diff --git a/src/main/java/com/epam/reportportal/auth/integration/ldap/LdapAuthProvider.java b/src/main/java/com/epam/reportportal/auth/integration/ldap/LdapAuthProvider.java index 4a84cb81..69c0621e 100644 --- a/src/main/java/com/epam/reportportal/auth/integration/ldap/LdapAuthProvider.java +++ b/src/main/java/com/epam/reportportal/auth/integration/ldap/LdapAuthProvider.java @@ -98,20 +98,21 @@ protected AuthenticationProvider getDelegate() { LdapParameter.GROUP_SEARCH_BASE.getParameter(integration).ifPresent(builder::groupSearchBase); LdapParameter.USER_SEARCH_FILTER.getParameter(integration).ifPresent(builder::userSearchFilter); - LdapParameter.PASSWORD_ENCODER_TYPE.getParameter(integration).ifPresent(it -> { + //TODO: temporary solution for working with encoded passwords +/* LdapParameter.PASSWORD_ENCODER_TYPE.getParameter(integration).ifPresent(it -> { LdapAuthenticationProviderConfigurer .PasswordCompareConfigurer passwordCompareConfigurer = builder.passwordCompare(); LdapParameter.PASSWORD_ATTRIBUTE.getParameter(integration) .ifPresent(passwordCompareConfigurer::passwordAttribute); - /* + *//* * DIRTY HACK. If LDAP password has salt, ldaptemplate.compare operation does not work * since we don't know server's salt. * To enable local password comparison, we need to provide password encoder from crypto's * package * This is why we just wrap old encoder with new one interface * New encoder cannot be used everywhere since it does not have implementation for LDAP - */ + *//* final PasswordEncoder delegate = PasswordEncoderFactories.createDelegatingPasswordEncoder(); builder.passwordEncoder(new org.springframework.security.crypto.password.PasswordEncoder() { @@ -125,7 +126,7 @@ public boolean matches(CharSequence rawPassword, String encodedPassword) { return delegate.matches(rawPassword, encodedPassword); } }); - }); + });*/ LdapParameter.USER_DN_PATTERN.getParameter(integration).ifPresent(builder::userDnPatterns);