IBM iNotes Javascript code is obfuscated and store in Forms9.nsf, this obfuscated JS code is not convenient for customer to understand when they want to customize. This tool is implemented using Python, the work mechanism is to beautify the JS code through parsing obfuscated code, then map some key word to meaningful word that iNotes source code use, the map file ObfuscationList.txt is delivered in Forms9.nsf file. So for later release of iNotes, end user just get the ObfuscationList.txt file from the latest Form##.nsf and replace it in this tool.

 

Used 3rd party tool:

 

1. Python 2.7

2. wxPython 2.8

3. py2exe-0.6.9.win32-py2.7.exe

 

Guide:

 

1. Unzip the file

2. Go to source\dist folder

3. Execute inotes_unobfuscation.exe

 

File Introduction:

 

Source file: sourcecode\inotes_unobfuscation.pyw, unobfuscationlib.py, setup.py

Build creation file: setup.bat

iNotes 9 map file: ObfuscationList_v9.txt

Build folder: sourcecode\dist

Sample JS file: sourcecode\dist\src\sample.js

 

Shu Qiang Li is the developer, Niklas Heidloff only committer.