**** UPDATE 6/27/2015: As of the App Catalog Shutdown, this method will no longer work!! ****

With the HP App Catalog shutting down soon, now is the time to grab offline copies of any of the apps you’ve installed or purchased.

This method will use your devices’ existing credentials to grab a list of all the apps you’ve purchased/installed, and download each one from HPs servers before they are shutdown.

First, we need to get a few things off of our WebOS device.  You will need the Preware app “Impostah” in order to complete these steps.  Go to each relevant page and email the info to yourself.

  1. Open Impostah
    01_impostah_main
  2. Tap “Palm Profile”
  3. Tap “Show Palm Profile”
  4. Tap the Impostah menu (upper left) and choose “Email”
    impostah_email1
  5. Put in your email address and hit “Send”
    email
  6. Go back to Impostah home
  7. Repeat email steps (4 and 5) for “Device Profile -> Show Device Profile”
  8. Repeat email steps (4 and 5) for “App Catalog -> Show Installed Apps”

Now, we’ve gathered the required information, we’ll need to get the script ready to run on our own computer.

  1. Dowload the script from here: https://github.com/PrplHaz4/webos-ipk-dump/blob/1.2/webos-ipk-dump.zip?raw=true
  2. Open the downloaded webos-ipk-dump.zip file
  3. Extract the files to c:\temp
    extract_zip extract_zip2
  4. You should now see webos-ipk-dump.exe inside  c:\temp\webos-ipk-dump directory
  5. Double-click “webos-ipk-dump” folder to see its contents (should contain a .exe file)
  6. Right click on a blank space in the folder and choose “New -> Text Document”
  7. Rename “New Text Document.txt” to ipkdump.json (click “yes” to change the file name extension)
    rename_text_file
  8. Find the email you sent yourself earlier with “Installed Apps”
  9. Copy the entire email BODY (from the first “{” to the last “}”)
  10. Paste it into the blank Notepad document
  11. Notepad -> File -> Save As…
  12. Give it a name “ipkdump.json
  13. Select Save as type:  All Files (*.*)
  14. Encoding: UTF-8 (THIS IS VERY IMPORTANT!)
  15. Save
    save_text_file

Everything is all set up, and we are ready to run the script!

  1. Double-click “webos-ipk-dump.exe”
  2. If prompted with a Windows protection dialog, click “More Info -> Run Anyway”
    win_protected2
  3. You should see a command line application come up
  4. Go back to the email you sent called “Palm Profile”
  5. Find and copy the “token” value to your clipboard (just the long string of numbers)
    "token": "NXXX7A12XXXA1432XXX7D0XXXF3EXXXDB",
  6. Paste it into the script when you’re asked for “Palm Profile Token” (hit enter)
    command_line_paste
  7. Go back to the last email you sent called “Device Profile”
  8. Find and copy the “nduId” value to your clipboard (for devices with cellular radios – Pre, Veer, 4G…etc – use the IMEI instead of nduId)
    "nduId": "7xxx47axxxcd3xxx2a6exxxa20dxxxb4a3cxxx45",
  9. Paste it into the script when you’re asked for “Device Profile nduId” (hit enter)
  10. Type ipkdump.json for the “Installed Apps json” (hit enter)
  11. Your downloads show start immediately – some apps are larger than others so may take a long time to download

You’re done.  You can find the your downloaded apps in the folder:

c:\temp\webos-ipk-dump\ipk

** If you cancel the processing for whatever reason, be sure to delete the last downloaded file, as it will be an incomplete download!

finished

Notes:

Windows Notepad file encoding (or JSON/Python)
ANSI fails
Unicode works (UTF-16)
Unicode Big-endian works (UTF-16)
UTF-8 works (UTF-8-SIG) *preferred