Check the inbound SAML message context slot, not the inbound message slot.
authorputmanb <putmanb@ab3bd59b-922f-494d-bb5f-6f0a3c29deca>
Mon, 6 Jul 2009 05:46:33 +0000 (05:46 +0000)
committerputmanb <putmanb@ab3bd59b-922f-494d-bb5f-6f0a3c29deca>
Mon, 6 Jul 2009 05:46:33 +0000 (05:46 +0000)
This mucks with eventual ECP profile support (e.g. Liberty SSOS).

git-svn-id: https://subversion.switch.ch/svn/shibboleth/java-idp/branches/REL_2@2864 ab3bd59b-922f-494d-bb5f-6f0a3c29deca

src/main/java/edu/internet2/middleware/shibboleth/idp/profile/saml2/SSOProfileHandler.java

index 3eb7e2b..e194897 100644 (file)
@@ -299,9 +299,9 @@ public class SSOProfileHandler extends AbstractSAML2ProfileHandler {
             decoder.decode(requestContext);
             log.debug("Decoded request from relying party '{}'", requestContext.getInboundMessageIssuer());
 
-            if (!(requestContext.getInboundMessage() instanceof AuthnRequest)) {
-                log.warn("Incomming message was not a AuthnRequest, it was a '{}'", requestContext.getInboundMessage()
-                        .getClass().getName());
+            if (!(requestContext.getInboundSAMLMessage() instanceof AuthnRequest)) {
+                log.warn("Incomming message was not a AuthnRequest, it was a '{}'",
+                        requestContext.getInboundSAMLMessage().getClass().getName());
                 requestContext.setFailureStatus(buildStatus(StatusCode.REQUESTER_URI, null,
                         "Invalid SAML AuthnRequest message."));
                 throw new ProfileException("Invalid SAML AuthnRequest message.");