mirror of
https://github.com/MichaelGrafnetter/DSInternals
synced 2025-03-11 06:08:02 +00:00
Fix doc tests
This commit is contained in:
parent
061db5543d
commit
6c2a3afe20
4
.github/README.md
vendored
4
.github/README.md
vendored
@ -14,8 +14,10 @@
|
||||
The DSInternals project consists of these two parts:
|
||||
- The [DSInternals Framework](https://www.nuget.org/profiles/DSInternals) exposes several internal features of *Active Directory* and can be used from any .NET application. The codebase has already been integrated into several 3<sup>rd</sup> party commercial products that use it in scenarios like Active Directory disaster recovery, identity management, cross-forest migrations and password strength auditing.
|
||||
- The [DSInternals PowerShell Module](https://www.powershellgallery.com/packages/DSInternals/) provides easy-to-use cmdlets that are built on top of the Framework. These are the main features:
|
||||
- [Azure Active Directory FIDO2 key auditing](../Documentation/PowerShell/Get-AzureADUserEx.md#get-azureaduserex) and retrieval of system information about all user-registered key credentials.
|
||||
- [Entra ID FIDO2 key auditing](../Documentation/PowerShell/Get-AzureADUserEx.md#get-azureaduserex) and retrieval of system information about all user-registered key credentials.
|
||||
- [Active Directory password auditing](../Documentation/PowerShell/Test-PasswordQuality.md#test-passwordquality) that discovers accounts sharing the same passwords or having passwords in a public database like [HaveIBeenPwned](https://haveibeenpwned.com) or in a custom dictionary.
|
||||
- [BitLocker recovery key](../Documentation/PowerShell/Get-ADDBBitLockerRecoveryInformation.md#get-addbbitlockerrecoveryinformation) and [LAPS password](../Documentation/PowerShell/Get-ADDBAccount.md#get-addbaccount) retrieval from Active Directory backups.
|
||||
- [Salvaging DNS resource records](../Documentation/PowerShell/Get-ADDBDnsResourceRecord.md#get-addbdnsresourcerecord) in the form of zone files from Active Directory backups.
|
||||
- [Key credential auditing and generation](../Documentation/PowerShell/Get-ADKeyCredential.md#get-adkeycredential), including support for NGC, FIDO2 and STK keys. Keys can also be tested against the [ROCA vulnerability](https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV190026). New NGC keys can also be [registered through the MS-DRSR protocol](../Documentation/PowerShell/Add-ADReplNgcKey.md#add-adreplngckey).
|
||||
- [Bare-metal recovery of domain controllers](../Documentation/PowerShell/New-ADDBRestoreFromMediaScript.md#new-addbrestorefrommediascript) from just IFM backups (ntds.dit + SYSVOL).
|
||||
- Offline ntds.dit file manipulation, including [hash dumping](../Documentation/PowerShell/Get-ADDBAccount.md#get-addbaccount), [password resets](../Documentation/PowerShell/Set-ADDBAccountPassword.md#set-addbaccountpassword), [group membership changes](../Documentation/PowerShell/Set-ADDBPrimaryGroup.md#set-addbprimarygroup), [SID History injection](../Documentation/PowerShell/Add-ADDBSidHistory.md#add-addbsidhistory) and [enabling](../Documentation/PowerShell/Enable-ADDBAccount.md#enable-addbaccount)/[disabling](../Documentation/PowerShell/Disable-ADDBAccount.md#disable-addbaccount) accounts.
|
||||
|
@ -63,6 +63,9 @@ Reads all Group Managed Service Accounts (gMSAs) from a ntds.dit file, while der
|
||||
### [Get-ADDBBitLockerRecoveryInformation](Get-ADDBBitLockerRecoveryInformation.md#get-addbbitlockerrecoveryinformation)
|
||||
Reads BitLocker recovery passwords from a ntds.dit file.
|
||||
|
||||
### [Get-ADDBDnsResourceRecord](Get-ADDBDnsResourceRecord.md#get-addbdnsresourcerecord)
|
||||
Retrieves DNS resource records from an Active Directory database.
|
||||
|
||||
### [Get-ADDBDomainController](Get-ADDBDomainController.md#get-addbdomaincontroller)
|
||||
Reads information about the originating DC from a ntds.dit file, including domain name, domain SID, DC name and DC site.
|
||||
|
||||
|
@ -119,11 +119,12 @@ Describe 'DSInternals PowerShell Module' {
|
||||
|
||||
Context 'Views' {
|
||||
|
||||
# Get all .NET types referenced by Views
|
||||
# Get all .NET types referenced by Views, with the exception of virtual types (containing #)
|
||||
$typeNames = Get-ChildItem -Filter *.format.ps1xml -Path $ModulePath -Recurse -File |
|
||||
Select-Xml -XPath '//TypeName/text()' |
|
||||
ForEach-Object { $PSItem.Node.Value } |
|
||||
Sort-Object -Unique |
|
||||
Where-Object { $PSItem -notlike '*#*' } |
|
||||
ForEach-Object { @{ TypeName = $PSItem } }
|
||||
|
||||
# Import the DSInternals PowerShell Module
|
||||
@ -261,7 +262,7 @@ Describe 'DSInternals PowerShell Module' {
|
||||
}
|
||||
|
||||
It 'has the same release notes as the module' {
|
||||
$chocolateySpec.package.metadata.releaseNotes.Replace("`r`n","`n").Trim() | Should Be $manifest.PrivateData.PSData.ReleaseNotes.Replace("`r`n","`n").Replace('- ','* ').Trim()
|
||||
$chocolateySpec.package.metadata.releaseNotes.Replace("`r`n","`n").Replace('`','').Trim() | Should Be $manifest.PrivateData.PSData.ReleaseNotes.Replace("`r`n","`n").Replace('- ','* ').Trim()
|
||||
}
|
||||
|
||||
It 'has the same copyright info as the module' {
|
||||
|
Loading…
Reference in New Issue
Block a user