Actually set the artifact type for the outbound message (makes it work much better)
authorlajoie <lajoie@ab3bd59b-922f-494d-bb5f-6f0a3c29deca>
Fri, 24 Aug 2007 14:48:58 +0000 (14:48 +0000)
committerlajoie <lajoie@ab3bd59b-922f-494d-bb5f-6f0a3c29deca>
Fri, 24 Aug 2007 14:48:58 +0000 (14:48 +0000)
git-svn-id: https://subversion.switch.ch/svn/shibboleth/java-idp/trunk@2349 ab3bd59b-922f-494d-bb5f-6f0a3c29deca

src/edu/internet2/middleware/shibboleth/idp/profile/saml1/AttributeQueryProfileHandler.java
src/edu/internet2/middleware/shibboleth/idp/profile/saml1/ShibbolethSSOProfileHandler.java
src/edu/internet2/middleware/shibboleth/idp/profile/saml2/AttributeQueryProfileHandler.java
src/edu/internet2/middleware/shibboleth/idp/profile/saml2/SSOProfileHandler.java

index d47b6a1..f0e9d2d 100644 (file)
@@ -160,6 +160,7 @@ public class AttributeQueryProfileHandler extends AbstractSAML1ProfileHandler {
                 AttributeQueryConfiguration profileConfig = (AttributeQueryConfiguration) rpConfig
                         .getProfileConfiguration(AttributeQueryConfiguration.PROFILE_ID);
                 requestContext.setProfileConfiguration(profileConfig);
+                requestContext.setOutboundMessageArtifactType(profileConfig.getOutboundArtifactType());
                 if (profileConfig.getSigningCredential() != null) {
                     requestContext.setOutboundSAMLMessageSigningCredential(profileConfig.getSigningCredential());
                 } else if (rpConfig.getDefaultSigningCredential() != null) {
index e7581d3..2023b8b 100644 (file)
@@ -304,6 +304,7 @@ public class ShibbolethSSOProfileHandler extends AbstractSAML1ProfileHandler {
             ShibbolethSSOConfiguration profileConfig = (ShibbolethSSOConfiguration) rpConfig
                     .getProfileConfiguration(SSOConfiguration.PROFILE_ID);
             requestContext.setProfileConfiguration(profileConfig);
+            requestContext.setOutboundMessageArtifactType(profileConfig.getOutboundArtifactType());
             if (profileConfig.getSigningCredential() != null) {
                 requestContext.setOutboundSAMLMessageSigningCredential(profileConfig.getSigningCredential());
             } else if (rpConfig.getDefaultSigningCredential() != null) {
index a7f2199..325a1c2 100644 (file)
@@ -157,6 +157,7 @@ public class AttributeQueryProfileHandler extends AbstractSAML2ProfileHandler {
                 AttributeQueryConfiguration profileConfig = (AttributeQueryConfiguration) rpConfig
                         .getProfileConfiguration(AttributeQueryConfiguration.PROFILE_ID);
                 requestContext.setProfileConfiguration(profileConfig);
+                requestContext.setOutboundMessageArtifactType(profileConfig.getOutboundArtifactType());
                 if (profileConfig.getSigningCredential() != null) {
                     requestContext.setOutboundSAMLMessageSigningCredential(profileConfig.getSigningCredential());
                 } else if (rpConfig.getDefaultSigningCredential() != null) {
index 0df301e..ccc5479 100644 (file)
@@ -317,6 +317,7 @@ public class SSOProfileHandler extends AbstractSAML2ProfileHandler {
             SSOConfiguration profileConfig = (SSOConfiguration) rpConfig
                     .getProfileConfiguration(SSOConfiguration.PROFILE_ID);
             requestContext.setProfileConfiguration(profileConfig);
+            requestContext.setOutboundMessageArtifactType(profileConfig.getOutboundArtifactType());
             if (profileConfig.getSigningCredential() != null) {
                 requestContext.setOutboundSAMLMessageSigningCredential(profileConfig.getSigningCredential());
             } else if (rpConfig.getDefaultSigningCredential() != null) {