code
stringlengths
281
23.7M
def test_serendipity_biharmonic(): sp = {'snes_type': 'ksponly', 'ksp_type': 'preonly', 'pc_type': 'lu', 'pc_factor_mat_solver_type': 'mumps', 'mat_mumps_icntl_14': 200} def error(N): mesh = UnitSquareMesh(N, N, quadrilateral=True) degree = 2 V = FunctionSpace(mesh, 'S', degree) u = Function(V) v = TestFunction(V) X = SpatialCoordinate(mesh) k = 1 u_ex = (sin((((2 * pi) * k) * X[0])) * cos((((2 * pi) * k) * X[1]))) h = avg(CellDiameter(mesh)) alpha = Constant(1) n = FacetNormal(mesh) f = (div(div(grad(grad(u_ex)))) + u_ex) g = dot(grad(grad(u_ex)), n) F = (((((inner(grad(grad(u)), grad(grad(v))) * dx) + (inner(u, v) * dx)) - (inner(f, v) * dx)) - (inner(g, grad(v)) * ds)) + (((alpha * (h ** (- (degree + 1)))) * inner(jump(grad(u), n), jump(grad(v), n))) * dS)) bc = DirichletBC(V, project(u_ex, V, solver_parameters=sp), 'on_boundary') solve((F == 0), u, bc, solver_parameters=sp) err = errornorm(u_ex, u, 'L2') return err errors = [] for N in [10, 20, 40]: errors.append(error(N)) convergence_orders = (lambda x: numpy.log2((numpy.array(x)[:(- 1)] / numpy.array(x)[1:]))) conv = convergence_orders(errors) assert all((conv >= 2))
class Image(HasTraits): filename = File(exists=True) sample_id = Str() operator = Str('N/A') date_acquired = Date() scan_size = Tuple(Float, Float) scan_width = Property(Float, depends_on='scan_size') scan_height = Property(Float, depends_on='scan_size') image = Array(shape=(None, None), dtype='uint8') histogram = Property(Array, depends_on='image') pixel_area = Float() ('filename') def read_image(self, event): pil_image = PILImage.open(self.filename).convert('L') self.image = np.array(pil_image) if (self.image.size > 0): self.pixel_area = ((self.scan_height * self.scan_width) / self.image.size) else: self.pixel_area = 0 def _date_acquired_default(self): return datetime.date.today() def _scan_size_default(self): return (1e-05, 1e-05) def _get_scan_width(self): return self.scan_size[0] def _set_scan_width(self, value): self.scan_size = (value, self.scan_size[1]) def _get_scan_height(self): return self.scan_size[1] def _set_scan_height(self, value): self.scan_size = (self.scan_size[0], value) _property def _get_histogram(self): (hist, bins) = np.histogram(self.image, bins=256, range=(0, 256), density=True) return hist
def test_preserve_remembers_exception(app, client): app.debug = True errors = [] ('/fail') def fail_func(): (1 // 0) ('/success') def success_func(): return 'Okay' _request def teardown_handler(exc): errors.append(exc) with pytest.raises(ZeroDivisionError): client.get('/fail') assert (errors == []) client.get('/success') assert (len(errors) == 2) assert isinstance(errors[0], ZeroDivisionError) client.get('/success') assert (len(errors) == 3) assert (errors[1] is None)
class PrometheusSerializer(Serializer): def encode(msg: Message) -> bytes: msg = cast(PrometheusMessage, msg) message_pb = ProtobufMessage() dialogue_message_pb = DialogueMessage() prometheus_msg = prometheus_pb2.PrometheusMessage() dialogue_message_pb.message_id = msg.message_id dialogue_reference = msg.dialogue_reference dialogue_message_pb.dialogue_starter_reference = dialogue_reference[0] dialogue_message_pb.dialogue_responder_reference = dialogue_reference[1] dialogue_message_pb.target = msg.target performative_id = msg.performative if (performative_id == PrometheusMessage.Performative.ADD_METRIC): performative = prometheus_pb2.PrometheusMessage.Add_Metric_Performative() type = msg.type performative.type = type title = msg.title performative.title = title description = msg.description performative.description = description labels = msg.labels performative.labels.update(labels) prometheus_msg.add_metric.CopyFrom(performative) elif (performative_id == PrometheusMessage.Performative.UPDATE_METRIC): performative = prometheus_pb2.PrometheusMessage.Update_Metric_Performative() title = msg.title performative.title = title callable = msg.callable performative.callable = callable value = msg.value performative.value = value labels = msg.labels performative.labels.update(labels) prometheus_msg.update_metric.CopyFrom(performative) elif (performative_id == PrometheusMessage.Performative.RESPONSE): performative = prometheus_pb2.PrometheusMessage.Response_Performative() code = msg.code performative.code = code if msg.is_set('message'): performative.message_is_set = True message = msg.message performative.message = message prometheus_msg.response.CopyFrom(performative) else: raise ValueError('Performative not valid: {}'.format(performative_id)) dialogue_message_pb.content = prometheus_msg.SerializeToString() message_pb.dialogue_message.CopyFrom(dialogue_message_pb) message_bytes = message_pb.SerializeToString() return message_bytes def decode(obj: bytes) -> Message: message_pb = ProtobufMessage() prometheus_pb = prometheus_pb2.PrometheusMessage() message_pb.ParseFromString(obj) message_id = message_pb.dialogue_message.message_id dialogue_reference = (message_pb.dialogue_message.dialogue_starter_reference, message_pb.dialogue_message.dialogue_responder_reference) target = message_pb.dialogue_message.target prometheus_pb.ParseFromString(message_pb.dialogue_message.content) performative = prometheus_pb.WhichOneof('performative') performative_id = PrometheusMessage.Performative(str(performative)) performative_content = {} if (performative_id == PrometheusMessage.Performative.ADD_METRIC): type = prometheus_pb.add_metric.type performative_content['type'] = type title = prometheus_pb.add_metric.title performative_content['title'] = title description = prometheus_pb.add_metric.description performative_content['description'] = description labels = prometheus_pb.add_metric.labels labels_dict = dict(labels) performative_content['labels'] = labels_dict elif (performative_id == PrometheusMessage.Performative.UPDATE_METRIC): title = prometheus_pb.update_metric.title performative_content['title'] = title callable = prometheus_pb.update_metric.callable performative_content['callable'] = callable value = prometheus_pb.update_metric.value performative_content['value'] = value labels = prometheus_pb.update_metric.labels labels_dict = dict(labels) performative_content['labels'] = labels_dict elif (performative_id == PrometheusMessage.Performative.RESPONSE): code = prometheus_pb.response.code performative_content['code'] = code if prometheus_pb.response.message_is_set: message = prometheus_pb.response.message performative_content['message'] = message else: raise ValueError('Performative not valid: {}.'.format(performative_id)) return PrometheusMessage(message_id=message_id, dialogue_reference=dialogue_reference, target=target, performative=performative, **performative_content)
class EvAdventureRollEngineTest(BaseEvenniaTest): def setUp(self): super().setUp() self.roll_engine = rules.EvAdventureRollEngine() ('evennia.contrib.tutorials.evadventure.rules.randint') def test_roll(self, mock_randint): mock_randint.return_value = 8 self.assertEqual(self.roll_engine.roll('1d6'), 8) mock_randint.assert_called_with(1, 6) self.assertEqual(self.roll_engine.roll('2d8'), (2 * 8)) mock_randint.assert_called_with(1, 8) self.assertEqual(self.roll_engine.roll('4d12'), (4 * 8)) mock_randint.assert_called_with(1, 12) self.assertEqual(self.roll_engine.roll('8d100'), (8 * 8)) mock_randint.assert_called_with(1, 100) def test_roll_limits(self): with self.assertRaises(TypeError): self.roll_engine.roll('100d6', max_number=10) with self.assertRaises(TypeError): self.roll_engine.roll('100') with self.assertRaises(TypeError): self.roll_engine.roll('dummy') with self.assertRaises(TypeError): self.roll_engine.roll('Ad4') with self.assertRaises(TypeError): self.roll_engine.roll('1d10000') ('evennia.contrib.tutorials.evadventure.rules.randint') def test_roll_with_advantage_disadvantage(self, mock_randint): mock_randint.return_value = 9 self.assertEqual(self.roll_engine.roll_with_advantage_or_disadvantage(), 9) mock_randint.assert_called_once() mock_randint.reset_mock() self.assertEqual(self.roll_engine.roll_with_advantage_or_disadvantage(disadvantage=True, advantage=True), 9) mock_randint.assert_called_once() mock_randint.reset_mock() self.assertEqual(self.roll_engine.roll_with_advantage_or_disadvantage(advantage=True), 9) mock_randint.assert_has_calls([call(1, 20), call(1, 20)]) mock_randint.reset_mock() self.assertEqual(self.roll_engine.roll_with_advantage_or_disadvantage(disadvantage=True), 9) mock_randint.assert_has_calls([call(1, 20), call(1, 20)]) mock_randint.reset_mock() ('evennia.contrib.tutorials.evadventure.rules.randint') def test_saving_throw(self, mock_randint): mock_randint.return_value = 8 character = MagicMock() character.strength = 2 character.dexterity = 1 self.assertEqual(self.roll_engine.saving_throw(character, bonus_type=enums.Ability.STR), (False, None, Something)) self.assertEqual(self.roll_engine.saving_throw(character, bonus_type=enums.Ability.DEX, modifier=1), (False, None, Something)) self.assertEqual(self.roll_engine.saving_throw(character, advantage=True, bonus_type=enums.Ability.DEX, modifier=6), (False, None, Something)) self.assertEqual(self.roll_engine.saving_throw(character, disadvantage=True, bonus_type=enums.Ability.DEX, modifier=7), (True, None, Something)) mock_randint.return_value = 1 self.assertEqual(self.roll_engine.saving_throw(character, disadvantage=True, bonus_type=enums.Ability.STR, modifier=2), (False, enums.Ability.CRITICAL_FAILURE, Something)) mock_randint.return_value = 20 self.assertEqual(self.roll_engine.saving_throw(character, disadvantage=True, bonus_type=enums.Ability.STR, modifier=2), (True, enums.Ability.CRITICAL_SUCCESS, Something)) ('evennia.contrib.tutorials.evadventure.rules.randint') def test_opposed_saving_throw(self, mock_randint): mock_randint.return_value = 10 (attacker, defender) = (MagicMock(), MagicMock()) attacker.strength = 1 defender.armor = 2 self.assertEqual(self.roll_engine.opposed_saving_throw(attacker, defender, attack_type=enums.Ability.STR, defense_type=enums.Ability.ARMOR), (False, None, Something)) self.assertEqual(self.roll_engine.opposed_saving_throw(attacker, defender, attack_type=enums.Ability.STR, defense_type=enums.Ability.ARMOR, modifier=2), (True, None, Something)) ('evennia.contrib.tutorials.evadventure.rules.randint') def test_roll_random_table(self, mock_randint): mock_randint.return_value = 10 self.assertEqual(self.roll_engine.roll_random_table('1d20', random_tables.chargen_tables['physique']), 'scrawny') self.assertEqual(self.roll_engine.roll_random_table('1d20', random_tables.chargen_tables['vice']), 'irascible') self.assertEqual(self.roll_engine.roll_random_table('1d20', random_tables.chargen_tables['alignment']), 'neutrality') self.assertEqual(self.roll_engine.roll_random_table('1d20', random_tables.chargen_tables['helmets and shields']), 'no helmet or shield') mock_randint.return_value = 25 self.assertEqual(self.roll_engine.roll_random_table('1d20', random_tables.chargen_tables['helmets and shields']), 'helmet and shield') mock_randint.return_value = (- 10) self.assertEqual(self.roll_engine.roll_random_table('1d20', random_tables.chargen_tables['helmets and shields']), 'no helmet or shield') ('evennia.contrib.tutorials.evadventure.rules.randint') def test_morale_check(self, mock_randint): defender = MagicMock() defender.morale = 12 mock_randint.return_value = 7 self.assertEqual(self.roll_engine.morale_check(defender), False) mock_randint.return_value = 3 self.assertEqual(self.roll_engine.morale_check(defender), True) ('evennia.contrib.tutorials.evadventure.rules.randint') def test_heal_from_rest(self, mock_randint): character = MagicMock() character.heal = MagicMock() character.hp_max = 8 character.hp = 1 character.constitution = 1 mock_randint.return_value = 5 self.roll_engine.heal_from_rest(character) mock_randint.assert_called_with(1, 8) character.heal.assert_called_with(6) ('evennia.contrib.tutorials.evadventure.rules.randint') def test_roll_death(self, mock_randint): character = MagicMock() character.strength = 13 character.hp = 0 character.hp_max = 8 mock_randint.return_value = 1 self.roll_engine.roll_death(character) character.at_death.assert_called() mock_randint.return_value = 3 self.roll_engine.roll_death(character) self.assertEqual(character.strength, 10)
class Comment(BaseObject): def __init__(self, api=None, author_id=None, body=None, created_at=None, html_url=None, id=None, locale=None, source_id=None, source_type=None, updated_at=None, url=None, vote_count=None, vote_sum=None, **kwargs): self.api = api self.author_id = author_id self.body = body self.created_at = created_at self.html_url = html_url self.id = id self.locale = locale self.source_id = source_id self.source_type = source_type self.updated_at = updated_at self.url = url self.vote_count = vote_count self.vote_sum = vote_sum for (key, value) in kwargs.items(): setattr(self, key, value) for key in self.to_dict(): if (getattr(self, key) is None): try: self._dirty_attributes.remove(key) except KeyError: continue def author(self): if (self.api and self.author_id): return self.api._get_user(self.author_id) def author(self, author): if author: self.author_id = author.id self._author = author def created(self): if self.created_at: return dateutil.parser.parse(self.created_at) def created(self, created): if created: self.created_at = created def updated(self): if self.updated_at: return dateutil.parser.parse(self.updated_at) def updated(self, updated): if updated: self.updated_at = updated
def be_distance(t1, t2, support, attr1, attr2): def _get_leaves_paths(t, attr, support): leaves = list(t.leaves()) leave_branches = set() for n in leaves: if n.is_root: continue movingnode = n length = 0 while (not movingnode.is_root): if support: length += (movingnode.dist * movingnode.support) else: length += movingnode.dist movingnode = movingnode.up leave_branches.add((n.props[attr], length)) return leave_branches def _get_distances(leaf_distances1, leaf_distances2): unique_leaves1 = (leaf_distances1 - leaf_distances2) unique_leaves2 = (leaf_distances2 - leaf_distances1) return abs((sum([leaf[1] for leaf in unique_leaves1]) - sum([leaf[1] for leaf in unique_leaves2]))) return _get_distances(_get_leaves_paths(t1, attr1, support), _get_leaves_paths(t2, attr2, support))
class TestOFPQueuePropMinRate(unittest.TestCase): rate = {'buf': b'\x00\x01', 'val': ofproto.OFPQT_MIN_RATE} len = {'buf': b'\x00\x10', 'val': ofproto.OFP_QUEUE_PROP_MIN_RATE_SIZE} zfill = (b'\x00' * 6) buf = (rate['buf'] + zfill) c = OFPQueuePropMinRate(rate['val']) def setUp(self): pass def tearDown(self): pass def test_init(self): cls = OFPQueuePropHeader._QUEUE_PROPERTIES[self.c.cls_prop_type] eq_(self.rate['val'], self.c.cls_prop_type) eq_(self.rate['val'], self.c.rate) eq_(self.rate['val'], cls.cls_prop_type) eq_(self.len['val'], self.c.cls_prop_len) eq_(self.len['val'], cls.cls_prop_len) def test_parser(self): res = self.c.parser(self.buf, 0) eq_(self.rate['val'], res.rate)
class ThreadedCamera(): def __init__(self, api_key, host, port): self.active = True self.results = [] self.capture = cv2.VideoCapture(0) self.capture.set(cv2.CAP_PROP_BUFFERSIZE, 2) compre_face: CompreFace = CompreFace(host, port, {'limit': 0, 'det_prob_threshold': 0.8, 'prediction_count': 1, 'face_plugins': 'age,gender', 'status': False}) self.recognition: RecognitionService = compre_face.init_face_recognition(api_key) self.FPS = (1 / 30) self.thread = Thread(target=self.show_frame, args=()) self.thread.daemon = True self.thread.start() def show_frame(self): print('Started') while self.capture.isOpened(): (status, frame_raw) = self.capture.read() self.frame = cv2.flip(frame_raw, 1) if self.results: results = self.results for result in results: box = result.get('box') age = result.get('age') gender = result.get('gender') mask = result.get('mask') subjects = result.get('subjects') if box: cv2.rectangle(img=self.frame, pt1=(box['x_min'], box['y_min']), pt2=(box['x_max'], box['y_max']), color=(0, 255, 0), thickness=1) if age: age = f"Age: {age['low']} - {age['high']}" cv2.putText(self.frame, age, (box['x_max'], (box['y_min'] + 15)), cv2.FONT_HERSHEY_SIMPLEX, 0.6, (0, 255, 0), 1) if gender: gender = f"Gender: {gender['value']}" cv2.putText(self.frame, gender, (box['x_max'], (box['y_min'] + 35)), cv2.FONT_HERSHEY_SIMPLEX, 0.6, (0, 255, 0), 1) if mask: mask = f"Mask: {mask['value']}" cv2.putText(self.frame, mask, (box['x_max'], (box['y_min'] + 55)), cv2.FONT_HERSHEY_SIMPLEX, 0.6, (0, 255, 0), 1) if subjects: subjects = sorted(subjects, key=(lambda k: k['similarity']), reverse=True) subject = f"Subject: {subjects[0]['subject']}" similarity = f"Similarity: {subjects[0]['similarity']}" cv2.putText(self.frame, subject, (box['x_max'], (box['y_min'] + 75)), cv2.FONT_HERSHEY_SIMPLEX, 0.6, (0, 255, 0), 1) cv2.putText(self.frame, similarity, (box['x_max'], (box['y_min'] + 95)), cv2.FONT_HERSHEY_SIMPLEX, 0.6, (0, 255, 0), 1) else: subject = f'No known faces' cv2.putText(self.frame, subject, (box['x_max'], (box['y_min'] + 75)), cv2.FONT_HERSHEY_SIMPLEX, 0.6, (0, 255, 0), 1) cv2.imshow('CompreFace demo', self.frame) time.sleep(self.FPS) if ((cv2.waitKey(1) & 255) == 27): self.capture.release() cv2.destroyAllWindows() self.active = False def is_active(self): return self.active def update(self): if (not hasattr(self, 'frame')): return (_, im_buf_arr) = cv2.imencode('.jpg', self.frame) byte_im = im_buf_arr.tobytes() data = self.recognition.recognize(byte_im) self.results = data.get('result')
class AS4C128M16(DDR3Module): nbanks = 8 nrows = 16384 ncols = 1024 technology_timings = _TechnologyTimings(tREFI=(.0 / 8192), tWTR=(4, 7.5), tCCD=(4, None), tRRD=(4, 6), tZQCS=(64, 80)) speedgrade_timings = {'1600': _SpeedgradeTimings(tRP=13.75, tRCD=13.75, tWR=13.75, tRFC=(160, None), tFAW=(None, 40), tRAS=35)} speedgrade_timings['default'] = speedgrade_timings['1600']
def test_complex(create_very_broken_file, tmpdir): path = os.path.join(str(tmpdir), 'complex.dlis') create_very_broken_file(path) errorhandler = ErrorHandler() with pytest.raises(RuntimeError): with dlis.load(path, error_handler=errorhandler) as (f, *_): pass errorhandler.critical = Actions.LOG_ERROR with dlis.load(path, error_handler=errorhandler) as (f, *_): f.cache_metadata(False) errorhandler.critical = Actions.RAISE with pytest.raises(RuntimeError) as excinfo: _ = f.object('VERY_MUCH_TESTY_SET', 'OBJECT', 1, 1) assert ('object set' in str(excinfo.value)) errorhandler.critical = Actions.LOG_ERROR obj = f.object('VERY_MUCH_TESTY_SET', 'OBJECT', 1, 1) errorhandler.critical = Actions.RAISE with pytest.raises(RuntimeError) as excinfo: _ = f.object('VERY_MUCH_TESTY_SET', 'OBJECT', 1, 1) assert ('object set' in str(excinfo.value)) errorhandler.critical = Actions.RAISE with pytest.raises(RuntimeError): _ = obj['INVALID'] errorhandler.critical = Actions.LOG_ERROR _ = obj['INVALID']
def recon_handler(user_name=None, email=None): if user_name: startTime = time.time() ghuser = github_recon(user_name) print('git', (startTime - time.time())) startTime = time.time() twit = twitter_recon(user_name) print('twit', (startTime - time.time())) startTime = time.time() yout = youtube_recon(user_name) print('you', (startTime - time.time())) startTime = time.time() imgur = imgur_recon(user_name) print('imgur', (startTime - time.time())) startTime = time.time() wiki = wikipedia_recon(user_name) print('wiki', (startTime - time.time())) startTime = time.time() steam = steam_recon(user_name) print('steam', (startTime - time.time())) startTime = time.time() lleak = liveleak_recon(user_name) print('lleak', (startTime - time.time())) startTime = time.time() p_bucket = photobucket_recon(user_name) print('pbucket', (startTime - time.time())) startTime = time.time() flickr = flickr_recon(user_name) print('flkr', (startTime - time.time())) startTime = time.time() hacker = hacker_recon(user_name) print('hacknews', (startTime - time.time())) startTime = time.time() reddit = reddit_recon(user_name) print('reddit', (startTime - time.time())) startTime = time.time() else: ghuser = twit = yout = imgur = wiki = lleak = steam = p_bucket = flickr = hacker = reddit = None if email: pwned = pwned_recon(email) print('pwnd', (startTime - time.time())) startTime = time.time() facebook = facebook_recon(email) print('facebook', (startTime - time.time())) startTime = time.time() hacked_emails = hacked_email_recon(email) print('hackmail', (startTime - time.time())) startTime = time.time() else: pwned = facebook = hacked_emails = None return {'facebook': facebook, 'twit': twit, 'yout': yout, 'lleak': lleak, 'ghuser': ghuser, 'reddit': reddit, 'steam': steam, 'imgur': imgur, 'p_bucket': p_bucket, 'flickr': flickr, 'hacker': hacker, 'wiki': wiki, 'pwned': pwned, 'hacked_emails': hacked_emails}
class MemoryAnalysisTestCase(unittest.TestCase): memory_analyzer: MemoryAnalysis def setUpClass(cls) -> None: memory_events_path: str = 'tests/data/memory_analysis/memory_timeline.raw.gz' cls.memory_analyzer = MemoryAnalysis(path=memory_events_path) def test_process_raw_events(self): (times, sizes) = self.memory_analyzer._process_raw_events() assert (len(times) == len(sizes)) assert (len(sizes[0]) == 8) assert (sizes[744] == [.0, .0, .0, 0.0, .0, .0, .0, .0])
def get_activation_context(editor: sublime.View, pos: int) -> Config: if editor.match_selector(pos, 'meta.attribute-with-value.style string'): return create_activation_context(editor, pos, {'name': CSSAbbreviationScope.Property}, True) syntax_name = syntax.from_pos(editor, pos) if syntax.is_css(syntax_name): ctx = get_css_context(editor, pos) if ctx: result = create_activation_context(editor, pos, ctx) if editor.match_selector(pos, 'meta.at-rule.media meta.group | meta.at-rule.supports meta.group'): result.options['stylesheet.after'] = '' return result return None if syntax.is_html(syntax_name): ctx = get_html_context(editor, pos) if (syntax.is_jsx(syntax_name) and (ctx is None)): return create_activation_context(editor, pos) return (create_activation_context(editor, pos, ctx) if (ctx is not None) else None) return create_activation_context(editor, pos)
class CubicGlyfTest(): def test_cubic_simple(self): spen = TTGlyphPen(None) spen.moveTo((0, 0)) spen.curveTo((0, 1), (1, 1), (1, 0)) spen.closePath() ppen = TTGlyphPointPen(None) ppen.beginPath() ppen.addPoint((0, 0), 'line') ppen.addPoint((0, 1)) ppen.addPoint((1, 1)) ppen.addPoint((1, 0), 'curve') ppen.endPath() for pen in (spen, ppen): glyph = pen.glyph() for i in range(2): if (i == 1): glyph.compile(None) assert (list(glyph.coordinates) == [(0, 0), (0, 1), (1, 1), (1, 0)]) assert (list(glyph.flags) == [1, 128, 128, 1]) rpen = RecordingPen() glyph.draw(rpen, None) assert (rpen.value == [('moveTo', ((0, 0),)), ('curveTo', ((0, 1), (1, 1), (1, 0))), ('closePath', ())]) .parametrize('dropImpliedOnCurves, segment_pen_commands, point_pen_commands, expected_coordinates, expected_flags, expected_endPts', [(True, [('moveTo', ((0, 0),)), ('curveTo', ((0, 1), (1, 2), (2, 2))), ('curveTo', ((3, 3), (4, 1), (4, 0))), ('closePath', ())], [('beginPath', (), {}), ('addPoint', ((0, 0), 'line', None, None), {}), ('addPoint', ((0, 1), None, None, None), {}), ('addPoint', ((1, 2), None, None, None), {}), ('addPoint', ((2, 2), 'curve', None, None), {}), ('addPoint', ((3, 3), None, None, None), {}), ('addPoint', ((4, 1), None, None, None), {}), ('addPoint', ((4, 0), 'curve', None, None), {}), ('endPath', (), {})], [(0, 0), (0, 1), (1, 2), (2, 2), (3, 3), (4, 1), (4, 0)], [1, 128, 128, 1, 128, 128, 1], [6]), (True, [('moveTo', ((0, 0),)), ('curveTo', ((0, 1), (1, 2), (2, 2))), ('curveTo', ((3, 2), (4, 1), (4, 0))), ('closePath', ())], [('beginPath', (), {}), ('addPoint', ((0, 0), 'line', None, None), {}), ('addPoint', ((0, 1), None, None, None), {}), ('addPoint', ((1, 2), None, None, None), {}), ('addPoint', ((2, 2), 'curve', None, None), {}), ('addPoint', ((3, 2), None, None, None), {}), ('addPoint', ((4, 1), None, None, None), {}), ('addPoint', ((4, 0), 'curve', None, None), {}), ('endPath', (), {})], [(0, 0), (0, 1), (1, 2), (3, 2), (4, 1), (4, 0)], [1, 128, 128, 128, 128, 1], [5]), (False, [('moveTo', ((0, 0),)), ('curveTo', ((0, 1), (1, 2), (2, 2))), ('curveTo', ((3, 2), (4, 1), (4, 0))), ('closePath', ())], [('beginPath', (), {}), ('addPoint', ((0, 0), 'line', None, None), {}), ('addPoint', ((0, 1), None, None, None), {}), ('addPoint', ((1, 2), None, None, None), {}), ('addPoint', ((2, 2), 'curve', None, None), {}), ('addPoint', ((3, 2), None, None, None), {}), ('addPoint', ((4, 1), None, None, None), {}), ('addPoint', ((4, 0), 'curve', None, None), {}), ('endPath', (), {})], [(0, 0), (0, 1), (1, 2), (2, 2), (3, 2), (4, 1), (4, 0)], [1, 128, 128, 1, 128, 128, 1], [6]), (True, [('moveTo', ((0, 0),)), ('curveTo', ((0, 1), (1, 2), (2, 2))), ('curveTo', ((3, 2), (4, 1), (4, 0))), ('closePath', ()), ('moveTo', ((0, 0),)), ('curveTo', ((0, 1), (1, 2), (2, 2))), ('curveTo', ((3, 2), (4, 1), (4, 0))), ('closePath', ())], [('beginPath', (), {}), ('addPoint', ((0, 0), 'line', None, None), {}), ('addPoint', ((0, 1), None, None, None), {}), ('addPoint', ((1, 2), None, None, None), {}), ('addPoint', ((2, 2), 'curve', None, None), {}), ('addPoint', ((3, 2), None, None, None), {}), ('addPoint', ((4, 1), None, None, None), {}), ('addPoint', ((4, 0), 'curve', None, None), {}), ('endPath', (), {}), ('beginPath', (), {}), ('addPoint', ((0, 0), 'line', None, None), {}), ('addPoint', ((0, 1), None, None, None), {}), ('addPoint', ((1, 2), None, None, None), {}), ('addPoint', ((2, 2), 'curve', None, None), {}), ('addPoint', ((3, 2), None, None, None), {}), ('addPoint', ((4, 1), None, None, None), {}), ('addPoint', ((4, 0), 'curve', None, None), {}), ('endPath', (), {})], [(0, 0), (0, 1), (1, 2), (3, 2), (4, 1), (4, 0), (0, 0), (0, 1), (1, 2), (3, 2), (4, 1), (4, 0)], [1, 128, 128, 128, 128, 1, 1, 128, 128, 128, 128, 1], [5, 11])]) def test_cubic_topology(self, dropImpliedOnCurves, segment_pen_commands, point_pen_commands, expected_coordinates, expected_flags, expected_endPts): spen = TTGlyphPen(None) rpen = RecordingPen() rpen.value = segment_pen_commands rpen.replay(spen) ppen = TTGlyphPointPen(None) rpen = RecordingPointPen() rpen.value = point_pen_commands rpen.replay(ppen) for pen in (spen, ppen): glyph = pen.glyph(dropImpliedOnCurves=dropImpliedOnCurves) assert (list(glyph.coordinates) == expected_coordinates) assert (list(glyph.flags) == expected_flags) assert (list(glyph.endPtsOfContours) == expected_endPts) rpen = RecordingPen() glyph.draw(rpen, None) assert (rpen.value == segment_pen_commands)
class Measurement(BasicObject): attributes = {'PHASE': utils.scalar, 'MEASUREMENT-SOURCE': utils.scalar, 'TYPE': utils.scalar, 'DIMENSION': utils.reverse, 'AXIS': utils.reverse, 'MEASUREMENT': utils.vector, 'SAMPLE-COUNT': utils.scalar, 'MAXIMUM-DEVIATION': utils.vector, 'STANDARD-DEVIATION': utils.vector, 'BEGIN-TIME': utils.scalar, 'DURATION': utils.scalar, 'REFERENCE': utils.vector, 'STANDARD': utils.vector, 'PLUS-TOLERANCE': utils.vector, 'MINUS-TOLERANCE': utils.vector} linkage = {'AXIS': utils.obname('AXIS'), 'MEASUREMENT-SOURCE': utils.objref} def __init__(self, attic, lf): super().__init__(attic, lf=lf) def phase(self): return self['PHASE'] def source(self): return self['MEASUREMENT-SOURCE'] def mtype(self): return self['TYPE'] def dimension(self): return self['DIMENSION'] def axis(self): return self['AXIS'] def samplecount(self): return self['SAMPLE-COUNT'] def begin_time(self): return self['BEGIN-TIME'] def duration(self): return self['DURATION'] def standard(self): return self['STANDARD'] def samples(self): try: samples = self.attic['MEASUREMENT'].value except KeyError: return np.empty(0) shape = utils.validshape(samples, self.dimension) return utils.sampling(samples, shape) def max_deviation(self): try: dev = self.attic['MAXIMUM-DEVIATION'].value except KeyError: return np.empty(0) shape = utils.validshape(dev, self.dimension) return utils.sampling(dev, shape, single=True) def std_deviation(self): try: dev = self.attic['STANDARD-DEVIATION'].value except KeyError: return np.empty(0) shape = utils.validshape(dev, self.dimension) return utils.sampling(dev, shape, single=True) def reference(self): try: ref = self.attic['REFERENCE'].value except KeyError: return np.empty(0) shape = utils.validshape(ref, self.dimension) return utils.sampling(ref, shape, single=True) def plus_tolerance(self): try: tolerance = self.attic['PLUS-TOLERANCE'].value except KeyError: return np.empty(0) shape = utils.validshape(tolerance, self.dimension) return utils.sampling(tolerance, shape, single=True) def minus_tolerance(self): try: tolerance = self.attic['MINUS-TOLERANCE'].value except KeyError: return np.empty(0) shape = utils.validshape(tolerance, self.dimension) return utils.sampling(tolerance, shape, single=True) def describe_attr(self, buf, width, indent, exclude): d = OrderedDict() d['Type of measurement'] = 'TYPE' d['Calibration standard'] = 'STANDARD' d['Phase in job sequence'] = 'PHASE' d['Start time of acquisition'] = 'BEGIN-TIME' d['Duration time'] = 'DURATION' d['Data source'] = 'MEASUREMENT-SOURCE' utils.describe_header(buf, 'Metadata', width, indent, lvl=2) utils.describe_attributes(buf, d, self, width, indent, exclude) d = OrderedDict() d['Dimensions'] = 'DIMENSION' d['Axis labels'] = 'AXIS' try: samplecount = len(self.samples) except ValueError: samplecount = 0 d['Number of values'] = samplecount samples = 'Samples used to compute std/max-dev' d[samples] = 'SAMPLE-COUNT' if exclude['empty']: d = utils.remove_empties(d) if d: utils.describe_header(buf, 'Samples', width, indent, lvl=2) utils.describe_attributes(buf, d, self, width, indent, exclude) d = OrderedDict() d['Reference'] = 'REFERENCE' d['Minus Tolerance'] = 'MINUS-TOLERANCE' d['Plus Tolerance'] = 'PLUS-TOLERANCE' d['Std deviation'] = 'STANDARD-DEVIATION' d['Max deviation'] = 'MAXIMUM-DEVIATION' utils.describe_sampled_attrs(buf, self.attic, self.dimension, 'MEASUREMENT', d, width, indent, exclude)
_production class Term(ASTNode): implicit_pushdown = inherited(implicit_pushdown=True) depth = inherited() index = inherited() index2 = synthesized() value = synthesized() type = synthesized() subtree_depth = synthesized() string = synthesized() summary = synthesized() def summary(self): return ('%s, %s' % (self.value, self.type)) def index2(self): if (self.index is None): return None return (self.index * 2) def rule_index(self) -> (Term.index All): return None def rule_depth(self) -> (Term.depth All): return (self.depth + 1)
def merge_subsets(a: Dict[(str, Any)], b: Dict[(str, Any)]) -> None: for key in b: if (key not in a): a[key] = b[key] elif (('fields' in a[key]) and ('fields' in b[key])): if (b[key]['fields'] == '*'): a[key]['fields'] = '*' elif (isinstance(a[key]['fields'], dict) and isinstance(b[key]['fields'], dict)): merge_subsets(a[key]['fields'], b[key]['fields']) elif (('fields' in a[key]) or ('fields' in b[key])): raise ValueError("Subsets unmergeable: 'fields' found in key '{}' in only one subset".format(key)) if (a[key].get('enabled', True) or b[key].get('enabled', True)): a[key].pop('enabled', None) if (a[key].get('index', True) or b[key].get('index', True)): a[key].pop('index', None)
def test_export_incompatible_runtime_config(kubeflow_pipelines_runtime_instance, airflow_runtime_instance): runner = CliRunner() pipeline_file = 'kubeflow_pipelines.pipeline' p = (((Path(__file__).parent / 'resources') / 'pipelines') / f'{pipeline_file}') assert p.is_file() result = runner.invoke(pipeline, ['export', str(p), '--runtime-config', airflow_runtime_instance]) assert (result.exit_code != 0), result.output assert ("The runtime configuration type 'APACHE_AIRFLOW' does not match the pipeline's runtime type 'KUBEFLOW_PIPELINES'." in result.output) pipeline_file = 'airflow.pipeline' p = (((Path(__file__).parent / 'resources') / 'pipelines') / f'{pipeline_file}') assert p.is_file() result = runner.invoke(pipeline, ['export', str(p), '--runtime-config', kubeflow_pipelines_runtime_instance]) assert (result.exit_code != 0), result.output assert ("The runtime configuration type 'KUBEFLOW_PIPELINES' does not match the pipeline's runtime type 'APACHE_AIRFLOW'." in result.output)
class ShutterReleaseLever(): def __init__(self, exposure_control_system=None): self.exposure_control_system = exposure_control_system def depress(self): if (not self.exposure_control_system): return self.exposure_control_system.exposure_level_lever.activate() self.exposure_control_system.read_meter() if self.exposure_control_system.shutter_lock_lever.blocks: self.exposure_control_system.exposure_level_lever.deactivate() print('Shutter release blocked') return if (self.exposure_control_system.mode == 'Shutter priority'): aperture = self.exposure_control_system.aperture_set_lever.aperture if self.exposure_control_system.shutter.cocked: self.exposure_control_system.iris.aperture = aperture elif (aperture > self.exposure_control_system.iris.aperture): self.exposure_control_system.iris.aperture = aperture print(f'Applying aperture value /{self.exposure_control_system.aperture_set_lever.aperture:.2g} to iris') self.exposure_control_system.shutter.trip() self.exposure_control_system.exposure_level_lever.deactivate()
() def flask_app(): app = Flask(__name__) ('/an-error/', methods=['GET', 'POST']) def an_error(): raise ValueError('hello world') ('/users/', methods=['GET', 'POST']) def users(): response = make_response(render_template('users.html', users=['Ron', 'Rasmus'])) response.headers.add('foo', 'bar') response.headers.add('foo', 'baz') response.headers.add('bar', 'bazzinga') return response ('/non-standard-status/', methods=['GET', 'POST']) def non_standard_status(): return ('foo', 'fail') ('/streaming/', methods=['GET']) def streaming(): def generator(): for i in range(5): with elasticapm.capture_span('generator'): time.sleep(0.01) (yield str(i)) return Response(generator(), mimetype='text/plain') ('/transaction-name/', methods=['GET']) def transaction_name(): elasticapm.set_transaction_name('foo') elasticapm.set_transaction_result('okydoky') return Response('') return app
def naics_data(db): baker.make(NAICS, code='212113', description='Anthracite Mining') baker.make(NAICS, code='212112', description='Bituminous Coal Underground Mining') baker.make(NAICS, code='213111', description='Drilling Oil and Gas Wells') baker.make(NAICS, code='111331', description='Apple Orchards')
class BasePlaylistPanelMixin(GObject.GObject): _gsignals_ = {'playlist-selected': (GObject.SignalFlags.RUN_LAST, None, (object,)), 'tracks-selected': (GObject.SignalFlags.RUN_LAST, None, (object,)), 'append-items': (GObject.SignalFlags.RUN_LAST, None, (object, bool)), 'replace-items': (GObject.SignalFlags.RUN_LAST, None, (object,)), 'queue-items': (GObject.SignalFlags.RUN_LAST, None, (object,))} playlist_nodes: Dict[(Playlist, Gtk.TreeIter)] deletion_dialogs: Dict[(Union[(Playlist, SmartPlaylist)], Gtk.Dialog)] def __init__(self): GObject.GObject.__init__(self) self.playlist_nodes = {} self.track_image = icons.MANAGER.pixbuf_from_icon_name('audio-x-generic', Gtk.IconSize.SMALL_TOOLBAR) self.deletion_dialogs = {} def remove_playlist(self, ignored=None): selected_playlist = self.tree.get_selected_page(raw=True) if (selected_playlist is None): return dialog = self.deletion_dialogs.get(selected_playlist) if dialog: dialog.present() return def on_response(dialog, response): if (response == Gtk.ResponseType.YES): if isinstance(selected_playlist, SmartPlaylist): self.smart_manager.remove_playlist(selected_playlist.name) else: self.playlist_manager.remove_playlist(selected_playlist.name) del self.playlist_nodes[selected_playlist] selection = self.tree.get_selection() (model, iter) = selection.get_selected() self.model.remove(iter) del self.deletion_dialogs[selected_playlist] dialog.destroy() dialog = Gtk.MessageDialog(buttons=Gtk.ButtonsType.YES_NO, message_type=Gtk.MessageType.QUESTION, text=(_('Delete the playlist "%s"?') % selected_playlist.name), transient_for=self.parent) dialog.connect('response', on_response) self.deletion_dialogs[selected_playlist] = dialog dialog.present() def rename_playlist(self, playlist): if (playlist is None): return dialog = dialogs.TextEntryDialog(_('Enter the new name you want for your playlist'), _('Rename Playlist'), playlist.name, parent=self.parent) result = dialog.run() name = dialog.get_value() dialog.destroy() if ((result != Gtk.ResponseType.OK) or (name == '')): return if (name in self.playlist_manager.playlists): dialogs.error(self.parent, _('The playlist name you entered is already in use.')) return selection = self.tree.get_selection() (model, iter) = selection.get_selected() model.set_value(iter, 1, name) self.playlist_manager.rename_playlist(playlist, name) def open_selected_playlist(self): selection = self.tree.get_selection() (model, iter) = selection.get_selected() self.open_item(self.tree, model.get_path(iter), None) def on_rating_changed(self, widget, rating): tracks = self.get_selected_tracks() for track in tracks: track.set_rating(rating) maximum = settings.get_option('rating/maximum', 5) event.log_event('rating_changed', self, ((100 * rating) / maximum)) def open_item(self, tree, path, col): iter = self.model.get_iter(path) item = self.model.get_value(iter, 2) if (item is not None): if isinstance(item, (Playlist, SmartPlaylist)): if hasattr(item, 'get_playlist'): try: item = item.get_playlist(self.collection) except Exception as e: logger.exception('Error loading smart playlist') dialogs.error(self.parent, (_('Error loading smart playlist: %s') % str(e))) return else: item = self.playlist_manager.get_playlist(item.name) self.emit('playlist-selected', item) else: self.emit('append-items', [item.track], True) def add_new_playlist(self, tracks=[], name=None): if name: if (name in self.playlist_manager.playlists): name = dialogs.ask_for_playlist_name(self.get_panel().get_toplevel(), self.playlist_manager, name) else: if tracks: artists = [] composers = [] albums = [] for track in tracks: artist = track.get_tag_display('artist', artist_compilations=False) if (artist is not None): artists += [artist] composer = track.get_tag_display('composer', artist_compilations=False) if (composer is not None): composers += composer album = track.get_tag_display('album') if (album is not None): albums += album artists = list(set(artists))[:3] composers = list(set(composers))[:3] albums = list(set(albums))[:3] if (len(artists) > 0): name = artists[0] if (len(artists) > 2): name = (_('%(first)s, %(second)s and others') % {'first': artists[0], 'second': artists[1]}) elif (len(artists) > 1): name = (_('%(first)s and %(second)s') % {'first': artists[0], 'second': artists[1]}) elif (len(composers) > 0): name = composers[0] if (len(composers) > 2): name = (_('%(first)s, %(second)s and others') % {'first': composers[0], 'second': composers[1]}) elif (len(composers) > 1): name = (_('%(first)s and %(second)s') % {'first': composers[0], 'second': composers[1]}) elif (len(albums) > 0): name = albums[0] if (len(albums) > 2): name = (_('%(first)s, %(second)s and others') % {'first': albums[0], 'second': albums[1]}) elif (len(albums) > 1): name = (_('%(first)s and %(second)s') % {'first': albums[0], 'second': albums[1]}) else: name = '' name = dialogs.ask_for_playlist_name(self.get_panel().get_toplevel(), self.playlist_manager, name) if (name is not None): new_playlist = Playlist(name) new_playlist.extend(tracks) self.playlist_manager.save_playlist(new_playlist) return name def _load_playlist_nodes(self, playlist): if (playlist not in self.playlist_nodes): return expanded = self.tree.row_expanded(self.model.get_path(self.playlist_nodes[playlist])) self._clear_node(self.playlist_nodes[playlist]) parent = self.playlist_nodes[playlist] for track in playlist: if (not track): continue wrapper = TrackWrapper(track, playlist) row = (self.track_image, str(wrapper), wrapper) self.model.append(parent, row) if expanded: self.tree.expand_row(self.model.get_path(self.playlist_nodes[playlist]), False) def remove_selected_track(self): selection = self.tree.get_selection() (model, iter) = selection.get_selected() track = model.get_value(iter, 2) if isinstance(track, TrackWrapper): del track.playlist[track.playlist.index(track.track)] self.model.remove(iter) self.playlist_manager.save_playlist(track.playlist, overwrite=True)
class SplineCV(BaseGridder): def __init__(self, mindists=None, dampings=(1e-10, 1e-05, 0.1), force_coords=None, engine='auto', cv=None, client=None, delayed=False, scoring=None): super().__init__() self.dampings = dampings if (mindists is None): self.mindists = [0] else: self.mindists = mindists warnings.warn('The mindists parameter of verde.SplineCV is no longer required and will be removed in Verde 2.0.0. Use the default value to obtain the future behavior.', FutureWarning, stacklevel=2) self.force_coords = force_coords self.engine = engine self.cv = cv self.client = client self.delayed = delayed self.scoring = scoring if (engine != 'auto'): warnings.warn("The 'engine' parameter of 'verde.SplineCV' is deprecated and will be removed in Verde 2.0.0. The faster and memory efficient numba engine will be the only option.", FutureWarning, stacklevel=2) if (client is not None): warnings.warn("The 'client' parameter of 'verde.SplineCV' is deprecated and will be removed in Verde 2.0.0. Use the 'delayed' parameter instead.", FutureWarning, stacklevel=2) def fit(self, coordinates, data, weights=None): parameter_sets = [dict(mindist=combo[0], damping=combo[1], engine=self.engine, force_coords=self.force_coords) for combo in itertools.product(self.mindists, self.dampings)] if (self.client is not None): scores = [] for params in parameter_sets: spline = Spline(**params) scores.append(self.client.submit(cross_val_score, spline, coordinates=coordinates, data=data, weights=weights, cv=self.cv)) scores = [np.mean(score.result()) for score in scores] else: scores = [] for params in parameter_sets: spline = Spline(**params) score = cross_val_score(spline, coordinates=coordinates, data=data, weights=weights, cv=self.cv, delayed=self.delayed, scoring=self.scoring) scores.append(dispatch(np.mean, delayed=self.delayed)(score)) best = dispatch(np.argmax, delayed=self.delayed)(scores) if self.delayed: best = best.compute() else: scores = np.asarray(scores) self.spline_ = Spline(**parameter_sets[best]) self.spline_.fit(coordinates, data, weights=weights) self.scores_ = scores return self def force_(self): return self.spline_.force_ def region_(self): return self.spline_.region_ def damping_(self): return self.spline_.damping def mindist_(self): return self.spline_.mindist def force_coords_(self): return self.spline_.force_coords_ def predict(self, coordinates): check_is_fitted(self, ['spline_']) return self.spline_.predict(coordinates)
def _write_tf_record(tasks, output_file, reverse_class_mapping_dict): writer = tf.python_io.TFRecordWriter(output_file) counter = 0 for task in tasks: if (task['answer'] == 'accept'): tf_example = create_a_tf_example(task, reverse_class_mapping_dict) writer.write(tf_example.SerializeToString()) counter += 1 else: continue writer.close() log('Successfully written {} annotations as TFRecords'.format(counter)) return counter
def lang_emoji(lang): if (lang == 'en'): emoji = '' elif (lang == 'de'): emoji = '' elif (lang == 'es'): emoji = '' elif (lang == 'se'): emoji = '' elif (lang == 'no'): emoji = '' elif (lang == 'ru'): emoji = '' elif (lang == 'ua'): emoji = '' elif (lang == 'it'): emoji = '' elif (lang == 'nz'): emoji = '' elif (lang == 'nl'): emoji = '' elif (lang == 'mx'): emoji = '' elif (lang == 'pt'): emoji = '' elif (lang == 'br'): emoji = '' elif (lang == 'au'): emoji = '' elif (lang == 'ca'): emoji = '' elif (lang == 'cr'): emoji = '' elif (lang == 'dk'): emoji = '' elif (lang == 'ie'): emoji = '' elif (lang == 'is'): emoji = '' elif (lang == 'th'): emoji = '' elif (lang == 'fr'): emoji = '' elif (lang == 'gr'): emoji = '' elif (lang == 'pl'): emoji = '' elif (lang == 'fi'): emoji = '' elif (lang == 'hk'): emoji = '' elif (lang == 'ar'): emoji = '' elif (lang == 'tr'): emoji = '' elif (lang == 'kr'): emoji = '' elif (lang == 'jp'): emoji = '' elif (lang == 'cn'): emoji = '' elif (lang == 'in'): emoji = '' else: emoji = lang return emoji
('thermoanalysis') .parametrize('id_, dG_ref', ((24, 0.), (63, 0.), (84, 0.))) def test_irc_h5(this_dir, id_, dG_ref): h5 = (this_dir / f'irc_000.0{id_}.orca.h5') geom = geom_from_hessian(h5) thermo = geom.get_thermoanalysis() print_thermoanalysis(thermo) assert (thermo.dG == pytest.approx(dG_ref, abs=0.0025))
class AggregatedExceptions(Exception): def __init__(self) -> None: super(AggregatedExceptions, self).__init__() self.exceptions: List[BaseException] = [] def append_exception(self, exception: BaseException) -> None: if isinstance(exception, AggregatedExceptions): self.exceptions.extend(exception.exceptions) else: self.exceptions.append(exception) def catch(self) -> Iterator[None]: try: (yield) except BaseException as exception: self.append_exception(exception) def __str__(self) -> str: return ('{} failures.\n'.format(len(self.exceptions)) + '\n'.join((f'{type(e)}: {str(e)}' for e in self.exceptions))) def raise_correct_exception(self) -> None: if (not self.exceptions): return ex_types = {type(ex) for ex in self.exceptions} if ((Skip in ex_types) or (unittest.SkipTest in ex_types)): raise Skip() elif (len(self.exceptions) == 1): raise self.exceptions[0] else: raise self if (len(self.exceptions) == 1): raise self.exceptions[0] else: raise self
class QCEngine(Calculator): def __init__(self, program, model, keywords=None, connectivity=None, bond_order=1, **kwargs): super().__init__(**kwargs) self.program = program self.model = model if (keywords is None): keywords = dict() self.keywords = dict(keywords) self.connectivity = connectivity self.bond_order = int(bond_order) def get_molecule(self, atoms, coords): c3d = coords.reshape((- 1), 3) mol_inp = {'symbols': atoms, 'geometry': c3d, 'molecular_charge': self.charge, 'molecular_multiplicity': self.mult} if (self.program == 'openmm'): if (self.connectivity is None): self.log(f'No connectivity specified! Using hacky connectivity guess with bond-order={self.bond_order}') connectivity = qcel.molutil.guess_connectivity(atoms, c3d, threshold=1.3) self.connectivity = [(at1, at2, self.bond_order) for (at1, at2) in connectivity] mol_inp['connectivity'] = self.connectivity molecule = qcel.models.Molecule.from_data(mol_inp) return molecule def compute(self, molecule, driver): inp = {'molecule': molecule, 'driver': driver, 'model': self.model, 'keywords': self.keywords} result = qcng.compute(inp, program=self.program, return_dict=True) self.calc_counter += 1 return result def keep_stdout(self, res): if ('stdout' in res): with open(self.make_fn(f'qce_{self.program}_stdout'), 'w') as handle: handle.write(res['stdout']) def get_energy(self, atoms, coords, **prepare_kwargs): mol = self.get_molecule(atoms, coords) res = self.compute(mol, driver='energy') self.keep_stdout(res) results = {'energy': res['return_result']} return results def get_forces(self, atoms, coords, **prepare_kwargs): mol = self.get_molecule(atoms, coords) res = self.compute(mol, driver='gradient') self.keep_stdout(res) results = {'energy': res['properties']['return_energy'], 'forces': (- np.array(res['return_result']))} return results def get_hessian(self, atoms, coords, **prepare_kwargs): mol = self.get_molecule(atoms, coords) res = self.compute(mol, driver='hessian') self.keep_stdout(res) size = (3 * len(atoms)) shape = (size, size) results = {'energy': res['properties']['return_energy'], 'hessian': np.array(res['return_result']).reshape(shape)} return results def __str__(self): return f'QCECalculator({self.name})'
_on_exception class TestMain(): def test_should_fail_if_no_files_were_found(self, tmp_path: Path, sample_layout_document: SampleLayoutDocument, fulltext_models_mock: MockFullTextModels): configure_fulltext_models_mock_with_sample_document(fulltext_models_mock, sample_layout_document) output_path = (tmp_path / 'generated-data') with pytest.raises(FileNotFoundError): main([f'--source-path={NON_EXISTING_PDF_PATTERN}', f'--output-path={output_path}']) assert (not output_path.exists()) def test_should_be_able_to_generate_segmentation_training_data(self, tmp_path: Path, sample_layout_document: SampleLayoutDocument, fulltext_models_mock: MockFullTextModels): configure_fulltext_models_mock_with_sample_document(fulltext_models_mock, sample_layout_document) output_path = (tmp_path / 'generated-data') main([f'--source-path={MINIMAL_EXAMPLE_PDF_PATTERN}', f'--output-path={output_path}']) assert output_path.exists() xml_root = _check_tei_training_data_generator_output_and_return_xml_root(SegmentationTeiTrainingDataGenerator(), output_path=output_path, expect_raw_data=True, source_filename=MINIMAL_EXAMPLE_PDF) assert get_text_content_list(xml_root.xpath('text')) assert (not get_text_content_list(xml_root.xpath('text/front'))) xml_root = _check_tei_training_data_generator_output_and_return_xml_root(HeaderTeiTrainingDataGenerator(), output_path=output_path, expect_raw_data=True, source_filename=MINIMAL_EXAMPLE_PDF) assert get_text_content_list(xml_root.xpath('text/front')) def test_should_add_gz_suffix_if_enabled(self, tmp_path: Path, sample_layout_document: SampleLayoutDocument, fulltext_models_mock: MockFullTextModels): configure_fulltext_models_mock_with_sample_document(fulltext_models_mock, sample_layout_document) output_path = (tmp_path / 'generated-data') main([f'--source-path={MINIMAL_EXAMPLE_PDF_PATTERN}', f'--output-path={output_path}', '--gzip']) assert output_path.exists() tei_training_data_generator = SegmentationTeiTrainingDataGenerator() tei_filename_suffix = tei_training_data_generator.get_default_tei_filename_suffix() assert tei_filename_suffix expected_tei_path = _get_expected_file_path_with_suffix(output_path, MINIMAL_EXAMPLE_PDF, (tei_filename_suffix + '.gz')) assert expected_tei_path.exists() with gzip.open(expected_tei_path, 'r') as fp: etree.parse(fp) data_filename_suffix = tei_training_data_generator.get_default_data_filename_suffix() assert data_filename_suffix expected_data_path = _get_expected_file_path_with_suffix(output_path, MINIMAL_EXAMPLE_PDF, (data_filename_suffix + '.gz')) assert expected_data_path.exists() with gzip.open(expected_data_path, 'r') as fp: fp.read() def test_should_be_able_to_generate_segmentation_training_data_using_model(self, tmp_path: Path, sample_layout_document: SampleLayoutDocument, fulltext_models_mock: MockFullTextModels): configure_fulltext_models_mock_with_sample_document(fulltext_models_mock, sample_layout_document) output_path = (tmp_path / 'generated-data') main([f'--source-path={MINIMAL_EXAMPLE_PDF_PATTERN}', f'--output-path={output_path}', '--use-model']) assert output_path.exists() xml_root = _check_tei_training_data_generator_output_and_return_xml_root(SegmentationTeiTrainingDataGenerator(), output_path=output_path, expect_raw_data=True, source_filename=MINIMAL_EXAMPLE_PDF) assert get_text_content_list(xml_root.xpath('text/front')) xml_root = _check_tei_training_data_generator_output_and_return_xml_root(HeaderTeiTrainingDataGenerator(), output_path=output_path, expect_raw_data=True, source_filename=MINIMAL_EXAMPLE_PDF) assert get_text_content_list(xml_root.xpath('text/front')) def test_should_allow_to_use_directory_structure(self, tmp_path: Path, sample_layout_document: SampleLayoutDocument, fulltext_models_mock: MockFullTextModels): configure_fulltext_models_mock_with_sample_document(fulltext_models_mock, sample_layout_document) output_path = (tmp_path / 'generated-data') main(['--use-directory-structure', f'--source-path={MINIMAL_EXAMPLE_PDF_PATTERN}', f'--output-path={output_path}']) assert output_path.exists() expected_output_path_and_suffix_list = [((((output_path / 'segmentation') / 'corpus') / 'tei'), SegmentationTeiTrainingDataGenerator().get_default_tei_filename_suffix()), ((((output_path / 'segmentation') / 'corpus') / 'raw'), SegmentationTeiTrainingDataGenerator().get_default_data_filename_suffix()), ((((output_path / 'header') / 'corpus') / 'tei'), HeaderTeiTrainingDataGenerator().get_default_tei_filename_suffix()), ((((output_path / 'header') / 'corpus') / 'raw'), HeaderTeiTrainingDataGenerator().get_default_data_filename_suffix()), ((((output_path / 'fulltext') / 'corpus') / 'tei'), FullTextTeiTrainingDataGenerator().get_default_tei_filename_suffix()), ((((output_path / 'fulltext') / 'corpus') / 'raw'), FullTextTeiTrainingDataGenerator().get_default_data_filename_suffix()), ((((output_path / 'figure') / 'corpus') / 'tei'), FigureTeiTrainingDataGenerator().get_default_tei_filename_suffix()), ((((output_path / 'figure') / 'corpus') / 'raw'), FigureTeiTrainingDataGenerator().get_default_data_filename_suffix()), ((((output_path / 'table') / 'corpus') / 'tei'), TableTeiTrainingDataGenerator().get_default_tei_filename_suffix()), ((((output_path / 'table') / 'corpus') / 'raw'), TableTeiTrainingDataGenerator().get_default_data_filename_suffix()), ((((output_path / 'reference-segmenter') / 'corpus') / 'tei'), ReferenceSegmenterTeiTrainingDataGenerator().get_default_tei_filename_suffix()), ((((output_path / 'reference-segmenter') / 'corpus') / 'raw'), ReferenceSegmenterTeiTrainingDataGenerator().get_default_data_filename_suffix()), (((output_path / 'affiliation-address') / 'corpus'), AffiliationAddressTeiTrainingDataGenerator.DEFAULT_TEI_FILENAME_SUFFIX), (((output_path / 'citation') / 'corpus'), CitationTeiTrainingDataGenerator.DEFAULT_TEI_FILENAME_SUFFIX), ((((output_path / 'name') / 'header') / 'corpus'), ('.header' + NameTeiTrainingDataGenerator.DEFAULT_TEI_FILENAME_SUFFIX)), ((((output_path / 'name') / 'citation') / 'corpus'), ('.citations' + NameTeiTrainingDataGenerator.DEFAULT_TEI_FILENAME_SUFFIX))] for (model_output_path, suffix) in expected_output_path_and_suffix_list: file_path = _get_expected_file_path_with_suffix(model_output_path, MINIMAL_EXAMPLE_PDF, suffix) assert file_path.exists()
class ListenerFactory(): def load_all(cls, ir: 'IR', aconf: Config) -> None: amod = ir.ambassador_module listeners = aconf.get_config('listeners') if listeners: for config in listeners.values(): ir.logger.debug(('ListenerFactory: creating Listener for %s' % repr(config.as_dict()))) listener = IRListener(ir, aconf, **config) if listener.is_active(): listener.referenced_by(config) listener.sourced_by(config) ir.logger.debug(f'ListenerFactory: saving Listener {listener}') ir.save_listener(listener) else: ir.logger.debug(f'ListenerFactory: not saving inactive Listener {listener}') def finalize(cls, ir: 'IR', aconf: Config) -> None: for group in ir.ordered_groups(): if (not isinstance(group, IRTCPMappingGroup)): continue group_key = group.bind_to() if (group_key not in ir.listeners): group_host = group.get('host', None) protocol = ('TLS' if group_host else 'TCP') bind_address = (group.get('address') or Config.envoy_bind_address) name = f'listener-{bind_address}-{group.port}' ir.logger.debug(('ListenerFactory: synthesizing %s listener for TCPMappingGroup on %s:%d' % (protocol, bind_address, group.port))) ir.save_listener(IRListener(ir, aconf, '-internal-', name, '-internal-', bind_address=bind_address, port=group.port, protocol=protocol, securityModel='SECURE', hostBinding={'namespace': {'from': 'SELF'}}))
class OptionPlotoptionsColumnStatesHover(Options): def animation(self) -> 'OptionPlotoptionsColumnStatesHoverAnimation': return self._config_sub_data('animation', OptionPlotoptionsColumnStatesHoverAnimation) def borderColor(self): return self._config_get(None) def borderColor(self, text: str): self._config(text, js_type=False) def brightness(self): return self._config_get(0.1) def brightness(self, num: float): self._config(num, js_type=False) def color(self): return self._config_get(None) def color(self, text: str): self._config(text, js_type=False) def enabled(self): return self._config_get(True) def enabled(self, flag: bool): self._config(flag, js_type=False)
def redox_result_to_qcdata(redox_result): geom = redox_result.geom_gas H = geom.eckart_projection(geom.mass_weigh_hessian(redox_result.hessian_gas)) (w, v) = np.linalg.eigh(H) nus = eigval_to_wavenumber(w) thermo_dict = {'masses': geom.masses, 'vibfreqs': nus, 'coords3d': geom.coords3d, 'energy': redox_result.energy_gas, 'mult': redox_result.mult} qcd = QCData(thermo_dict) return qcd
def _map_privacy_request(privacy_request: PrivacyRequest) -> Dict[(str, Any)]: request_data = {} request_data['id'] = privacy_request.id action_type: Optional[ActionType] = privacy_request.policy.get_action_type() if action_type: request_data['type'] = action_type.value identity: Identity = privacy_request.get_persisted_identity() if identity.email: request_data['email'] = identity.email if privacy_request.requested_at: request_data['requested_at'] = privacy_request.requested_at.strftime('%m/%d/%Y %H:%M %Z') return request_data
class OptionSeriesVariwideLabelStyle(Options): def fontSize(self): return self._config_get('0.8em') def fontSize(self, num: float): self._config(num, js_type=False) def fontWeight(self): return self._config_get('bold') def fontWeight(self, text: str): self._config(text, js_type=False)
class DockLayout(LayoutItem): left = Union(Instance(PaneItem), Instance(Tabbed), Instance(Splitter)) right = Union(Instance(PaneItem), Instance(Tabbed), Instance(Splitter)) top = Union(Instance(PaneItem), Instance(Tabbed), Instance(Splitter)) bottom = Union(Instance(PaneItem), Instance(Tabbed), Instance(Splitter)) top_left_corner = Enum('top', 'left') top_right_corner = Enum('top', 'right') bottom_left_corner = Enum('bottom', 'left') bottom_right_corner = Enum('bottom', 'right')
def create_embed_relu_relu_softmax(depth, width, vector_length): with Model.define_operators({'>>': chain}): model = (strings2arrays() >> with_array(((((HashEmbed(width, vector_length, column=0) >> expand_window(window_size=1)) >> Relu(width, (width * 3))) >> Relu(width, width)) >> Softmax(17, width)))) return model
def extractYuukouUs(item): (vol, chp, frag, postfix) = extractVolChapterFragmentPostfix(item['title']) if ((not (chp or vol)) or ('preview' in item['title'].lower())): return None tagmap = [('PRC', 'PRC', 'translated'), ('Loiterous', 'Loiterous', 'oel')] for (tagname, name, tl_type) in tagmap: if (tagname in item['tags']): return buildReleaseMessageWithType(item, name, vol, chp, frag=frag, postfix=postfix, tl_type=tl_type) return False
def test_default_integer_argument(): integer = IntegerArgument() validation_status = integer.validate('45') assert validation_status assert (validation_status.value() == '45') assert (validation_status.message() == '') validation_status = integer.validate('-45') assert validation_status assert (validation_status.value() == '-45') validation_status = integer.validate('45 ') assert (not validation_status) assert (validation_status.message() != '') assert (validation_status.value() is None) validation_status = integer.validate('gx') assert (not validation_status) assert (validation_status.message() != '')
() def patch_module_device(monkeypatch, calibration_raw, capture_factory): class ColorControl(): mode: int value: int class DeviceHandle(): def __init__(self, device_id: int): self._meta: DeviceMeta = DEVICE_METAS[device_id] self._opened = True self._cameras_started = False self._imu_started = False self._color_controls: Mapping[(ColorControlCommand, ColorControl)] = self._default_color_controls() def _default_color_controls(self) -> Mapping[(ColorControlCommand, ColorControl)]: return {color_control['color_control_command']: ColorControl(mode=color_control['default_mode'], value=color_control['default_value']) for color_control in self._meta.color_controls} def close(self) -> int: assert (self._opened is True) self._opened = False return Result.Success.value def get_sync_jack(self) -> Tuple[(int, bool, bool)]: assert (self._opened is True) return (Result.Success.value, self._meta.jack_in, self._meta.jack_out) def device_get_color_control(self, cmd: int) -> Tuple[(int, int, int)]: assert (self._opened is True) control = self._color_controls[ColorControlCommand(cmd)] return (Result.Success.value, control.mode, control.value) def device_set_color_control(self, cmd: int, mode: int, value: int): assert (self._opened is True) command = ColorControlCommand(cmd) control = self._color_controls[command] for color_control_meta in self._meta.color_controls: if (color_control_meta['color_control_command'] == command): control_meta: ColorControlCapabilities = color_control_meta break else: raise ValueError(f'Unknown cmd: {cmd}') if (ColorControlMode(mode) == ColorControlMode.AUTO): if (not control_meta['supports_auto']): return Result.Failed.value control.mode = mode control.value = control_meta['default_value'] else: if ((value < color_control_meta['min_value']) or (value > color_control_meta['max_value'])): return Result.Failed.value control.mode = mode control.value = value return Result.Success.value def device_get_color_control_capabilities(self, cmd: int) -> Tuple[(int, ColorControlCapabilities)]: assert (self._opened is True) command = ColorControlCommand(cmd) for color_control_meta in self._meta.color_controls: if (color_control_meta['color_control_command'] == command): control_meta: ColorControlCapabilities = color_control_meta break else: raise ValueError(f'Unknown cmd: {cmd}') return (Result.Success.value, control_meta) def device_start_cameras(self) -> int: assert (self._opened is True) if self._cameras_started: return Result.Failed.value self._cameras_started = True return Result.Success.value def device_stop_cameras(self) -> int: assert (self._opened is True) if (not self._cameras_started): return Result.Failed.value self._cameras_started = False return Result.Success.value def device_start_imu(self) -> int: assert (self._opened is True) if (not self._cameras_started): return Result.Failed.value if self._imu_started: return Result.Failed.value self._imu_started = True return Result.Success.value def device_stop_imu(self) -> int: assert (self._opened is True) if (not self._imu_started): return Result.Failed.value self._imu_started = False return Result.Success.value def device_get_capture(self) -> Tuple[(int, Optional[object])]: assert (self._opened is True) if (not self._cameras_started): return (Result.Failed.value, None) return (Result.Success.value, capture_factory()) def device_get_imu_sample(self) -> Tuple[(int, Optional[Tuple[(float, Tuple[(float, float, float)], int, Tuple[(float, float, float)], int)]])]: assert (self._opened is True) if (not self._cameras_started): return (Result.Failed.value, None) return (Result.Success.value, (36.6, (0.1, 9.8, 0.005), int((time.time() * 1000000.0)), (0.1, 0.2, 0.3), int((time.time() * 1000000.0)))) def device_get_calibration(self, depth_mode: int, color_resolution: int) -> Tuple[(int, Optional[object])]: assert (self._opened is True) calibration = Calibration.from_raw(calibration_raw, DepthMode.NFOV_UNBINNED, ColorResolution.RES_720P) return (Result.Success.value, calibration._calibration_handle) def device_get_raw_calibration(self) -> Optional[str]: assert (self._opened is True) return '{}' def device_get_serialnum(self) -> str: assert (self._opened is True) return self._meta.serial def _device_open(device_id: int, thread_safe: bool) -> Tuple[(int, object)]: if (device_id not in DEVICE_METAS): return (Result.Failed.value, None) capsule = DeviceHandle(device_id) return (Result.Success.value, capsule) def _device_close(capsule: DeviceHandle, thread_safe: bool) -> int: capsule.close() return Result.Success.value def _device_get_sync_jack(capsule: DeviceHandle, thread_safe: bool) -> Tuple[(int, bool, bool)]: return capsule.get_sync_jack() def _device_get_color_control(capsule: DeviceHandle, thread_safe: bool, cmd: int) -> Tuple[(int, int, int)]: return capsule.device_get_color_control(cmd) def _device_set_color_control(capsule: DeviceHandle, thread_safe: bool, cmd: int, mode: int, value: int) -> int: return capsule.device_set_color_control(cmd, mode, value) def _device_get_color_control_capabilities(capsule: DeviceHandle, thread_safe: bool, cmd: int) -> Tuple[(int, ColorControlCapabilities)]: return capsule.device_get_color_control_capabilities(cmd) def _device_start_cameras(capsule: DeviceHandle, thread_safe: bool, color_format: int, color_resolution: int, dept_mode: int, camera_fps: int, synchronized_images_only: bool, depth_delay_off_color_usec: int, wired_sync_mode: int, subordinate_delay_off_master_usec: int, disable_streaming_indicator: bool) -> int: return capsule.device_start_cameras() def _device_stop_cameras(capsule: DeviceHandle, thread_safe: bool) -> int: return capsule.device_stop_cameras() def _device_start_imu(capsule: DeviceHandle, thread_safe: bool) -> int: return capsule.device_start_imu() def _device_stop_imu(capsule: DeviceHandle, thread_safe: bool) -> int: return capsule.device_stop_imu() def _device_get_capture(capsule: DeviceHandle, thread_safe: bool, timeout: int) -> Tuple[(int, Optional[object])]: return capsule.device_get_capture() def _device_get_imu_sample(capsule: DeviceHandle, thread_safe: bool, timeout: int) -> Tuple[(int, Optional[Tuple[(float, Tuple[(float, float, float)], int, Tuple[(float, float, float)], int)]])]: return capsule.device_get_imu_sample() def _device_get_calibration(capsule: DeviceHandle, thread_safe, depth_mode: int, color_resolution: int) -> Tuple[(int, Optional[object])]: return capsule.device_get_calibration(depth_mode, color_resolution) def _device_get_raw_calibration(capsule: DeviceHandle, thread_safe) -> Optional[str]: return capsule.device_get_raw_calibration() def _device_get_installed_count() -> int: return 1 def _device_get_serialnum(capsule: DeviceHandle, thread_safe) -> Optional[str]: return capsule.device_get_serialnum() monkeypatch.setattr('k4a_module.device_open', _device_open) monkeypatch.setattr('k4a_module.device_close', _device_close) monkeypatch.setattr('k4a_module.device_get_sync_jack', _device_get_sync_jack) monkeypatch.setattr('k4a_module.device_get_color_control', _device_get_color_control) monkeypatch.setattr('k4a_module.device_set_color_control', _device_set_color_control) monkeypatch.setattr('k4a_module.device_get_color_control_capabilities', _device_get_color_control_capabilities) monkeypatch.setattr('k4a_module.device_start_cameras', _device_start_cameras) monkeypatch.setattr('k4a_module.device_stop_cameras', _device_stop_cameras) monkeypatch.setattr('k4a_module.device_start_imu', _device_start_imu) monkeypatch.setattr('k4a_module.device_stop_imu', _device_stop_imu) monkeypatch.setattr('k4a_module.device_get_capture', _device_get_capture) monkeypatch.setattr('k4a_module.device_get_imu_sample', _device_get_imu_sample) monkeypatch.setattr('k4a_module.device_get_calibration', _device_get_calibration) monkeypatch.setattr('k4a_module.device_get_raw_calibration', _device_get_raw_calibration) monkeypatch.setattr('k4a_module.device_get_installed_count', _device_get_installed_count) monkeypatch.setattr('k4a_module.device_get_serialnum', _device_get_serialnum)
(eq=False) class OSMNode(Tagged): id_: int coordinates: np.ndarray visible: Optional[str] = None changeset: Optional[str] = None timestamp: Optional[datetime] = None user: Optional[str] = None uid: Optional[str] = None def from_xml_structure(cls, element: Element) -> 'OSMNode': attributes = element.attrib tags: Tags = {x.attrib['k']: x.attrib['v'] for x in element if (x.tag == 'tag')} return cls(tags, int(attributes['id']), np.array((float(attributes['lat']), float(attributes['lon']))), attributes.get('visible', None), attributes.get('changeset', None), (datetime.strptime(attributes['timestamp'], OSM_TIME_PATTERN) if ('timestamp' in attributes) else None), attributes.get('user', None), attributes.get('uid', None)) def parse_from_structure(cls, structure: dict[(str, Any)]) -> 'OSMNode': return cls(structure.get('tags', {}), structure['id'], coordinates=np.array((structure['lat'], structure['lon']))) def get_boundary_box(self) -> BoundaryBox: return BoundaryBox(self.coordinates[1], self.coordinates[0], self.coordinates[1], self.coordinates[0]) def __hash__(self) -> int: return self.id_ def __eq__(self, other) -> bool: if (not isinstance(other, OSMNode)): return False return ((self.id_ == other.id_) and np.array_equal(self.coordinates, other.coordinates) and (self.visible == other.visible) and (self.changeset == other.changeset) and (self.timestamp == other.timestamp) and (self.user == other.user) and (self.uid == other.uid))
def config_get_value(args): with open(get_configuration_file_path(), 'r') as f: yaml_config = yaml.load(f, Loader=yaml.FullLoader) if (args.option not in yaml_config): raise SystemExit(f'The option [{args.option}] is not found in config.') value = yaml_config[args.option] print(value)
class CubeTable(QWidget): ps_color_changed = pyqtSignal(bool) ps_history_backup = pyqtSignal(bool) def __init__(self, wget, args): super().__init__(wget) self.setAttribute(Qt.WA_AcceptTouchEvents) self._args = args self._updated_colors = False self.setMinimumSize(120, 10) cube_grid_layout = QGridLayout(self) cube_grid_layout.setContentsMargins(0, 0, 0, 0) cube_grid_layout.setHorizontalSpacing(0) cube_grid_layout.setVerticalSpacing(0) scroll_area = QScrollArea(self) scroll_area.setFrameShape(QFrame.Box) scroll_area.setVerticalScrollBarPolicy(Qt.ScrollBarAlwaysOn) scroll_area.setHorizontalScrollBarPolicy(Qt.ScrollBarAlwaysOff) scroll_area.setWidgetResizable(True) cube_grid_layout.addWidget(scroll_area) scroll_contents = QWidget() scroll_horizontal_layout = QHBoxLayout(scroll_contents) scroll_horizontal_layout.setContentsMargins(0, 0, 0, 0) scroll_area.setWidget(scroll_contents) self._cubes = (Cube(scroll_contents, args, 0), Cube(scroll_contents, args, 1), Cube(scroll_contents, args, 2), Cube(scroll_contents, args, 3), Cube(scroll_contents, args, 4)) self.update_color() for idx in (2, 1, 0, 3, 4): scroll_horizontal_layout.addWidget(self._cubes[idx]) self._cubes[idx].square.ps_color_changed.connect((lambda x: self.update_color())) self._cubes[idx].square.ps_color_changed.connect((lambda x: self.ps_history_backup.emit(True))) self._cubes[idx].square.ps_index_changed.connect((lambda x: self.update_color())) for ctp in ('r', 'g', 'b'): obj = getattr(self._cubes[idx], 'hs_rgb_{}'.format(ctp)) obj.valueChanged.connect(self.modify_color(idx, 'direct', ctp)) obj = getattr(self._cubes[idx], 'sp_rgb_{}'.format(ctp)) obj.valueChanged.connect(self.modify_color(idx, 'frdire', ctp)) for ctp in ('h', 's', 'v'): obj = getattr(self._cubes[idx], 'hs_hsv_{}'.format(ctp)) obj.valueChanged.connect(self.modify_color(idx, 'indire', ctp)) obj = getattr(self._cubes[idx], 'dp_hsv_{}'.format(ctp)) obj.valueChanged.connect(self.modify_color(idx, 'frdire', ctp)) self._cubes[idx].le_hec.textChanged.connect(self.modify_color(idx, 'frdire', 'hec')) self.modify_box_visibility() def sizeHint(self): return QSize(600, 200) def resizeEvent(self, event): wid = self.geometry().width() if ((wid < 650) and self._cubes[0].sp_rgb_r.isVisible()): for idx in (2, 1, 0, 3, 4): for ctp in ('r', 'g', 'b'): obj = getattr(self._cubes[idx], 'sp_rgb_{}'.format(ctp)) obj.setVisible(False) for ctp in ('h', 's', 'v'): obj = getattr(self._cubes[idx], 'dp_hsv_{}'.format(ctp)) obj.setVisible(False) if ((wid > 650) and (not self._cubes[0].sp_rgb_r.isVisible())): for idx in (2, 1, 0, 3, 4): for ctp in ('r', 'g', 'b'): obj = getattr(self._cubes[idx], 'sp_rgb_{}'.format(ctp)) obj.setVisible(True) for ctp in ('h', 's', 'v'): obj = getattr(self._cubes[idx], 'dp_hsv_{}'.format(ctp)) obj.setVisible(True) event.ignore() def modify_color(self, idx, kword, ctp): def _func_(value): if self._updated_colors: return if (ctp == 'hec'): value = Color.stri2color(value) if (not value): return self._updated_colors = True color = Color(self._args.sys_color_set[idx], tp='color', overflow=self._args.sys_color_set.get_overflow()) if (ctp == 'hec'): color.setti(value, tp='color') elif ((kword == 'direct') or (kword == 'frdire')): color.setti(value, ctp) else: color.setti((value / 1000.0), ctp) self._args.sys_color_set.modify(self._args.hm_rule, idx, color) if (kword == 'frdire'): self.update_color(skip_dp=(idx, ctp)) else: self.update_color() self._updated_colors = False return _func_ def update_color(self, skip_dp=None): self._updated_colors = True for lc_idx in range(5): if ((lc_idx == self._args.sys_activated_idx) and (self._args.sys_activated_assit_idx >= 0)): curr_color = gen_assit_color(self._args.sys_color_set[lc_idx], *self._args.sys_grid_assitlocs[lc_idx][self._args.sys_activated_assit_idx][2:6]) else: curr_color = self._args.sys_color_set[lc_idx] curr_hec = curr_color.getti('hec') (curr_h, curr_s, curr_v) = curr_color.getti('hsv') if ((curr_hec == self._cubes[lc_idx].le_hec.text()) and (curr_s > 0.01) and (0.99 > curr_v > 0.01)): continue if (not (skip_dp and (skip_dp[0] == lc_idx) and (skip_dp[1] == 'hec'))): self._cubes[lc_idx].le_hec.setText(curr_hec) for lc_ctp in ('r', 'g', 'b'): obj = getattr(self._cubes[lc_idx], 'hs_rgb_{}'.format(lc_ctp)) obj.setValue(curr_color.getti(lc_ctp)) if (not (skip_dp and (skip_dp[0] == lc_idx) and (skip_dp[1] == lc_ctp))): obj = getattr(self._cubes[lc_idx], 'sp_rgb_{}'.format(lc_ctp)) obj.setValue(curr_color.getti(lc_ctp)) for lc_ctp in ('h', 's', 'v'): obj = getattr(self._cubes[lc_idx], 'hs_hsv_{}'.format(lc_ctp)) obj.setValue((vars()['curr_{}'.format(lc_ctp)] * 1000.0)) if (not (skip_dp and (skip_dp[0] == lc_idx) and (skip_dp[1] == lc_ctp))): obj = getattr(self._cubes[lc_idx], 'dp_hsv_{}'.format(lc_ctp)) obj.setValue(vars()['curr_{}'.format(lc_ctp)]) self.update_index() self._updated_colors = False def update_index(self): for lc_idx in range(5): self._cubes[lc_idx].update() self.ps_color_changed.emit(True) def modify_rule(self): self._args.sys_color_set.create(self._args.hm_rule) self.update_color() self.ps_history_backup.emit(True) def create_set(self, direct=False): if ((not direct) and (True in [bool(i) for i in self._args.sys_grid_assitlocs])): self._args.sys_grid_assitlocs = [[], [], [], [], []] self._args.sys_assit_color_locs = [[], [], [], [], []] self._args.sys_activated_assit_idx = (- 1) else: self._args.sys_color_set.initialize() self._args.sys_color_set.create(self._args.hm_rule) self.update_color() self.ps_history_backup.emit(True) def modify_box_visibility(self): for i in range(5): self._cubes[i].gbox_hsv.setVisible(self._args.show_hsv) self._cubes[i].gbox_rgb.setVisible(self._args.show_rgb) def update_all(self): for lc_idx in range(5): self._cubes[lc_idx].update() self.update() def clipboard_act(self, ctp): def _func_(): color = self._args.sys_color_set[self._args.sys_activated_idx].getti(ctp) if (ctp == 'hec'): color = ((self._args.hec_prefix[0] + str(color)) + self._args.hec_prefix[1]) else: color = self._args.rgb_prefix[1].join([((self._args.r_prefix[0] + str(color[coi])) + self._args.r_prefix[1]) for coi in range(3)]) color = ((self._args.rgb_prefix[0] + color) + self._args.rgb_prefix[2]) mimedata = QMimeData() mimedata.setText(color) clipboard = QApplication.clipboard() clipboard.setMimeData(mimedata) return _func_ def active_by_num(self, idx): def _func_(): self._args.sys_activated_idx = idx self._args.sys_activated_assit_idx = (- 1) self.update_index() return _func_
def get_tracks(server, username, fromuts, touts, startpage=1, sleep_func=time.sleep, tracktype='recenttracks'): page = startpage response = connect_server(server, username, page, fromuts, touts, sleep_func, tracktype) totalpages = get_pageinfo(response, tracktype) if (startpage > totalpages): raise ValueError(('First page (%s) is higher than total pages (%s).' % (startpage, totalpages))) while (page <= totalpages): if (page > startpage): response = connect_server(server, username, page, fromuts, touts, sleep_func, tracktype) tracklist = get_tracklist(response) tracks = [] for trackelement in tracklist: if (('nowplaying' not in trackelement.attrib) or (not trackelement.attrib['nowplaying'])): tracks.append(parse_track(trackelement)) (yield (page, totalpages, tracks)) page += 1 sleep_func(0.5)
def test(): from instakit.utils.static import asset from instakit.utils.mode import Mode from clu.predicates import isslotted image_paths = list(map((lambda image_file: asset.path('img', image_file)), asset.listfiles('img'))) image_inputs = list(map((lambda image_path: Mode.RGB.open(image_path)), image_paths)) processors = (Contour(), Detail(), Emboss(), EdgeEnhance(), EdgeEnhanceMore(), FindEdges(), Smooth(), SmoothMore(), Sharpen(), UnsharpMask(), GaussianBlur(sigmaX=3), SimpleGaussianBlur(radius=3)) for processor in processors: assert isslotted(processor) for image_input in image_inputs: GaussianBlur(sigmaX=3).process(image_input).show() print(image_paths)
class OptionSeriesPyramidSonificationTracksMappingTremoloDepth(Options): def mapFunction(self): return self._config_get(None) def mapFunction(self, value: Any): self._config(value, js_type=False) def mapTo(self): return self._config_get(None) def mapTo(self, text: str): self._config(text, js_type=False) def max(self): return self._config_get(None) def max(self, num: float): self._config(num, js_type=False) def min(self): return self._config_get(None) def min(self, num: float): self._config(num, js_type=False) def within(self): return self._config_get(None) def within(self, value: Any): self._config(value, js_type=False)
class OptionPlotoptionsOrganizationLevels(Options): def borderColor(self): return self._config_get(None) def borderColor(self, text: str): self._config(text, js_type=False) def borderWidth(self): return self._config_get(None) def borderWidth(self, num: float): self._config(num, js_type=False) def color(self): return self._config_get(None) def color(self, text: str): self._config(text, js_type=False) def colorByPoint(self): return self._config_get(True) def colorByPoint(self, flag: bool): self._config(flag, js_type=False) def dataLabels(self) -> 'OptionPlotoptionsOrganizationLevelsDatalabels': return self._config_sub_data('dataLabels', OptionPlotoptionsOrganizationLevelsDatalabels) def level(self): return self._config_get(None) def level(self, num: float): self._config(num, js_type=False) def linkOpacity(self): return self._config_get(0.5) def linkOpacity(self, num: float): self._config(num, js_type=False) def states(self) -> 'OptionPlotoptionsOrganizationLevelsStates': return self._config_sub_data('states', OptionPlotoptionsOrganizationLevelsStates)
def test_proxy_object_is_returned_from_calls(accounts, tester): addr = accounts[1] value = ['blahblah', addr, ['yesyesyes', '0x1234']] tester.setTuple(value) with brownie.multicall: ret_val = tester.getTuple(addr) assert (inspect.getattr_static(ret_val, '__wrapped__') != value) assert isinstance(ret_val, Proxy) assert (ret_val.__wrapped__ == value)
def create_osmocore_logging_header(timestamp=datetime.datetime.now(), process_name='', pid=0, level=0, subsys_name='', filename='', line_number=0): if (type(process_name) == str): process_name = process_name.encode('utf-8') if (type(subsys_name) == str): subsys_name = subsys_name.encode('utf-8') if (type(filename) == str): filename = filename.encode('utf-8') logging_hdr = struct.pack('!LL16sLB3x16s32sL', int(timestamp.timestamp()), timestamp.microsecond, process_name, pid, level, subsys_name, filename, line_number) return logging_hdr
class Border(): def __init__(self, leaf): self.file = Projection.leaf_to_string(leaf, 'File') self.filetype = str.upper(Projection.leaf_to_string(leaf, 'Type', 'shp')) self.draw = Projection.leaf_to_bool(leaf, 'Draw', False) self.encoding = Projection.leaf_to_string(leaf, 'Encoding', 'utf-8') self.path = (ClipBorder.readPath(self.file, 0) if (self.filetype != 'SHP') else None) self.polygon = str.upper(Projection.leaf_to_string(leaf, 'Polygon', 'on')) self.linewidth = Projection.leaf_to_float(leaf, 'LineWidth', 1) self.linecolor = Projection.leaf_to_string(leaf, 'LineColor', 'k') def readPolygon(filename): try: file_object = open(filename) all_the_text = file_object.read().strip() file_object.close() poses = re.split('[,]+|[\\s]+', all_the_text) lon = [float(p) for p in poses[0::2]] lat = [float(p) for p in poses[1::2]] path = Path(zip(lon, lat)) return path except Exception as err: print('{0}{1}-{2}'.format(filename, err, datetime.now())) return None
def fortios_log_fortianalyzer_cloud(data, fos): fos.do_member_operation('log.fortianalyzer-cloud', 'override-filter') if data['log_fortianalyzer_cloud_override_filter']: resp = log_fortianalyzer_cloud_override_filter(data, fos) else: fos._module.fail_json(msg=('missing task body: %s' % 'log_fortianalyzer_cloud_override_filter')) return ((not is_successful_status(resp)), (is_successful_status(resp) and (resp['revision_changed'] if ('revision_changed' in resp) else True)), resp, {})
def fixReleasePacket(data): expect = ['srcname', 'series', 'vol', 'chp', 'published', 'itemurl', 'postfix', 'author', 'tl_type'] maybe = ['match_author', 'loose_match', 'prefix_match'] assert (len(expect) <= len(data)), ("Invalid number of items in release packet! Expected: '%s', received '%s'" % (expect, list(data.keys()))) assert all([(key in data) for key in expect]), ("Missing key in release message! Expect: '%s', received '%s'" % (expect, list(data.keys()))) data['series'] = fix_string(data['series']) data['postfix'] = fix_string(data['postfix']) data['author'] = fix_string(data['author']) if (('scribblehub' in data['itemurl']) and (data['postfix'] == '')): with open(('no_desc_sh_release_%s.txt' % time.time()), 'w') as fp: fp.write('Stack:\n') for line in traceback.format_stack(): fp.write(line) fp.write('\n\n') fp.write('Message:\n') fp.write(pprint.pformat(data)) return data
class AttachableTest(QuickbooksTestCase): def setUp(self): super(AttachableTest, self).setUp() self.time = datetime.now() def test_create_note(self): attachable = Attachable() vendor = Vendor.all(max_results=1, qb=self.qb_client)[0] attachable_ref = AttachableRef() attachable_ref.EntityRef = vendor.to_ref() attachable.AttachableRef.append(attachable_ref) attachable.Note = 'Test note added on {}'.format(self.time.strftime('%Y-%m-%d %H:%M:%S')) attachable.save(qb=self.qb_client) query_attachable = Attachable.get(attachable.Id, qb=self.qb_client) self.assertEqual(query_attachable.AttachableRef[0].EntityRef.value, vendor.Id) self.assertEqual(query_attachable.Note, 'Test note added on {}'.format(self.time.strftime('%Y-%m-%d %H:%M:%S'))) def test_update_note(self): attachable = Attachable.all(max_results=1, qb=self.qb_client)[0] attachable.Note = 'Note updated on {}'.format(self.time.strftime('%Y-%m-%d %H:%M:%S')) attachable.save(qb=self.qb_client) query_attachable = Attachable.get(attachable.Id, qb=self.qb_client) self.assertEqual(query_attachable.Note, 'Note updated on {}'.format(self.time.strftime('%Y-%m-%d %H:%M:%S'))) def test_create_file(self): attachable = Attachable() test_file = tempfile.NamedTemporaryFile(suffix='.txt') vendor = Vendor.all(max_results=1, qb=self.qb_client)[0] attachable_ref = AttachableRef() attachable_ref.EntityRef = vendor.to_ref() attachable.AttachableRef.append(attachable_ref) attachable.FileName = os.path.basename(test_file.name) attachable._FilePath = test_file.name attachable.ContentType = 'text/plain' attachable.save(qb=self.qb_client) query_attachable = Attachable.get(attachable.Id, qb=self.qb_client) self.assertEqual(query_attachable.AttachableRef[0].EntityRef.value, vendor.Id)
def test_reward_monitoring(): env = build_dummy_maze_env() env = MazeEnvMonitoringWrapper.wrap(env, observation_logging=False, action_logging=False, reward_logging=True) env = LogStatsWrapper.wrap(env) env.reset() env.step(env.action_space.sample()) for ii in range(2): env.step(env.action_space.sample()) reward_events = env.get_last_step_events(query=[RewardEvents.reward_original, RewardEvents.reward_processed]) assert (len(reward_events) == 2) for event in reward_events: assert issubclass(event.interface_class, RewardEvents) assert (event.attributes['value'] == 10) assert (event.interface_method in [RewardEvents.reward_original, RewardEvents.reward_processed])
def test_unknown_language(): with pytest.raises(UnsupportedLanguage): compiler.generate_input_json({'foo': ''}, language='Bar') with pytest.raises(UnsupportedLanguage): compiler.compile_from_input_json({'language': 'FooBar'}) with pytest.raises(UnsupportedLanguage): compiler.generate_build_json({'language': 'BarBaz'}, {})
class HStack(Stack): def __init__(self, workspace_name: str, params: List[Any]): super().__init__(LayoutName.HSTACK, workspace_name, params) def _first_direction(self) -> Direction: return Direction.VERTICAL def _resize_direction(self) -> ResizeDirection: return ResizeDirection.HEIGHT def _second_axe_position(self, second_axe_position: str) -> VerticalPosition: return VerticalPosition(second_axe_position) def _default_second_axe_position(self) -> VerticalPosition: return VerticalPosition.UP def create(cls, workspace_name: str, params: List[Any]) -> Optional['Layout']: return HStack(workspace_name, params)
class perm102_bmm_rcr_bias(perm102_bmm_rcr): def __init__(self): super().__init__() self._attrs['op'] = 'perm102_bmm_rcr_bias' def _infer_shapes(self, a: Tensor, b: Tensor, bias: Tensor): bias_shapes = bias._attrs['shape'] if (len(bias_shapes) != 2): raise RuntimeError('Bias should be 2D vector ') bias_shape = bias_shapes[1] if (not isinstance(bias_shape, IntImm)): raise RuntimeError('Bias should be fixed 2D vector') outshape = super()._infer_shapes(a, b) if (outshape[2] != bias_shape): raise RuntimeError("GEMM/Bias shape doesn't match") return outshape def __call__(self, a: Tensor, b: Tensor, bias: Tensor) -> Tensor: self._attrs['inputs'] = [a, b, bias] self._attrs['input_accessors'] = [TensorAccessor(tensor) for tensor in self._attrs['inputs']] self._set_depth() self._sanity_check(a, b) output_shape = self._infer_shapes(a, b, bias) self._extract_epilogue_alignment(output_shape) output = Tensor(output_shape, src_ops={self}, dtype=a.dtype()) self._attrs['outputs'] = [output] self._attrs['output_accessors'] = [TensorAccessor(tensor) for tensor in self._attrs['outputs']] return output
def find_graph_differences_summary(previous_graph: Optional[GraphRepr], current_graph: GraphRepr, previous_results: Dict[(str, Optional[List[Row]])], previous_erasure_results: Dict[(str, int)]) -> Optional[GraphDiffSummary]: graph_diff: Optional[GraphDiff] = _find_graph_differences(previous_graph, current_graph, previous_results, previous_erasure_results) if (not graph_diff): return None return GraphDiffSummary(prev_collection_count=len(graph_diff.previous_collections), curr_collection_count=len(graph_diff.current_collections), added_collection_count=len(graph_diff.added_collections), removed_collection_count=len(graph_diff.removed_collections), added_edge_count=len(graph_diff.added_edges), removed_edge_count=len(graph_diff.removed_edges), already_processed_access_collection_count=len(graph_diff.already_processed_access_collections), already_processed_erasure_collection_count=len(graph_diff.already_processed_erasure_collections), skipped_added_edge_count=len(graph_diff.skipped_added_edges))
def test_example_generation() -> None: option = Option(id='option', description='Option', examples=['selection']) number = Number(id='number', description='Number', examples=[('number', 2)], many=True) text = Text(id='text', description='Text', examples=[('text', '3')], many=True) selection = Selection(id='selection', description='Selection', options=[option], null_examples=['foo'], many=True) obj = Object(id='object', description='object', examples=[('another number', {'number': 1})], attributes=[number, text, selection], many=True) examples = generate_examples(obj) assert (examples == [('another number', {'object': [{'number': 1}]}), ('number', {'object': [{'number': [2]}]}), ('text', {'object': [{'text': ['3']}]}), ('selection', {'object': [{'selection': ['option']}]}), ('foo', {})])
def in_progress(): try: (current_year, current_month) = TaskLog.objects.values_list('year', 'month').distinct().order_by('-year', '-month')[0] except IndexError: return False return (not TaskLog.objects.filter(year=current_year, month=current_month, task_name='fetch_and_import').exists())
(input_signature=(tf.TensorSpec(shape=[None], dtype=tf.string), tf.TensorSpec(shape=[None, 4], dtype=tf.int32))) def decode_and_crop_and_serve(image_bytes, crop_window): return {tf.saved_model.CLASSIFY_OUTPUT_SCORES: classifier(decode_and_crop(image_bytes=image_bytes, crop_window=crop_window)), tf.saved_model.CLASSIFY_OUTPUT_CLASSES: classifier.layers[1].columns}
class ExecutionContextAPI(ABC): def coinbase(self) -> Address: ... def timestamp(self) -> int: ... def block_number(self) -> BlockNumber: ... def difficulty(self) -> int: ... def mix_hash(self) -> Hash32: ... def gas_limit(self) -> int: ... def prev_hashes(self) -> Iterable[Hash32]: ... def chain_id(self) -> int: ... def base_fee_per_gas(self) -> Optional[int]: ...
class Instance(): def __init__(self, location: Location) -> None: self.location = location (self.multiplexer, self.oef_search_dialogues, self.crypto, self.connection) = make_multiplexer_and_dialogues() self.thread = Thread(target=self.multiplexer.connect) def address(self) -> str: return self.crypto.address def start(self) -> None: self.thread.start() wait_for_condition((lambda : self.multiplexer.is_connected), timeout=5) self.register_location() def stop(self): self.multiplexer.disconnect() self.thread.join() def register_location(self, disclosure_accuracy: Optional[str]=None) -> None: service_instance: Dict[(str, Any)] = {'location': self.location} if disclosure_accuracy: service_instance['disclosure_accuracy'] = disclosure_accuracy service_description = Description(service_instance, data_model=models.AGENT_LOCATION_MODEL) (message, sending_dialogue) = self.oef_search_dialogues.create(counterparty=str(SOEFConnection.connection_id.to_any()), performative=OefSearchMessage.Performative.REGISTER_SERVICE, service_description=service_description) envelope = Envelope(to=message.to, sender=message.sender, message=message) logger.info('Registering agent at location=({},{}) by agent={}'.format(self.location.latitude, self.location.longitude, self.crypto.address)) self.multiplexer.put(envelope) envelope = self.get() assert envelope message = cast(OefSearchMessage, envelope.message) receiving_dialogue = self.oef_search_dialogues.update(message) assert (sending_dialogue == receiving_dialogue) def wait_registered(self) -> None: wait_for_condition((lambda : self.connection.channel.unique_page_address), timeout=10) def register_personality_pieces(self, piece: str='genus', value: str='service') -> None: service_instance = {'piece': piece, 'value': value} service_description = Description(service_instance, data_model=models.AGENT_PERSONALITY_MODEL) (message, sending_dialogue) = self.oef_search_dialogues.create(counterparty=str(SOEFConnection.connection_id.to_any()), performative=OefSearchMessage.Performative.REGISTER_SERVICE, service_description=service_description) envelope = Envelope(to=message.to, sender=message.sender, message=message) logger.info('Registering agent personality') self.multiplexer.put(envelope) envelope = self.get() assert envelope message = cast(OefSearchMessage, envelope.message) receiving_dialogue = self.oef_search_dialogues.update(message) assert (sending_dialogue == receiving_dialogue) def register_service_key(self, key: str, value: str) -> None: service_instance = {'key': 'test', 'value': 'test'} service_description = Description(service_instance, data_model=models.SET_SERVICE_KEY_MODEL) (message, sending_dialogue) = self.oef_search_dialogues.create(counterparty=str(SOEFConnection.connection_id.to_any()), performative=OefSearchMessage.Performative.REGISTER_SERVICE, service_description=service_description) envelope = Envelope(to=message.to, sender=message.sender, message=message) logger.info('Registering agent service key') self.multiplexer.put(envelope) envelope = self.get() assert envelope message = cast(OefSearchMessage, envelope.message) receiving_dialogue = self.oef_search_dialogues.update(message) assert (sending_dialogue == receiving_dialogue) def search(self, query: Query) -> OefSearchMessage: (message, sending_dialogue) = self.oef_search_dialogues.create(counterparty=str(SOEFConnection.connection_id.to_any()), performative=OefSearchMessage.Performative.SEARCH_SERVICES, query=query) search_envelope = Envelope(to=message.to, sender=message.sender, message=message) logger.info(f'Searching for agents with query: {query}') self.multiplexer.put(search_envelope) envelope = self.get() assert envelope message = cast(OefSearchMessage, envelope.message) receiving_dialogue = self.oef_search_dialogues.update(message) assert (sending_dialogue == receiving_dialogue) return message def get(self): wait_for_condition((lambda : (not self.multiplexer.in_queue.empty())), timeout=20) return self.multiplexer.get() def generic_command(self, command: str, parameters: Optional[dict]=None) -> None: service_instance = {'command': command} if parameters: service_instance['parameters'] = urlencode(parameters) service_description = Description(service_instance, data_model=models.AGENT_GENERIC_COMMAND_MODEL) (message, _) = self.oef_search_dialogues.create(counterparty=str(SOEFConnection.connection_id.to_any()), performative=OefSearchMessage.Performative.REGISTER_SERVICE, service_description=service_description) envelope = Envelope(to=message.to, sender=message.sender, message=message) logger.info(f'Send generic command {command} {parameters}') self.multiplexer.put(envelope)
class DataModelBuilder(object): def __init__(self, global_configs, scanner_configs, service_config, model_name): self.global_configs = global_configs self.scanner_configs = scanner_configs self.service_config = service_config self.model_name = model_name def build(self): data_models = [] requirements_map = data_model_requirements_map.REQUIREMENTS_MAP for scanner in self.scanner_configs.get('scanners'): scanner_name = scanner.get('name') if (scanner.get('enabled') and requirements_map.get(scanner_name)): data_model = self._instantiate_data_model(scanner_name) if data_model: data_models.append(data_model) return data_models def _instantiate_data_model(self, data_model_name): module_path = 'google.cloud.forseti.scanner.scanners.config_validator_util.data_models.{}' requirements_map = data_model_requirements_map.REQUIREMENTS_MAP LOGGER.debug('Initializing Config Validator data model: %s - %s', data_model_name, requirements_map.get(data_model_name)) module_name = module_path.format(requirements_map.get(data_model_name).get('module_name')) try: module = importlib.import_module(module_name) except (ImportError, TypeError, ValueError): LOGGER.exception('Unable to import %s for building Config Validator data model.\n', module_name) return None class_name = requirements_map.get(data_model_name).get('class_name') try: data_model_class = getattr(module, class_name) except AttributeError: LOGGER.exception('Unable to instantiate %s for building Config Validator data model.\n', class_name) return None data_model = data_model_class(self.global_configs, self.scanner_configs, self.service_config, self.model_name) return data_model
def load_modules(package): modules = pkgutil.iter_modules(package.__path__, (package.__name__ + '.')) for (_, name, _) in modules: logger.debug(f'loading module: {name}') try: importlib.import_module(name) except ModuleNotFoundError as error: logger.warning(f'failed to import module: {name}. ModuleNotFoundError: {error}')
('orca') def test_nitrobenzene(): inp_1 = {'xyz': 'lib:redox/nitrobenzene.xyz', 'charge': 0, 'mult': 1, 'opt': False} inp_2 = {'xyz': 'lib:redox/nitrobenzene_anion.xyz', 'charge': (- 1), 'mult': 2, 'opt': False} orca_gas = {'keywords': 'uks b3lyp 6-31G** rijcosx autoaux', 'pal': 4} orca_solv = orca_gas.copy() orca_solv['keywords'] += ' cpcm(acetonitrile)' orca_kwargs = {'calc_cls': ORCA, 'gas_kwargs': orca_gas, 'solv_kwargs': orca_solv} test_redox(inp_1, inp_2, **orca_kwargs) import pdb pdb.set_trace() pass
class _L2Responder_pcap(_L2Responder): _fd = None _inject = None _c_int_ = None def __init__(self, server_address, response_interface, qtags=None): import ctypes self._c_int_ = ctypes.c_int import ctypes.util from . import getifaddrslib pcap = ctypes.util.find_library('pcap') if (not pcap): raise Exception('libpcap not found') pcap = ctypes.cdll.LoadLibrary(pcap) errbuf = ctypes.create_string_buffer(256) self._fd = pcap.pcap_open_live(response_interface.encode('utf-8'), ctypes.c_int(0), ctypes.c_int(0), ctypes.c_int(0), errbuf) if (not self._fd): import errno raise IOError(errno.EACCES, errbuf.value) elif errbuf.value: import warnings warnings.warn(errbuf.value) try: mac = bytes(MAC(getifaddrslib.get_mac_address(response_interface))) except Exception: pcap.pcap_close(self._fd) raise else: _L2Responder.__init__(self, server_address, mac, qtags=qtags) self._inject = pcap.pcap_inject def _send_(self, packet): return self._inject(self._fd, packet, self._c_int_(len(packet)))
class PollOption(JsonDeserializable): def de_json(cls, json_string): if (json_string is None): return None obj = cls.check_json(json_string, dict_copy=False) return cls(**obj) def __init__(self, text, voter_count=0, **kwargs): self.text: str = text self.voter_count: int = voter_count
def extension_controller_fortigate(data, fos): vdom = data['vdom'] state = data['state'] extension_controller_fortigate_data = data['extension_controller_fortigate'] filtered_data = underscore_to_hyphen(filter_extension_controller_fortigate_data(extension_controller_fortigate_data)) if ((state == 'present') or (state is True)): return fos.set('extension-controller', 'fortigate', data=filtered_data, vdom=vdom) elif (state == 'absent'): return fos.delete('extension-controller', 'fortigate', mkey=filtered_data['name'], vdom=vdom) else: fos._module.fail_json(msg='state must be present or absent!')
class MESH_OT_YAVNEBase(bpy.types.Operator): bl_idname = 'mesh.yavne_base' bl_label = 'YAVNE Base Operator' bl_options = {'INTERNAL'} addon_key = __package__.split('.')[0] def poll(cls, context): edit_object = context.edit_object return (edit_object and (edit_object.type == 'MESH') and (edit_object.mode == 'EDIT') and (context.space_data.type == 'VIEW_3D')) def __init__(self): mesh = bpy.context.edit_object.data bm = bmesh.from_edit_mesh(mesh) vert_int_layers = bm.verts.layers.int face_int_layers = bm.faces.layers.int loop_float_layers = bm.loops.layers.float self.addon = bpy.context.preferences.addons[self.addon_key] if (not ('vertex-normal-weight' in vert_int_layers.keys())): vert_int_layers.new('vertex-normal-weight') if (not ('face-normal-influence' in face_int_layers.keys())): face_int_layers.new('face-normal-influence') if (not ('loop-normal-x' in loop_float_layers.keys())): loop_float_layers.new('loop-normal-x') if (not ('loop-normal-y' in loop_float_layers.keys())): loop_float_layers.new('loop-normal-y') if (not ('loop-normal-z' in loop_float_layers.keys())): loop_float_layers.new('loop-normal-z') bmesh.update_edit_mesh(mesh)
(config_path='./conf', config_name='conf_apex_dqn') def main(cfg): if (cfg.seed is not None): random_utils.manual_seed(cfg.seed) logging.info(hydra_utils.config_to_json(cfg)) env = atari_wrapper.make_atari_env(**cfg.env) model = AtariDQNModel(env.action_space.n, network=cfg.network, dueling_dqn=cfg.dueling_dqn, spectral_norm=cfg.spectral_norm, double_dqn=cfg.double_dqn).to(cfg.train_device) infer_model = copy.deepcopy(model).to(cfg.infer_device) infer_model.eval() model_pool = RemotableModelPool(infer_model, seed=cfg.seed) optimizer = make_optimizer(model.parameters(), **cfg.optimizer) replay_buffer = ReplayBuffer(TensorCircularBuffer(cfg.replay_buffer_size), PrioritizedSampler(priority_exponent=cfg.priority_exponent)) ctrl = Controller() m_server = Server(cfg.m_server_name, cfg.m_server_addr) r_server = Server(cfg.r_server_name, cfg.r_server_addr) c_server = Server(cfg.c_server_name, cfg.c_server_addr) m_server.add_service(model_pool) r_server.add_service(replay_buffer) c_server.add_service(ctrl) servers = ServerList([m_server, r_server, c_server]) learner_model = wrap_downstream_model(model, m_server) t_actor_model = make_remote_model(model, m_server, version=ModelVersion.LATEST) e_actor_model = make_remote_model(model, m_server, version=ModelVersion.LATEST) learner_ctrl = remote_utils.make_remote(ctrl, c_server) t_actor_ctrl = remote_utils.make_remote(ctrl, c_server) e_actor_ctrl = remote_utils.make_remote(ctrl, c_server) learner_replay_buffer = make_remote_replay_buffer(replay_buffer, r_server, prefetch=cfg.prefetch) t_actor_replay_buffer = make_remote_replay_buffer(replay_buffer, r_server) env_fac = atari_wrapper.AtariWrapperFactory(**cfg.env) t_agent_fac = ApexDQNAgentFactory(t_actor_model, FlexibleEpsFunc(cfg.eps, cfg.num_training_rollouts), replay_buffer=t_actor_replay_buffer, n_step=cfg.n_step, gamma=cfg.gamma, max_abs_reward=cfg.max_abs_reward, rescale_value=cfg.rescale_value) e_agent_fac = ApexDQNAgentFactory(e_actor_model, ConstantEpsFunc(cfg.evaluation_eps)) t_loop = ParallelLoop(env_fac, t_agent_fac, t_actor_ctrl, running_phase=Phase.TRAIN, should_update=True, num_rollouts=cfg.num_training_rollouts, num_workers=cfg.num_training_workers, seed=cfg.seed) e_loop = ParallelLoop(env_fac, e_agent_fac, e_actor_ctrl, running_phase=Phase.EVAL, should_update=False, num_rollouts=cfg.num_evaluation_rollouts, num_workers=cfg.num_evaluation_workers, seed=(None if (cfg.seed is None) else (cfg.seed + cfg.num_training_rollouts))) loops = LoopList([t_loop, e_loop]) learner = ApexDQNAgent(learner_model, replay_buffer=learner_replay_buffer, controller=learner_ctrl, optimizer=optimizer, batch_size=cfg.batch_size, max_grad_norm=cfg.max_grad_norm, n_step=cfg.n_step, gamma=cfg.gamma, importance_sampling_exponent=cfg.importance_sampling_exponent, value_clipping_eps=cfg.value_clipping_eps, fr_kappa=cfg.fr_kappa, target_sync_period=cfg.target_sync_period, learning_starts=cfg.learning_starts, model_push_period=cfg.model_push_period) servers.start() loops.start() learner.connect() learner_model.init_model() learner_model.push() start_time = time.perf_counter() for epoch in range(cfg.num_epochs): stats = learner.train(cfg.steps_per_epoch) cur_time = (time.perf_counter() - start_time) info = f'T Epoch {epoch}' if cfg.table_view: logging.info((('\n\n' + stats.table(info, time=cur_time)) + '\n')) else: logging.info(stats.json(info, phase='Train', epoch=epoch, time=cur_time)) time.sleep(1) stats = learner.eval(cfg.num_evaluation_episodes, keep_training_loops=True) cur_time = (time.perf_counter() - start_time) info = f'E Epoch {epoch}' if cfg.table_view: logging.info((('\n\n' + stats.table(info, time=cur_time)) + '\n')) else: logging.info(stats.json(info, phase='Eval', epoch=epoch, time=cur_time)) torch.save(model.state_dict(), f'dqn_agent-{epoch}.pth') time.sleep(1) loops.terminate() servers.terminate()
.parametrize('elasticapm_client', [{'service_name': '%&!'}], indirect=True) def test_invalid_service_name_disables_send(elasticapm_client): assert (len(elasticapm_client.config.errors) == 1) assert ('SERVICE_NAME' in elasticapm_client.config.errors) assert elasticapm_client.config.disable_send
def test_supervisor_not_started(): timeout = 0.1 sleep_time = 0.5 exec_limiter = ExecTimeoutThreadGuard(timeout) with exec_limiter as exec_limit: assert (not exec_limiter._future_guard_task) TestThreadGuard.slow_function(sleep_time) assert (not exec_limit.is_cancelled_by_timeout())
def branches(src_dir, remote=True): clean_src = io.escape_path(src_dir) if remote: return _cleanup_remote_branch_names(process.run_subprocess_with_output(f"git -C {clean_src} for-each-ref refs/remotes/ --format='%(refname:short)'")) else: return _cleanup_local_branch_names(process.run_subprocess_with_output(f"git -C {clean_src} for-each-ref refs/heads/ --format='%(refname:short)'"))
class SimpleDocker(object): def __init__(self, use_udocker=None): self.identifier = LongIdentifier() if (use_udocker is None): self._with_udocker = self._use_udocker() else: self._with_udocker = use_udocker def _use_udocker(self): if is_docker_installed(): return False if (not is_udocker_installed()): return False return True def _splitter(name): name = name.split('/') if (len(name) == 2): org = name[0] img = name[1] else: org = None img = name[0] img_ = img.split(':') if (len(img_) == 2): img = img_[0] tag = img_[1] else: img = img_[0] return (org, img, tag) def _image_name(org, img, tag): return ('%s/%s:%s' % (org, img, tag)) def images(self): tmp_dir = tempfile.mkdtemp(prefix='ersilia-') tmp_file = os.path.join(tmp_dir, 'images.txt') if (not self._with_udocker): cmd = 'docker images > {0}'.format(tmp_file) run_command(cmd) img_dict = {} with open(tmp_file, 'r') as f: h = next(f) rep_idx = h.find('REPOSITORY') tag_idx = h.find('TAG') img_idx = h.find('IMAGE ID') crt_idx = h.find('CREATED') for l in f: rep = l[rep_idx:tag_idx].strip() tag = l[tag_idx:img_idx].strip() img = l[img_idx:crt_idx].strip() img_dict['{0}:{1}'.format(rep, tag)] = img return img_dict else: cmd = 'sudo -u {0} udocker images > {1}'.format(DEFAULT_UDOCKER_USERNAME, tmp_file) run_command(cmd) with open(tmp_file, 'r') as f: h = next(f) for l in f: img = l.split(' ')[0] img_dict[img] = img return img_dict def containers(self, only_run): tmp_dir = tempfile.mkdtemp(prefix='ersilia-') tmp_file = os.path.join(tmp_dir, 'containers.txt') if (not only_run): all_str = '-a' else: all_str = '' cmd = 'docker ps {0} > {1}'.format(all_str, tmp_file) run_command(cmd) cnt_dict = {} with open(tmp_file, 'r') as f: h = next(f) cnt_idx = h.find('CONTAINER ID') img_idx = h.find('IMAGE') cmd_idx = h.find('COMMAND') sts_idx = h.find('STATUS') pts_idx = h.find('PORTS') nam_idx = h.find('NAMES') for l in f: cnt = l[cnt_idx:img_idx].strip() img = l[img_idx:cmd_idx].strip() sts = l[sts_idx:pts_idx].strip() nam = l[nam_idx:].strip() cnt_dict[nam] = img return cnt_dict def exists(self, org, img, tag): bash_script = '\n #!/bin/bash\n image_and_tag="$1"\n image_and_tag_array=(${image_and_tag//:/ })\n if [[ "$(docker images ${image_and_tag_array[0]} | grep ${image_and_tag_array[1]} 2> /dev/null)" != "" ]]; then\n echo "True"\n else\n echo "False"\n fi\n ' tmp_folder = tempfile.mkdtemp(prefix='ersilia-') tmp_script = os.path.join(tmp_folder, 'exists.sh') with open(tmp_script, 'w') as f: f.write(bash_script) cmd = ['bash', tmp_script, self._image_name(org, img, tag)] res = run_command_check_output(cmd) res = res.strip() if (res == b'False'): return False if (res == b'True'): return True return None def build(self, path, org, img, tag): if self._with_udocker: raise Exception('Cannot built with udocker') path = os.path.abspath(path) cwd = os.getcwd() os.chdir(path) cmd = ('docker build -t %s %s' % (self._image_name(org, img, tag), path)) run_command(cmd) os.chdir(cwd) def delete(self, org, img, tag): if (not self._with_udocker): cmd = ('docker rmi %s' % self._image_name(org, img, tag)) run_command(cmd) else: cmd = 'sudo -u {0} udocker rmi {1}'.format(DEFAULT_UDOCKER_USERNAME, self._image_name(org, img, tag)) def run(self, org, img, tag, name, memory=None): if (name is None): name = self.identifier.encode() if (not self._with_udocker): if (memory is None): cmd = 'docker run -it -d --platform {0} --name {1} {2} bash'.format(resolve_platform(), name, self._image_name(org, img, tag)) else: cmd = 'docker run -it -d --memory="{3}" --platform {0} --name {1} {2} bash'.format(resolve_platform(), name, self._image_name(org, img, tag), (str(memory) + 'g')) run_command(cmd) else: cmd = 'sudo -u {0} udocker run {2} bash'.format(DEFAULT_UDOCKER_USERNAME, self._image_name(org, img, tag)) run_command(cmd) return name def kill(name): cmd = 'docker kill {0}'.format(name) run_command(cmd) def remove(name): cmd = 'docker rm -f {0}'.format(name) run_command(cmd) def cp_from_container(name, img_path, local_path, org=None, img=None, tag=None): local_path = os.path.abspath(local_path) tmp_file = os.path.join(tempfile.mkdtemp(prefix='ersilia-'), 'tmp.txt') cmd = ('docker cp %s:%s %s &> %s' % (name, img_path, local_path, tmp_file)) run_command(cmd) with open(tmp_file, 'r') as f: output = f.read() if ('No such container' in output): img_name = '{0}/{1}:{2}'.format(org, img, tag) cmd = 'docker run --platform linux/amd64 -d --name={0} {1}'.format(name, img_name) run_command(cmd) cmd = ('docker cp %s:%s %s' % (name, img_path, local_path)) run_command(cmd) def cp_from_image(self, img_path, local_path, org, img, tag): name = self.run(org, img, tag, name=None) self.cp_from_container(name, img_path, local_path, org=org, img=img, tag=tag) self.remove(name) def exec_container(name, cmd): cmd = ('docker exec -i %s bash -c "%s"' % (name, cmd)) run_command(cmd) def exec(self, cmd, org, img, tag, name): name = self.run(org, img, tag, name=name) self.exec_container(name, cmd) self.kill(name)
def test_equal_szts_straight(): kwargs = copy.copy(KWARGS) kwargs['images'] = 10 kwargs['max_step'] = 0.04 convergence = {'rms_force_thresh': 2.4} kwargs['convergence'] = convergence szts_equal = SimpleZTS(get_geoms(('A', 'B')), param='equal') opt = run_cos_opt(szts_equal, SteepestDescent, **kwargs) return opt
class Txt(Generator): def __init__(self, rmap=None, path='regs.txt', **args): super().__init__(rmap, **args) self.path = path def generate(self): self.validate() for reg in self.rmap: if (len(reg) > 1): raise ValueError(('Only registers with single bitfield are allowed for %s generator.' % self._name())) data_w = config.globcfg['data_width'] address_w = config.globcfg['address_width'] address_digits = ((address_w // 4) + (1 if (address_w % 4) else 0)) address_str = '0x%0{0}x'.format(address_digits) reset_digits = ((data_w // 4) + (1 if (data_w % 4) else 0)) reset_str = '0x%0{0}x'.format(reset_digits) row_template = '| %-{0}s | %-{1}s | %-{2}s | %-{3}s | %-{4}s | %-{5}s | %-{6}s |\n' row_top = ['Address', 'Name', 'Width', 'Access', 'Hardware', 'Reset', 'Description'] col_address = [(address_str % reg.address) for reg in self.rmap] col_names = self.rmap.reg_names col_width = [('%d' % reg.bitfields[0].width) for reg in self.rmap] col_access = [reg.bitfields[0].access for reg in self.rmap] col_hardware = [reg.bitfields[0].hardware for reg in self.rmap] col_reset = [(reset_str % reg.reset) for reg in self.rmap] col_description = [reg.description for reg in self.rmap] cols_w = [max((address_digits + 2), len(row_top[0])), max(max([len(s) for s in col_names]), len(row_top[1])), max(max([len(s) for s in col_width]), len(row_top[2])), max(max([len(s) for s in col_access]), len(row_top[3])), max(max([len(s) for s in col_hardware]), len(row_top[4])), max((reset_digits + 2), len(row_top[5])), max(max([len(s) for s in col_description]), len(row_top[6]))] row_template = row_template.format(*cols_w) out_lines = [(row_template % tuple(row_top))] out_lines.append((row_template % tuple([('-' * w) for w in cols_w]))) for i in range(len(col_names)): out_lines.append((row_template % (col_address[i], col_names[i], col_width[i], col_access[i], col_hardware[i], col_reset[i], col_description[i]))) utils.create_dirs(self.path) with open(self.path, 'w') as f: f.writelines(out_lines)
class OptionPlotoptionsTreegraphSonificationContexttracksMappingTremoloDepth(Options): def mapFunction(self): return self._config_get(None) def mapFunction(self, value: Any): self._config(value, js_type=False) def mapTo(self): return self._config_get(None) def mapTo(self, text: str): self._config(text, js_type=False) def max(self): return self._config_get(None) def max(self, num: float): self._config(num, js_type=False) def min(self): return self._config_get(None) def min(self, num: float): self._config(num, js_type=False) def within(self): return self._config_get(None) def within(self, value: Any): self._config(value, js_type=False)
def extractMadsnailRu(item): (vol, chp, frag, postfix) = extractVolChapterFragmentPostfix(item['title']) if ((not (chp or vol)) or ('preview' in item['title'].lower())): return False if ('WATTT' in item['tags']): return buildReleaseMessageWithType(item, 'WATTT', vol, chp, frag=frag, postfix=postfix) return False
(Output('forward-week', 'style'), [Input('week-ending', 'children')]) def toggle_forward_arrow_display(week_ending): if (calc_next_saturday(datetime.strptime(week_ending, '%A %b %d, %Y')) == calc_next_saturday(get_max_week_ending())): return {'color': 'rgba(0,0,0,0)', 'backgroundColor': 'rgba(0,0,0,0)', 'border': '0'} else: return {'display': 'inline-block', 'backgroundColor': 'rgba(0,0,0,0)', 'border': '0'}
def check_provider_constraints(provider_name: str, feature: str, subfeature: str, phase: Optional[str]=None, constraints: Optional[Dict]=None) -> Tuple[(bool, str)]: subfeatures_providers = list_features(as_dict=True) provider_info = subfeatures_providers.get(provider_name, None) if (not provider_info): return (False, f"Provider : '{provider_name}' unknown.") if (feature not in provider_info): return (False, f"Provider : '{provider_name}' does not provide an API for '{feature} {subfeature}'") if (subfeature not in provider_info[feature]): return (False, f"Provider : '{provider_name}' does not provide an API for '{feature} {subfeature}'") if phase: if ((not isinstance(provider_info[feature][subfeature], dict)) or (isinstance(provider_info[feature][subfeature], dict) and (phase not in provider_info[feature][subfeature].keys()))): return (False, (f"Provider : '{provider_name}' does not provide an API for " + "'{feature} {subfeature} {phase}'")) if constraints: for (key, values) in constraints: for value in values: if (not (value in load_provider(ProviderDataEnum.PROVIDER_INFO, provider_name=provider_name, feature=feature, subfeature=subfeature, phase=phase)[key])): return (False, f"constraint : '{key} - {values}' not filled for '{provider_name}'") return (True, 'All Good!')
class SingleSiteUniformMetropolisHastingsTest(unittest.TestCase): class SampleBernoulliModel(object): _variable def foo(self): return dist.Beta(torch.tensor(2.0), torch.tensor(2.0)) _variable def bar(self): return dist.Bernoulli(self.foo()) class SampleCategoricalModel(object): _variable def foo(self): return dist.Dirichlet(torch.tensor([0.5, 0.5])) _variable def bar(self): return dist.Categorical(self.foo()) def test_single_site_uniform_mh_with_bernoulli(self): model = self.SampleBernoulliModel() mh = bm.SingleSiteUniformMetropolisHastings() foo_key = model.foo() bar_key = model.bar() sampler = mh.sampler([foo_key], {bar_key: torch.tensor(0.0)}, num_samples=5) for world in sampler: self.assertTrue((foo_key in world)) self.assertTrue((bar_key in world)) self.assertTrue((foo_key in world.get_variable(bar_key).parents)) self.assertTrue((bar_key in world.get_variable(foo_key).children)) def test_single_site_uniform_mh_with_categorical(self): model = self.SampleCategoricalModel() mh = bm.SingleSiteUniformMetropolisHastings() foo_key = model.foo() bar_key = model.bar() sampler = mh.sampler([foo_key], {bar_key: torch.tensor(0.0)}, num_samples=5) for world in sampler: self.assertTrue((foo_key in world)) self.assertTrue((bar_key in world)) self.assertTrue((foo_key in world.get_variable(bar_key).parents)) self.assertTrue((bar_key in world.get_variable(foo_key).children))
def test_average_regions_range_in_bins_end(): outfile = NamedTemporaryFile(suffix='.npz', prefix='average_region', delete=False) matrix = (ROOT + 'small_test_matrix.cool') bed_file = (ROOT + 'hicAverageRegions/regions_multi.bed') args = '--matrix {} --regions {} -o {} --rangeInBins 100 100 -cb {}'.format(matrix, bed_file, outfile.name, 'end').split() compute(hicAverageRegions.main, args, 5) test_file = load_npz((ROOT + 'hicAverageRegions/regions_multi_range_in_bins_end.npz')) new_file = load_npz(outfile.name) nt.assert_almost_equal(test_file.data, new_file.data, decimal=0) os.remove(outfile.name)
class BatchProcessor(): def __init__(self, batch_size=50, concurrent_requests=4): self.batch_size = batch_size self.concurrent_requests = concurrent_requests def process_event_requests(self, event_requests_async): async def process(): async for _ in self.process_event_requests_generator(event_requests_async): pass asyncio.run(process()) async def process_event_requests_generator(self, event_requests_async): index = 0 while (index < len(event_requests_async)): batch = event_requests_async[index:(index + self.concurrent_requests)] responses = [] for request in batch: response = (await request.execute()) responses.append(response) (yield responses) index += self.concurrent_requests def process_events(self, event_request_async_to_clone, events): async def process(): async for _ in self.process_events_generator(event_request_async_to_clone, events): pass asyncio.run(process()) async def process_events_generator(self, event_request_async_to_clone, events): index = 0 while (index < len(events)): responses = [] while ((index < len(events)) and (len(responses) < self.concurrent_requests)): event_request = event_request_async_to_clone.clone_without_events() event_request.events = events[index:(index + self.batch_size)] response = (await event_request.execute()) responses.append(response) index += self.batch_size (yield responses)
class EventEmailTemplateForm(EmailTemplateForm): def __init__(self, event, location): domain = Site.objects.get_current().domain super(EventEmailTemplateForm, self).__init__() self.fields['sender'].initial = location.from_email() self.fields['footer'].initial = forms.CharField(widget=forms.Textarea(attrs={'readonly': 'readonly'})) path = reverse('gather_view_event', args=(location.slug, event.id, event.slug)) self.fields['footer'].initial = ("\nThis message was sent to attendees of the event '%s' at %s. You can view event details and update your RSVP status on the event page % (event.title, location.name, domain, path)) self.fields['recipient'].initial = ', '.join([attendee.email for attendee in list(event.attendees.all())]) self.fields['subject'].initial = (((('[' + location.email_subject_prefix) + '] Update for event "') + event.title) + '"')
def apply_encryption(message: PlainMessage, credentials: V3, security_name: bytes, security_engine_id: bytes, engine_boots: int, engine_time: int) -> Union[(PlainMessage, EncryptedMessage)]: if ((credentials.priv is not None) and (not credentials.priv.method)): raise UnsupportedSecurityLevel('Encryption method is missing') if (credentials.priv is None): return replace(message, security_parameters=bytes(USMSecurityParameters(security_engine_id, engine_boots, engine_time, security_name, b'', b''))) priv_method = priv.create(credentials.priv.method) localised_key = localise_key(credentials, security_engine_id) try: (encrypted, salt) = priv_method.encrypt_data(localised_key, security_engine_id, engine_boots, engine_time, bytes(message.scoped_pdu)) scoped_pdu = OctetString(encrypted) except Exception as exc: raise EncryptionError(f'Unable to encrypt message ({exc})') from exc unauthed_message = replace(message, scoped_pdu=scoped_pdu, security_parameters=bytes(USMSecurityParameters(security_engine_id, engine_boots, engine_time, security_name, b'', salt))) return unauthed_message
class OptionSeriesColumnDataDragdrop(Options): def draggableX(self): return self._config_get(None) def draggableX(self, flag: bool): self._config(flag, js_type=False) def draggableY(self): return self._config_get(None) def draggableY(self, flag: bool): self._config(flag, js_type=False) def dragHandle(self) -> 'OptionSeriesColumnDataDragdropDraghandle': return self._config_sub_data('dragHandle', OptionSeriesColumnDataDragdropDraghandle) def dragMaxX(self): return self._config_get(None) def dragMaxX(self, num: float): self._config(num, js_type=False) def dragMaxY(self): return self._config_get(None) def dragMaxY(self, num: float): self._config(num, js_type=False) def dragMinX(self): return self._config_get(None) def dragMinX(self, num: float): self._config(num, js_type=False) def dragMinY(self): return self._config_get(None) def dragMinY(self, num: float): self._config(num, js_type=False) def dragPrecisionX(self): return self._config_get(0) def dragPrecisionX(self, num: float): self._config(num, js_type=False) def dragPrecisionY(self): return self._config_get(0) def dragPrecisionY(self, num: float): self._config(num, js_type=False) def dragSensitivity(self): return self._config_get(2) def dragSensitivity(self, num: float): self._config(num, js_type=False) def groupBy(self): return self._config_get(None) def groupBy(self, text: str): self._config(text, js_type=False) def guideBox(self) -> 'OptionSeriesColumnDataDragdropGuidebox': return self._config_sub_data('guideBox', OptionSeriesColumnDataDragdropGuidebox) def liveRedraw(self): return self._config_get(True) def liveRedraw(self, flag: bool): self._config(flag, js_type=False)
def _bail_if_private(candidate: str, allow_private: bool) -> None: if (candidate.startswith('_') and (not allow_private) and (not (candidate.startswith('__') and candidate.endswith('__')))): raise ValueError("It's disencouraged to patch/mock private interfaces.\nThis would result in way too coupled tests and implementation. Please consider using patterns like dependency injection instead. If you really need to do this use the allow_private=True argument.")
def _StashRepos(repos_and_branch, params, pop=False): commands = [] for (repo, _branch) in repos_and_branch: if pop: cmd = [params.config.git, 'stash', 'pop'] else: cmd = [params.config.git, 'stash', '-u'] commands.append(ParallelCmd(repo, cmd)) ExecuteInParallel(commands)
_flyte_cli.command('update-plugin-override', cls=_FlyteSubCommand) _host_option _insecure_option _project_option _domain_option _optional_name_option _click.option('--task-type', help='Task type for which to apply plugin implementation overrides') _click.option('--plugin-id', multiple=True, help='Plugin id(s) to be used in place of the default for the task type.') _click.option('--missing-plugin-behavior', help='Behavior when no specified plugin_id has an associated handler.', default='FAIL') def update_plugin_override(host, insecure, project, domain, name, task_type, plugin_id, missing_plugin_behavior): _welcome_message() client = _get_client(host, insecure) plugin_override = _PluginOverride(task_type, list(plugin_id), _PluginOverride.string_to_enum(missing_plugin_behavior.upper())) matching_attributes = _MatchingAttributes(plugin_overrides=_PluginOverrides(overrides=[plugin_override])) if (name is not None): client.update_workflow_attributes(project, domain, name, matching_attributes) _click.echo('Successfully updated plugin override for project: {}, domain: {}, and workflow: {}'.format(project, domain, name)) else: client.update_project_domain_attributes(project, domain, matching_attributes) _click.echo('Successfully updated plugin override for project: {} and domain: {}'.format(project, domain))
def lab_to_din99o(lab: Vector) -> Vector: (l, a, b) = lab val = (1 + (C2 * l)) l99o = ((C1 * math.copysign(math.log(abs(val)), val)) / KE) if ((a == 0) and (b == 0)): a99o = b99o = 0.0 else: eo = ((a * math.cos(RADS)) + (b * math.sin(RADS))) fo = (FACTOR * ((b * math.cos(RADS)) - (a * math.sin(RADS)))) go = math.sqrt(((eo ** 2) + (fo ** 2))) val = (1 + (C3 * go)) c99o = (math.copysign(math.log(abs(val)), val) / ((C4 * KE) * KCH)) h99o = (math.atan2(fo, eo) + RADS) a99o = (c99o * math.cos(h99o)) b99o = (c99o * math.sin(h99o)) return [l99o, a99o, b99o]
class SlaPolicyResponseHandler(GenericZendeskResponseHandler): def applies_to(api, response): return get_endpoint_path(api, response).startswith('/slas') def deserialize(self, response_json): if ('definitions' in response_json): definitions = self.object_mapping.object_from_json('definitions', response_json['definitions']) return dict(definitions=definitions) return super(SlaPolicyResponseHandler, self).deserialize(response_json) def build(self, response): response_json = response.json() response_objects = self.deserialize(response_json) if ('sla_policies' in response_objects): return ZendeskResultGenerator(self, response.json(), response_objects=response_objects['sla_policies']) elif ('sla_policy' in response_objects): return response_objects['sla_policy'] elif response_objects: return response_objects['definitions'] raise ZenpyException('Could not handle response: {}'.format(response_json))
class TestUserUpdateClipper(): def _init_user_model(self, param_value): user_model = utils.TwoFC() user_model.fill_all(param_value) return user_model def test_calc_clip_factor(self) -> None: clip_factor = calc_clip_factor(clipping_value=5, norm=10) assertAlmostEqual(clip_factor, 0.5, places=3) clip_factor = calc_clip_factor(clipping_value=1, norm=1) assertAlmostEqual(clip_factor, 1, places=3) clip_factor = calc_clip_factor(clipping_value=2, norm=0.8) assertAlmostEqual(clip_factor, 1, places=3) def test_calc_user_update_norm(self) -> None: model = utils.TwoFC() model.fill_all(2.0) model_params = model.parameters() norm = calc_norm(model_params) assertAlmostEqual(norm, 9., delta=1e-06) model.fill_all(1.0) model_params = model.parameters() norm = calc_norm(model_params) assertAlmostEqual(norm, 4., delta=1e-06) def test_clipped_updates_are_smaller(self) -> None: max_norm = 0.0003 previous_model = self._init_user_model(6) current_model = self._init_user_model(7) clipper = UserUpdateClipper(max_norm=max_norm) model_diff = clipper.calc_model_diff(current_model, previous_model) orignal = deepcopy(model_diff) assertGreater(calc_norm(model_diff.parameters()), max_norm) clipper.clip(model_diff) assertAlmostEqual(calc_norm(model_diff.parameters()), max_norm, delta=1e-06) for (o, c) in zip(orignal.parameters(), model_diff.parameters()): assertTrue(torch.all(o.gt(c))) def test_clipped_user_updates_non_zero(self) -> None: max_norm = 0.0003 previous_model = self._init_user_model(6) current_model = self._init_user_model(7) clipper = UserUpdateClipper(max_norm=max_norm) model_diff = clipper.calc_model_diff(current_model, previous_model) clipper.clip(model_diff) clipped_model_diff_params = [p for p in model_diff.parameters() if p.requires_grad] for clipped in clipped_model_diff_params: allzeros = torch.zeros_like(clipped) assertFalse(torch.allclose(clipped, allzeros)) def test_clipping_to_high_value_does_not_clip(self) -> None: max_norm = 1000 previous_model = self._init_user_model(6) current_model = self._init_user_model(7) clipper = UserUpdateClipper(max_norm=max_norm) model_diff = clipper.calc_model_diff(current_model, previous_model) original = deepcopy(model_diff) clipper.clip(model_diff) mismatched = utils.verify_models_equivalent_after_training(original, model_diff) assertEmpty(mismatched, msg=mismatched)
class LocalEnsembleReader(): def __init__(self, storage: LocalStorageReader, path: Path): self._storage: Union[(LocalStorageReader, LocalStorageAccessor)] = storage self._path = path self._index = _Index.model_validate_json((path / 'index.json').read_text(encoding='utf-8')) self._experiment_path = (self._path / 'experiment') self._state_map = self._load_state_map() def mount_point(self) -> Path: return self._path def name(self) -> str: return self._index.name def id(self) -> UUID: return self._index.id def experiment_id(self) -> UUID: return self._index.experiment_id def ensemble_size(self) -> int: return self._index.ensemble_size def started_at(self) -> datetime: return self._index.started_at def iteration(self) -> int: return self._index.iteration def state_map(self) -> List[RealizationStorageState]: return self._state_map def experiment(self) -> Union[(LocalExperimentReader, LocalExperimentAccessor)]: return self._storage.get_experiment(self.experiment_id) def is_initalized(self) -> bool: return ((RealizationStorageState.INITIALIZED in self.state_map) or self.has_data) def has_data(self) -> bool: return (RealizationStorageState.HAS_DATA in self.state_map) def close(self) -> None: self.sync() def sync(self) -> None: pass def get_realization_mask_from_state(self, states: List[RealizationStorageState]) -> npt.NDArray[np.bool_]: return np.array([(s in states) for s in self._state_map], dtype=bool) def _load_state_map(self) -> List[RealizationStorageState]: state_map_file = (self._experiment_path / 'state_map.json') if state_map_file.exists(): with open(state_map_file, 'r', encoding='utf-8') as f: data = json.load(f) return [RealizationStorageState(v) for v in data['state_map']] else: return [RealizationStorageState.UNDEFINED for _ in range(self.ensemble_size)] def realizations_initialized(self, realizations: List[int]) -> bool: initialized_realizations = set(self.realization_list(RealizationStorageState.INITIALIZED)) return all(((real in initialized_realizations) for real in realizations)) def has_parameter_group(self, group: str) -> bool: param_group_file = (self.mount_point / f'realization-0/{group}.nc') return param_group_file.exists() def _filter_active_realizations(self, realization_index: Optional[int]=None) -> List[int]: realizations = self.realization_list(RealizationStorageState.HAS_DATA) if (realization_index is not None): if (realization_index not in realizations): raise IndexError(f'No such realization {realization_index}') realizations = [realization_index] return realizations def realization_list(self, state: RealizationStorageState) -> List[int]: return [i for (i, s) in enumerate(self._state_map) if (s == state)] def get_summary_keyset(self) -> List[str]: realization_folders = list(self.mount_point.glob('realization-*')) if (not realization_folders): return [] summary_path = (realization_folders[0] / 'summary.nc') if (not summary_path.exists()): return [] realization_nr = int(str(realization_folders[0])[(- 1)]) response = self.load_responses('summary', (realization_nr,)) keys = sorted(response['name'].values) return keys def _get_gen_data_config(self, key: str) -> GenDataConfig: config = self.experiment.response_configuration[key] assert isinstance(config, GenDataConfig) return config def get_gen_data_keyset(self) -> List[str]: keylist = [k for (k, v) in self.experiment.response_info.items() if (('_ert_kind' in v) and (v['_ert_kind'] == 'GenDataConfig'))] gen_data_list = [] for key in keylist: gen_data_config = self._get_gen_data_config(key) if (gen_data_config.report_steps is None): gen_data_list.append(f'{key}') else: for report_step in gen_data_config.report_steps: gen_data_list.append(f'{key}{report_step}') return sorted(gen_data_list, key=(lambda k: k.lower())) def get_gen_kw_keyset(self) -> List[str]: gen_kw_list = [] for key in self.experiment.parameter_info: gen_kw_config = self.experiment.parameter_configuration[key] assert isinstance(gen_kw_config, GenKwConfig) for keyword in [e.name for e in gen_kw_config.transfer_functions]: gen_kw_list.append(f'{key}:{keyword}') if gen_kw_config.shouldUseLogScale(keyword): gen_kw_list.append(f'LOG10_{key}:{keyword}') return sorted(gen_kw_list, key=(lambda k: k.lower())) def _load_single_dataset(self, group: str, realization: int) -> xr.Dataset: try: return xr.open_dataset(((self.mount_point / f'realization-{realization}') / f'{group}.nc'), engine='scipy') except FileNotFoundError as e: raise KeyError(f"No dataset '{group}' in storage for realization {realization}") from e def _load_dataset(self, group: str, realizations: Union[(int, npt.NDArray[np.int_], None)]) -> xr.Dataset: if isinstance(realizations, int): return self._load_single_dataset(group, realizations).isel(realizations=0, drop=True) if (realizations is None): datasets = [xr.open_dataset(p, engine='scipy') for p in sorted(self.mount_point.glob(f'realization-*/{group}.nc'))] else: datasets = [self._load_single_dataset(group, i) for i in realizations] return xr.combine_nested(datasets, 'realizations') def load_parameters(self, group: str, realizations: Union[(int, npt.NDArray[np.int_], None)]=None) -> xr.Dataset: return self._load_dataset(group, realizations) _cache def load_responses(self, key: str, realizations: npt.NDArray[np.int_]) -> xr.Dataset: if (key not in self.experiment.response_configuration): raise ValueError(f'{key} is not a response') loaded = [] for realization in realizations: input_path = ((self.mount_point / f'realization-{realization}') / f'{key}.nc') if (not input_path.exists()): raise KeyError(f'No response for key {key}, realization: {realization}') ds = xr.open_dataset(input_path, engine='scipy') loaded.append(ds) response = xr.combine_nested(loaded, concat_dim='realization') assert isinstance(response, xr.Dataset) return response def load_all_summary_data(self, keys: Optional[List[str]]=None, realization_index: Optional[int]=None) -> pd.DataFrame: summary_keys = self.get_summary_keyset() try: df = self.load_responses('summary', tuple(self._filter_active_realizations(realization_index))).to_dataframe() except (ValueError, KeyError): return pd.DataFrame() df = df.unstack(level='name') df.columns = [col[1] for col in df.columns.values] df.index = df.index.rename({'time': 'Date', 'realization': 'Realization'}).reorder_levels(['Realization', 'Date']) if keys: summary_keys = sorted([key for key in keys if (key in summary_keys)]) return df[summary_keys] return df def load_gen_data(self, key: str, report_step: int, realization_index: Optional[int]=None) -> pd.DataFrame: realizations = self._filter_active_realizations(realization_index) try: vals = self.load_responses(key, tuple(realizations)).sel(report_step=report_step, drop=True) except KeyError as e: raise KeyError(f'Missing response: {key}') from e index = pd.Index(vals.index.values, name='axis') return pd.DataFrame(data=vals['values'].values.reshape(len(vals.realization), (- 1)).T, index=index, columns=realizations) def load_all_gen_kw_data(self, group: Optional[str]=None, realization_index: Optional[int]=None) -> pd.DataFrame: ens_mask = self.get_realization_mask_from_state([RealizationStorageState.INITIALIZED, RealizationStorageState.HAS_DATA]) realizations = (np.array([realization_index]) if (realization_index is not None) else np.flatnonzero(ens_mask)) dataframes = [] gen_kws = [config for config in self.experiment.parameter_configuration.values() if isinstance(config, GenKwConfig)] if group: gen_kws = [config for config in gen_kws if (config.name == group)] for key in gen_kws: try: ds = self.load_parameters(key.name, realizations)['transformed_values'] assert isinstance(ds, xr.DataArray) ds['names'] = np.char.add(f'{key.name}:', ds['names'].astype(np.str_)) df = ds.to_dataframe().unstack(level='names') df.columns = df.columns.droplevel() for parameter in df.columns: if key.shouldUseLogScale(parameter.split(':')[1]): df[f'LOG10_{parameter}'] = np.log10(df[parameter]) dataframes.append(df) except KeyError: pass if (not dataframes): return pd.DataFrame() dataframe = pd.concat(dataframes, axis=1) dataframe.columns.name = None dataframe.index.name = 'Realization' return dataframe.sort_index(axis=1)
def gen_function_call(func_attrs, backend_spec, indent=' ', bias_add=False): x = func_attrs['inputs'][0] xshape = x._attrs['shape'] y = func_attrs['outputs'][0] yshape = y._attrs['shape'] if bias_add: r = func_attrs['inputs'][1] return FUNC_CALL_TEMPLATE.render(func_name=func_attrs['name'], index_type=backend_spec.index_type, in_ptr=x._attrs['name'], res_ptr=r._attrs['name'], out_ptr=y._attrs['name'], p_batch=('&' + xshape[0]._attrs['name']), p_in_ch=('&' + xshape[3]._attrs['name']), p_in_h=('&' + xshape[1]._attrs['name']), p_in_w=('&' + xshape[2]._attrs['name']), p_out_batch=('&' + yshape[0]._attrs['name']), p_out_h=('&' + yshape[1]._attrs['name']), p_out_w=('&' + yshape[2]._attrs['name']), indent=indent, bias_add=bias_add) else: return FUNC_CALL_TEMPLATE.render(func_name=func_attrs['name'], index_type=backend_spec.index_type, in_ptr=x._attrs['name'], out_ptr=y._attrs['name'], p_batch=('&' + xshape[0]._attrs['name']), p_in_ch=('&' + xshape[3]._attrs['name']), p_in_h=('&' + xshape[1]._attrs['name']), p_in_w=('&' + xshape[2]._attrs['name']), p_out_batch=('&' + yshape[0]._attrs['name']), p_out_h=('&' + yshape[1]._attrs['name']), p_out_w=('&' + yshape[2]._attrs['name']), indent=indent, bias_add=bias_add)
class HFConfigKeys(): def conv_rotary_embedding_base(config: GPTNeoXConfig) -> int: assert (config.layer.attention.rotary_embeddings is not None) return config.layer.attention.rotary_embeddings.rotary_base def conv_rotary_embedding_fraction(config: GPTNeoXConfig) -> float: assert (config.layer.attention.rotary_embeddings is not None) return config.layer.attention.rotary_embeddings.rotary_fraction ROTARY_EMB_BASE = HFConfigKey('rotary_emb_base', 'rotary_embedding_base', (lambda c: HFConfigKeys.conv_rotary_embedding_base(c))) ROTARY_PCT = HFConfigKey('rotary_pct', 'rotary_embedding_fraction', (lambda c: HFConfigKeys.conv_rotary_embedding_fraction(c)))
class LRUCache(): def __init__(self, capacity: int): self.capacity = capacity self.cache = {} self.head = ListNode(None, None) self.tail = ListNode(None, None) self.head.next = self.tail self.tail.prev = self.head def get(self, key: int) -> int: if (key not in self.cache): return (- 1) node = self.cache[key] self.delete_node(node) self.insert_after_head(node) return node.val def delete_node(self, node: ListNode) -> None: node.prev.next = node.next node.next.prev = node.prev node.next = None node.prev = None def insert_after_head(self, node: ListNode) -> None: second = self.head.next self.head.next = node node.next = second second.prev = node node.prev = self.head def put(self, key: int, value: int) -> None: if (key in self.cache): self.get(key) self.cache[key].val = value return if (len(self.cache) >= self.capacity): second_last = self.tail.prev self.delete_node(second_last) del self.cache[second_last.key] node = ListNode(key, value) self.cache[key] = node self.insert_after_head(node) def debug(self): curr = self.head.next print(self.cache) while (curr != self.tail): print(curr.key, curr.val, end=' ') curr = curr.next print()
class ObjectWithEqualityComparisonMode(HasTraits): list_values = List(comparison_mode=ComparisonMode.equality) dict_values = Dict(comparison_mode=ComparisonMode.equality) set_values = Set(comparison_mode=ComparisonMode.equality) number = Any(comparison_mode=ComparisonMode.equality) calculated = Property(depends_on='number') def _get_calculated(self): return None
class Driver(): def __init__(self, user, password, db, u_search='', g_search='', c_search='', regex=''): try: self.driver = GraphDatabase.driver('neo4j://localhost:7687', auth=(user, password)) self.database = db self.user_search = u_search self.group_search = g_search self.computer_search = c_search self.regex = regex self.queries = {'1': {'query': 'MATCH (n:User {hasspn: true}) RETURN n.name AS result ORDER BY n.name', 'desc': 'List all kerberoastable users', 'message_generator': (lambda r: (((r.get('result') is not None) and f"{log.default}User {log.reset}{log.red}{r['result']}{log.reset}{log.default} is kerberoastable{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '2': {'query': 'MATCH (n:User {owned: true, hasspn: true}) RETURN n.name AS result ORDER BY n.name', 'desc': 'List all kerberoastable users for owned principals', 'message_generator': (lambda r: (((r.get('result') is not None) and f"{log.default}User {log.reset}{log.red}{r['result']}{log.reset}{log.default} is kerberoastable{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '3': {'query': 'MATCH p=(u:User)-[:CanRDP]->(c:Computer) RETURN u.name,c.name ORDER BY u.name', 'desc': 'List all user RDP privileges', 'message_generator': (lambda r: ((((r.get('u.name') is not None) and (r.get('c.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['u.name']}{log.reset}{log.default} CanRDP to {log.reset}{log.red}{r['c.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '4': {'query': 'MATCH p=(g:Group)-[:CanRDP]->(c:Computer) RETURN g.name,c.name ORDER BY g.name', 'desc': 'List all group RDP privileges', 'message_generator': (lambda r: ((((r.get('g.name') is not None) and (r.get('c.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['g.name']}{log.reset}{log.default} CanRDP to {log.reset}{log.red}{r['c.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '5': {'query': 'MATCH p=(g:Group)-[:CanRDP]->(c:Computer) WHERE (g.objectid =~ "(?i)S-1-5-21-.*-513" OR g.objectid =~ "(?i).*-S-1-5-11" OR g.objectid =~ "(?i).*-S-1-1-0" OR g.objectid =~ "(?i).*-S-1-5-32-545") RETURN g.name,c.name ORDER BY g.name', 'desc': 'List all RDP privileges for Users, Domain Users, Authenticated Users, or Everyone groups', 'message_generator': (lambda r: ((((r.get('g.name') is not None) and (r.get('c.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['g.name']}{log.reset}{log.default} CanRDP to {log.reset}{log.red}{r['c.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '6': {'query': 'MATCH p=(m:Group)-[:MemberOf]->(g:Group)-[:CanRDP]->(n:Computer) WHERE (m.objectid =~ "(?i)S-1-5-21-.*-513" OR m.objectid =~ "(?i).*-S-1-5-11" OR m.objectid =~ "(?i).*-S-1-1-0" OR m.objectid =~ "(?i).*-S-1-5-32-545") RETURN m.name,n.name,g.name ORDER BY m.name', 'desc': 'List all group-delegated RDP privileges for Users, Domain Users, Authenticated Users, or Everyone groups', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None) and (r.get('g.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} is MemberOf {log.reset}{log.red}{r['g.name']} {log.reset}{log.default}which CanRDP to {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '7': {'query': 'MATCH p=(m {owned: true})-[:CanRDP]->(c:Computer) RETURN m.name,c.name,labels(m) ORDER BY m.name', 'desc': 'List all RDP privileges for owned principals', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('c.name') is not None)) and f"{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}{log.default} CanRDP to {log.reset}{log.red}{r['c.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '8': {'query': 'MATCH (n {owned: true})-[:MemberOf]->(g:Group)-[:CanRDP]->(m:Computer) RETURN n.name,labels(n),m.name,g.name ORDER BY n.name', 'desc': 'List all group-delegated RDP privileges for owned principals', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None) and (r.get('g.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} is MemberOf {log.reset}{log.red}{r['g.name']} {log.reset}{log.default}which CanRDP to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '9': {'query': 'MATCH (c:Computer {unconstraineddelegation: true}) RETURN c.name ORDER BY c.name', 'desc': 'List all Unconstrained Delegation', 'message_generator': (lambda r: (((r.get('c.name') is not None) and f"{log.default}Computer {log.reset}{log.red}{r['c.name']}{log.reset}{log.default} has unconstrained delegation privilege{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '10': {'query': "MATCH (H:Computer) WHERE H.operatingsystem =~ '.*(2000|2003|2008|xp|vista|7|me).*' RETURN H.name,H.operatingsystem ORDER BY H.name", 'desc': 'List all unsupported OSs', 'message_generator': (lambda r: ((((r.get('H.name') is not None) and (r.get('H.operatingsystem') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['H.name']}{log.reset}{log.default} is unsupported with OS {log.reset}{log.red}{r['H.operatingsystem']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '11': {'query': "MATCH (g:Group) WHERE g.name =~ '.*((?i)admin|adm).*' RETURN g.name ORDER BY g.name", 'desc': 'List groups containing "admin"', 'message_generator': (lambda r: (((r.get('g.name') is not None) and f"{log.default}Admin group {log.reset}{log.red}{r['g.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '12': {'query': "MATCH (u:User) WHERE u.name =~ '.*((?i)admin|adm).*' RETURN u.name ORDER BY u.name", 'desc': 'List users containing "admin"', 'message_generator': (lambda r: (((r.get('u.name') is not None) and f"{log.default}Admin user {log.reset}{log.red}{r['u.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '13': {'query': 'MATCH p=shortestPath((m:User)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)admin|adm).*" AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all user shortest paths to admin groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '14': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)admin|adm).*" AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all group shortest paths to admin groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '15': {'query': 'MATCH p=shortestPath((m:Computer)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)admin|adm).*" AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all computer shortest paths to admin groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '16': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE (m.objectid =~ "(?i)S-1-5-21-.*-513" OR m.objectid =~ "(?i).*-S-1-5-11" OR m.objectid =~ "(?i).*-S-1-1-0" OR m.objectid =~ "(?i).*-S-1-5-32-545") AND n.name =~ ".*((?i)admin|adm).*" AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to admin groups for Users, Domain Users, Authenticated Users, or Everyone groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '17': {'query': 'MATCH p=shortestPath((m {owned: true})-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)admin|adm).*" AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to admin groups for owned principals', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '18': {'query': "MATCH (g:Group) WHERE g.name =~ '.*((?i)sql).*' RETURN g.name ORDER BY g.name", 'desc': 'List groups containing "sql"', 'message_generator': (lambda r: (((r.get('g.name') is not None) and f"{log.default}SQL group {log.reset}{log.red}{r['g.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '19': {'query': "MATCH (u:User) WHERE u.name =~ '.*((?i)sql).*' RETURN u.name ORDER BY u.name", 'desc': 'List users containing "sql"', 'message_generator': (lambda r: (((r.get('u.name') is not None) and f"{log.default}SQL user {log.reset}{log.red}{r['u.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '20': {'query': "MATCH (c:Computer) WHERE c.name =~ '.*((?i)sql).*' RETURN c.name ORDER BY c.name", 'desc': 'List computers containing "sql"', 'message_generator': (lambda r: (((r.get('c.name') is not None) and f"{log.default}SQL computer {log.reset}{log.red}{r['c.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '21': {'query': 'MATCH p=shortestPath((m:User)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)SQL).*" AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all user shortest paths to SQL groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '22': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)SQL).*" AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all group shortest paths to SQL groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '23': {'query': 'MATCH p=shortestPath((m:Computer)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)SQL).*" AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all computer shortest paths to SQL groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '24': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE (m.objectid =~ "(?i)S-1-5-21-.*-513" OR m.objectid =~ "(?i).*-S-1-5-11" OR m.objectid =~ "(?i).*-S-1-1-0" OR m.objectid =~ "(?i).*-S-1-5-32-545") AND n.name =~ ".*((?i)SQL).*" AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to SQL groups for Users, Domain Users, Authenticated Users, or Everyone groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '25': {'query': 'MATCH p=shortestPath((m {owned: true})-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)SQL).*" AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to SQL groups for owned principals', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '26': {'query': "MATCH (u:User) WHERE u.name =~ '.*((?i)svc|service).*' RETURN u.name ORDER BY u.name", 'desc': 'List users containing "svc/service"', 'message_generator': (lambda r: (((r.get('u.name') is not None) and f"{log.default}Service user {log.reset}{log.red}{r['u.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '27': {'query': "MATCH (g:Group) WHERE g.name =~ '.*((?i)svc|service).*' RETURN g.name ORDER BY g.name", 'desc': 'List groups containing "svc/service"', 'message_generator': (lambda r: (((r.get('g.name') is not None) and f"{log.default}Service group {log.reset}{log.red}{r['g.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '28': {'query': 'MATCH p=shortestPath((m:User)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)service|svc).*" AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all user shortest paths to service groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '29': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)service|svc).*" AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all group shortest paths to service groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '30': {'query': 'MATCH p=shortestPath((m:Computer)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)service|svc).*" AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all computer shortest paths to service groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '31': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE (m.objectid =~ "(?i)S-1-5-21-.*-513" OR m.objectid =~ "(?i).*-S-1-5-11" OR m.objectid =~ "(?i).*-S-1-1-0" OR m.objectid =~ "(?i).*-S-1-5-32-545") AND n.name =~ ".*((?i)service|svc).*" AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to service groups for Users, Domain Users, Authenticated Users, or Everyone groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '32': {'query': 'MATCH p=shortestPath((m {owned: true})-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)service|svc).*" AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to service groups for owned principals', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '33': {'query': "MATCH (u:User) WHERE u.name =~ '.*((?i)web).*' RETURN u.name ORDER BY u.name", 'desc': 'List users containing "web"', 'message_generator': (lambda r: (((r.get('u.name') is not None) and f"{log.default}Web user {log.reset}{log.red}{r['u.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '34': {'query': "MATCH (g:Group) WHERE g.name =~ '.*((?i)web).*' RETURN g.name ORDER BY g.name", 'desc': 'List groups containing "web"', 'message_generator': (lambda r: (((r.get('g.name') is not None) and f"{log.default}Web group {log.reset}{log.red}{r['g.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '35': {'query': "MATCH (c:Computer) WHERE c.name =~ '.*((?i)web).*' RETURN c.name ORDER BY c.name", 'desc': 'List computers containing "web"', 'message_generator': (lambda r: (((r.get('c.name') is not None) and f"{log.default}Web computer {log.reset}{log.red}{r['c.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '36': {'query': 'MATCH p=shortestPath((m:User)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)WEB).*" AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all user shortest paths to web groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '37': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)WEB).*" AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all group shortest paths to web groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '38': {'query': 'MATCH p=shortestPath((m:Computer)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)WEB).*" AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all computer shortest paths to web groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '39': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE (m.objectid =~ "(?i)S-1-5-21-.*-513" OR m.objectid =~ "(?i).*-S-1-5-11" OR m.objectid =~ "(?i).*-S-1-1-0" OR m.objectid =~ "(?i).*-S-1-5-32-545") AND n.name =~ ".*((?i)WEB).*" AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to web groups for Users, Domain Users, Authenticated Users, or Everyone groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '40': {'query': 'MATCH p=shortestPath((m {owned: true})-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)WEB).*" AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to web groups for owned principals', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '41': {'query': "MATCH (u:User) WHERE u.name =~ '.*((?i)dev).*' RETURN u.name ORDER BY u.name", 'desc': 'List users containing "dev"', 'message_generator': (lambda r: (((r.get('u.name') is not None) and f"{log.default}Dev user {log.reset}{log.red}{r['u.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '42': {'query': "MATCH (g:Group) WHERE g.name =~ '.*((?i)dev).*' RETURN g.name ORDER BY g.name", 'desc': 'List groups containing "dev"', 'message_generator': (lambda r: (((r.get('g.name') is not None) and f"{log.default}Dev group {log.reset}{log.red}{r['g.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '43': {'query': "MATCH (c:Computer) WHERE c.name =~ '.*((?i)dev).*' RETURN c.name ORDER BY c.name", 'desc': 'List computers containing "dev"', 'message_generator': (lambda r: (((r.get('c.name') is not None) and f"{log.default}Dev computer {log.reset}{log.red}{r['c.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '44': {'query': "MATCH (u:User) WHERE u.name =~ '.*((?i)prod).*' RETURN u.name ORDER BY u.name", 'desc': 'List users containing "prod"', 'message_generator': (lambda r: (((r.get('u.name') is not None) and f"{log.default}Prod user {log.reset}{log.red}{r['u.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '45': {'query': "MATCH (g:Group) WHERE g.name =~ '.*((?i)prod).*' RETURN g.name ORDER BY g.name", 'desc': 'List groups containing "prod"', 'message_generator': (lambda r: (((r.get('g.name') is not None) and f"{log.default}Prod group {log.reset}{log.red}{r['g.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '46': {'query': "MATCH (c:Computer) WHERE c.name =~ '.*((?i)prod).*' RETURN c.name ORDER BY c.name", 'desc': 'List computers containing "prod"', 'message_generator': (lambda r: (((r.get('c.name') is not None) and f"{log.default}Prod computer {log.reset}{log.red}{r['c.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '47': {'query': 'MATCH (n:Group) WHERE n.objectid =~ "(?i)S-1-5-21-.*-512" WITH n MATCH p=(n)<-[r:MemberOf*1..]-(m) RETURN m.name ORDER BY m.name', 'desc': 'List all Domain Admins', 'message_generator': (lambda r: (((r.get('m.name') is not None) and f"{log.default}User {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} is MemberOf Domain Admins{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '48': {'query': 'MATCH p=shortestPath((m:User)-[r*1..]->(n:Group)) WHERE n.objectid =~ "(?i)S-1-5-21-.*-512" AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all user shortest paths to Domain Admins', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '49': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE n.objectid =~ "(?i)S-1-5-21-.*-512" AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all group shortest paths to Domain Admins', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '50': {'query': 'MATCH p=shortestPath((m:Computer)-[r*1..]->(n:Group)) WHERE n.objectid =~ "(?i)S-1-5-21-.*-512" AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all computer shortest paths to Domain Admins', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '51': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE (m.objectid =~ "(?i)S-1-5-21-.*-513" OR m.objectid =~ "(?i).*-S-1-5-11" OR m.objectid =~ "(?i).*-S-1-1-0" OR m.objectid =~ "(?i).*-S-1-5-32-545") AND n.objectid =~ "(?i)S-1-5-21-.*-512" AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to Domain Admins for Users, Domain Users, Authenticated Users, or Everyone groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '52': {'query': 'MATCH p=shortestPath((m {owned: true})-[r*1..]->(n:Group)) WHERE n.objectid =~ "(?i)S-1-5-21-.*-512" AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to Domain Admins for owned principals', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '53': {'query': 'MATCH (n:Group) WHERE n.objectid =~ "(?i)S-1-5-21-.*-519" WITH n MATCH p=(n)<-[r:MemberOf*1..]-(m) RETURN m.name ORDER BY m.name', 'desc': 'List all Enterprise Admins', 'message_generator': (lambda r: (((r.get('m.name') is not None) and f"{log.default}User {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} is MemberOf Enterprise Admins{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '54': {'query': 'MATCH p=shortestPath((m:User)-[r*1..]->(n:Group)) WHERE n.objectid =~ "(?i)S-1-5-21-.*-519" AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all user shortest paths to Enterprise Admins', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '55': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE n.objectid =~ "(?i)S-1-5-21-.*-519" AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all group shortest paths to Enterprise Admins', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '56': {'query': 'MATCH p=shortestPath((m:Computer)-[r*1..]->(n:Group)) WHERE n.objectid =~ "(?i)S-1-5-21-.*-519" AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all computer shortest paths to Enterprise Admins', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '57': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE (m.objectid =~ "(?i)S-1-5-21-.*-513" OR m.objectid =~ "(?i).*-S-1-5-11" OR m.objectid =~ "(?i).*-S-1-1-0" OR m.objectid =~ "(?i).*-S-1-5-32-545") AND n.objectid =~ "(?i)S-1-5-21-.*-519" AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to Enterprise Admins for Users, Domain Users, Authenticated Users, or Everyone groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '58': {'query': 'MATCH p=shortestPath((m {owned: true})-[r*1..]->(n:Group)) WHERE n.objectid =~ "(?i)S-1-5-21-.*-519" AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to Enterprise Admins for owned principals', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '59': {'query': 'MATCH p=(m:Computer)-[r:HasSession]->(n:User) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all sessions', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} HasSession on {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '60': {'query': 'MATCH p=(m:Computer)-[r:HasSession]->(n:User {owned: true}) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all sessions for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} HasSession on {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '61': {'query': 'MATCH (u:User {dontreqpreauth: true}) RETURN u.name ORDER BY u.name', 'desc': 'List all AS-REP roastable users', 'message_generator': (lambda r: (((r.get('u.name') is not None) and f"{log.default}User {log.reset}{log.red}{r['u.name']}{log.reset}{log.default} is AS-REP roastable{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '62': {'query': 'MATCH (u:User {dontreqpreauth: true, owned: true}) RETURN u.name ORDER BY u.name', 'desc': 'List all AS-REP roastable users for owned principals', 'message_generator': (lambda r: (((r.get('u.name') is not None) and f"{log.default}User {log.reset}{log.red}{r['u.name']}{log.reset}{log.default} is AS-REP roastable{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '63': {'query': 'MATCH (m:User {highvalue: true}) RETURN m.name ORDER BY m.name', 'desc': 'List all high-value users', 'message_generator': (lambda r: (((r.get('m.name') is not None) and f"{log.default}User {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} is high value{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '64': {'query': 'MATCH (m:Group {highvalue: true}) RETURN m.name ORDER BY m.name', 'desc': 'List all high-value groups', 'message_generator': (lambda r: (((r.get('m.name') is not None) and f"{log.default}Group {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} is high value{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '65': {'query': 'MATCH (m:Computer {highvalue: true}) RETURN m.name ORDER BY m.name', 'desc': 'List all high-value computers', 'message_generator': (lambda r: (((r.get('m.name') is not None) and f"{log.default}Computer {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} is high value{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '66': {'query': 'MATCH p=(n {highvalue: true}) RETURN n.name,labels(n) ORDER BY n.name', 'desc': 'List all high-value principals', 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} is high value{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '67': {'query': 'MATCH (m {highvalue: true, owned: true}) RETURN m.name,labels(m) ORDER BY m.name', 'desc': 'List all high-value owned principals', 'message_generator': (lambda r: (((r.get('m.name') is not None) and f"{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}{log.default} is high value{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '68': {'query': 'MATCH p=(n:User)-[r:MemberOf*1..]->(m:Group {highvalue: true}) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all members of high-value groups', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is MemberOf high value group {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '69': {'query': 'MATCH p=(n {owned: true})-[r:MemberOf*1..]->(m:Group {highvalue: true}) RETURN n.name,m.name,labels(n) ORDER BY n.name', 'desc': 'List all members of high-value groups for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} is MemberOf high value group {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '70': {'query': 'MATCH (m:User),(n {highvalue: true}),p=shortestPath((m)-[r*1..]->(n)) WHERE NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") AND NOT m=n RETURN m.name,p ORDER BY m.name', 'desc': 'List all user shortest paths to high-value targets', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '71': {'query': 'MATCH (m:Group),(n {highvalue: true}),p=shortestPath((m)-[r*1..]->(n)) WHERE NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") AND NOT m=n RETURN m.name,p ORDER BY m.name', 'desc': 'List all group shortest paths to high-value targets', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '72': {'query': 'MATCH (m:Computer),(n {highvalue: true}),p=shortestPath((m)-[r*1..]->(n)) WHERE NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") AND NOT m=n RETURN m.name,p ORDER BY m.name', 'desc': 'List all computer shortest paths to high-value targets', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '73': {'query': 'MATCH (m:Group),(n {highvalue: true}),p=shortestPath((m)-[r*1..]->(n)) WHERE (m.objectid =~ "(?i)S-1-5-21-.*-513" OR m.objectid =~ "(?i).*-S-1-5-11" OR m.objectid =~ "(?i).*-S-1-1-0" OR m.objectid =~ "(?i).*-S-1-5-32-545") AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") AND NOT m=n RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to high-value targets for Users, Domain Users, Authenticated Users, or Everyone groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '74': {'query': 'MATCH (m {owned: true}),(n {highvalue: true}),p=shortestPath((m)-[r*1..]->(n)) WHERE NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") AND NOT m=n RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to high-value targets for owned principals', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '75': {'query': 'MATCH p=shortestPath((m:User)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)EXCHANGE).*" AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all user shortest paths to Exchange groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '76': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)EXCHANGE).*" AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all group shortest paths to Exchange groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '77': {'query': 'MATCH p=shortestPath((m:Computer)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)EXCHANGE).*" AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all computer shortest paths to Exchange groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '78': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE (m.objectid =~ "(?i)S-1-5-21-.*-513" OR m.objectid =~ "(?i).*-S-1-5-11" OR m.objectid =~ "(?i).*-S-1-1-0" OR m.objectid =~ "(?i).*-S-1-5-32-545") AND n.name =~ ".*((?i)EXCHANGE).*" AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") AND NOT m=n RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to Exchange groups for Users, Domain Users, Authenticated Users, or Everyone groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '79': {'query': 'MATCH p=shortestPath((m {owned: true})-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)EXCHANGE).*" AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") AND NOT m=n RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to Exchange groups for owned principals', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '80': {'query': 'MATCH p=(m:User)-[r:AdminTo]->(n:Computer) RETURN m.name, n.name ORDER BY m.name', 'desc': 'List all user AdminTo privileges', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} is AdminTo {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '81': {'query': 'MATCH p=(m:Group)-[r:AdminTo]->(n:Computer) RETURN m.name,n.name ORDER BY m.name', 'desc': 'List all group AdminTo privileges', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} is AdminTo {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '82': {'query': 'MATCH p=(m:Computer)-[r:AdminTo]->(n:Computer) RETURN m.name,n.name ORDER BY m.name', 'desc': 'List all computer AdminTo privileges', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} is AdminTo {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '83': {'query': 'MATCH p=(m:Group)-[r:AdminTo]->(n:Computer) WHERE (m.objectid =~ "(?i)S-1-5-21-.*-513" OR m.objectid =~ "(?i).*-S-1-5-11" OR m.objectid =~ "(?i).*-S-1-1-0" OR m.objectid =~ "(?i).*-S-1-5-32-545") RETURN m.name,n.name ORDER BY m.name', 'desc': 'List all AdminTo privileges for Users, Domain Users, Authenticated Users, or Everyone groups', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} is AdminTo {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '84': {'query': 'MATCH p=(m:Group)-[:MemberOf]->(g:Group)-[:AdminTo]->(n:Computer) WHERE (m.objectid =~ "(?i)S-1-5-21-.*-513" OR m.objectid =~ "(?i).*-S-1-5-11" OR m.objectid =~ "(?i).*-S-1-1-0" OR m.objectid =~ "(?i).*-S-1-5-32-545") RETURN m.name,n.name,g.name ORDER BY m.name', 'desc': 'List all group-delegated AdminTo privileges for Users, Domain Users, Authenticated Users, or Everyone groups', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None) and (r.get('g.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} is MemberOf {log.reset}{log.red}{r['g.name']} {log.reset}{log.default}which is AdminTo {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '85': {'query': 'MATCH p=(m {owned: true})-[r:AdminTo]->(n:Computer) RETURN m.name,n.name,labels(m) ORDER BY m.name', 'desc': 'List all AdminTo privileges for owned principals', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}{log.default} is AdminTo {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '86': {'query': 'MATCH (n {owned: true})-[:MemberOf]->(g:Group)-[:AdminTo]->(m:Computer) RETURN n.name,labels(n),m.name,g.name ORDER BY n.name', 'desc': 'List all group-delegated AdminTo privileges for owned principals', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None) and (r.get('g.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} is MemberOf {log.reset}{log.red}{r['g.name']} {log.reset}{log.default}which is AdminTo {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '87': {'query': 'MATCH p=(n:User)-[r:ReadLAPSPassword]->(m:Computer) RETURN n.name,m.name ORDER by n.name', 'desc': 'List all user ReadLAPSPassword privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can read LAPS passwords for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '88': {'query': 'MATCH p=(n:Group)-[r:ReadLAPSPassword]->(m:Computer) RETURN n.name,m.name ORDER by n.name', 'desc': 'List all group ReadLAPSPassword privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can read LAPS passwords for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '89': {'query': 'MATCH p=(n:Computer)-[r:ReadLAPSPassword]->(m:Computer) RETURN n.name,m.name ORDER by n.name', 'desc': 'List all computer ReadLAPSPassword privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can read LAPS passwords for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '90': {'query': 'MATCH p=(n:Group)-[r:ReadLAPSPassword]->(m:Computer) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,m.name ORDER by n.name', 'desc': 'List all ReadLAPSPassword privileges for Users, Domain Users, Authenticated Users, or Everyone groups', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can read LAPS passwords for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '91': {'query': 'MATCH p=(m {owned: true})-[r:ReadLAPSPassword]->(n:Computer) RETURN n.name,m.name,labels(m) ORDER by m.name', 'desc': 'List all ReadLAPSPassword privileges for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}{log.default} can read LAPS passwords for {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '92': {'query': 'MATCH p=(n:User)-[r:SyncLAPSPassword]->(m:Computer) RETURN n.name,m.name ORDER by n.name', 'desc': 'List all user SyncLAPSPassword privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can sync LAPS passwords for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '93': {'query': 'MATCH p=(n:Group)-[r:SyncLAPSPassword]->(m:Computer) RETURN n.name,m.name ORDER by n.name', 'desc': 'List all group SyncLAPSPassword privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can sync LAPS passwords for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '94': {'query': 'MATCH p=(n:Computer)-[r:SyncLAPSPassword]->(m:Computer) RETURN n.name,m.name ORDER by n.name', 'desc': 'List all computer SyncLAPSPassword privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can sync LAPS passwords for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '95': {'query': 'MATCH p=(n:Group)-[r:SyncLAPSPassword]->(m:Computer) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,m.name ORDER by n.name', 'desc': 'List all SyncLAPSPassword privileges for Users, Domain Users, Authenticated Users, or Everyone groups', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can sync LAPS passwords for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '96': {'query': 'MATCH p=(m {owned: true})-[r:SyncLAPSPassword]->(n:Computer) RETURN n.name,m.name,labels(m) ORDER by m.name', 'desc': 'List all SyncLAPSPassword privileges for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}{log.default} can sync LAPS passwords for {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '97': {'query': 'MATCH (n:User)-[r:DumpSMSAPassword]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all user DumpSMSAPassword privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has DumpSMSAPassword over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '98': {'query': 'MATCH (n:Group)-[r:DumpSMSAPassword]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all group DumpSMSAPassword privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has DumpSMSAPassword over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '99': {'query': 'MATCH (n:Computer)-[r:DumpSMSAPassword]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all computer DumpSMSAPassword privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has DumpSMSAPassword over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '100': {'query': 'MATCH (n:Group)-[r:DumpSMSAPassword]->(m) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all DumpSMSAPassword privileges for Users, Domain Users, Authenticated Users, and Everyone groups', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has DumpSMSAPassword over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '101': {'query': 'MATCH (n {owned: true})-[r:DumpSMSAPassword]->(m) RETURN n.name,m.name,labels(m),labels(n) ORDER BY n.name', 'desc': 'List all DumpSMSAPassword privileges for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} has DumpSMSAPassword over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '102': {'query': "MATCH (n:User)-[:MemberOf*1..]->(g:Group) WHERE g.objectid ENDS WITH '-512' MATCH p = (c:Computer)-[:HasSession]->(n) RETURN n.name,c.name ORDER BY n.name", 'desc': 'List Domain Admin sessions', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('c.name') is not None)) and f"{log.default}Domain admin {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} HasSession on {log.reset}{log.red}{r['c.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '103': {'query': "MATCH (n:User)-[:MemberOf*1..]->(g:Group) WHERE g.objectid ENDS WITH '-519' MATCH p = (c:Computer)-[:HasSession]->(n) RETURN n.name,c.name ORDER BY n.name", 'desc': 'List Enterprise Admin sessions', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('c.name') is not None)) and f"{log.default}Enterprise admin {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} HasSession on {log.reset}{log.red}{r['c.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '104': {'query': 'MATCH (n:User) RETURN n.name ORDER BY n.name', 'desc': 'List all users', 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '105': {'query': 'MATCH (n:Group) RETURN n.name ORDER BY n.name', 'desc': 'List all groups', 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '106': {'query': 'MATCH (n:Computer) RETURN n.name ORDER BY n.name', 'desc': 'List all computers', 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '107': {'query': 'MATCH (m {owned: true}) RETURN m.name,labels(m) ORDER BY m.name', 'desc': 'List all owned principals', 'message_generator': (lambda r: (((r.get('m.name') is not None) and f"{log.default}Owned principal {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '108': {'query': 'MATCH (n:Computer {enabled: true}) RETURN n.name ORDER BY n.name', 'desc': 'List all enabled computers', 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']} {log.reset}{log.default}is enabled{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '109': {'query': 'MATCH (n:Computer {enabled: false}) RETURN n.name ORDER BY n.name', 'desc': 'List all disabled computers', 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']} {log.reset}{log.default}is disabled{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '110': {'query': 'MATCH (n:Group) WHERE n.objectid =~ "(?i)S-1-5-21-.*-516" WITH n MATCH p=(n)<-[r:MemberOf*1..]-(m) RETURN m.name ORDER BY m.name', 'desc': 'List all Domain Controllers', 'message_generator': (lambda r: (((r.get('m.name') is not None) and f"{log.default}Computer {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} is a Domain Controller{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '111': {'query': 'MATCH (n:Group) WHERE n.objectid =~ "(?i)S-1-5-21-.*-516" WITH n MATCH p=(n)<-[r:MemberOf*1..]-(m) RETURN m.name,m.operatingsystem ORDER BY m.name', 'desc': 'List all Domain Controllers OSs', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('m.operatingsystem') is not None)) and f"{log.default}Domain Controller {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} OS {log.reset}{log.red}{r['m.operatingsystem']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '112': {'query': 'MATCH p=shortestPath((m:User)-[r*1..]->(n:Group)) WHERE n.objectid =~ "(?i)S-1-5-21-.*-516" AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all user shortest paths to Domain Controllers', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '113': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE n.objectid =~ "(?i)S-1-5-21-.*-516" AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all group shortest paths to Domain Controllers', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '114': {'query': 'MATCH p=shortestPath((m:Computer)-[r*1..]->(n:Group)) WHERE n.objectid =~ "(?i)S-1-5-21-.*-516" AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all computer shortest paths to Domain Controllers', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '115': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE (m.objectid =~ "(?i)S-1-5-21-.*-513" OR m.objectid =~ "(?i).*-S-1-5-11" OR m.objectid =~ "(?i).*-S-1-1-0" OR m.objectid =~ "(?i).*-S-1-5-32-545") AND n.objectid =~ "(?i)S-1-5-21-.*-516" AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to Domain Controllers for Users, Domain Users, Authenticated Users, or Everyone groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '116': {'query': 'MATCH p=shortestPath((m {owned: true})-[r*1..]->(n:Group)) WHERE n.objectid =~ "(?i)S-1-5-21-.*-516" AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to Domain Controllers for owned principals', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '117': {'query': 'MATCH (n:User {passwordnotreqd: true}) RETURN n.name ORDER BY n.name', 'desc': "List all users that don't require a password", 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is not required to have a password{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '118': {'query': 'MATCH (n:User {passwordnotreqd: true, owned: true}) RETURN n.name ORDER BY n.name', 'desc': "List all users that don't require a password for owned principals", 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is not required to have a password{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '119': {'query': 'MATCH (n:User {pwdneverexpires: true}) RETURN n.name ORDER BY n.name', 'desc': 'List all users where password never expires', 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.default}User's {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} password is set to never expire{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '120': {'query': 'MATCH (n:User {pwdneverexpires: true, owned: true}) RETURN n.name ORDER BY n.name', 'desc': 'List all users where password never expires for owned principals', 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.default}User's {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} password is set to never expire{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '121': {'query': 'MATCH (u:User)-[:AllowedToDelegate]->(c:Computer) RETURN u.name,c.name ORDER BY u.name', 'desc': 'List all user Constrained Delegation', 'message_generator': (lambda r: ((((r.get('u.name') is not None) and (r.get('c.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['u.name']}{log.reset}{log.default} is allowed to delegate for {log.reset}{log.red}{r['c.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '122': {'query': 'MATCH (g:Group)-[:AllowedToDelegate]->(c:Computer) RETURN g.name,c.name ORDER BY g.name', 'desc': 'List all group Constrained Delegation', 'message_generator': (lambda r: ((((r.get('g.name') is not None) and (r.get('c.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['g.name']}{log.reset}{log.default} is allowed to delegate for {log.reset}{log.red}{r['c.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '123': {'query': 'MATCH (c1:Computer)-[:AllowedToDelegate]->(c2:Computer) RETURN c1.name,c2.name ORDER BY c1.name', 'desc': 'List all computer Constrained Delegation', 'message_generator': (lambda r: ((((r.get('c1.name') is not None) and (r.get('c2.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['c1.name']}{log.reset}{log.default} is allowed to delegate for {log.reset}{log.red}{r['c2.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '124': {'query': 'MATCH (n:GPO) RETURN n.name ORDER BY n.name', 'desc': 'List all GPOs', 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.default}GPO {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '125': {'query': 'MATCH (n:Domain) RETURN n.name ORDER BY n.name', 'desc': 'List all domains', 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.default}Domain {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '126': {'query': 'MATCH p=(n:Domain)-[r:TrustedBy]->(m:Domain) RETURN r.trusttype,n.name,m.name ORDER by n.name', 'desc': 'List all domain trusts', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None) and (r.get('r.trusttype') is not None)) and f"{log.default}Domain {log.reset}{log.red}{r['n.name']} {log.reset}{log.default}is trusted by {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}with type {log.reset}{log.red}{r['r.trusttype']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '127': {'query': 'MATCH p=shortestPath((m:User)-[r*1..]->(n:Domain)) WHERE NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") AND NOT m=n RETURN m.name,p ORDER BY m.name', 'desc': 'List all user shortest paths to domains', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '128': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Domain)) WHERE NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") AND NOT m=n RETURN m.name,p ORDER BY m.name', 'desc': 'List all group shortest paths to domains', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '129': {'query': 'MATCH p=shortestPath((m:Computer)-[r*1..]->(n:Domain)) WHERE NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") AND NOT m=n RETURN m.name,p ORDER BY m.name', 'desc': 'List all computer shortest paths to domains', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '130': {'query': 'MATCH p=shortestPath((m:Domain)-[r*1..]->(n:Domain)) WHERE NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") AND NONE (r in relationships(p) WHERE type(r)="TrustedBy") AND NOT m=n RETURN m.name,p ORDER BY m.name', 'desc': 'List all domain shortest paths to domains', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '131': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Domain)) WHERE (m.objectid =~ "(?i)S-1-5-21-.*-513" OR m.objectid =~ "(?i).*-S-1-5-11" OR m.objectid =~ "(?i).*-S-1-1-0" OR m.objectid =~ "(?i).*-S-1-5-32-545") AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") AND NOT m=n RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to domains for Users, Domain Users, Authenticated Users, or Everyone groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '132': {'query': 'MATCH p=shortestPath((m {owned: true})-[r*1..]->(n:Domain)) WHERE NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") AND NOT m=n RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to domains for owned principals', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '133': {'query': 'MATCH (c:Computer) WHERE c.haslaps = true RETURN c.name ORDER BY c.name', 'desc': 'List computers with LAPS enabled', 'message_generator': (lambda r: (((r.get('c.name') is not None) and f"{log.default}Computer {log.reset}{log.red}{r['c.name']}{log.reset}{log.default} has LAPS enabled{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '134': {'query': 'MATCH (c:Computer) WHERE c.haslaps = false RETURN c.name ORDER BY c.name', 'desc': 'List computers with LAPS disabled', 'message_generator': (lambda r: (((r.get('c.name') is not None) and f"{log.default}Computer {log.reset}{log.red}{r['c.name']}{log.reset}{log.default} has LAPS disabled{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '135': {'query': "MATCH (u:User) WHERE u.description =~ '.*((?i)pass|pw|:).*' RETURN u.name,u.description ORDER BY u.name", 'desc': 'List potential passwords in descriptions', 'message_generator': (lambda r: ((((r.get('u.name') is not None) and (r.get('u.description') is not None)) and f"{log.default}User {log.reset}{log.red}{r['u.name']}{log.reset}{log.default} may have password in description {log.reset}{log.red}{r['u.description']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '136': {'query': 'MATCH (m:User {highvalue: true}) RETURN m.name ORDER BY m.name', 'desc': 'List all high-value users', 'message_generator': (lambda r: (((r.get('m.name') is not None) and f"{log.default}User {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} is high value{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '137': {'query': 'MATCH (m:User {sensitive: true}) RETURN m.name ORDER BY m.name', 'desc': 'List all sensitive users', 'message_generator': (lambda r: (((r.get('m.name') is not None) and f"{log.default}User {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} is sensitive{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '138': {'query': 'MATCH (m:User {admincount: true}) RETURN m.name ORDER BY m.name', 'desc': 'List all users with an admin count', 'message_generator': (lambda r: (((r.get('m.name') is not None) and f"{log.default}User {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} has an admin count{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '139': {'query': 'MATCH (m:Group {admincount: true}) RETURN m.name ORDER BY m.name', 'desc': 'List all groups with an admin count', 'message_generator': (lambda r: (((r.get('m.name') is not None) and f"{log.default}Group {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} has an admin count{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '140': {'query': 'MATCH (m:Computer {admincount: true}) RETURN m.name ORDER BY m.name', 'desc': 'List all computers with an admin count', 'message_generator': (lambda r: (((r.get('m.name') is not None) and f"{log.default}Computer {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} has an admin count{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '141': {'query': 'MATCH (m {admincount: true, owned: true}) RETURN labels(m),m.name ORDER BY m.name', 'desc': 'List all owned principals with an admin count', 'message_generator': (lambda r: (((r.get('m.name') is not None) and f"{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}{log.default} has an admin count{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '142': {'query': 'MATCH p=(n:User)-[r:ReadGMSAPassword]->(m:User) RETURN n.name,m.name ORDER by n.name', 'desc': 'List all user ReadGMSAPassword privileges', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can read GMSA passwords for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '143': {'query': 'MATCH p=(n:Group)-[r:ReadGMSAPassword]->(m:User) RETURN n.name,m.name ORDER by n.name', 'desc': 'List all group ReadGMSAPassword privileges', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can read GMSA passwords for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '144': {'query': 'MATCH p=(n:Computer)-[r:ReadGMSAPassword]->(m:User) RETURN n.name,m.name ORDER by n.name', 'desc': 'List all computer ReadGMSAPassword privileges', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can read GMSA passwords for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '145': {'query': 'MATCH (n:Group)-[r:ReadGMSAPassword]->(m:User) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all ReadGMSAPassword privileges for Users, Domain Users, Authenticated Users, and Everyone groups', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can read GMSA passwords for {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '146': {'query': 'MATCH p=(m {owned: true})-[r:ReadGMSAPassword]->(n:User) RETURN n.name,m.name,labels(m) ORDER by m.name', 'desc': 'List all ReadGMSAPassword privileges for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}{log.default} can read GMSA passwords for {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '147': {'query': 'MATCH (n:User)-[r:DCSync]->(m:Domain) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all user DCSync privileges', 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has DCSync privileges for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '148': {'query': 'MATCH (n:Group)-[r:DCSync]->(m:Domain) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all group DCSync privileges', 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has DCSync privileges for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '149': {'query': 'MATCH (n:Computer)-[r:DCSync]->(m:Domain) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all computer DCSync privileges', 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has DCSync privileges for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '150': {'query': 'MATCH (n)-[r:DCSync]->(m:Domain) RETURN n.name,labels(n),m.name ORDER BY n.name', 'desc': 'List all DCSync privileges', 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}) {log.red}{r['n.name']}{log.reset}{log.default} has DCSync privileges for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '151': {'query': 'MATCH (n:Group)-[r:DCSync]->(m:Domain) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all DCSync privileges for Users, Domain Users, Authenticated Users, or Everyone groups', 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.red}{r['n.name']}{log.reset}{log.default} has DCSync privileges for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '152': {'query': 'MATCH p=(m {owned: true})-[r:DCSync]->(n:Domain) RETURN n.name,m.name,labels(m) ORDER by m.name', 'desc': 'List all DCSync privileges for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['m.name']}{log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}{log.default} has DCSync privileges for {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '153': {'query': 'MATCH (n:User)-[r:ForceChangePassword]->(m:User) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all user ForceChangePassword privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can force change password for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '154': {'query': 'MATCH (n:Group)-[r:ForceChangePassword]->(m:User) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all group ForceChangePassword privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can force change password for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '155': {'query': 'MATCH (n:Computer)-[r:ForceChangePassword]->(m:User) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all computer ForceChangePassword privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can force change password for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '156': {'query': 'MATCH (n:Group)-[r:ForceChangePassword]->(m:User) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all ForceChangePassword privileges for Users, Domain Users, Authenticated Users, and Everyone groups', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has ForceChangePassword over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '157': {'query': 'MATCH (n {owned: true})-[r:ForceChangePassword]->(m:User) RETURN n.name,m.name,labels(m),labels(n) ORDER BY n.name', 'desc': 'List all ForceChangePassword privileges for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} has ForceChangePassword over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '158': {'query': 'MATCH (n:User)-[r:AddMember]->(m:Group) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all user AddMember privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can add members to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '159': {'query': 'MATCH (n:Group)-[r:AddMember]->(m:Group) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all group AddMember privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can add members to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '160': {'query': 'MATCH (n:Computer)-[r:AddMember]->(m:Group) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all computer AddMember privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can add members to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '161': {'query': 'MATCH (n:Group)-[r:AddMember]->(m:Group) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all AddMember privileges for Users, Domain Users, Authenticated Users, and Everyone groups', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has AddMember over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '162': {'query': 'MATCH (n {owned: true})-[r:AddMember]->(m:Group) RETURN n.name,m.name,labels(m),labels(n) ORDER BY n.name', 'desc': 'List all AddMember privileges for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} has AddMember over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '163': {'query': 'MATCH (n:User)-[r:AddSelf]->(m:Group) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all user AddSelf privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can add itself to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '164': {'query': 'MATCH (n:Group)-[r:AddSelf]->(m:Group) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all group AddSelf privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can add itself to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '165': {'query': 'MATCH (n:Computer)-[r:AddSelf]->(m:Group) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all computer AddSelf privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can add itself to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '166': {'query': 'MATCH (n:Group)-[r:AddSelf]->(m:Group) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all AddSelf privileges for Users, Domain Users, Authenticated Users, and Everyone groups', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has AddSelf over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '167': {'query': 'MATCH (n {owned: true})-[r:AddSelf]->(m:Group) RETURN n.name,m.name,labels(m),labels(n) ORDER BY n.name', 'desc': 'List all AddSelf privileges for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} has AddSelf over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '168': {'query': 'MATCH (n:User)-[r:SQLAdmin]->(m:Computer) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all user SQLAdmin privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is SQLAdmin to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '169': {'query': 'MATCH (n:Group)-[r:SQLAdmin]->(m:Computer) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all group SQLAdmin privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is SQLAdmin to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '170': {'query': 'MATCH (n:Computer)-[r:SQLAdmin]->(m:Computer) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all computer SQLAdmin privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is SQLAdmin to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '171': {'query': 'MATCH (n:Group)-[r:SQLAdmin]->(m:Computer) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all SQLAdmin privileges for Users, Domain Users, Authenticated Users, and Everyone groups', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has SQLAdmin over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '172': {'query': 'MATCH (n {owned: true})-[r:SQLAdmin]->(m:Computer) RETURN n.name,m.name,labels(m),labels(n) ORDER BY n.name', 'desc': 'List all SQLAdmin privileges for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} has SQLAdmin over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '173': {'query': 'MATCH (n:User)-[r:CanPSRemote]->(m:Computer) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all user CanPSRemote privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can PSRemote to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '174': {'query': 'MATCH (n:Group)-[r:CanPSRemote]->(m:Computer) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all group CanPSRemote privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can PSRemote to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '175': {'query': 'MATCH (n:Computer)-[r:CanPSRemote]->(m:Computer) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all computer CanPSRemote privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can PSRemote to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '176': {'query': 'MATCH (n:Group)-[r:CanPSRemote]->(m:Computer) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all CanPSRemote privileges for Users, Domain Users, Authenticated Users, and Everyone groups', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has CanPSRemote over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '177': {'query': 'MATCH (n {owned: true})-[r:CanPSRemote]->(m:Computer) RETURN n.name,m.name,labels(m),labels(n) ORDER BY n.name', 'desc': 'List all CanPSRemote privileges for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} has CanPSRemote over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '178': {'query': 'MATCH (n:User)-[r:ExecuteDCOM]->(m:Computer) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all user ExecuteDCOM privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can ExecuteDCOM on {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '179': {'query': 'MATCH (n:Group)-[r:ExecuteDCOM]->(m:Computer) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all group ExecuteDCOM privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can ExecuteDCOM on {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '180': {'query': 'MATCH (n:Computer)-[r:ExecuteDCOM]->(m:Computer) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all computer ExecuteDCOM privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can ExecuteDCOM on {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '181': {'query': 'MATCH (n:Group)-[r:ExecuteDCOM]->(m:Computer) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all ExecuteDCOM privileges for Users, Domain Users, Authenticated Users, and Everyone groups', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has ExecuteDCOM over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '182': {'query': 'MATCH (n {owned: true})-[r:ExecuteDCOM]->(m:Computer) RETURN n.name,m.name,labels(m),labels(n) ORDER BY n.name', 'desc': 'List all ExecuteDCOM privileges for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} has ExecuteDCOM over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '183': {'query': 'MATCH (n:User)-[r:AllowedToAct]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all user AllowedToAct privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is AllowedToAct for {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '184': {'query': 'MATCH (n:Group)-[r:AllowedToAct]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all group AllowedToAct privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is AllowedToAct for {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '185': {'query': 'MATCH (n:Computer)-[r:AllowedToAct]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all computer AllowedToAct privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is AllowedToAct for {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '186': {'query': 'MATCH (n:Group)-[r:AllowedToAct]->(m:Computer) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all AllowedToAct privileges for Users, Domain Users, Authenticated Users, and Everyone groups', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has AllowedToAct over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '187': {'query': 'MATCH (n {owned: true})-[r:AllowedToAct]->(m:Computer) RETURN n.name,m.name,labels(m),labels(n) ORDER BY n.name', 'desc': 'List all AllowedToAct privileges for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} has AllowedToAct over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '188': {'query': 'MATCH (n:User)-[r:Owns]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all user Owns privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} Owns {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '189': {'query': 'MATCH (n:Group)-[r:Owns]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all group Owns privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} Owns {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '190': {'query': 'MATCH (n:Computer)-[r:Owns]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all computer Owns privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} Owns {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '191': {'query': 'MATCH (n:Group)-[r:Owns]->(m) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all Owns privileges for Users, Domain Users, Authenticated Users, and Everyone groups', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has Owns over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '192': {'query': 'MATCH (n {owned: true})-[r:Owns]->(m) RETURN n.name,m.name,labels(m),labels(n) ORDER BY n.name', 'desc': 'List all Owns privileges for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} has Owns over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '193': {'query': 'MATCH (n:User)-[r:AllExtendedRights]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all user AllExtendedRights privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has AllExtendedRights over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '194': {'query': 'MATCH (n:Group)-[r:AllExtendedRights]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all group AllExtendedRights privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has AllExtendedRights over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '195': {'query': 'MATCH (n:Computer)-[r:AllExtendedRights]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all computer AllExtendedRights privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has AllExtendedRights over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '196': {'query': 'MATCH (n:Group)-[r:AllExtendedRights]->(m) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all AllExtendedRights privileges for Users, Domain Users, Authenticated Users, and Everyone groups', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has AllExtendedRights over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '197': {'query': 'MATCH (n {owned: true})-[r:AllExtendedRights]->(m) RETURN n.name,m.name,labels(m),labels(n) ORDER BY n.name', 'desc': 'List all AllExtendedRights privileges for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} has AllExtendedRights over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '198': {'query': 'MATCH (n:User)-[r:MemberOf]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all user memberships', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is MemberOf {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '199': {'query': 'MATCH (n:Group)-[r:MemberOf]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all group memberships', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is MemberOf {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '200': {'query': 'MATCH (n:Computer)-[r:MemberOf]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all computer memberships', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is MemberOf {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '201': {'query': 'MATCH (n:Group)-[r:MemberOf]->(m) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all memberships for Users, Domain Users, Authenticated Users, and Everyone groups', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has MemberOf over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '202': {'query': 'MATCH (n {owned: true})-[r:MemberOf]->(m) RETURN n.name,m.name,labels(m),labels(n) ORDER BY n.name', 'desc': 'List all memberships for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} has MemberOf over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '203': {'query': 'MATCH (n:User)-[r:AddKeyCredentialLink]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all user AddKeyCredentialLink privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has AddKeyCredentialLink over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '204': {'query': 'MATCH (n:Group)-[r:AddKeyCredentialLink]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all group AddKeyCredentialLink privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has AddKeyCredentialLink over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '205': {'query': 'MATCH (n:Computer)-[r:AddKeyCredentialLink]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all computer AddKeyCredentialLink privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has AddKeyCredentialLink over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '206': {'query': 'MATCH (n:Group)-[r:AddKeyCredentialLink]->(m) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all AddKeyCredentialLink privileges for Users, Domain Users, Authenticated Users, and Everyone groups', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has AddKeyCredentialLink over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '207': {'query': 'MATCH (n {owned: true})-[r:AddKeyCredentialLink]->(m) RETURN n.name,m.name,labels(m),labels(n) ORDER BY n.name', 'desc': 'List all AddKeyCredentialLink privileges for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} has AddKeyCredentialLink over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '208': {'query': 'MATCH (n:User)-[r:GenericAll]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all user GenericAll privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has GenericAll over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '209': {'query': 'MATCH (n:Group)-[r:GenericAll]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all group GenericAll privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has GenericAll over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '210': {'query': 'MATCH (n:Computer)-[r:GenericAll]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all computer GenericAll privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has GenericAll over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '211': {'query': 'MATCH (n:Group)-[r:GenericAll]->(m) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all GenericAll privileges for Users, Domain Users, Authenticated Users, and Everyone groups', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has GenericAll over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '212': {'query': 'MATCH (n {owned: true})-[r:GenericAll]->(m) RETURN n.name,m.name,labels(m),labels(n) ORDER BY n.name', 'desc': 'List all GenericAll privileges for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} has GenericAll over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '213': {'query': 'MATCH (n:User)-[r:WriteDacl]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all user WriteDacl privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteDacl over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '214': {'query': 'MATCH (n:Group)-[r:WriteDacl]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all group WriteDacl privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteDacl over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '215': {'query': 'MATCH (n:Computer)-[r:WriteDacl]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all computer WriteDacl privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteDacl over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '216': {'query': 'MATCH (n:Group)-[r:WriteDacl]->(m) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all WriteDacl privileges for Users, Domain Users, Authenticated Users, and Everyone groups', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteDacl over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '217': {'query': 'MATCH (n {owned: true})-[r:WriteDacl]->(m) RETURN n.name,m.name,labels(m),labels(n) ORDER BY n.name', 'desc': 'List all WriteDacl privileges for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} has WriteDacl over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '218': {'query': 'MATCH (n:User)-[r:WriteOwner]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all user WriteOwner privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteOwner over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '219': {'query': 'MATCH (n:Group)-[r:WriteOwner]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all group WriteOwner privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteOwner over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '220': {'query': 'MATCH (n:Computer)-[r:WriteOwner]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all computer WriteOwner privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteOwner over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '221': {'query': 'MATCH (n:Group)-[r:WriteOwner]->(m) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all WriteOwner privileges for Users, Domain Users, Authenticated Users, and Everyone groups', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteOwner over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '222': {'query': 'MATCH (n {owned: true})-[r:WriteOwner]->(m) RETURN n.name,m.name,labels(m),labels(n) ORDER BY n.name', 'desc': 'List all WriteOwner privileges for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} has WriteOwner over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '223': {'query': 'MATCH (n:User)-[r:WriteSPN]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all user WriteSPN privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteSPN over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '224': {'query': 'MATCH (n:Group)-[r:WriteSPN]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all group WriteSPN privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteSPN over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '225': {'query': 'MATCH (n:Computer)-[r:WriteSPN]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all computer WriteSPN privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteSPN over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '226': {'query': 'MATCH (n:Group)-[r:WriteSPN]->(m) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all WriteSPN privileges for Users, Domain Users, Authenticated Users, and Everyone groups', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteSPN over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '227': {'query': 'MATCH (n {owned: true})-[r:WriteSPN]->(m) RETURN n.name,m.name,labels(m),labels(n) ORDER BY n.name', 'desc': 'List all WriteSPN privileges for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} has WriteSPN over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '228': {'query': 'MATCH (n:User)-[r:WriteAccountRestrictions]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all user WriteAccountRestrictions privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteAccountRestrictions over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '229': {'query': 'MATCH (n:Group)-[r:WriteAccountRestrictions]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all group WriteAccountRestrictions privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteAccountRestrictions over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '230': {'query': 'MATCH (n:Computer)-[r:WriteAccountRestrictions]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all computer WriteAccountRestrictions privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteAccountRestrictions over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '231': {'query': 'MATCH (n:Group)-[r:WriteAccountRestrictions]->(m) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all WriteAccountRestrictions privileges for Users, Domain Users, Authenticated Users, and Everyone groups', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteAccountRestrictions over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '232': {'query': 'MATCH (n {owned: true})-[r:WriteAccountRestrictions]->(m) RETURN n.name,m.name,labels(m),labels(n) ORDER BY n.name', 'desc': 'List all WriteAccountRestrictions privileges for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} has WriteAccountRestrictions over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '233': {'query': 'MATCH (n:User)-[r:GenericWrite]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all user GenericWrite privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has GenericWrite over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '234': {'query': 'MATCH (n:Group)-[r:GenericWrite]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all group GenericWrite privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has GenericWrite over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '235': {'query': 'MATCH (n:Computer)-[r:GenericWrite]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all computer GenericWrite privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has GenericWrite over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '236': {'query': 'MATCH (n:Group)-[r:GenericWrite]->(m) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all GenericWrite privileges for Users, Domain Users, Authenticated Users, and Everyone groups', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has GenericWrite over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '237': {'query': 'MATCH (n {owned: true})-[r:GenericWrite]->(m) RETURN n.name,m.name,labels(m),labels(n) ORDER BY n.name', 'desc': 'List all GenericWrite privileges for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} has GenericWrite over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '238': {'query': 'MATCH (n:User)-[r:HasSIDHistory]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all user HasSIDHistory privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has HasSIDHistory over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '239': {'query': 'MATCH (n:Group)-[r:HasSIDHistory]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all group HasSIDHistory privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has HasSIDHistory over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '240': {'query': 'MATCH (n:Computer)-[r:HasSIDHistory]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all computer HasSIDHistory privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has HasSIDHistory over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '241': {'query': 'MATCH (n:Group)-[r:HasSIDHistory]->(m) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all HasSIDHistory privileges for Users, Domain Users, Authenticated Users, and Everyone groups', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has HasSIDHistory over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '242': {'query': 'MATCH (n {owned: true})-[r:HasSIDHistory]->(m) RETURN n.name,m.name,labels(m),labels(n) ORDER BY n.name', 'desc': 'List all HasSIDHistory privileges for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} has HasSIDHistory over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '243': {'query': 'MATCH (u:User) RETURN u.name,u.description ORDER BY u.name', 'desc': 'List all user descriptions', 'message_generator': (lambda r: ((((r.get('u.description') is not None) and (r.get('u.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['u.name']}{log.reset}{log.default} description {log.reset}{log.red}{r['u.description']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '244': {'query': 'MATCH (g:Group) RETURN g.name,g.description ORDER BY g.name', 'desc': 'List all group descriptions', 'message_generator': (lambda r: ((((r.get('g.description') is not None) and (r.get('g.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['g.name']}{log.reset}{log.default} description {log.reset}{log.red}{r['g.description']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '245': {'query': 'MATCH (u:User) RETURN u.name,u.email ORDER BY u.name', 'desc': 'List all emails', 'message_generator': (lambda r: ((((r.get('u.email') is not None) and (r.get('u.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['u.name']}{log.reset}{log.default} email {log.reset}{log.red}{r['u.email']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '246': {'query': 'MATCH (o:OU) RETURN o.name ORDER BY o.name', 'desc': 'List all OUs', 'message_generator': (lambda r: (((r.get('o.name') is not None) and f"{log.default}OU {log.reset}{log.red}{r['o.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '247': {'query': 'MATCH (c:Container) RETURN c.name ORDER BY c.name', 'desc': 'List all Containers', 'message_generator': (lambda r: (((r.get('c.name') is not None) and f"{log.default}Container {log.reset}{log.red}{r['c.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '248': {'query': 'MATCH (n:Domain) RETURN n.name ORDER BY n.name', 'desc': 'List all Domains', 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.default}Domain {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '249': {'query': 'MATCH (d:Domain) RETURN d.name,d.functionallevel ORDER BY d.name', 'desc': 'List all Domains functional level', 'message_generator': (lambda r: ((((r.get('d.name') is not None) and (r.get('d.functionallevel') is not None)) and f"{log.default}Domain {log.reset}{log.red}{r['d.name']}{log.reset}{log.default} functional level {log.reset}{log.red}{r['d.functionallevel']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '250': {'query': 'MATCH (n)-[r:Owns|AllExtendedRights|WriteDacl|GenericAll|WriteOwner|GenericWrite]->(o:OU) RETURN n.name,o.name,TYPE(r),labels(n) ORDER BY n.name', 'desc': 'List all object control over OUs', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('o.name') is not None)) and f"({r['labels(n)'][0]}/{r['labels(n)'][1]}) {log.red}{r['n.name']} {log.reset}{log.default}has {log.reset}{log.red}{r['TYPE(r)']}{log.reset}{log.default} over OU {log.reset}{log.red}{r['o.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '251': {'query': 'MATCH (n {owned: true})-[r:Owns|AllExtendedRights|WriteDacl|GenericAll|WriteOwner|GenericWrite]->(o:OU) RETURN n.name,o.name,TYPE(r),labels(n) ORDER BY n.name', 'desc': 'List all object control over OUs for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('o.name') is not None)) and f"({r['labels(n)'][0]}/{r['labels(n)'][1]}) {log.red}{r['n.name']} {log.reset}{log.default}has {log.reset}{log.red}{r['TYPE(r)']}{log.reset}{log.default} over OU {log.reset}{log.red}{r['o.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '252': {'query': 'MATCH (n)-[r:Owns|AllExtendedRights|WriteDacl|GenericAll|WriteOwner|GenericWrite]->(c:Container) RETURN n.name,c.name,TYPE(r),labels(n) ORDER BY n.name', 'desc': 'List all object control over Containers', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('c.name') is not None)) and f"{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}) {log.red}{r['n.name']} {log.reset}{log.default}has {log.reset}{log.red}{r['TYPE(r)']}{log.reset}{log.default} over Container {log.reset}{log.red}{r['c.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '253': {'query': 'MATCH (n {owned: true})-[r:Owns|AllExtendedRights|WriteDacl|GenericAll|WriteOwner|GenericWrite]->(c:Container) RETURN n.name,c.name,TYPE(r),labels(n) ORDER BY n.name', 'desc': 'List all object control over Containers for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('c.name') is not None)) and f"{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}) {log.red}{r['n.name']} {log.reset}{log.default}has {log.reset}{log.red}{r['TYPE(r)']}{log.reset}{log.default} over Container {log.reset}{log.red}{r['c.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '254': {'query': 'MATCH (n)-[r:Owns|AllExtendedRights|WriteDacl|GenericAll|WriteOwner|GenericWrite]->(g:GPO) RETURN n.name,g.name,TYPE(r),labels(n) ORDER BY n.name', 'desc': 'List all object control over GPOs', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('g.name') is not None)) and f"({r['labels(n)'][0]}/{r['labels(n)'][1]}) {log.red}{r['n.name']} {log.reset}{log.default}has {log.reset}{log.red}{r['TYPE(r)']}{log.reset}{log.default} over GPO {log.reset}{log.red}{r['g.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '255': {'query': 'MATCH (n {owned: true})-[r:Owns|AllExtendedRights|WriteDacl|GenericAll|WriteOwner|GenericWrite]->(g:GPO) RETURN n.name,g.name,TYPE(r),labels(n) ORDER BY n.name', 'desc': 'List all object control over GPOs for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('g.name') is not None)) and f"({r['labels(n)'][0]}/{r['labels(n)'][1]}) {log.red}{r['n.name']} {log.reset}{log.default}has {log.reset}{log.red}{r['TYPE(r)']}{log.reset}{log.default} over GPO {log.reset}{log.red}{r['g.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '256': {'query': 'MATCH (g1)-[:GPLink]->(g2) RETURN g1.name,g2.name,labels(g2) ORDER BY g1.name', 'desc': 'List all GP Links', 'message_generator': (lambda r: ((((r.get('g1.name') is not None) and (r.get('g2.name') is not None)) and f"{log.default}GPO {log.reset}{log.red}{r['g1.name']}{log.reset}{log.default} is linked to {log.reset}{log.red}{r['g2.name']}{log.reset}{log.default} ({r['labels(g2)'][0]}/{r['labels(g2)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '257': {'query': 'MATCH (n:User)-[r]->(m) RETURN n.name,TYPE(r),labels(m),m.name ORDER BY TYPE(r)', 'desc': 'List all user privileges', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has {log.reset}{log.red}{r['TYPE(r)']}{log.reset}{log.default} over {log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '258': {'query': 'MATCH (n:Group)-[r]->(m) RETURN n.name,TYPE(r),labels(m),m.name ORDER BY TYPE(r)', 'desc': 'List all group privileges', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has {log.reset}{log.red}{r['TYPE(r)']}{log.reset}{log.default} over {log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '259': {'query': 'MATCH (n:Computer)-[r]->(m) RETURN n.name,TYPE(r),labels(m),m.name ORDER BY TYPE(r)', 'desc': 'List all computer privileges', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has {log.reset}{log.red}{r['TYPE(r)']}{log.reset}{log.default} over {log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '260': {'query': 'MATCH (n:Group)-[r]->(m) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,TYPE(r),labels(m),m.name ORDER BY TYPE(r)', 'desc': 'List all privileges for Users, Domain Users, Authenticated Users, or Everyone groups', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has {log.reset}{log.red}{r['TYPE(r)']}{log.reset}{log.default} over {log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '261': {'query': 'MATCH (n:Group)-[:MemberOf]->(g:Group)-[r]->(m) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,TYPE(r),labels(m),m.name,g.name ORDER BY TYPE(r)', 'desc': 'List all group-delegated privileges for Users, Domain Users, Authenticated Users, or Everyone groups', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is MemberOf {log.reset}{log.red}{r['g.name']} {log.reset}{log.default}which has {log.reset}{log.red}{r['TYPE(r)']}{log.reset}{log.default} over {log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '262': {'query': 'MATCH (n {owned: true})-[r]->(m) RETURN n.name,TYPE(r),labels(m),labels(n),m.name ORDER BY TYPE(r)', 'desc': 'List all privileges for owned principals', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} has {log.reset}{log.red}{r['TYPE(r)']}{log.reset}{log.default} over {log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '263': {'query': 'MATCH (n {owned: true})-[:MemberOf]->(g:Group),(g)-[r]->(m) RETURN n.name,TYPE(r),labels(m),labels(n),m.name,g.name ORDER BY TYPE(r)', 'desc': 'List all group-delegated privileges for owned principals', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None) and (r.get('g.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} is MemberOf {log.reset}{log.red}{r['g.name']} {log.reset}{log.default}which has {log.reset}{log.red}{r['TYPE(r)']}{log.reset}{log.default} over {log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '264': {'query': "MATCH p=(u:User)-[:CanRDP]->(c:Computer) WHERE u.name =~ '((?i)USER_SEARCH)' RETURN u.name,c.name", 'desc': "List this user's RDP privileges", 'message_generator': (lambda r: ((((r.get('u.name') is not None) and (r.get('c.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['u.name']}{log.reset}{log.default} CanRDP to {log.reset}{log.red}{r['c.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '265': {'query': "MATCH (n:User)-[:MemberOf]->(m:Group),(m)-[:CanRDP]->(c:Computer) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN DISTINCT n.name,m.name,c.name ORDER BY m.name", 'desc': "List this user's group-delegated RDP privileges", 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None) and (r.get('c.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is MemberOf {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}which CanRDP to {log.red}{r['c.name']}{log.default}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '266': {'query': "MATCH p=(m:User)-[r:AdminTo]->(n:Computer) WHERE m.name =~ '((?i)USER_SEARCH)' RETURN m.name, n.name ORDER BY m.name", 'desc': "List this user's AdminTo privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} is AdminTo {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '267': {'query': "MATCH (n:User)-[:MemberOf]->(m:Group),(m)-[:AdminTo]->(c:Computer) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN DISTINCT n.name,m.name,c.name ORDER BY m.name", 'desc': "List this user's group-delegated AdminTo privileges", 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None) and (r.get('c.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is MemberOf {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} which is AdminTo {log.red}{r['c.name']}{log.default}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '268': {'query': "MATCH p=(m:Computer)-[r:HasSession]->(n:User) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,m.name", 'desc': "List this user's sessions", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} HasSession on {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '269': {'query': "MATCH p=(n:User)-[r:ReadLAPSPassword]->(m:Computer) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,m.name ORDER by n.name", 'desc': "List this user's ReadLAPSPassword privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can read LAPS passwords for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '270': {'query': "MATCH p=(n:User)-[r:SyncLAPSPassword]->(m:Computer) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,m.name ORDER by n.name", 'desc': "List this user's SyncLAPSPassword privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can sync LAPS passwords for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '271': {'query': "MATCH (n:User)-[r:DumpSMSAPassword]->(m) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this user's DumpSMSAPassword privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has DumpSMSAPassword over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '272': {'query': "MATCH p=(n:User)-[r:ReadGMSAPassword]->(m:User) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,m.name ORDER by n.name", 'desc': "List this user's ReadGMSAPassword privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can read GMSA passwords for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '273': {'query': "MATCH (u:User)-[:AllowedToDelegate]->(c:Computer) WHERE u.name =~ '((?i)USER_SEARCH)' RETURN u.name,c.name", 'desc': "List this user's Constrained Delegation privileges", 'message_generator': (lambda r: ((((r.get('u.name') is not None) and (r.get('c.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['u.name']}{log.reset}{log.default} is allowed to delegate for {log.reset}{log.red}{r['c.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '274': {'query': "MATCH (n:User)-[r:ForceChangePassword]->(m:User) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,m.name ORDER BY n.name", 'desc': "List this user's ForceChangePassword privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can force change password for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '275': {'query': "MATCH (n:User)-[r:AddMember]->(m:Group) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,m.name ORDER BY n.name", 'desc': "List this user's AddMember privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can add members to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '276': {'query': "MATCH (n:User)-[r:AddSelf]->(m:Group) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,m.name ORDER BY n.name", 'desc': "List this user's AddSelf privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can add itself to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '277': {'query': "MATCH (n:User)-[r:SQLAdmin]->(m:Computer) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,m.name ORDER BY n.name", 'desc': "List this user's SQLAdmin privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is SQLAdmin to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '278': {'query': "MATCH (n:User)-[r:CanPSRemote]->(m:Computer) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,m.name ORDER BY n.name", 'desc': "List this user's CanPSRemote privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can PSRemote to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '279': {'query': "MATCH (n:User)-[r:ExecuteDCOM]->(m:Computer) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,m.name ORDER BY n.name", 'desc': "List this user's ExecuteDCOM privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can ExecuteDCOM on {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '280': {'query': "MATCH (n:User)-[r:AllowedToAct]->(m) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this user's AllowedToAct privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is AllowedToAct for {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '281': {'query': "MATCH (n:User)-[r:Owns]->(m) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this user's Owns privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} Owns {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '282': {'query': "MATCH (n:User)-[r:AllExtendedRights]->(m) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this user's AllExtendedRights privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has AllExtendedRights over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '283': {'query': "MATCH (n:User)-[r:AddKeyCredentialLink]->(m) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this user's AddKeyCredentialLink privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has AddKeyCredentialLink over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '284': {'query': "MATCH (n:User)-[r:GenericAll]->(m) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this user's GenericAll privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has GenericAll over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '285': {'query': "MATCH (n:User)-[r:WriteDacl]->(m) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this user's WriteDacl privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteDacl over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '286': {'query': "MATCH (n:User)-[r:WriteOwner]->(m) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this user's WriteOwner privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteOwner over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '287': {'query': "MATCH (n:User)-[r:WriteSPN]->(m) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this user's WriteSPN privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteSPN over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '288': {'query': "MATCH (n:User)-[r:WriteAccountRestrictions]->(m) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this user's WriteAccountRestrictions privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteAccountRestrictions over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '289': {'query': "MATCH (n:User)-[r:GenericWrite]->(m) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this user's GenericWrite privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has GenericWrite over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '290': {'query': "MATCH (n:User)-[r:HasSIDHistory]->(m) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this user's HasSIDHistory privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has HasSIDHistory over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '291': {'query': "MATCH (u:User) WHERE u.name =~ '((?i)USER_SEARCH)' RETURN u.name,u.description ORDER BY u.name", 'desc': "List this user's description", 'message_generator': (lambda r: ((((r.get('u.description') is not None) and (r.get('u.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['u.name']}{log.reset}{log.default} description {log.reset}{log.red}{r['u.description']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '292': {'query': "MATCH (u:User) WHERE u.name =~ '((?i)USER_SEARCH)' RETURN u.name,u.email ORDER BY u.name", 'desc': "List this user's email", 'message_generator': (lambda r: (((r.get('u.email') is not None) and f"{log.default}User {log.reset}{log.red}{r['u.name']}{log.reset}{log.default} email {log.reset}{log.red}{r['u.email']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '293': {'query': "MATCH (n:User)-[r:MemberOf]->(m) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this user's group memberships", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is MemberOf {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '294': {'query': "MATCH (u:User {dontreqpreauth: true}) WHERE u.name =~ '((?i)USER_SEARCH)' RETURN u.name", 'desc': "List if this user's AS-REP roastable", 'message_generator': (lambda r: (((r.get('u.name') is not None) and f"{log.default}User {log.reset}{log.red}{r['u.name']}{log.reset}{log.default} is AS-REP roastable{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '295': {'query': "MATCH (n:User) WHERE n.hasspn=true AND n.name =~ '((?i)USER_SEARCH)' RETURN n.name AS result ORDER BY n.name", 'desc': "List if this user's kerberoastable", 'message_generator': (lambda r: (((r.get('result') is not None) and f"{log.default}User {log.reset}{log.red}{r['result']}{log.reset}{log.default} is kerberoastable{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '296': {'query': "MATCH (n:User)-[r]->(m) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,TYPE(r),labels(m),m.name ORDER BY TYPE(r)", 'desc': 'List all privileges for this user', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None) and (r.get('TYPE(r)') is not None) and (r.get('labels(m)') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has {log.reset}{log.red}{r['TYPE(r)']}{log.reset}{log.default} over {log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '297': {'query': "MATCH (n:User)-[:MemberOf]->(m:Group),(m)-[r]->(v) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,TYPE(r),labels(v),m.name,v.name ORDER BY m.name", 'desc': 'List all group-delegated privileges for this user', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None) and (r.get('v.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']} {log.reset}{log.default}is MemberOf {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}which has {log.reset}{log.red}{r['TYPE(r)']}{log.reset}{log.default} over {log.red}{r['v.name']} {log.reset}{log.default}({r['labels(v)'][0]}/{r['labels(v)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '298': {'query': 'MATCH (m:User),(n {highvalue: true}),p=shortestPath((m)-[r*1..]->(n)) WHERE NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") AND NOT m=n AND m.name =~ \'((?i)USER_SEARCH)\' RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to high-value targets for this user', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'user'}, '299': {'query': 'MATCH p=shortestPath((m:User)-[r*1..]->(n:Group)) WHERE n.objectid =~ "(?i)S-1-5-21-.*-512" AND m.name =~ \'((?i)USER_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to Domain Admins for this user', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'user'}, '300': {'query': 'MATCH p=shortestPath((m:User)-[r*1..]->(n:Group)) WHERE n.objectid =~ "(?i)S-1-5-21-.*-519" AND m.name =~ \'((?i)USER_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to Enterprise Admins for this user', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'user'}, '301': {'query': 'MATCH p=shortestPath((m:User)-[r*1..]->(n:Group)) WHERE n.objectid =~ "(?i)S-1-5-21-.*-516" AND m.name =~ \'((?i)USER_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to Domain Controllers for this user', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'user'}, '302': {'query': 'MATCH p=shortestPath((m:User)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)EXCHANGE).*" AND m.name =~ \'((?i)USER_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to Exchange groups for this user', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'user'}, '303': {'query': 'MATCH p=shortestPath((m:User)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)admin|adm).*" AND m.name =~ \'((?i)USER_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to admin groups for this user', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'user'}, '304': {'query': 'MATCH p=shortestPath((m:User)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)SQL).*" AND m.name =~ \'((?i)USER_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to sql groups for this user', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'user'}, '305': {'query': 'MATCH p=shortestPath((m:User)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)WEB).*" AND m.name =~ \'((?i)USER_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to web groups for this user', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'user'}, '306': {'query': 'MATCH p=shortestPath((m:User)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)service|svc).*" AND m.name =~ \'((?i)USER_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to service groups for this user', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'user'}, '307': {'query': 'MATCH p=shortestPath((m)-[r*1..]->(n:User)) WHERE n.name =~ \'((?i)USER_SEARCH)\' AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to this user', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'user'}, '308': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:User)) WHERE (m.objectid =~ "(?i)S-1-5-21-.*-513" OR m.objectid =~ "(?i).*-S-1-5-11" OR m.objectid =~ "(?i).*-S-1-1-0" OR m.objectid =~ "(?i).*-S-1-5-32-545") AND n.name =~ \'((?i)USER_SEARCH)\' AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to this user for Users, Domain Users, Authenticated Users, or Everyone groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'user'}, '309': {'query': 'MATCH p=shortestPath((m {owned: true})-[r*1..]->(n:User)) WHERE n.name =~ \'((?i)USER_SEARCH)\' AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to this user for owned principals', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'user'}, '310': {'query': "MATCH p=(g:Group)-[:CanRDP]->(c:Computer) WHERE g.name =~ '((?i)GROUP_SEARCH)' RETURN g.name,c.name", 'desc': "List this group's RDP privileges", 'message_generator': (lambda r: ((((r.get('g.name') is not None) and (r.get('c.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['g.name']}{log.reset}{log.default} CanRDP to {log.reset}{log.red}{r['c.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '311': {'query': "MATCH (n:Group)-[:MemberOf]->(m:Group),(m)-[:CanRDP]->(c:Computer) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN DISTINCT n.name,m.name,c.name ORDER BY m.name", 'desc': "List this group's group-delegated RDP privileges", 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('c.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is MemberOf {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}which CanRDP to {log.red}{r['c.name']}{log.default}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '312': {'query': "MATCH p=(m:Group)-[r:AdminTo]->(n:Computer) WHERE m.name =~ '((?i)GROUP_SEARCH)' RETURN m.name, n.name ORDER BY m.name", 'desc': "List this group's AdminTo privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} is AdminTo {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '313': {'query': "MATCH (n:Group)-[:MemberOf]->(m:Group),(m)-[:AdminTo]->(c:Computer) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN DISTINCT n.name,m.name,c.name ORDER BY m.name", 'desc': "List this group's group-delegated AdminTo privileges", 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('c.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is MemberOf {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} which is AdminTo {log.red}{r['c.name']}{log.default}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '314': {'query': "MATCH p=(n:Group)-[r:ReadLAPSPassword]->(m:Computer) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,m.name ORDER by n.name", 'desc': "List this group's ReadLAPSPassword privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can read LAPS passwords for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '315': {'query': "MATCH p=(n:Group)-[r:SyncLAPSPassword]->(m:Computer) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,m.name ORDER by n.name", 'desc': "List this group's SyncLAPSPassword privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can sync LAPS passwords for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '316': {'query': "MATCH (n:Group)-[r:DumpSMSAPassword]->(m) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this group's DumpSMSAPassword privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has DumpSMSAPassword over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '317': {'query': "MATCH p=(n:Group)-[r:ReadGMSAPassword]->(m:User) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,m.name ORDER by n.name", 'desc': "List this group's ReadGMSAPassword privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can read GMSA passwords for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '318': {'query': "MATCH (g:Group)-[:AllowedToDelegate]->(c:Computer) WHERE g.name =~ '((?i)GROUP_SEARCH)' RETURN g.name,c.name", 'desc': "List this group's Constrained Delegation privileges", 'message_generator': (lambda r: ((((r.get('g.name') is not None) and (r.get('c.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['g.name']}{log.reset}{log.default} is allowed to delegate for {log.reset}{log.red}{r['c.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '319': {'query': "MATCH (n:Group)-[r:ForceChangePassword]->(m:User) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,m.name ORDER BY n.name", 'desc': "List this group's ForceChangePassword privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can force change password for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '320': {'query': "MATCH (n:Group)-[r:AddMember]->(m:Group) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,m.name ORDER BY n.name", 'desc': "List this group's AddMember privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can add members to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '321': {'query': "MATCH (n:Group)-[r:AddSelf]->(m:Group) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,m.name ORDER BY n.name", 'desc': "List this group's AddSelf privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can add itself to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '322': {'query': "MATCH (n:Group)-[r:SQLAdmin]->(m:Computer) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,m.name ORDER BY n.name", 'desc': "List this group's SQLAdmin privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is SQLAdmin to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '323': {'query': "MATCH (n:Group)-[r:CanPSRemote]->(m:Computer) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,m.name ORDER BY n.name", 'desc': "List this group's CanPSRemote privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can PSRemote to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '324': {'query': "MATCH (n:Group)-[r:ExecuteDCOM]->(m:Computer) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,m.name ORDER BY n.name", 'desc': "List this group's ExecuteDCOM privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can ExecuteDCOM on {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '325': {'query': "MATCH (n:Group)-[r:AllowedToAct]->(m) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this group's AllowedToAct privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is AllowedToAct for {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '326': {'query': "MATCH (n:Group)-[r:Owns]->(m) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this group's Owns privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} Owns {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '327': {'query': "MATCH (n:Group)-[r:AllExtendedRights]->(m) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this group's AllExtendedRights privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has AllExtendedRights over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '328': {'query': "MATCH (n:Group)-[r:AddKeyCredentialLink]->(m) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this group's AddKeyCredentialLink privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has AddKeyCredentialLink over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '329': {'query': "MATCH (n:Group)-[r:GenericAll]->(m) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this group's GenericAll privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has GenericAll over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '330': {'query': "MATCH (n:Group)-[r:WriteDacl]->(m) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this group's WriteDacl privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteDacl over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '331': {'query': "MATCH (n:Group)-[r:WriteOwner]->(m) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this group's WriteOwner privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteOwner over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '332': {'query': "MATCH (n:Group)-[r:WriteSPN]->(m) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this group's WriteSPN privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteSPN over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '333': {'query': "MATCH (n:Group)-[r:WriteAccountRestrictions]->(m) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this group's WriteAccountRestrictions privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteAccountRestrictions over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '334': {'query': "MATCH (n:Group)-[r:GenericWrite]->(m) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this group's GenericWrite privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has GenericWrite over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '335': {'query': "MATCH (n:Group)-[r:HasSIDHistory]->(m) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this group's HasSIDHistory privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has HasSIDHistory over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '336': {'query': "MATCH (g:Group) WHERE g.name =~ '((?i)GROUP_SEARCH)' RETURN g.name,g.description ORDER BY g.name", 'desc': "List this group's description", 'message_generator': (lambda r: ((((r.get('g.description') is not None) and (r.get('g.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['g.name']}{log.reset}{log.default} description {log.reset}{log.red}{r['g.description']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '337': {'query': "MATCH (n:Group)-[r:MemberOf]->(m) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this group's group memberships", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is MemberOf {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '338': {'query': "MATCH (n)-[r:MemberOf]->(m) WHERE m.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,m.name,labels(m),labels(n) ORDER BY n.name", 'desc': "List this group's members", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.red}{r['n.name']}{log.reset}{log.default} ({r['labels(n)'][0]}/{r['labels(n)'][1]}) is MemberOf {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '339': {'query': "MATCH (n:Group)-[r:AdminTo|HasSession|ForceChangePassword|AddMember|AddSelf|CanPSRemote|ExecuteDCOM|SQLAdmin|AllowedToDelegate|GenericAll|GenericWrite|WriteDacl|HasSIDHistory|DumpSMSAPassword|WriteSPN|WriteAccountRestrictions|Owns|AddKeyCredentialLink|ReadLAPSPassword|SyncLAPSPassword|ReadGMSAPassword|AllExtendedRights|AllowedToAct]->(m) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,TYPE(r),labels(m),m.name ORDER BY TYPE(r)", 'desc': 'List all privileges for this group', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has {log.reset}{log.red}{r['TYPE(r)']}{log.reset}{log.default} over {log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '340': {'query': "MATCH (n:Group)-[:MemberOf]->(m:Group),(m)-[r]->(v) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,TYPE(r),labels(v),m.name,v.name ORDER BY m.name", 'desc': 'List all group-delegated privileges for this group', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None) and (r.get('v.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']} {log.reset}{log.default}is MemberOf {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}which has {log.reset}{log.red}{r['TYPE(r)']}{log.reset}{log.default} over {log.red}{r['v.name']} {log.reset}{log.default}({r['labels(v)'][0]}/{r['labels(v)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '341': {'query': 'MATCH (m:Group),(n {highvalue: true}),p=shortestPath((m)-[r*1..]->(n)) WHERE NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") AND NOT m=n AND m.name =~ \'((?i)GROUP_SEARCH)\' RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to high-value targets for this group', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'group'}, '342': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE n.objectid =~ "(?i)S-1-5-21-.*-512" AND NOT m=n AND m.name =~ \'((?i)GROUP_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to Domain Admins for this group', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'group'}, '343': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE n.objectid =~ "(?i)S-1-5-21-.*-519" AND NOT m=n AND m.name =~ \'((?i)GROUP_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to Enterprise Admins for this group', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'group'}, '344': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE n.objectid =~ "(?i)S-1-5-21-.*-516" AND NOT m=n AND m.name =~ \'((?i)GROUP_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to Domain Controllers for this group', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'group'}, '345': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)EXCHANGE).*" AND NOT m=n AND m.name =~ \'((?i)GROUP_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to Exchange groups for this group', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'group'}, '346': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)admin|adm).*" AND NOT m=n AND m.name =~ \'((?i)GROUP_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to admin groups for this group', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'group'}, '347': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)SQL).*" AND NOT m=n AND m.name =~ \'((?i)GROUP_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to sql groups for this group', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'group'}, '348': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)WEB).*" AND NOT m=n AND m.name =~ \'((?i)GROUP_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to web groups for this group', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'group'}, '349': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)service|svc).*" AND NOT m=n AND m.name =~ \'((?i)GROUP_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to service groups for this group', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'group'}, '350': {'query': 'MATCH p=shortestPath((m)-[r*1..]->(n:Group)) WHERE n.name =~ \'((?i)GROUP_SEARCH)\' AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to this group', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'group'}, '351': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE (m.objectid =~ "(?i)S-1-5-21-.*-513" OR m.objectid =~ "(?i).*-S-1-5-11" OR m.objectid =~ "(?i).*-S-1-1-0" OR m.objectid =~ "(?i).*-S-1-5-32-545") AND n.name =~ \'((?i)GROUP_SEARCH)\' AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to this group for Users, Domain Users, Authenticated Users, or Everyone groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'group'}, '352': {'query': 'MATCH p=shortestPath((m {owned: true})-[r*1..]->(n:Group)) WHERE n.name =~ \'((?i)GROUP_SEARCH)\' AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to this group for owned principals', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'group'}, '353': {'query': "MATCH p=(m:Computer)-[r:AdminTo]->(n:Computer) WHERE m.name =~ '((?i)COMPUTER_SEARCH)' RETURN m.name, n.name ORDER BY m.name", 'desc': "List this computer's AdminTo privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} is AdminTo {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '354': {'query': "MATCH (n:Computer)-[:MemberOf]->(m:Group),(m)-[:AdminTo]->(c:Computer) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN DISTINCT n.name,m.name,c.name ORDER BY m.name", 'desc': "List this computer's group-delegated AdminTo privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None) and (r.get('c.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is MemberOf {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} which is AdminTo {log.red}{r['c.name']}{log.default}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '355': {'query': "MATCH p=(n:Computer)-[r:ReadLAPSPassword]->(m:Computer) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,m.name ORDER by n.name", 'desc': "List this computer's ReadLAPSPassword privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can read LAPS passwords for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '356': {'query': "MATCH p=(n:Computer)-[r:SyncLAPSPassword]->(m:Computer) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,m.name ORDER by n.name", 'desc': "List this computer's SyncLAPSPassword privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can sync LAPS passwords for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '357': {'query': "MATCH (n:Computer)-[r:DumpSMSAPassword]->(m) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this computer's DumpSMSAPassword privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has DumpSMSAPassword over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '358': {'query': "MATCH p=(n:Computer)-[r:ReadGMSAPassword]->(m:User) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,m.name ORDER by n.name", 'desc': "List this computer's ReadGMSAPassword privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can read GMSA passwords for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '359': {'query': "MATCH (n:Computer)-[:AllowedToDelegate]->(c:Computer) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,c.name", 'desc': "List this computer's Constrained Delegation privileges", 'message_generator': (lambda r: ((((r.get('c.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is allowed to delegate for {log.reset}{log.red}{r['c.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '360': {'query': "MATCH (n:Computer)-[r:ForceChangePassword]->(m:User) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,m.name ORDER BY n.name", 'desc': "List this computer's ForceChangePassword privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can force change password for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '361': {'query': "MATCH (n:Computer)-[r:AddMember]->(m:Group) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,m.name ORDER BY n.name", 'desc': "List this computer's AddMember privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can add members to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '362': {'query': "MATCH (n:Computer)-[r:AddSelf]->(m:Group) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,m.name ORDER BY n.name", 'desc': "List this computer's AddSelf privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can add itself to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '363': {'query': "MATCH (n:Computer)-[r:SQLAdmin]->(m:Computer) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,m.name ORDER BY n.name", 'desc': "List this computer's SQLAdmin privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is SQLAdmin to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '364': {'query': "MATCH (n:Computer)-[r:CanPSRemote]->(m:Computer) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,m.name ORDER BY n.name", 'desc': "List this computer's CanPSRemote privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can PSRemote to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '365': {'query': "MATCH (n:Computer)-[r:ExecuteDCOM]->(m:Computer) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,m.name ORDER BY n.name", 'desc': "List this computer's ExecuteDCOM privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can ExecuteDCOM on {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '366': {'query': "MATCH (n:Computer)-[r:AllowedToAct]->(m) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this computer's AllowedToAct privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is AllowedToAct for {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '367': {'query': "MATCH (n:Computer)-[r:Owns]->(m) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this computer's Owns privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} Owns {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '368': {'query': "MATCH (n:Computer)-[r:AllExtendedRights]->(m) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this computer's AllExtendedRights privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has AllExtendedRights over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '369': {'query': "MATCH (n:Computer)-[r:AddKeyCredentialLink]->(m) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this computer's AddKeyCredentialLink privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has AddKeyCredentialLink over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '370': {'query': "MATCH (n:Computer)-[r:GenericAll]->(m) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this computer's GenericAll privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has GenericAll over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '371': {'query': "MATCH (n:Computer)-[r:WriteDacl]->(m) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this computer's WriteDacl privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteDacl over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '372': {'query': "MATCH (n:Computer)-[r:WriteOwner]->(m) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this computer's WriteOwner privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteOwner over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '373': {'query': "MATCH (n:Computer)-[r:WriteSPN]->(m) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this computer's WriteSPN privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteSPN over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '374': {'query': "MATCH (n:Computer)-[r:WriteAccountRestrictions]->(m) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this computer's WriteAccountRestrictions privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteAccountRestrictions over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '375': {'query': "MATCH (n:Computer)-[r:GenericWrite]->(m) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this computer's GenericWrite privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has GenericWrite over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '376': {'query': "MATCH (n:Computer)-[r:HasSIDHistory]->(m) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this computer's HasSIDHistory privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has HasSIDHistory over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '377': {'query': "MATCH (n:Computer)-[r:MemberOf]->(m) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this computer's group memberships", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is MemberOf {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '378': {'query': "MATCH (n:Computer)-[r]->(m) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,TYPE(r),labels(m),m.name ORDER BY TYPE(r)", 'desc': 'List all privileges for this computer', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has {log.reset}{log.red}{r['TYPE(r)']}{log.reset}{log.default} over {log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '379': {'query': "MATCH (n:Computer)-[:MemberOf]->(m:Group),(m)-[r]->(v) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,TYPE(r),labels(v),m.name,v.name ORDER BY m.name", 'desc': 'List all group-delegated privileges for this computer', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None) and (r.get('v.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']} {log.reset}{log.default}is MemberOf {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}which has {log.reset}{log.red}{r['TYPE(r)']}{log.reset}{log.default} over {log.red}{r['v.name']} {log.reset}{log.default}({r['labels(v)'][0]}/{r['labels(v)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '380': {'query': 'MATCH (m:Computer),(n {highvalue: true}),p=shortestPath((m)-[r*1..]->(n)) WHERE NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") AND NOT m=n AND m.name =~ \'((?i)COMPUTER_SEARCH)\' RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to high-value targets for this computer', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'computer'}, '381': {'query': 'MATCH p=shortestPath((m:Computer)-[r*1..]->(n:Group)) WHERE n.objectid =~ "(?i)S-1-5-21-.*-512" AND m.name =~ \'((?i)COMPUTER_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to Domain Admins for this computer', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'computer'}, '382': {'query': 'MATCH p=shortestPath((m:Computer)-[r*1..]->(n:Group)) WHERE n.objectid =~ "(?i)S-1-5-21-.*-519" AND m.name =~ \'((?i)COMPUTER_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to Enterprise Admins for this computer', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'computer'}, '383': {'query': 'MATCH p=shortestPath((m:Computer)-[r*1..]->(n:Group)) WHERE n.objectid =~ "(?i)S-1-5-21-.*-516" AND m.name =~ \'((?i)COMPUTER_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to Domain Controllers for this computer', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'computer'}, '384': {'query': 'MATCH p=shortestPath((m:Computer)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)EXCHANGE).*" AND m.name =~ \'((?i)COMPUTER_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to Exchange groups for this computer', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'computer'}, '385': {'query': 'MATCH p=shortestPath((m:Computer)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)admin|adm).*" AND m.name =~ \'((?i)COMPUTER_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to admin groups for this computer', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'computer'}, '386': {'query': 'MATCH p=shortestPath((m:Computer)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)SQL).*" AND m.name =~ \'((?i)COMPUTER_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to sql groups for this computer', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'computer'}, '387': {'query': 'MATCH p=shortestPath((m:Computer)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)WEB).*" AND m.name =~ \'((?i)COMPUTER_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to web groups for this computer', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'computer'}, '388': {'query': 'MATCH p=shortestPath((m:Computer)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)service|svc).*" AND m.name =~ \'((?i)COMPUTER_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to service groups for this computer', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'computer'}, '389': {'query': 'MATCH p=shortestPath((m)-[r*1..]->(n:Computer)) WHERE n.name =~ \'((?i)COMPUTER_SEARCH)\' AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to this computer', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'computer'}, '390': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Computer)) WHERE (m.objectid =~ "(?i)S-1-5-21-.*-513" OR m.objectid =~ "(?i).*-S-1-5-11" OR m.objectid =~ "(?i).*-S-1-1-0" OR m.objectid =~ "(?i).*-S-1-5-32-545") AND n.name =~ \'((?i)COMPUTER_SEARCH)\' AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to this computer for Users, Domain Users, Authenticated Users, or Everyone groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'computer'}, '391': {'query': 'MATCH p=shortestPath((m {owned: true})-[r*1..]->(n:Computer)) WHERE n.name =~ \'((?i)COMPUTER_SEARCH)\' AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to this computer for owned principals', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'computer'}, '392': {'query': "MATCH (n:Group) WHERE n.name =~ 'REGEX' RETURN n.name ORDER BY n.name", 'desc': 'Search for groups matching the regex', 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'regex'}, '393': {'query': "MATCH (n:User) WHERE n.name =~ 'REGEX' RETURN n.name ORDER BY n.name", 'desc': 'Search for users matching the regex', 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'regex'}, '394': {'query': "MATCH (n:Computer) WHERE n.name =~ 'REGEX' RETURN n.name ORDER BY n.name", 'desc': 'Search for computers matching the regex', 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'regex'}, '395': {'query': "MATCH (n:User) WHERE n.description =~ 'REGEX' RETURN n.name,n.description ORDER BY n.name", 'desc': 'Search for user descriptions matching the regex', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('n.description') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']} {log.reset}{log.default}description {log.reset}{log.red}{r['n.description']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'regex'}, '396': {'query': "MATCH (n:Group) WHERE n.description =~ 'REGEX' RETURN n.name,n.description ORDER BY n.name", 'desc': 'Search for group descriptions matching the regex', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('n.description') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']} {log.reset}{log.default}description {log.reset}{log.red}{r['n.description']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'regex'}, '397': {'query': "MATCH (n:Computer) WHERE n.operatingsystem =~ 'REGEX' RETURN n.name,n.operatingsystem ORDER BY n.name", 'desc': 'Search for OSs matching the regex', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('n.operatingsystem') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']} {log.reset}{log.default}OS {log.reset}{log.red}{r['n.operatingsystem']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'regex'}, '398': {'query': "MATCH (n:GPO) WHERE n.name =~ 'REGEX' RETURN n.name ORDER BY n.name", 'desc': 'Search for GPOs matching the regex', 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.default}GPO {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'regex'}, '399': {'query': "MATCH (n:Container) WHERE n.name =~ 'REGEX' RETURN n.name ORDER BY n.name", 'desc': 'Search for Containers matching the regex', 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.default}Container {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'regex'}, '400': {'query': "MATCH (n:OU) WHERE n.name =~ 'REGEX' RETURN n.name ORDER BY n.name", 'desc': 'Search for OUs matching the regex', 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.default}OU {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'regex'}} except Exception as e: log.log_error(e) def close(self): self.driver.close() def set_user_param(self, param): self.user_search = param def get_user_param(self): return self.user_search def set_group_param(self, param): self.group_search = param def get_group_param(self): return self.group_search def set_computer_param(self, param): self.computer_search = param def get_computer_param(self): return self.computer_search def set_regex(self, r): self.regex = r def get_regex(self): return self.regex def search_queries(self, search_string): results = {k: v for (k, v) in self.queries.items() if (search_string.lower() in v['desc'].lower())} if results: print(f'{log.green}Cypher matches for "{search_string}":{log.reset}') for (key, value) in results.items(): print(f"{log.red}{key}.{log.reset} {value['desc']}") else: print(f'{log.yellow}No matches found for "{search_string}".{log.reset}') def print_queries_by_type(self, type): if (type == 'all'): self.print_all_queries() return print(f'{log.default}{type.capitalize()} Cyphers{log.reset}') for (num, data) in self.queries.items(): if (data['type'] == type): print(f"{log.default}{num}.) {log.reset}{data['desc']}") def print_all_queries(self): print(f'{log.default}All Cyphers{log.reset}') for (num, data) in self.queries.items(): print(f"{log.default}{num}.) {log.reset}{data['desc']}") def replace_fillers_in_string(self, string): replacements = {'USER_SEARCH': self.user_search, 'GROUP_SEARCH': self.group_search, 'COMPUTER_SEARCH': self.computer_search, 'REGEX': self.regex} for (filler, replacement) in replacements.items(): string = string.replace(filler, replacement) return string def handle_standard_query(self, query_data, f): try: with self.driver.session(database=self.database) as session: results = session.run(self.replace_fillers_in_string(query_data['query'])) if (results.peek() is None): log.log_no_results() else: count = 0 for r in results: msg = query_data['message_generator'](r) if (msg is None): continue self.handle_output(f, msg) count += 1 if (count == 0): log.log_no_results() if f: util.handle_export(count, f) except Exception as e: log.log_error(e) def handle_path_query(self, query_data, f): try: with self.driver.session(database=self.database) as session: results = session.run(self.replace_fillers_in_string(query_data['query'])) if (results.peek() is None): log.log_no_results() else: count = 0 p_count = 1 for r in results: if ((r['m.name'] is not None) and (r['p'] is not None)): path = r['p'] if ((path.start_node['name'] is not None) and (path.end_node['name'] is not None)): n_count = 0 p_len = len(path) final = '' mid_len = len(f"*Path {p_count}* {path.start_node['name']} -> {path.end_node['name']}*") self.handle_output(f, ('*' * mid_len)) self.handle_output(f, f"*Path {p_count}* {path.start_node['name']} -> {path.end_node['name']}*") self.handle_output(f, ('*' * mid_len)) for rel in path: if ((rel.start_node['name'] is not None) and (rel.end_node['name'] is not None)): s_labels = list(rel.start_node.labels) e_labels = list(rel.end_node.labels) if (n_count != (p_len - 1)): final += f"{log.red}{rel.start_node['name']}{log.reset}{log.default} ({s_labels[0]}/{s_labels[1]}) has {log.red}{rel.type}{log.reset} over {log.reset}{log.red}{rel.end_node['name']} {log.reset}{log.default}({e_labels[0]}/{e_labels[1]}) and {log.reset}" n_count += 1 else: final += f"{log.red}{rel.start_node['name']}{log.reset}{log.default} ({s_labels[0]}/{s_labels[1]}) has {log.red}{rel.type}{log.reset} over {log.reset}{log.red}{rel.end_node['name']} {log.reset}{log.default}({e_labels[0]}/{e_labels[1]}){log.reset}" n_count += 1 self.handle_output(f, final) p_count += 1 count += 1 if (count == 0): log.log_no_results() if f: util.handle_export(count, f) except Exception as e: log.log_error(e) def handle_output(self, f, message): if (f == ''): print(message) else: with open(f, 'a+') as file: print(message) file.write((util.strip_ansi_escape_sequences(message) + '\n')) def run_query(self, option, f): try: query_data = self.queries.get(option) if (query_data is not None): query_data['handler'](query_data, f) else: log.log_error('Cypher does not exist!') except Exception as e: log.log_error(e)
def test_distance_nearest_projection(): spacing = 0.3 coords = grid_coordinates((5, 10, (- 20), (- 17)), spacing=spacing, adjust='region') distance = median_distance(coords, k_nearest=1, projection=(lambda i, j: ((i * 2), (j * 2)))) npt.assert_allclose(distance, (spacing * 2)) assert (distance.shape == coords[0].shape)