly crypted password from the hipchat configuration file. The API allows decoding/encoding but the wrapper script only decodes passwords. See the specs, if you care.

Prerequsite: Find the HipChat Secret

  1. Discover Hipchat's Secret Hashing key. You're on your own for this.
  2. Put the secret in ~/.hipchat_secret or in your environment, HIPCHAT_SECRET
  3. …
  4. Profit!

Example Usage

Automagical:

$ hipchat-secrets
Analyzing HipChat config: /Users/xxx/Library/Preferences/com.hipchat.xxx/Local Store/hipchatConfig.json

xxx@xxx.com's password is xxx

With non-standard config file location:

$ hipchat-secrets /some/other/file/that/was/a/hipchatConfig.json
Analyzing HipChat config: /some/other/file/that/was/a/hipchatConfig.json

xxx@xxx.com's password is xxx

With secret from environment:

$ HIPCHAT_SECRET=IFoundTheSecret hipchat-secrets

Windows:

> env HIPCHAT_SECRET=IFoundTheSecret hipchat-secrets

Tested against

  • 1.8.7-p371
  • 1.9.2-p320
  • 1.9.3-p374
  • 2.0.0-rc1
  • jruby-1.7.0
  • jruby-1.7.2

Contributing

  1. Fork it
  2. Create your feature branch (git checkout -b my-new-feature)
  3. Commit your changes (git commit -am 'Add some feature')
  4. Push to the branch (git push origin my-new-feature)
  5. Create new Pull Request

Come on Atlassian

Seriously. Your password encryption is hardly better than plaintext. Use real encryption to protect secrets.