net-ldap 0.16.2 → 0.16.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,7 +1,6 @@
1
1
  require_relative '../test_helper'
2
2
 
3
3
  class TestBindIntegration < LDAPIntegrationTestCase
4
-
5
4
  INTEGRATION_HOSTNAME = 'ldap.example.org'.freeze
6
5
 
7
6
  def test_bind_success
@@ -28,7 +27,7 @@ class TestBindIntegration < LDAPIntegrationTestCase
28
27
  assert_equal Net::LDAP::ResultCodeUnwillingToPerform, result.code
29
28
  assert_equal Net::LDAP::ResultStrings[Net::LDAP::ResultCodeUnwillingToPerform], result.message
30
29
  assert_equal "unauthenticated bind (DN with no password) disallowed",
31
- result.error_message
30
+ result.error_message
32
31
  assert_equal "", result.matched_dn
33
32
  end
34
33
 
@@ -3,7 +3,7 @@ require_relative '../test_helper'
3
3
  class TestPasswordModifyIntegration < LDAPIntegrationTestCase
4
4
  def setup
5
5
  super
6
- @admin_account = {dn: 'cn=admin,dc=example,dc=org', password: 'admin', method: :simple}
6
+ @admin_account = { dn: 'cn=admin,dc=example,dc=org', password: 'admin', method: :simple }
7
7
  @ldap.authenticate @admin_account[:dn], @admin_account[:password]
8
8
 
9
9
  @dn = 'uid=modify-password-user1,ou=People,dc=example,dc=org'
@@ -35,13 +35,13 @@ class TestPasswordModifyIntegration < LDAPIntegrationTestCase
35
35
  new_password: 'passworD2')
36
36
 
37
37
  assert @ldap.get_operation_result.extended_response.nil?,
38
- 'Should not have generated a new password'
38
+ 'Should not have generated a new password'
39
39
 
40
40
  refute @ldap.bind(username: @dn, password: 'admin', method: :simple),
41
- 'Old password should no longer be valid'
41
+ 'Old password should no longer be valid'
42
42
 
43
43
  assert @ldap.bind(username: @dn, password: 'passworD2', method: :simple),
44
- 'New password should be valid'
44
+ 'New password should be valid'
45
45
  end
46
46
 
47
47
  def test_password_modify_generate
@@ -54,10 +54,10 @@ class TestPasswordModifyIntegration < LDAPIntegrationTestCase
54
54
  assert generated_password, 'Should have generated a password'
55
55
 
56
56
  refute @ldap.bind(username: @dn, password: 'admin', method: :simple),
57
- 'Old password should no longer be valid'
57
+ 'Old password should no longer be valid'
58
58
 
59
59
  assert @ldap.bind(username: @dn, password: generated_password, method: :simple),
60
- 'New password should be valid'
60
+ 'New password should be valid'
61
61
  end
62
62
 
63
63
  def test_password_modify_generate_no_old_password
@@ -69,10 +69,10 @@ class TestPasswordModifyIntegration < LDAPIntegrationTestCase
69
69
  assert generated_password, 'Should have generated a password'
70
70
 
71
71
  refute @ldap.bind(username: @dn, password: 'admin', method: :simple),
72
- 'Old password should no longer be valid'
72
+ 'Old password should no longer be valid'
73
73
 
74
74
  assert @ldap.bind(username: @dn, password: generated_password, method: :simple),
75
- 'New password should be valid'
75
+ 'New password should be valid'
76
76
  end
77
77
 
78
78
  def test_password_modify_overwrite_old_password
@@ -81,10 +81,10 @@ class TestPasswordModifyIntegration < LDAPIntegrationTestCase
81
81
  new_password: 'passworD3')
82
82
 
83
83
  refute @ldap.bind(username: @dn, password: 'admin', method: :simple),
84
- 'Old password should no longer be valid'
84
+ 'Old password should no longer be valid'
85
85
 
86
86
  assert @ldap.bind(username: @dn, password: 'passworD3', method: :simple),
87
- 'New password should be valid'
87
+ 'New password should be valid'
88
88
  end
89
89
 
90
90
  def teardown
@@ -1,5 +1,5 @@
1
1
  require_relative 'test_helper'
2
- require 'net/ldap/dn'
2
+ require_relative '../lib/net/ldap/dn'
3
3
 
4
4
  class TestDN < Test::Unit::TestCase
5
5
  def test_escape
@@ -26,7 +26,6 @@ class TestDN < Test::Unit::TestCase
26
26
  assert_equal ['1.23.4', '#A3B4D5', 'ou', 'Company'], dn.to_a
27
27
  end
28
28
 
29
- # TODO: raise a more specific exception than RuntimeError
30
29
  def test_bad_input_raises_error
31
30
  [
32
31
  'cn=James,',
@@ -38,7 +37,7 @@ class TestDN < Test::Unit::TestCase
38
37
  'd1.2=Value',
39
38
  ].each do |input|
40
39
  dn = Net::LDAP::DN.new(input)
41
- assert_raises(RuntimeError) { dn.to_a }
40
+ assert_raises(Net::LDAP::InvalidDNError) { dn.to_a }
42
41
  end
43
42
  end
44
43
  end
@@ -47,7 +47,8 @@ class TestEntryLDIF < Test::Unit::TestCase
47
47
  %Q{dn: something
48
48
  foo: foo
49
49
  barAttribute: bar
50
- })
50
+ },
51
+ )
51
52
  end
52
53
 
53
54
  def test_attribute
@@ -59,7 +60,7 @@ barAttribute: bar
59
60
  @entry.foo = 'bar'
60
61
  assert_equal ['bar'], @entry.foo
61
62
 
62
- @entry.fOo= 'baz'
63
+ @entry.fOo = 'baz'
63
64
  assert_equal ['baz'], @entry.foo
64
65
  end
65
66
  end
@@ -1,4 +1,5 @@
1
1
  # encoding: utf-8
2
+
2
3
  require_relative 'test_helper'
3
4
 
4
5
  class TestFilterParser < Test::Unit::TestCase
@@ -21,4 +22,8 @@ class TestFilterParser < Test::Unit::TestCase
21
22
  def test_colons
22
23
  assert_kind_of Net::LDAP::Filter, Net::LDAP::Filter::FilterParser.parse("(ismemberof=cn=edu:berkeley:app:calmessages:deans,ou=campus groups,dc=berkeley,dc=edu)")
23
24
  end
25
+
26
+ def test_attr_tag
27
+ assert_kind_of Net::LDAP::Filter, Net::LDAP::Filter::FilterParser.parse("(mail;primary=jane@example.org)")
28
+ end
24
29
  end
@@ -1,6 +1,6 @@
1
1
  # Add 'lib' to load path.
2
2
  require 'test/unit'
3
- require 'net/ldap'
3
+ require_relative '../lib/net/ldap'
4
4
  require 'flexmock/test_unit'
5
5
 
6
6
  # Whether integration tests should be run.
@@ -1,4 +1,4 @@
1
- require 'test_helper'
1
+ require_relative 'test_helper'
2
2
 
3
3
  class TestLDAPInstrumentation < Test::Unit::TestCase
4
4
  # Fake Net::LDAP::Connection for testing
@@ -94,7 +94,7 @@ class TestLDAPInstrumentation < Test::Unit::TestCase
94
94
 
95
95
  def test_normalize_encryption_symbol
96
96
  enc = @subject.send(:normalize_encryption, :start_tls)
97
- assert_equal enc, {:method => :start_tls, :tls_options => {}}
97
+ assert_equal enc, :method => :start_tls, :tls_options => {}
98
98
  end
99
99
 
100
100
  def test_normalize_encryption_nil
@@ -104,11 +104,11 @@ class TestLDAPInstrumentation < Test::Unit::TestCase
104
104
 
105
105
  def test_normalize_encryption_string
106
106
  enc = @subject.send(:normalize_encryption, 'start_tls')
107
- assert_equal enc, {:method => :start_tls, :tls_options => {}}
107
+ assert_equal enc, :method => :start_tls, :tls_options => {}
108
108
  end
109
109
 
110
110
  def test_normalize_encryption_hash
111
- enc = @subject.send(:normalize_encryption, {:method => :start_tls, :tls_options => {:foo => :bar}})
112
- assert_equal enc, {:method => :start_tls, :tls_options => {:foo => :bar}}
111
+ enc = @subject.send(:normalize_encryption, :method => :start_tls, :tls_options => { :foo => :bar })
112
+ assert_equal enc, :method => :start_tls, :tls_options => { :foo => :bar }
113
113
  end
114
114
  end
@@ -95,7 +95,7 @@ class TestLDAPConnection < Test::Unit::TestCase
95
95
 
96
96
  def test_connection_timeout
97
97
  connection = Net::LDAP::Connection.new(:host => "fail.Errno::ETIMEDOUT", :port => 636, :socket_class => FakeTCPSocket)
98
- stderr = capture_stderr do
98
+ capture_stderr do
99
99
  assert_raise Net::LDAP::Error do
100
100
  connection.socket
101
101
  end
@@ -124,7 +124,7 @@ class TestLDAPConnection < Test::Unit::TestCase
124
124
  end
125
125
 
126
126
  def test_modify_ops_replace
127
- args = { :operations =>[[:replace, "mail", "testuser@example.com"]] }
127
+ args = { :operations => [[:replace, "mail", "testuser@example.com"]] }
128
128
  result = Net::LDAP::Connection.modify_ops(args[:operations])
129
129
  expected = ["0#\n\x01\x020\x1E\x04\x04mail1\x16\x04\x14testuser@example.com"]
130
130
  assert_equal(expected, result)
@@ -191,9 +191,9 @@ class TestLDAPConnectionSocketReads < Test::Unit::TestCase
191
191
  result2 = make_message(2)
192
192
 
193
193
  mock = flexmock("socket")
194
- mock.should_receive(:read_ber).
195
- and_return(result1).
196
- and_return(result2)
194
+ mock.should_receive(:read_ber)
195
+ .and_return(result1)
196
+ .and_return(result2)
197
197
  conn = Net::LDAP::Connection.new(:socket => mock)
198
198
 
199
199
  assert result = conn.queued_read(2)
@@ -206,9 +206,9 @@ class TestLDAPConnectionSocketReads < Test::Unit::TestCase
206
206
  result2 = make_message(2, app_tag: Net::LDAP::PDU::ModifyResponse)
207
207
 
208
208
  mock = flexmock("socket")
209
- mock.should_receive(:read_ber).
210
- and_return(result1).
211
- and_return(result2)
209
+ mock.should_receive(:read_ber)
210
+ .and_return(result1)
211
+ .and_return(result2)
212
212
  mock.should_receive(:write)
213
213
  conn = Net::LDAP::Connection.new(:socket => mock)
214
214
 
@@ -227,9 +227,9 @@ class TestLDAPConnectionSocketReads < Test::Unit::TestCase
227
227
  result2 = make_message(2, app_tag: Net::LDAP::PDU::AddResponse)
228
228
 
229
229
  mock = flexmock("socket")
230
- mock.should_receive(:read_ber).
231
- and_return(result1).
232
- and_return(result2)
230
+ mock.should_receive(:read_ber)
231
+ .and_return(result1)
232
+ .and_return(result2)
233
233
  mock.should_receive(:write)
234
234
  conn = Net::LDAP::Connection.new(:socket => mock)
235
235
 
@@ -245,9 +245,9 @@ class TestLDAPConnectionSocketReads < Test::Unit::TestCase
245
245
  result2 = make_message(2, app_tag: Net::LDAP::PDU::ModifyRDNResponse)
246
246
 
247
247
  mock = flexmock("socket")
248
- mock.should_receive(:read_ber).
249
- and_return(result1).
250
- and_return(result2)
248
+ mock.should_receive(:read_ber)
249
+ .and_return(result1)
250
+ .and_return(result2)
251
251
  mock.should_receive(:write)
252
252
  conn = Net::LDAP::Connection.new(:socket => mock)
253
253
 
@@ -266,9 +266,9 @@ class TestLDAPConnectionSocketReads < Test::Unit::TestCase
266
266
  result2 = make_message(2, app_tag: Net::LDAP::PDU::DeleteResponse)
267
267
 
268
268
  mock = flexmock("socket")
269
- mock.should_receive(:read_ber).
270
- and_return(result1).
271
- and_return(result2)
269
+ mock.should_receive(:read_ber)
270
+ .and_return(result1)
271
+ .and_return(result2)
272
272
  mock.should_receive(:write)
273
273
  conn = Net::LDAP::Connection.new(:socket => mock)
274
274
 
@@ -284,13 +284,13 @@ class TestLDAPConnectionSocketReads < Test::Unit::TestCase
284
284
  result2 = make_message(2, app_tag: Net::LDAP::PDU::ExtendedResponse)
285
285
 
286
286
  mock = flexmock("socket")
287
- mock.should_receive(:read_ber).
288
- and_return(result1).
289
- and_return(result2)
287
+ mock.should_receive(:read_ber)
288
+ .and_return(result1)
289
+ .and_return(result2)
290
290
  mock.should_receive(:write)
291
291
  conn = Net::LDAP::Connection.new(:socket => mock)
292
- flexmock(Net::LDAP::Connection).should_receive(:wrap_with_ssl).with(mock, {}, nil).
293
- and_return(mock)
292
+ flexmock(Net::LDAP::Connection).should_receive(:wrap_with_ssl).with(mock, {}, nil)
293
+ .and_return(mock)
294
294
 
295
295
  conn.next_msgid # simulates ongoing query
296
296
 
@@ -303,9 +303,9 @@ class TestLDAPConnectionSocketReads < Test::Unit::TestCase
303
303
  result2 = make_message(2, app_tag: Net::LDAP::PDU::BindResult)
304
304
 
305
305
  mock = flexmock("socket")
306
- mock.should_receive(:read_ber).
307
- and_return(result1).
308
- and_return(result2)
306
+ mock.should_receive(:read_ber)
307
+ .and_return(result1)
308
+ .and_return(result2)
309
309
  mock.should_receive(:write)
310
310
  conn = Net::LDAP::Connection.new(:socket => mock)
311
311
 
@@ -314,7 +314,8 @@ class TestLDAPConnectionSocketReads < Test::Unit::TestCase
314
314
  assert result = conn.bind(
315
315
  method: :simple,
316
316
  username: "uid=user1,ou=People,dc=rubyldap,dc=com",
317
- password: "passworD1")
317
+ password: "passworD1",
318
+ )
318
319
  assert result.success?
319
320
  assert_equal 2, result.message_id
320
321
  end
@@ -324,9 +325,9 @@ class TestLDAPConnectionSocketReads < Test::Unit::TestCase
324
325
  result2 = make_message(2, app_tag: Net::LDAP::PDU::BindResult)
325
326
 
326
327
  mock = flexmock("socket")
327
- mock.should_receive(:read_ber).
328
- and_return(result1).
329
- and_return(result2)
328
+ mock.should_receive(:read_ber)
329
+ .and_return(result1)
330
+ .and_return(result2)
330
331
  mock.should_receive(:write)
331
332
  conn = Net::LDAP::Connection.new(:socket => mock)
332
333
 
@@ -336,10 +337,23 @@ class TestLDAPConnectionSocketReads < Test::Unit::TestCase
336
337
  method: :sasl,
337
338
  mechanism: "fake",
338
339
  initial_credential: "passworD1",
339
- challenge_response: flexmock("challenge proc"))
340
+ challenge_response: flexmock("challenge proc"),
341
+ )
340
342
  assert result.success?
341
343
  assert_equal 2, result.message_id
342
344
  end
345
+
346
+ def test_invalid_pdu_type
347
+ options = {
348
+ code: Net::LDAP::ResultCodeSuccess,
349
+ matched_dn: "",
350
+ error_message: "",
351
+ }
352
+ ber = Net::BER::BerIdentifiedArray.new([options[:code], options[:matched_dn], options[:error_message]])
353
+ assert_raise Net::LDAP::PDU::Error do
354
+ Net::LDAP::PDU.new([0, ber])
355
+ end
356
+ end
343
357
  end
344
358
 
345
359
  class TestLDAPConnectionErrors < Test::Unit::TestCase
@@ -469,8 +483,8 @@ class TestLDAPConnectionInstrumentation < Test::Unit::TestCase
469
483
  search_result_ber = Net::BER::BerIdentifiedArray.new([Net::LDAP::ResultCodeSuccess, "", ""])
470
484
  search_result_ber.ber_identifier = Net::LDAP::PDU::SearchResult
471
485
  search_result = [1, search_result_ber]
472
- @tcp_socket.should_receive(:read_ber).and_return(search_data).
473
- and_return(search_result)
486
+ @tcp_socket.should_receive(:read_ber).and_return(search_data)
487
+ .and_return(search_result)
474
488
 
475
489
  events = @service.subscribe "search.net_ldap_connection"
476
490
  unread = @service.subscribe "search_messages_unread.net_ldap_connection"
@@ -22,46 +22,46 @@ class TestLdif < Test::Unit::TestCase
22
22
  def test_ldif_with_comments
23
23
  str = ["# Hello from LDIF-land", "# This is an unterminated comment"]
24
24
  io = StringIO.new(str[0] + "\r\n" + str[1])
25
- ds = Net::LDAP::Dataset::read_ldif(io)
25
+ ds = Net::LDAP::Dataset.read_ldif(io)
26
26
  assert_equal(str, ds.comments)
27
27
  end
28
28
 
29
29
  def test_ldif_with_password
30
30
  psw = "goldbricks"
31
- hashed_psw = "{SHA}" + Base64::encode64(Digest::SHA1.digest(psw)).chomp
31
+ hashed_psw = "{SHA}" + Base64.encode64(Digest::SHA1.digest(psw)).chomp
32
32
 
33
- ldif_encoded = Base64::encode64(hashed_psw).chomp
34
- ds = Net::LDAP::Dataset::read_ldif(StringIO.new("dn: Goldbrick\r\nuserPassword:: #{ldif_encoded}\r\n\r\n"))
33
+ ldif_encoded = Base64.encode64(hashed_psw).chomp
34
+ ds = Net::LDAP::Dataset.read_ldif(StringIO.new("dn: Goldbrick\r\nuserPassword:: #{ldif_encoded}\r\n\r\n"))
35
35
  recovered_psw = ds["Goldbrick"][:userpassword].shift
36
36
  assert_equal(hashed_psw, recovered_psw)
37
37
  end
38
38
 
39
39
  def test_ldif_with_continuation_lines
40
- ds = Net::LDAP::Dataset::read_ldif(StringIO.new("dn: abcdefg\r\n hijklmn\r\n\r\n"))
40
+ ds = Net::LDAP::Dataset.read_ldif(StringIO.new("dn: abcdefg\r\n hijklmn\r\n\r\n"))
41
41
  assert_equal(true, ds.key?("abcdefghijklmn"))
42
42
  end
43
43
 
44
44
  def test_ldif_with_continuation_lines_and_extra_whitespace
45
- ds1 = Net::LDAP::Dataset::read_ldif(StringIO.new("dn: abcdefg\r\n hijklmn\r\n\r\n"))
45
+ ds1 = Net::LDAP::Dataset.read_ldif(StringIO.new("dn: abcdefg\r\n hijklmn\r\n\r\n"))
46
46
  assert_equal(true, ds1.key?("abcdefg hijklmn"))
47
- ds2 = Net::LDAP::Dataset::read_ldif(StringIO.new("dn: abcdefg\r\n hij klmn\r\n\r\n"))
47
+ ds2 = Net::LDAP::Dataset.read_ldif(StringIO.new("dn: abcdefg\r\n hij klmn\r\n\r\n"))
48
48
  assert_equal(true, ds2.key?("abcdefghij klmn"))
49
49
  end
50
50
 
51
51
  def test_ldif_tab_is_not_continuation
52
- ds = Net::LDAP::Dataset::read_ldif(StringIO.new("dn: key\r\n\tnotcontinued\r\n\r\n"))
52
+ ds = Net::LDAP::Dataset.read_ldif(StringIO.new("dn: key\r\n\tnotcontinued\r\n\r\n"))
53
53
  assert_equal(true, ds.key?("key"))
54
54
  end
55
55
 
56
56
  def test_ldif_with_base64_dn
57
57
  str = "dn:: Q049QmFzZTY0IGRuIHRlc3QsT1U9VGVzdCxPVT1Vbml0cyxEQz1leGFtcGxlLERDPWNvbQ==\r\n\r\n"
58
- ds = Net::LDAP::Dataset::read_ldif(StringIO.new(str))
58
+ ds = Net::LDAP::Dataset.read_ldif(StringIO.new(str))
59
59
  assert_equal(true, ds.key?("CN=Base64 dn test,OU=Test,OU=Units,DC=example,DC=com"))
60
60
  end
61
61
 
62
62
  def test_ldif_with_base64_dn_and_continuation_lines
63
63
  str = "dn:: Q049QmFzZTY0IGRuIHRlc3Qgd2l0aCBjb250aW51YXRpb24gbGluZSxPVT1UZXN0LE9VPVVua\r\n XRzLERDPWV4YW1wbGUsREM9Y29t\r\n\r\n"
64
- ds = Net::LDAP::Dataset::read_ldif(StringIO.new(str))
64
+ ds = Net::LDAP::Dataset.read_ldif(StringIO.new(str))
65
65
  assert_equal(true, ds.key?("CN=Base64 dn test with continuation line,OU=Test,OU=Units,DC=example,DC=com"))
66
66
  end
67
67
 
@@ -69,7 +69,7 @@ class TestLdif < Test::Unit::TestCase
69
69
  # to verify the content.
70
70
  def test_ldif
71
71
  File.open(TestLdifFilename, "r") do |f|
72
- ds = Net::LDAP::Dataset::read_ldif(f)
72
+ ds = Net::LDAP::Dataset.read_ldif(f)
73
73
  assert_equal(13, ds.length)
74
74
  end
75
75
  end
@@ -84,7 +84,7 @@ class TestLdif < Test::Unit::TestCase
84
84
  entries = data.lines.grep(/^dn:\s*/) { $'.chomp }
85
85
  dn_entries = entries.dup
86
86
 
87
- ds = Net::LDAP::Dataset::read_ldif(io) do |type, value|
87
+ ds = Net::LDAP::Dataset.read_ldif(io) do |type, value|
88
88
  case type
89
89
  when :dn
90
90
  assert_equal(dn_entries.first, value)
@@ -4,7 +4,7 @@ require_relative 'test_helper'
4
4
 
5
5
  class TestPassword < Test::Unit::TestCase
6
6
  def test_psw
7
- assert_equal("{MD5}xq8jwrcfibi0sZdZYNkSng==", Net::LDAP::Password.generate( :md5, "cashflow" ))
8
- assert_equal("{SHA}YE4eGkN4BvwNN1f5R7CZz0kFn14=", Net::LDAP::Password.generate( :sha, "cashflow" ))
7
+ assert_equal("{MD5}xq8jwrcfibi0sZdZYNkSng==", Net::LDAP::Password.generate(:md5, "cashflow"))
8
+ assert_equal("{SHA}YE4eGkN4BvwNN1f5R7CZz0kFn14=", Net::LDAP::Password.generate(:sha, "cashflow"))
9
9
  end
10
10
  end
@@ -1,7 +1,7 @@
1
1
  # $Id: testsnmp.rb 231 2006-12-21 15:09:29Z blackhedd $
2
2
 
3
3
  require_relative 'test_helper'
4
- require 'net/snmp'
4
+ require_relative '../lib/net/snmp'
5
5
 
6
6
  class TestSnmp < Test::Unit::TestCase
7
7
  def self.raw_string(s)
@@ -17,7 +17,7 @@ class TestSnmp < Test::Unit::TestCase
17
17
  def test_invalid_packet
18
18
  data = "xxxx"
19
19
  assert_raise(Net::BER::BerError) do
20
- ary = data.read_ber(Net::SNMP::AsnSyntax)
20
+ data.read_ber(Net::SNMP::AsnSyntax)
21
21
  end
22
22
  end
23
23
 
@@ -41,7 +41,7 @@ ary = data.read_ber(Net::SNMP::AsnSyntax)
41
41
 
42
42
  def test_weird_packet
43
43
  assert_raise(Net::SnmpPdu::Error) do
44
- Net::SnmpPdu.parse("aaaaaaaaaaaaaa")
44
+ Net::SnmpPdu.parse("aaaaaaaaaaaaaa")
45
45
  end
46
46
  end
47
47
 
@@ -93,7 +93,7 @@ Net::SnmpPdu.parse("aaaaaaaaaaaaaa")
93
93
 
94
94
  def test_make_bad_response
95
95
  pdu = Net::SnmpPdu.new
96
- assert_raise(Net::SnmpPdu::Error) {pdu.to_ber_string}
96
+ assert_raise(Net::SnmpPdu::Error) { pdu.to_ber_string }
97
97
  pdu.pdu_type = :get_response
98
98
  pdu.request_id = 999
99
99
  pdu.to_ber_string
@@ -115,5 +115,4 @@ Net::SnmpPdu.parse("aaaaaaaaaaaaaa")
115
115
  pdu = Net::SnmpPdu.parse(ary)
116
116
  assert_equal("xxxxxx", pdu.community)
117
117
  end
118
-
119
118
  end