code stringlengths 281 23.7M |
|---|
def test_serendipity_biharmonic():
sp = {'snes_type': 'ksponly', 'ksp_type': 'preonly', 'pc_type': 'lu', 'pc_factor_mat_solver_type': 'mumps', 'mat_mumps_icntl_14': 200}
def error(N):
mesh = UnitSquareMesh(N, N, quadrilateral=True)
degree = 2
V = FunctionSpace(mesh, 'S', degree)
u = Function(V)
v = TestFunction(V)
X = SpatialCoordinate(mesh)
k = 1
u_ex = (sin((((2 * pi) * k) * X[0])) * cos((((2 * pi) * k) * X[1])))
h = avg(CellDiameter(mesh))
alpha = Constant(1)
n = FacetNormal(mesh)
f = (div(div(grad(grad(u_ex)))) + u_ex)
g = dot(grad(grad(u_ex)), n)
F = (((((inner(grad(grad(u)), grad(grad(v))) * dx) + (inner(u, v) * dx)) - (inner(f, v) * dx)) - (inner(g, grad(v)) * ds)) + (((alpha * (h ** (- (degree + 1)))) * inner(jump(grad(u), n), jump(grad(v), n))) * dS))
bc = DirichletBC(V, project(u_ex, V, solver_parameters=sp), 'on_boundary')
solve((F == 0), u, bc, solver_parameters=sp)
err = errornorm(u_ex, u, 'L2')
return err
errors = []
for N in [10, 20, 40]:
errors.append(error(N))
convergence_orders = (lambda x: numpy.log2((numpy.array(x)[:(- 1)] / numpy.array(x)[1:])))
conv = convergence_orders(errors)
assert all((conv >= 2)) |
class Image(HasTraits):
filename = File(exists=True)
sample_id = Str()
operator = Str('N/A')
date_acquired = Date()
scan_size = Tuple(Float, Float)
scan_width = Property(Float, depends_on='scan_size')
scan_height = Property(Float, depends_on='scan_size')
image = Array(shape=(None, None), dtype='uint8')
histogram = Property(Array, depends_on='image')
pixel_area = Float()
('filename')
def read_image(self, event):
pil_image = PILImage.open(self.filename).convert('L')
self.image = np.array(pil_image)
if (self.image.size > 0):
self.pixel_area = ((self.scan_height * self.scan_width) / self.image.size)
else:
self.pixel_area = 0
def _date_acquired_default(self):
return datetime.date.today()
def _scan_size_default(self):
return (1e-05, 1e-05)
def _get_scan_width(self):
return self.scan_size[0]
def _set_scan_width(self, value):
self.scan_size = (value, self.scan_size[1])
def _get_scan_height(self):
return self.scan_size[1]
def _set_scan_height(self, value):
self.scan_size = (self.scan_size[0], value)
_property
def _get_histogram(self):
(hist, bins) = np.histogram(self.image, bins=256, range=(0, 256), density=True)
return hist |
def test_preserve_remembers_exception(app, client):
app.debug = True
errors = []
('/fail')
def fail_func():
(1 // 0)
('/success')
def success_func():
return 'Okay'
_request
def teardown_handler(exc):
errors.append(exc)
with pytest.raises(ZeroDivisionError):
client.get('/fail')
assert (errors == [])
client.get('/success')
assert (len(errors) == 2)
assert isinstance(errors[0], ZeroDivisionError)
client.get('/success')
assert (len(errors) == 3)
assert (errors[1] is None) |
class PrometheusSerializer(Serializer):
def encode(msg: Message) -> bytes:
msg = cast(PrometheusMessage, msg)
message_pb = ProtobufMessage()
dialogue_message_pb = DialogueMessage()
prometheus_msg = prometheus_pb2.PrometheusMessage()
dialogue_message_pb.message_id = msg.message_id
dialogue_reference = msg.dialogue_reference
dialogue_message_pb.dialogue_starter_reference = dialogue_reference[0]
dialogue_message_pb.dialogue_responder_reference = dialogue_reference[1]
dialogue_message_pb.target = msg.target
performative_id = msg.performative
if (performative_id == PrometheusMessage.Performative.ADD_METRIC):
performative = prometheus_pb2.PrometheusMessage.Add_Metric_Performative()
type = msg.type
performative.type = type
title = msg.title
performative.title = title
description = msg.description
performative.description = description
labels = msg.labels
performative.labels.update(labels)
prometheus_msg.add_metric.CopyFrom(performative)
elif (performative_id == PrometheusMessage.Performative.UPDATE_METRIC):
performative = prometheus_pb2.PrometheusMessage.Update_Metric_Performative()
title = msg.title
performative.title = title
callable = msg.callable
performative.callable = callable
value = msg.value
performative.value = value
labels = msg.labels
performative.labels.update(labels)
prometheus_msg.update_metric.CopyFrom(performative)
elif (performative_id == PrometheusMessage.Performative.RESPONSE):
performative = prometheus_pb2.PrometheusMessage.Response_Performative()
code = msg.code
performative.code = code
if msg.is_set('message'):
performative.message_is_set = True
message = msg.message
performative.message = message
prometheus_msg.response.CopyFrom(performative)
else:
raise ValueError('Performative not valid: {}'.format(performative_id))
dialogue_message_pb.content = prometheus_msg.SerializeToString()
message_pb.dialogue_message.CopyFrom(dialogue_message_pb)
message_bytes = message_pb.SerializeToString()
return message_bytes
def decode(obj: bytes) -> Message:
message_pb = ProtobufMessage()
prometheus_pb = prometheus_pb2.PrometheusMessage()
message_pb.ParseFromString(obj)
message_id = message_pb.dialogue_message.message_id
dialogue_reference = (message_pb.dialogue_message.dialogue_starter_reference, message_pb.dialogue_message.dialogue_responder_reference)
target = message_pb.dialogue_message.target
prometheus_pb.ParseFromString(message_pb.dialogue_message.content)
performative = prometheus_pb.WhichOneof('performative')
performative_id = PrometheusMessage.Performative(str(performative))
performative_content = {}
if (performative_id == PrometheusMessage.Performative.ADD_METRIC):
type = prometheus_pb.add_metric.type
performative_content['type'] = type
title = prometheus_pb.add_metric.title
performative_content['title'] = title
description = prometheus_pb.add_metric.description
performative_content['description'] = description
labels = prometheus_pb.add_metric.labels
labels_dict = dict(labels)
performative_content['labels'] = labels_dict
elif (performative_id == PrometheusMessage.Performative.UPDATE_METRIC):
title = prometheus_pb.update_metric.title
performative_content['title'] = title
callable = prometheus_pb.update_metric.callable
performative_content['callable'] = callable
value = prometheus_pb.update_metric.value
performative_content['value'] = value
labels = prometheus_pb.update_metric.labels
labels_dict = dict(labels)
performative_content['labels'] = labels_dict
elif (performative_id == PrometheusMessage.Performative.RESPONSE):
code = prometheus_pb.response.code
performative_content['code'] = code
if prometheus_pb.response.message_is_set:
message = prometheus_pb.response.message
performative_content['message'] = message
else:
raise ValueError('Performative not valid: {}.'.format(performative_id))
return PrometheusMessage(message_id=message_id, dialogue_reference=dialogue_reference, target=target, performative=performative, **performative_content) |
class EvAdventureRollEngineTest(BaseEvenniaTest):
def setUp(self):
super().setUp()
self.roll_engine = rules.EvAdventureRollEngine()
('evennia.contrib.tutorials.evadventure.rules.randint')
def test_roll(self, mock_randint):
mock_randint.return_value = 8
self.assertEqual(self.roll_engine.roll('1d6'), 8)
mock_randint.assert_called_with(1, 6)
self.assertEqual(self.roll_engine.roll('2d8'), (2 * 8))
mock_randint.assert_called_with(1, 8)
self.assertEqual(self.roll_engine.roll('4d12'), (4 * 8))
mock_randint.assert_called_with(1, 12)
self.assertEqual(self.roll_engine.roll('8d100'), (8 * 8))
mock_randint.assert_called_with(1, 100)
def test_roll_limits(self):
with self.assertRaises(TypeError):
self.roll_engine.roll('100d6', max_number=10)
with self.assertRaises(TypeError):
self.roll_engine.roll('100')
with self.assertRaises(TypeError):
self.roll_engine.roll('dummy')
with self.assertRaises(TypeError):
self.roll_engine.roll('Ad4')
with self.assertRaises(TypeError):
self.roll_engine.roll('1d10000')
('evennia.contrib.tutorials.evadventure.rules.randint')
def test_roll_with_advantage_disadvantage(self, mock_randint):
mock_randint.return_value = 9
self.assertEqual(self.roll_engine.roll_with_advantage_or_disadvantage(), 9)
mock_randint.assert_called_once()
mock_randint.reset_mock()
self.assertEqual(self.roll_engine.roll_with_advantage_or_disadvantage(disadvantage=True, advantage=True), 9)
mock_randint.assert_called_once()
mock_randint.reset_mock()
self.assertEqual(self.roll_engine.roll_with_advantage_or_disadvantage(advantage=True), 9)
mock_randint.assert_has_calls([call(1, 20), call(1, 20)])
mock_randint.reset_mock()
self.assertEqual(self.roll_engine.roll_with_advantage_or_disadvantage(disadvantage=True), 9)
mock_randint.assert_has_calls([call(1, 20), call(1, 20)])
mock_randint.reset_mock()
('evennia.contrib.tutorials.evadventure.rules.randint')
def test_saving_throw(self, mock_randint):
mock_randint.return_value = 8
character = MagicMock()
character.strength = 2
character.dexterity = 1
self.assertEqual(self.roll_engine.saving_throw(character, bonus_type=enums.Ability.STR), (False, None, Something))
self.assertEqual(self.roll_engine.saving_throw(character, bonus_type=enums.Ability.DEX, modifier=1), (False, None, Something))
self.assertEqual(self.roll_engine.saving_throw(character, advantage=True, bonus_type=enums.Ability.DEX, modifier=6), (False, None, Something))
self.assertEqual(self.roll_engine.saving_throw(character, disadvantage=True, bonus_type=enums.Ability.DEX, modifier=7), (True, None, Something))
mock_randint.return_value = 1
self.assertEqual(self.roll_engine.saving_throw(character, disadvantage=True, bonus_type=enums.Ability.STR, modifier=2), (False, enums.Ability.CRITICAL_FAILURE, Something))
mock_randint.return_value = 20
self.assertEqual(self.roll_engine.saving_throw(character, disadvantage=True, bonus_type=enums.Ability.STR, modifier=2), (True, enums.Ability.CRITICAL_SUCCESS, Something))
('evennia.contrib.tutorials.evadventure.rules.randint')
def test_opposed_saving_throw(self, mock_randint):
mock_randint.return_value = 10
(attacker, defender) = (MagicMock(), MagicMock())
attacker.strength = 1
defender.armor = 2
self.assertEqual(self.roll_engine.opposed_saving_throw(attacker, defender, attack_type=enums.Ability.STR, defense_type=enums.Ability.ARMOR), (False, None, Something))
self.assertEqual(self.roll_engine.opposed_saving_throw(attacker, defender, attack_type=enums.Ability.STR, defense_type=enums.Ability.ARMOR, modifier=2), (True, None, Something))
('evennia.contrib.tutorials.evadventure.rules.randint')
def test_roll_random_table(self, mock_randint):
mock_randint.return_value = 10
self.assertEqual(self.roll_engine.roll_random_table('1d20', random_tables.chargen_tables['physique']), 'scrawny')
self.assertEqual(self.roll_engine.roll_random_table('1d20', random_tables.chargen_tables['vice']), 'irascible')
self.assertEqual(self.roll_engine.roll_random_table('1d20', random_tables.chargen_tables['alignment']), 'neutrality')
self.assertEqual(self.roll_engine.roll_random_table('1d20', random_tables.chargen_tables['helmets and shields']), 'no helmet or shield')
mock_randint.return_value = 25
self.assertEqual(self.roll_engine.roll_random_table('1d20', random_tables.chargen_tables['helmets and shields']), 'helmet and shield')
mock_randint.return_value = (- 10)
self.assertEqual(self.roll_engine.roll_random_table('1d20', random_tables.chargen_tables['helmets and shields']), 'no helmet or shield')
('evennia.contrib.tutorials.evadventure.rules.randint')
def test_morale_check(self, mock_randint):
defender = MagicMock()
defender.morale = 12
mock_randint.return_value = 7
self.assertEqual(self.roll_engine.morale_check(defender), False)
mock_randint.return_value = 3
self.assertEqual(self.roll_engine.morale_check(defender), True)
('evennia.contrib.tutorials.evadventure.rules.randint')
def test_heal_from_rest(self, mock_randint):
character = MagicMock()
character.heal = MagicMock()
character.hp_max = 8
character.hp = 1
character.constitution = 1
mock_randint.return_value = 5
self.roll_engine.heal_from_rest(character)
mock_randint.assert_called_with(1, 8)
character.heal.assert_called_with(6)
('evennia.contrib.tutorials.evadventure.rules.randint')
def test_roll_death(self, mock_randint):
character = MagicMock()
character.strength = 13
character.hp = 0
character.hp_max = 8
mock_randint.return_value = 1
self.roll_engine.roll_death(character)
character.at_death.assert_called()
mock_randint.return_value = 3
self.roll_engine.roll_death(character)
self.assertEqual(character.strength, 10) |
class Comment(BaseObject):
def __init__(self, api=None, author_id=None, body=None, created_at=None, html_url=None, id=None, locale=None, source_id=None, source_type=None, updated_at=None, url=None, vote_count=None, vote_sum=None, **kwargs):
self.api = api
self.author_id = author_id
self.body = body
self.created_at = created_at
self.html_url = html_url
self.id = id
self.locale = locale
self.source_id = source_id
self.source_type = source_type
self.updated_at = updated_at
self.url = url
self.vote_count = vote_count
self.vote_sum = vote_sum
for (key, value) in kwargs.items():
setattr(self, key, value)
for key in self.to_dict():
if (getattr(self, key) is None):
try:
self._dirty_attributes.remove(key)
except KeyError:
continue
def author(self):
if (self.api and self.author_id):
return self.api._get_user(self.author_id)
def author(self, author):
if author:
self.author_id = author.id
self._author = author
def created(self):
if self.created_at:
return dateutil.parser.parse(self.created_at)
def created(self, created):
if created:
self.created_at = created
def updated(self):
if self.updated_at:
return dateutil.parser.parse(self.updated_at)
def updated(self, updated):
if updated:
self.updated_at = updated |
def be_distance(t1, t2, support, attr1, attr2):
def _get_leaves_paths(t, attr, support):
leaves = list(t.leaves())
leave_branches = set()
for n in leaves:
if n.is_root:
continue
movingnode = n
length = 0
while (not movingnode.is_root):
if support:
length += (movingnode.dist * movingnode.support)
else:
length += movingnode.dist
movingnode = movingnode.up
leave_branches.add((n.props[attr], length))
return leave_branches
def _get_distances(leaf_distances1, leaf_distances2):
unique_leaves1 = (leaf_distances1 - leaf_distances2)
unique_leaves2 = (leaf_distances2 - leaf_distances1)
return abs((sum([leaf[1] for leaf in unique_leaves1]) - sum([leaf[1] for leaf in unique_leaves2])))
return _get_distances(_get_leaves_paths(t1, attr1, support), _get_leaves_paths(t2, attr2, support)) |
class TestOFPQueuePropMinRate(unittest.TestCase):
rate = {'buf': b'\x00\x01', 'val': ofproto.OFPQT_MIN_RATE}
len = {'buf': b'\x00\x10', 'val': ofproto.OFP_QUEUE_PROP_MIN_RATE_SIZE}
zfill = (b'\x00' * 6)
buf = (rate['buf'] + zfill)
c = OFPQueuePropMinRate(rate['val'])
def setUp(self):
pass
def tearDown(self):
pass
def test_init(self):
cls = OFPQueuePropHeader._QUEUE_PROPERTIES[self.c.cls_prop_type]
eq_(self.rate['val'], self.c.cls_prop_type)
eq_(self.rate['val'], self.c.rate)
eq_(self.rate['val'], cls.cls_prop_type)
eq_(self.len['val'], self.c.cls_prop_len)
eq_(self.len['val'], cls.cls_prop_len)
def test_parser(self):
res = self.c.parser(self.buf, 0)
eq_(self.rate['val'], res.rate) |
class ThreadedCamera():
def __init__(self, api_key, host, port):
self.active = True
self.results = []
self.capture = cv2.VideoCapture(0)
self.capture.set(cv2.CAP_PROP_BUFFERSIZE, 2)
compre_face: CompreFace = CompreFace(host, port, {'limit': 0, 'det_prob_threshold': 0.8, 'prediction_count': 1, 'face_plugins': 'age,gender', 'status': False})
self.recognition: RecognitionService = compre_face.init_face_recognition(api_key)
self.FPS = (1 / 30)
self.thread = Thread(target=self.show_frame, args=())
self.thread.daemon = True
self.thread.start()
def show_frame(self):
print('Started')
while self.capture.isOpened():
(status, frame_raw) = self.capture.read()
self.frame = cv2.flip(frame_raw, 1)
if self.results:
results = self.results
for result in results:
box = result.get('box')
age = result.get('age')
gender = result.get('gender')
mask = result.get('mask')
subjects = result.get('subjects')
if box:
cv2.rectangle(img=self.frame, pt1=(box['x_min'], box['y_min']), pt2=(box['x_max'], box['y_max']), color=(0, 255, 0), thickness=1)
if age:
age = f"Age: {age['low']} - {age['high']}"
cv2.putText(self.frame, age, (box['x_max'], (box['y_min'] + 15)), cv2.FONT_HERSHEY_SIMPLEX, 0.6, (0, 255, 0), 1)
if gender:
gender = f"Gender: {gender['value']}"
cv2.putText(self.frame, gender, (box['x_max'], (box['y_min'] + 35)), cv2.FONT_HERSHEY_SIMPLEX, 0.6, (0, 255, 0), 1)
if mask:
mask = f"Mask: {mask['value']}"
cv2.putText(self.frame, mask, (box['x_max'], (box['y_min'] + 55)), cv2.FONT_HERSHEY_SIMPLEX, 0.6, (0, 255, 0), 1)
if subjects:
subjects = sorted(subjects, key=(lambda k: k['similarity']), reverse=True)
subject = f"Subject: {subjects[0]['subject']}"
similarity = f"Similarity: {subjects[0]['similarity']}"
cv2.putText(self.frame, subject, (box['x_max'], (box['y_min'] + 75)), cv2.FONT_HERSHEY_SIMPLEX, 0.6, (0, 255, 0), 1)
cv2.putText(self.frame, similarity, (box['x_max'], (box['y_min'] + 95)), cv2.FONT_HERSHEY_SIMPLEX, 0.6, (0, 255, 0), 1)
else:
subject = f'No known faces'
cv2.putText(self.frame, subject, (box['x_max'], (box['y_min'] + 75)), cv2.FONT_HERSHEY_SIMPLEX, 0.6, (0, 255, 0), 1)
cv2.imshow('CompreFace demo', self.frame)
time.sleep(self.FPS)
if ((cv2.waitKey(1) & 255) == 27):
self.capture.release()
cv2.destroyAllWindows()
self.active = False
def is_active(self):
return self.active
def update(self):
if (not hasattr(self, 'frame')):
return
(_, im_buf_arr) = cv2.imencode('.jpg', self.frame)
byte_im = im_buf_arr.tobytes()
data = self.recognition.recognize(byte_im)
self.results = data.get('result') |
class AS4C128M16(DDR3Module):
nbanks = 8
nrows = 16384
ncols = 1024
technology_timings = _TechnologyTimings(tREFI=(.0 / 8192), tWTR=(4, 7.5), tCCD=(4, None), tRRD=(4, 6), tZQCS=(64, 80))
speedgrade_timings = {'1600': _SpeedgradeTimings(tRP=13.75, tRCD=13.75, tWR=13.75, tRFC=(160, None), tFAW=(None, 40), tRAS=35)}
speedgrade_timings['default'] = speedgrade_timings['1600'] |
def test_complex(create_very_broken_file, tmpdir):
path = os.path.join(str(tmpdir), 'complex.dlis')
create_very_broken_file(path)
errorhandler = ErrorHandler()
with pytest.raises(RuntimeError):
with dlis.load(path, error_handler=errorhandler) as (f, *_):
pass
errorhandler.critical = Actions.LOG_ERROR
with dlis.load(path, error_handler=errorhandler) as (f, *_):
f.cache_metadata(False)
errorhandler.critical = Actions.RAISE
with pytest.raises(RuntimeError) as excinfo:
_ = f.object('VERY_MUCH_TESTY_SET', 'OBJECT', 1, 1)
assert ('object set' in str(excinfo.value))
errorhandler.critical = Actions.LOG_ERROR
obj = f.object('VERY_MUCH_TESTY_SET', 'OBJECT', 1, 1)
errorhandler.critical = Actions.RAISE
with pytest.raises(RuntimeError) as excinfo:
_ = f.object('VERY_MUCH_TESTY_SET', 'OBJECT', 1, 1)
assert ('object set' in str(excinfo.value))
errorhandler.critical = Actions.RAISE
with pytest.raises(RuntimeError):
_ = obj['INVALID']
errorhandler.critical = Actions.LOG_ERROR
_ = obj['INVALID'] |
def recon_handler(user_name=None, email=None):
if user_name:
startTime = time.time()
ghuser = github_recon(user_name)
print('git', (startTime - time.time()))
startTime = time.time()
twit = twitter_recon(user_name)
print('twit', (startTime - time.time()))
startTime = time.time()
yout = youtube_recon(user_name)
print('you', (startTime - time.time()))
startTime = time.time()
imgur = imgur_recon(user_name)
print('imgur', (startTime - time.time()))
startTime = time.time()
wiki = wikipedia_recon(user_name)
print('wiki', (startTime - time.time()))
startTime = time.time()
steam = steam_recon(user_name)
print('steam', (startTime - time.time()))
startTime = time.time()
lleak = liveleak_recon(user_name)
print('lleak', (startTime - time.time()))
startTime = time.time()
p_bucket = photobucket_recon(user_name)
print('pbucket', (startTime - time.time()))
startTime = time.time()
flickr = flickr_recon(user_name)
print('flkr', (startTime - time.time()))
startTime = time.time()
hacker = hacker_recon(user_name)
print('hacknews', (startTime - time.time()))
startTime = time.time()
reddit = reddit_recon(user_name)
print('reddit', (startTime - time.time()))
startTime = time.time()
else:
ghuser = twit = yout = imgur = wiki = lleak = steam = p_bucket = flickr = hacker = reddit = None
if email:
pwned = pwned_recon(email)
print('pwnd', (startTime - time.time()))
startTime = time.time()
facebook = facebook_recon(email)
print('facebook', (startTime - time.time()))
startTime = time.time()
hacked_emails = hacked_email_recon(email)
print('hackmail', (startTime - time.time()))
startTime = time.time()
else:
pwned = facebook = hacked_emails = None
return {'facebook': facebook, 'twit': twit, 'yout': yout, 'lleak': lleak, 'ghuser': ghuser, 'reddit': reddit, 'steam': steam, 'imgur': imgur, 'p_bucket': p_bucket, 'flickr': flickr, 'hacker': hacker, 'wiki': wiki, 'pwned': pwned, 'hacked_emails': hacked_emails} |
class MemoryAnalysisTestCase(unittest.TestCase):
memory_analyzer: MemoryAnalysis
def setUpClass(cls) -> None:
memory_events_path: str = 'tests/data/memory_analysis/memory_timeline.raw.gz'
cls.memory_analyzer = MemoryAnalysis(path=memory_events_path)
def test_process_raw_events(self):
(times, sizes) = self.memory_analyzer._process_raw_events()
assert (len(times) == len(sizes))
assert (len(sizes[0]) == 8)
assert (sizes[744] == [.0, .0, .0, 0.0, .0, .0, .0, .0]) |
def get_activation_context(editor: sublime.View, pos: int) -> Config:
if editor.match_selector(pos, 'meta.attribute-with-value.style string'):
return create_activation_context(editor, pos, {'name': CSSAbbreviationScope.Property}, True)
syntax_name = syntax.from_pos(editor, pos)
if syntax.is_css(syntax_name):
ctx = get_css_context(editor, pos)
if ctx:
result = create_activation_context(editor, pos, ctx)
if editor.match_selector(pos, 'meta.at-rule.media meta.group | meta.at-rule.supports meta.group'):
result.options['stylesheet.after'] = ''
return result
return None
if syntax.is_html(syntax_name):
ctx = get_html_context(editor, pos)
if (syntax.is_jsx(syntax_name) and (ctx is None)):
return create_activation_context(editor, pos)
return (create_activation_context(editor, pos, ctx) if (ctx is not None) else None)
return create_activation_context(editor, pos) |
class CubicGlyfTest():
def test_cubic_simple(self):
spen = TTGlyphPen(None)
spen.moveTo((0, 0))
spen.curveTo((0, 1), (1, 1), (1, 0))
spen.closePath()
ppen = TTGlyphPointPen(None)
ppen.beginPath()
ppen.addPoint((0, 0), 'line')
ppen.addPoint((0, 1))
ppen.addPoint((1, 1))
ppen.addPoint((1, 0), 'curve')
ppen.endPath()
for pen in (spen, ppen):
glyph = pen.glyph()
for i in range(2):
if (i == 1):
glyph.compile(None)
assert (list(glyph.coordinates) == [(0, 0), (0, 1), (1, 1), (1, 0)])
assert (list(glyph.flags) == [1, 128, 128, 1])
rpen = RecordingPen()
glyph.draw(rpen, None)
assert (rpen.value == [('moveTo', ((0, 0),)), ('curveTo', ((0, 1), (1, 1), (1, 0))), ('closePath', ())])
.parametrize('dropImpliedOnCurves, segment_pen_commands, point_pen_commands, expected_coordinates, expected_flags, expected_endPts', [(True, [('moveTo', ((0, 0),)), ('curveTo', ((0, 1), (1, 2), (2, 2))), ('curveTo', ((3, 3), (4, 1), (4, 0))), ('closePath', ())], [('beginPath', (), {}), ('addPoint', ((0, 0), 'line', None, None), {}), ('addPoint', ((0, 1), None, None, None), {}), ('addPoint', ((1, 2), None, None, None), {}), ('addPoint', ((2, 2), 'curve', None, None), {}), ('addPoint', ((3, 3), None, None, None), {}), ('addPoint', ((4, 1), None, None, None), {}), ('addPoint', ((4, 0), 'curve', None, None), {}), ('endPath', (), {})], [(0, 0), (0, 1), (1, 2), (2, 2), (3, 3), (4, 1), (4, 0)], [1, 128, 128, 1, 128, 128, 1], [6]), (True, [('moveTo', ((0, 0),)), ('curveTo', ((0, 1), (1, 2), (2, 2))), ('curveTo', ((3, 2), (4, 1), (4, 0))), ('closePath', ())], [('beginPath', (), {}), ('addPoint', ((0, 0), 'line', None, None), {}), ('addPoint', ((0, 1), None, None, None), {}), ('addPoint', ((1, 2), None, None, None), {}), ('addPoint', ((2, 2), 'curve', None, None), {}), ('addPoint', ((3, 2), None, None, None), {}), ('addPoint', ((4, 1), None, None, None), {}), ('addPoint', ((4, 0), 'curve', None, None), {}), ('endPath', (), {})], [(0, 0), (0, 1), (1, 2), (3, 2), (4, 1), (4, 0)], [1, 128, 128, 128, 128, 1], [5]), (False, [('moveTo', ((0, 0),)), ('curveTo', ((0, 1), (1, 2), (2, 2))), ('curveTo', ((3, 2), (4, 1), (4, 0))), ('closePath', ())], [('beginPath', (), {}), ('addPoint', ((0, 0), 'line', None, None), {}), ('addPoint', ((0, 1), None, None, None), {}), ('addPoint', ((1, 2), None, None, None), {}), ('addPoint', ((2, 2), 'curve', None, None), {}), ('addPoint', ((3, 2), None, None, None), {}), ('addPoint', ((4, 1), None, None, None), {}), ('addPoint', ((4, 0), 'curve', None, None), {}), ('endPath', (), {})], [(0, 0), (0, 1), (1, 2), (2, 2), (3, 2), (4, 1), (4, 0)], [1, 128, 128, 1, 128, 128, 1], [6]), (True, [('moveTo', ((0, 0),)), ('curveTo', ((0, 1), (1, 2), (2, 2))), ('curveTo', ((3, 2), (4, 1), (4, 0))), ('closePath', ()), ('moveTo', ((0, 0),)), ('curveTo', ((0, 1), (1, 2), (2, 2))), ('curveTo', ((3, 2), (4, 1), (4, 0))), ('closePath', ())], [('beginPath', (), {}), ('addPoint', ((0, 0), 'line', None, None), {}), ('addPoint', ((0, 1), None, None, None), {}), ('addPoint', ((1, 2), None, None, None), {}), ('addPoint', ((2, 2), 'curve', None, None), {}), ('addPoint', ((3, 2), None, None, None), {}), ('addPoint', ((4, 1), None, None, None), {}), ('addPoint', ((4, 0), 'curve', None, None), {}), ('endPath', (), {}), ('beginPath', (), {}), ('addPoint', ((0, 0), 'line', None, None), {}), ('addPoint', ((0, 1), None, None, None), {}), ('addPoint', ((1, 2), None, None, None), {}), ('addPoint', ((2, 2), 'curve', None, None), {}), ('addPoint', ((3, 2), None, None, None), {}), ('addPoint', ((4, 1), None, None, None), {}), ('addPoint', ((4, 0), 'curve', None, None), {}), ('endPath', (), {})], [(0, 0), (0, 1), (1, 2), (3, 2), (4, 1), (4, 0), (0, 0), (0, 1), (1, 2), (3, 2), (4, 1), (4, 0)], [1, 128, 128, 128, 128, 1, 1, 128, 128, 128, 128, 1], [5, 11])])
def test_cubic_topology(self, dropImpliedOnCurves, segment_pen_commands, point_pen_commands, expected_coordinates, expected_flags, expected_endPts):
spen = TTGlyphPen(None)
rpen = RecordingPen()
rpen.value = segment_pen_commands
rpen.replay(spen)
ppen = TTGlyphPointPen(None)
rpen = RecordingPointPen()
rpen.value = point_pen_commands
rpen.replay(ppen)
for pen in (spen, ppen):
glyph = pen.glyph(dropImpliedOnCurves=dropImpliedOnCurves)
assert (list(glyph.coordinates) == expected_coordinates)
assert (list(glyph.flags) == expected_flags)
assert (list(glyph.endPtsOfContours) == expected_endPts)
rpen = RecordingPen()
glyph.draw(rpen, None)
assert (rpen.value == segment_pen_commands) |
class Measurement(BasicObject):
attributes = {'PHASE': utils.scalar, 'MEASUREMENT-SOURCE': utils.scalar, 'TYPE': utils.scalar, 'DIMENSION': utils.reverse, 'AXIS': utils.reverse, 'MEASUREMENT': utils.vector, 'SAMPLE-COUNT': utils.scalar, 'MAXIMUM-DEVIATION': utils.vector, 'STANDARD-DEVIATION': utils.vector, 'BEGIN-TIME': utils.scalar, 'DURATION': utils.scalar, 'REFERENCE': utils.vector, 'STANDARD': utils.vector, 'PLUS-TOLERANCE': utils.vector, 'MINUS-TOLERANCE': utils.vector}
linkage = {'AXIS': utils.obname('AXIS'), 'MEASUREMENT-SOURCE': utils.objref}
def __init__(self, attic, lf):
super().__init__(attic, lf=lf)
def phase(self):
return self['PHASE']
def source(self):
return self['MEASUREMENT-SOURCE']
def mtype(self):
return self['TYPE']
def dimension(self):
return self['DIMENSION']
def axis(self):
return self['AXIS']
def samplecount(self):
return self['SAMPLE-COUNT']
def begin_time(self):
return self['BEGIN-TIME']
def duration(self):
return self['DURATION']
def standard(self):
return self['STANDARD']
def samples(self):
try:
samples = self.attic['MEASUREMENT'].value
except KeyError:
return np.empty(0)
shape = utils.validshape(samples, self.dimension)
return utils.sampling(samples, shape)
def max_deviation(self):
try:
dev = self.attic['MAXIMUM-DEVIATION'].value
except KeyError:
return np.empty(0)
shape = utils.validshape(dev, self.dimension)
return utils.sampling(dev, shape, single=True)
def std_deviation(self):
try:
dev = self.attic['STANDARD-DEVIATION'].value
except KeyError:
return np.empty(0)
shape = utils.validshape(dev, self.dimension)
return utils.sampling(dev, shape, single=True)
def reference(self):
try:
ref = self.attic['REFERENCE'].value
except KeyError:
return np.empty(0)
shape = utils.validshape(ref, self.dimension)
return utils.sampling(ref, shape, single=True)
def plus_tolerance(self):
try:
tolerance = self.attic['PLUS-TOLERANCE'].value
except KeyError:
return np.empty(0)
shape = utils.validshape(tolerance, self.dimension)
return utils.sampling(tolerance, shape, single=True)
def minus_tolerance(self):
try:
tolerance = self.attic['MINUS-TOLERANCE'].value
except KeyError:
return np.empty(0)
shape = utils.validshape(tolerance, self.dimension)
return utils.sampling(tolerance, shape, single=True)
def describe_attr(self, buf, width, indent, exclude):
d = OrderedDict()
d['Type of measurement'] = 'TYPE'
d['Calibration standard'] = 'STANDARD'
d['Phase in job sequence'] = 'PHASE'
d['Start time of acquisition'] = 'BEGIN-TIME'
d['Duration time'] = 'DURATION'
d['Data source'] = 'MEASUREMENT-SOURCE'
utils.describe_header(buf, 'Metadata', width, indent, lvl=2)
utils.describe_attributes(buf, d, self, width, indent, exclude)
d = OrderedDict()
d['Dimensions'] = 'DIMENSION'
d['Axis labels'] = 'AXIS'
try:
samplecount = len(self.samples)
except ValueError:
samplecount = 0
d['Number of values'] = samplecount
samples = 'Samples used to compute std/max-dev'
d[samples] = 'SAMPLE-COUNT'
if exclude['empty']:
d = utils.remove_empties(d)
if d:
utils.describe_header(buf, 'Samples', width, indent, lvl=2)
utils.describe_attributes(buf, d, self, width, indent, exclude)
d = OrderedDict()
d['Reference'] = 'REFERENCE'
d['Minus Tolerance'] = 'MINUS-TOLERANCE'
d['Plus Tolerance'] = 'PLUS-TOLERANCE'
d['Std deviation'] = 'STANDARD-DEVIATION'
d['Max deviation'] = 'MAXIMUM-DEVIATION'
utils.describe_sampled_attrs(buf, self.attic, self.dimension, 'MEASUREMENT', d, width, indent, exclude) |
_production
class Term(ASTNode):
implicit_pushdown = inherited(implicit_pushdown=True)
depth = inherited()
index = inherited()
index2 = synthesized()
value = synthesized()
type = synthesized()
subtree_depth = synthesized()
string = synthesized()
summary = synthesized()
def summary(self):
return ('%s, %s' % (self.value, self.type))
def index2(self):
if (self.index is None):
return None
return (self.index * 2)
def rule_index(self) -> (Term.index All):
return None
def rule_depth(self) -> (Term.depth All):
return (self.depth + 1) |
def merge_subsets(a: Dict[(str, Any)], b: Dict[(str, Any)]) -> None:
for key in b:
if (key not in a):
a[key] = b[key]
elif (('fields' in a[key]) and ('fields' in b[key])):
if (b[key]['fields'] == '*'):
a[key]['fields'] = '*'
elif (isinstance(a[key]['fields'], dict) and isinstance(b[key]['fields'], dict)):
merge_subsets(a[key]['fields'], b[key]['fields'])
elif (('fields' in a[key]) or ('fields' in b[key])):
raise ValueError("Subsets unmergeable: 'fields' found in key '{}' in only one subset".format(key))
if (a[key].get('enabled', True) or b[key].get('enabled', True)):
a[key].pop('enabled', None)
if (a[key].get('index', True) or b[key].get('index', True)):
a[key].pop('index', None) |
def test_export_incompatible_runtime_config(kubeflow_pipelines_runtime_instance, airflow_runtime_instance):
runner = CliRunner()
pipeline_file = 'kubeflow_pipelines.pipeline'
p = (((Path(__file__).parent / 'resources') / 'pipelines') / f'{pipeline_file}')
assert p.is_file()
result = runner.invoke(pipeline, ['export', str(p), '--runtime-config', airflow_runtime_instance])
assert (result.exit_code != 0), result.output
assert ("The runtime configuration type 'APACHE_AIRFLOW' does not match the pipeline's runtime type 'KUBEFLOW_PIPELINES'." in result.output)
pipeline_file = 'airflow.pipeline'
p = (((Path(__file__).parent / 'resources') / 'pipelines') / f'{pipeline_file}')
assert p.is_file()
result = runner.invoke(pipeline, ['export', str(p), '--runtime-config', kubeflow_pipelines_runtime_instance])
assert (result.exit_code != 0), result.output
assert ("The runtime configuration type 'KUBEFLOW_PIPELINES' does not match the pipeline's runtime type 'APACHE_AIRFLOW'." in result.output) |
class ShutterReleaseLever():
def __init__(self, exposure_control_system=None):
self.exposure_control_system = exposure_control_system
def depress(self):
if (not self.exposure_control_system):
return
self.exposure_control_system.exposure_level_lever.activate()
self.exposure_control_system.read_meter()
if self.exposure_control_system.shutter_lock_lever.blocks:
self.exposure_control_system.exposure_level_lever.deactivate()
print('Shutter release blocked')
return
if (self.exposure_control_system.mode == 'Shutter priority'):
aperture = self.exposure_control_system.aperture_set_lever.aperture
if self.exposure_control_system.shutter.cocked:
self.exposure_control_system.iris.aperture = aperture
elif (aperture > self.exposure_control_system.iris.aperture):
self.exposure_control_system.iris.aperture = aperture
print(f'Applying aperture value /{self.exposure_control_system.aperture_set_lever.aperture:.2g} to iris')
self.exposure_control_system.shutter.trip()
self.exposure_control_system.exposure_level_lever.deactivate() |
()
def flask_app():
app = Flask(__name__)
('/an-error/', methods=['GET', 'POST'])
def an_error():
raise ValueError('hello world')
('/users/', methods=['GET', 'POST'])
def users():
response = make_response(render_template('users.html', users=['Ron', 'Rasmus']))
response.headers.add('foo', 'bar')
response.headers.add('foo', 'baz')
response.headers.add('bar', 'bazzinga')
return response
('/non-standard-status/', methods=['GET', 'POST'])
def non_standard_status():
return ('foo', 'fail')
('/streaming/', methods=['GET'])
def streaming():
def generator():
for i in range(5):
with elasticapm.capture_span('generator'):
time.sleep(0.01)
(yield str(i))
return Response(generator(), mimetype='text/plain')
('/transaction-name/', methods=['GET'])
def transaction_name():
elasticapm.set_transaction_name('foo')
elasticapm.set_transaction_result('okydoky')
return Response('')
return app |
def naics_data(db):
baker.make(NAICS, code='212113', description='Anthracite Mining')
baker.make(NAICS, code='212112', description='Bituminous Coal Underground Mining')
baker.make(NAICS, code='213111', description='Drilling Oil and Gas Wells')
baker.make(NAICS, code='111331', description='Apple Orchards') |
class BasePlaylistPanelMixin(GObject.GObject):
_gsignals_ = {'playlist-selected': (GObject.SignalFlags.RUN_LAST, None, (object,)), 'tracks-selected': (GObject.SignalFlags.RUN_LAST, None, (object,)), 'append-items': (GObject.SignalFlags.RUN_LAST, None, (object, bool)), 'replace-items': (GObject.SignalFlags.RUN_LAST, None, (object,)), 'queue-items': (GObject.SignalFlags.RUN_LAST, None, (object,))}
playlist_nodes: Dict[(Playlist, Gtk.TreeIter)]
deletion_dialogs: Dict[(Union[(Playlist, SmartPlaylist)], Gtk.Dialog)]
def __init__(self):
GObject.GObject.__init__(self)
self.playlist_nodes = {}
self.track_image = icons.MANAGER.pixbuf_from_icon_name('audio-x-generic', Gtk.IconSize.SMALL_TOOLBAR)
self.deletion_dialogs = {}
def remove_playlist(self, ignored=None):
selected_playlist = self.tree.get_selected_page(raw=True)
if (selected_playlist is None):
return
dialog = self.deletion_dialogs.get(selected_playlist)
if dialog:
dialog.present()
return
def on_response(dialog, response):
if (response == Gtk.ResponseType.YES):
if isinstance(selected_playlist, SmartPlaylist):
self.smart_manager.remove_playlist(selected_playlist.name)
else:
self.playlist_manager.remove_playlist(selected_playlist.name)
del self.playlist_nodes[selected_playlist]
selection = self.tree.get_selection()
(model, iter) = selection.get_selected()
self.model.remove(iter)
del self.deletion_dialogs[selected_playlist]
dialog.destroy()
dialog = Gtk.MessageDialog(buttons=Gtk.ButtonsType.YES_NO, message_type=Gtk.MessageType.QUESTION, text=(_('Delete the playlist "%s"?') % selected_playlist.name), transient_for=self.parent)
dialog.connect('response', on_response)
self.deletion_dialogs[selected_playlist] = dialog
dialog.present()
def rename_playlist(self, playlist):
if (playlist is None):
return
dialog = dialogs.TextEntryDialog(_('Enter the new name you want for your playlist'), _('Rename Playlist'), playlist.name, parent=self.parent)
result = dialog.run()
name = dialog.get_value()
dialog.destroy()
if ((result != Gtk.ResponseType.OK) or (name == '')):
return
if (name in self.playlist_manager.playlists):
dialogs.error(self.parent, _('The playlist name you entered is already in use.'))
return
selection = self.tree.get_selection()
(model, iter) = selection.get_selected()
model.set_value(iter, 1, name)
self.playlist_manager.rename_playlist(playlist, name)
def open_selected_playlist(self):
selection = self.tree.get_selection()
(model, iter) = selection.get_selected()
self.open_item(self.tree, model.get_path(iter), None)
def on_rating_changed(self, widget, rating):
tracks = self.get_selected_tracks()
for track in tracks:
track.set_rating(rating)
maximum = settings.get_option('rating/maximum', 5)
event.log_event('rating_changed', self, ((100 * rating) / maximum))
def open_item(self, tree, path, col):
iter = self.model.get_iter(path)
item = self.model.get_value(iter, 2)
if (item is not None):
if isinstance(item, (Playlist, SmartPlaylist)):
if hasattr(item, 'get_playlist'):
try:
item = item.get_playlist(self.collection)
except Exception as e:
logger.exception('Error loading smart playlist')
dialogs.error(self.parent, (_('Error loading smart playlist: %s') % str(e)))
return
else:
item = self.playlist_manager.get_playlist(item.name)
self.emit('playlist-selected', item)
else:
self.emit('append-items', [item.track], True)
def add_new_playlist(self, tracks=[], name=None):
if name:
if (name in self.playlist_manager.playlists):
name = dialogs.ask_for_playlist_name(self.get_panel().get_toplevel(), self.playlist_manager, name)
else:
if tracks:
artists = []
composers = []
albums = []
for track in tracks:
artist = track.get_tag_display('artist', artist_compilations=False)
if (artist is not None):
artists += [artist]
composer = track.get_tag_display('composer', artist_compilations=False)
if (composer is not None):
composers += composer
album = track.get_tag_display('album')
if (album is not None):
albums += album
artists = list(set(artists))[:3]
composers = list(set(composers))[:3]
albums = list(set(albums))[:3]
if (len(artists) > 0):
name = artists[0]
if (len(artists) > 2):
name = (_('%(first)s, %(second)s and others') % {'first': artists[0], 'second': artists[1]})
elif (len(artists) > 1):
name = (_('%(first)s and %(second)s') % {'first': artists[0], 'second': artists[1]})
elif (len(composers) > 0):
name = composers[0]
if (len(composers) > 2):
name = (_('%(first)s, %(second)s and others') % {'first': composers[0], 'second': composers[1]})
elif (len(composers) > 1):
name = (_('%(first)s and %(second)s') % {'first': composers[0], 'second': composers[1]})
elif (len(albums) > 0):
name = albums[0]
if (len(albums) > 2):
name = (_('%(first)s, %(second)s and others') % {'first': albums[0], 'second': albums[1]})
elif (len(albums) > 1):
name = (_('%(first)s and %(second)s') % {'first': albums[0], 'second': albums[1]})
else:
name = ''
name = dialogs.ask_for_playlist_name(self.get_panel().get_toplevel(), self.playlist_manager, name)
if (name is not None):
new_playlist = Playlist(name)
new_playlist.extend(tracks)
self.playlist_manager.save_playlist(new_playlist)
return name
def _load_playlist_nodes(self, playlist):
if (playlist not in self.playlist_nodes):
return
expanded = self.tree.row_expanded(self.model.get_path(self.playlist_nodes[playlist]))
self._clear_node(self.playlist_nodes[playlist])
parent = self.playlist_nodes[playlist]
for track in playlist:
if (not track):
continue
wrapper = TrackWrapper(track, playlist)
row = (self.track_image, str(wrapper), wrapper)
self.model.append(parent, row)
if expanded:
self.tree.expand_row(self.model.get_path(self.playlist_nodes[playlist]), False)
def remove_selected_track(self):
selection = self.tree.get_selection()
(model, iter) = selection.get_selected()
track = model.get_value(iter, 2)
if isinstance(track, TrackWrapper):
del track.playlist[track.playlist.index(track.track)]
self.model.remove(iter)
self.playlist_manager.save_playlist(track.playlist, overwrite=True) |
class SplineCV(BaseGridder):
def __init__(self, mindists=None, dampings=(1e-10, 1e-05, 0.1), force_coords=None, engine='auto', cv=None, client=None, delayed=False, scoring=None):
super().__init__()
self.dampings = dampings
if (mindists is None):
self.mindists = [0]
else:
self.mindists = mindists
warnings.warn('The mindists parameter of verde.SplineCV is no longer required and will be removed in Verde 2.0.0. Use the default value to obtain the future behavior.', FutureWarning, stacklevel=2)
self.force_coords = force_coords
self.engine = engine
self.cv = cv
self.client = client
self.delayed = delayed
self.scoring = scoring
if (engine != 'auto'):
warnings.warn("The 'engine' parameter of 'verde.SplineCV' is deprecated and will be removed in Verde 2.0.0. The faster and memory efficient numba engine will be the only option.", FutureWarning, stacklevel=2)
if (client is not None):
warnings.warn("The 'client' parameter of 'verde.SplineCV' is deprecated and will be removed in Verde 2.0.0. Use the 'delayed' parameter instead.", FutureWarning, stacklevel=2)
def fit(self, coordinates, data, weights=None):
parameter_sets = [dict(mindist=combo[0], damping=combo[1], engine=self.engine, force_coords=self.force_coords) for combo in itertools.product(self.mindists, self.dampings)]
if (self.client is not None):
scores = []
for params in parameter_sets:
spline = Spline(**params)
scores.append(self.client.submit(cross_val_score, spline, coordinates=coordinates, data=data, weights=weights, cv=self.cv))
scores = [np.mean(score.result()) for score in scores]
else:
scores = []
for params in parameter_sets:
spline = Spline(**params)
score = cross_val_score(spline, coordinates=coordinates, data=data, weights=weights, cv=self.cv, delayed=self.delayed, scoring=self.scoring)
scores.append(dispatch(np.mean, delayed=self.delayed)(score))
best = dispatch(np.argmax, delayed=self.delayed)(scores)
if self.delayed:
best = best.compute()
else:
scores = np.asarray(scores)
self.spline_ = Spline(**parameter_sets[best])
self.spline_.fit(coordinates, data, weights=weights)
self.scores_ = scores
return self
def force_(self):
return self.spline_.force_
def region_(self):
return self.spline_.region_
def damping_(self):
return self.spline_.damping
def mindist_(self):
return self.spline_.mindist
def force_coords_(self):
return self.spline_.force_coords_
def predict(self, coordinates):
check_is_fitted(self, ['spline_'])
return self.spline_.predict(coordinates) |
def _write_tf_record(tasks, output_file, reverse_class_mapping_dict):
writer = tf.python_io.TFRecordWriter(output_file)
counter = 0
for task in tasks:
if (task['answer'] == 'accept'):
tf_example = create_a_tf_example(task, reverse_class_mapping_dict)
writer.write(tf_example.SerializeToString())
counter += 1
else:
continue
writer.close()
log('Successfully written {} annotations as TFRecords'.format(counter))
return counter |
def lang_emoji(lang):
if (lang == 'en'):
emoji = ''
elif (lang == 'de'):
emoji = ''
elif (lang == 'es'):
emoji = ''
elif (lang == 'se'):
emoji = ''
elif (lang == 'no'):
emoji = ''
elif (lang == 'ru'):
emoji = ''
elif (lang == 'ua'):
emoji = ''
elif (lang == 'it'):
emoji = ''
elif (lang == 'nz'):
emoji = ''
elif (lang == 'nl'):
emoji = ''
elif (lang == 'mx'):
emoji = ''
elif (lang == 'pt'):
emoji = ''
elif (lang == 'br'):
emoji = ''
elif (lang == 'au'):
emoji = ''
elif (lang == 'ca'):
emoji = ''
elif (lang == 'cr'):
emoji = ''
elif (lang == 'dk'):
emoji = ''
elif (lang == 'ie'):
emoji = ''
elif (lang == 'is'):
emoji = ''
elif (lang == 'th'):
emoji = ''
elif (lang == 'fr'):
emoji = ''
elif (lang == 'gr'):
emoji = ''
elif (lang == 'pl'):
emoji = ''
elif (lang == 'fi'):
emoji = ''
elif (lang == 'hk'):
emoji = ''
elif (lang == 'ar'):
emoji = ''
elif (lang == 'tr'):
emoji = ''
elif (lang == 'kr'):
emoji = ''
elif (lang == 'jp'):
emoji = ''
elif (lang == 'cn'):
emoji = ''
elif (lang == 'in'):
emoji = ''
else:
emoji = lang
return emoji |
('thermoanalysis')
.parametrize('id_, dG_ref', ((24, 0.), (63, 0.), (84, 0.)))
def test_irc_h5(this_dir, id_, dG_ref):
h5 = (this_dir / f'irc_000.0{id_}.orca.h5')
geom = geom_from_hessian(h5)
thermo = geom.get_thermoanalysis()
print_thermoanalysis(thermo)
assert (thermo.dG == pytest.approx(dG_ref, abs=0.0025)) |
class AggregatedExceptions(Exception):
def __init__(self) -> None:
super(AggregatedExceptions, self).__init__()
self.exceptions: List[BaseException] = []
def append_exception(self, exception: BaseException) -> None:
if isinstance(exception, AggregatedExceptions):
self.exceptions.extend(exception.exceptions)
else:
self.exceptions.append(exception)
def catch(self) -> Iterator[None]:
try:
(yield)
except BaseException as exception:
self.append_exception(exception)
def __str__(self) -> str:
return ('{} failures.\n'.format(len(self.exceptions)) + '\n'.join((f'{type(e)}: {str(e)}' for e in self.exceptions)))
def raise_correct_exception(self) -> None:
if (not self.exceptions):
return
ex_types = {type(ex) for ex in self.exceptions}
if ((Skip in ex_types) or (unittest.SkipTest in ex_types)):
raise Skip()
elif (len(self.exceptions) == 1):
raise self.exceptions[0]
else:
raise self
if (len(self.exceptions) == 1):
raise self.exceptions[0]
else:
raise self |
class QCEngine(Calculator):
def __init__(self, program, model, keywords=None, connectivity=None, bond_order=1, **kwargs):
super().__init__(**kwargs)
self.program = program
self.model = model
if (keywords is None):
keywords = dict()
self.keywords = dict(keywords)
self.connectivity = connectivity
self.bond_order = int(bond_order)
def get_molecule(self, atoms, coords):
c3d = coords.reshape((- 1), 3)
mol_inp = {'symbols': atoms, 'geometry': c3d, 'molecular_charge': self.charge, 'molecular_multiplicity': self.mult}
if (self.program == 'openmm'):
if (self.connectivity is None):
self.log(f'No connectivity specified! Using hacky connectivity guess with bond-order={self.bond_order}')
connectivity = qcel.molutil.guess_connectivity(atoms, c3d, threshold=1.3)
self.connectivity = [(at1, at2, self.bond_order) for (at1, at2) in connectivity]
mol_inp['connectivity'] = self.connectivity
molecule = qcel.models.Molecule.from_data(mol_inp)
return molecule
def compute(self, molecule, driver):
inp = {'molecule': molecule, 'driver': driver, 'model': self.model, 'keywords': self.keywords}
result = qcng.compute(inp, program=self.program, return_dict=True)
self.calc_counter += 1
return result
def keep_stdout(self, res):
if ('stdout' in res):
with open(self.make_fn(f'qce_{self.program}_stdout'), 'w') as handle:
handle.write(res['stdout'])
def get_energy(self, atoms, coords, **prepare_kwargs):
mol = self.get_molecule(atoms, coords)
res = self.compute(mol, driver='energy')
self.keep_stdout(res)
results = {'energy': res['return_result']}
return results
def get_forces(self, atoms, coords, **prepare_kwargs):
mol = self.get_molecule(atoms, coords)
res = self.compute(mol, driver='gradient')
self.keep_stdout(res)
results = {'energy': res['properties']['return_energy'], 'forces': (- np.array(res['return_result']))}
return results
def get_hessian(self, atoms, coords, **prepare_kwargs):
mol = self.get_molecule(atoms, coords)
res = self.compute(mol, driver='hessian')
self.keep_stdout(res)
size = (3 * len(atoms))
shape = (size, size)
results = {'energy': res['properties']['return_energy'], 'hessian': np.array(res['return_result']).reshape(shape)}
return results
def __str__(self):
return f'QCECalculator({self.name})' |
_on_exception
class TestMain():
def test_should_fail_if_no_files_were_found(self, tmp_path: Path, sample_layout_document: SampleLayoutDocument, fulltext_models_mock: MockFullTextModels):
configure_fulltext_models_mock_with_sample_document(fulltext_models_mock, sample_layout_document)
output_path = (tmp_path / 'generated-data')
with pytest.raises(FileNotFoundError):
main([f'--source-path={NON_EXISTING_PDF_PATTERN}', f'--output-path={output_path}'])
assert (not output_path.exists())
def test_should_be_able_to_generate_segmentation_training_data(self, tmp_path: Path, sample_layout_document: SampleLayoutDocument, fulltext_models_mock: MockFullTextModels):
configure_fulltext_models_mock_with_sample_document(fulltext_models_mock, sample_layout_document)
output_path = (tmp_path / 'generated-data')
main([f'--source-path={MINIMAL_EXAMPLE_PDF_PATTERN}', f'--output-path={output_path}'])
assert output_path.exists()
xml_root = _check_tei_training_data_generator_output_and_return_xml_root(SegmentationTeiTrainingDataGenerator(), output_path=output_path, expect_raw_data=True, source_filename=MINIMAL_EXAMPLE_PDF)
assert get_text_content_list(xml_root.xpath('text'))
assert (not get_text_content_list(xml_root.xpath('text/front')))
xml_root = _check_tei_training_data_generator_output_and_return_xml_root(HeaderTeiTrainingDataGenerator(), output_path=output_path, expect_raw_data=True, source_filename=MINIMAL_EXAMPLE_PDF)
assert get_text_content_list(xml_root.xpath('text/front'))
def test_should_add_gz_suffix_if_enabled(self, tmp_path: Path, sample_layout_document: SampleLayoutDocument, fulltext_models_mock: MockFullTextModels):
configure_fulltext_models_mock_with_sample_document(fulltext_models_mock, sample_layout_document)
output_path = (tmp_path / 'generated-data')
main([f'--source-path={MINIMAL_EXAMPLE_PDF_PATTERN}', f'--output-path={output_path}', '--gzip'])
assert output_path.exists()
tei_training_data_generator = SegmentationTeiTrainingDataGenerator()
tei_filename_suffix = tei_training_data_generator.get_default_tei_filename_suffix()
assert tei_filename_suffix
expected_tei_path = _get_expected_file_path_with_suffix(output_path, MINIMAL_EXAMPLE_PDF, (tei_filename_suffix + '.gz'))
assert expected_tei_path.exists()
with gzip.open(expected_tei_path, 'r') as fp:
etree.parse(fp)
data_filename_suffix = tei_training_data_generator.get_default_data_filename_suffix()
assert data_filename_suffix
expected_data_path = _get_expected_file_path_with_suffix(output_path, MINIMAL_EXAMPLE_PDF, (data_filename_suffix + '.gz'))
assert expected_data_path.exists()
with gzip.open(expected_data_path, 'r') as fp:
fp.read()
def test_should_be_able_to_generate_segmentation_training_data_using_model(self, tmp_path: Path, sample_layout_document: SampleLayoutDocument, fulltext_models_mock: MockFullTextModels):
configure_fulltext_models_mock_with_sample_document(fulltext_models_mock, sample_layout_document)
output_path = (tmp_path / 'generated-data')
main([f'--source-path={MINIMAL_EXAMPLE_PDF_PATTERN}', f'--output-path={output_path}', '--use-model'])
assert output_path.exists()
xml_root = _check_tei_training_data_generator_output_and_return_xml_root(SegmentationTeiTrainingDataGenerator(), output_path=output_path, expect_raw_data=True, source_filename=MINIMAL_EXAMPLE_PDF)
assert get_text_content_list(xml_root.xpath('text/front'))
xml_root = _check_tei_training_data_generator_output_and_return_xml_root(HeaderTeiTrainingDataGenerator(), output_path=output_path, expect_raw_data=True, source_filename=MINIMAL_EXAMPLE_PDF)
assert get_text_content_list(xml_root.xpath('text/front'))
def test_should_allow_to_use_directory_structure(self, tmp_path: Path, sample_layout_document: SampleLayoutDocument, fulltext_models_mock: MockFullTextModels):
configure_fulltext_models_mock_with_sample_document(fulltext_models_mock, sample_layout_document)
output_path = (tmp_path / 'generated-data')
main(['--use-directory-structure', f'--source-path={MINIMAL_EXAMPLE_PDF_PATTERN}', f'--output-path={output_path}'])
assert output_path.exists()
expected_output_path_and_suffix_list = [((((output_path / 'segmentation') / 'corpus') / 'tei'), SegmentationTeiTrainingDataGenerator().get_default_tei_filename_suffix()), ((((output_path / 'segmentation') / 'corpus') / 'raw'), SegmentationTeiTrainingDataGenerator().get_default_data_filename_suffix()), ((((output_path / 'header') / 'corpus') / 'tei'), HeaderTeiTrainingDataGenerator().get_default_tei_filename_suffix()), ((((output_path / 'header') / 'corpus') / 'raw'), HeaderTeiTrainingDataGenerator().get_default_data_filename_suffix()), ((((output_path / 'fulltext') / 'corpus') / 'tei'), FullTextTeiTrainingDataGenerator().get_default_tei_filename_suffix()), ((((output_path / 'fulltext') / 'corpus') / 'raw'), FullTextTeiTrainingDataGenerator().get_default_data_filename_suffix()), ((((output_path / 'figure') / 'corpus') / 'tei'), FigureTeiTrainingDataGenerator().get_default_tei_filename_suffix()), ((((output_path / 'figure') / 'corpus') / 'raw'), FigureTeiTrainingDataGenerator().get_default_data_filename_suffix()), ((((output_path / 'table') / 'corpus') / 'tei'), TableTeiTrainingDataGenerator().get_default_tei_filename_suffix()), ((((output_path / 'table') / 'corpus') / 'raw'), TableTeiTrainingDataGenerator().get_default_data_filename_suffix()), ((((output_path / 'reference-segmenter') / 'corpus') / 'tei'), ReferenceSegmenterTeiTrainingDataGenerator().get_default_tei_filename_suffix()), ((((output_path / 'reference-segmenter') / 'corpus') / 'raw'), ReferenceSegmenterTeiTrainingDataGenerator().get_default_data_filename_suffix()), (((output_path / 'affiliation-address') / 'corpus'), AffiliationAddressTeiTrainingDataGenerator.DEFAULT_TEI_FILENAME_SUFFIX), (((output_path / 'citation') / 'corpus'), CitationTeiTrainingDataGenerator.DEFAULT_TEI_FILENAME_SUFFIX), ((((output_path / 'name') / 'header') / 'corpus'), ('.header' + NameTeiTrainingDataGenerator.DEFAULT_TEI_FILENAME_SUFFIX)), ((((output_path / 'name') / 'citation') / 'corpus'), ('.citations' + NameTeiTrainingDataGenerator.DEFAULT_TEI_FILENAME_SUFFIX))]
for (model_output_path, suffix) in expected_output_path_and_suffix_list:
file_path = _get_expected_file_path_with_suffix(model_output_path, MINIMAL_EXAMPLE_PDF, suffix)
assert file_path.exists() |
class ListenerFactory():
def load_all(cls, ir: 'IR', aconf: Config) -> None:
amod = ir.ambassador_module
listeners = aconf.get_config('listeners')
if listeners:
for config in listeners.values():
ir.logger.debug(('ListenerFactory: creating Listener for %s' % repr(config.as_dict())))
listener = IRListener(ir, aconf, **config)
if listener.is_active():
listener.referenced_by(config)
listener.sourced_by(config)
ir.logger.debug(f'ListenerFactory: saving Listener {listener}')
ir.save_listener(listener)
else:
ir.logger.debug(f'ListenerFactory: not saving inactive Listener {listener}')
def finalize(cls, ir: 'IR', aconf: Config) -> None:
for group in ir.ordered_groups():
if (not isinstance(group, IRTCPMappingGroup)):
continue
group_key = group.bind_to()
if (group_key not in ir.listeners):
group_host = group.get('host', None)
protocol = ('TLS' if group_host else 'TCP')
bind_address = (group.get('address') or Config.envoy_bind_address)
name = f'listener-{bind_address}-{group.port}'
ir.logger.debug(('ListenerFactory: synthesizing %s listener for TCPMappingGroup on %s:%d' % (protocol, bind_address, group.port)))
ir.save_listener(IRListener(ir, aconf, '-internal-', name, '-internal-', bind_address=bind_address, port=group.port, protocol=protocol, securityModel='SECURE', hostBinding={'namespace': {'from': 'SELF'}})) |
class OptionPlotoptionsColumnStatesHover(Options):
def animation(self) -> 'OptionPlotoptionsColumnStatesHoverAnimation':
return self._config_sub_data('animation', OptionPlotoptionsColumnStatesHoverAnimation)
def borderColor(self):
return self._config_get(None)
def borderColor(self, text: str):
self._config(text, js_type=False)
def brightness(self):
return self._config_get(0.1)
def brightness(self, num: float):
self._config(num, js_type=False)
def color(self):
return self._config_get(None)
def color(self, text: str):
self._config(text, js_type=False)
def enabled(self):
return self._config_get(True)
def enabled(self, flag: bool):
self._config(flag, js_type=False) |
def redox_result_to_qcdata(redox_result):
geom = redox_result.geom_gas
H = geom.eckart_projection(geom.mass_weigh_hessian(redox_result.hessian_gas))
(w, v) = np.linalg.eigh(H)
nus = eigval_to_wavenumber(w)
thermo_dict = {'masses': geom.masses, 'vibfreqs': nus, 'coords3d': geom.coords3d, 'energy': redox_result.energy_gas, 'mult': redox_result.mult}
qcd = QCData(thermo_dict)
return qcd |
def _map_privacy_request(privacy_request: PrivacyRequest) -> Dict[(str, Any)]:
request_data = {}
request_data['id'] = privacy_request.id
action_type: Optional[ActionType] = privacy_request.policy.get_action_type()
if action_type:
request_data['type'] = action_type.value
identity: Identity = privacy_request.get_persisted_identity()
if identity.email:
request_data['email'] = identity.email
if privacy_request.requested_at:
request_data['requested_at'] = privacy_request.requested_at.strftime('%m/%d/%Y %H:%M %Z')
return request_data |
class OptionSeriesVariwideLabelStyle(Options):
def fontSize(self):
return self._config_get('0.8em')
def fontSize(self, num: float):
self._config(num, js_type=False)
def fontWeight(self):
return self._config_get('bold')
def fontWeight(self, text: str):
self._config(text, js_type=False) |
class DockLayout(LayoutItem):
left = Union(Instance(PaneItem), Instance(Tabbed), Instance(Splitter))
right = Union(Instance(PaneItem), Instance(Tabbed), Instance(Splitter))
top = Union(Instance(PaneItem), Instance(Tabbed), Instance(Splitter))
bottom = Union(Instance(PaneItem), Instance(Tabbed), Instance(Splitter))
top_left_corner = Enum('top', 'left')
top_right_corner = Enum('top', 'right')
bottom_left_corner = Enum('bottom', 'left')
bottom_right_corner = Enum('bottom', 'right') |
def create_embed_relu_relu_softmax(depth, width, vector_length):
with Model.define_operators({'>>': chain}):
model = (strings2arrays() >> with_array(((((HashEmbed(width, vector_length, column=0) >> expand_window(window_size=1)) >> Relu(width, (width * 3))) >> Relu(width, width)) >> Softmax(17, width))))
return model |
def extractYuukouUs(item):
(vol, chp, frag, postfix) = extractVolChapterFragmentPostfix(item['title'])
if ((not (chp or vol)) or ('preview' in item['title'].lower())):
return None
tagmap = [('PRC', 'PRC', 'translated'), ('Loiterous', 'Loiterous', 'oel')]
for (tagname, name, tl_type) in tagmap:
if (tagname in item['tags']):
return buildReleaseMessageWithType(item, name, vol, chp, frag=frag, postfix=postfix, tl_type=tl_type)
return False |
def test_default_integer_argument():
integer = IntegerArgument()
validation_status = integer.validate('45')
assert validation_status
assert (validation_status.value() == '45')
assert (validation_status.message() == '')
validation_status = integer.validate('-45')
assert validation_status
assert (validation_status.value() == '-45')
validation_status = integer.validate('45 ')
assert (not validation_status)
assert (validation_status.message() != '')
assert (validation_status.value() is None)
validation_status = integer.validate('gx')
assert (not validation_status)
assert (validation_status.message() != '') |
()
def patch_module_device(monkeypatch, calibration_raw, capture_factory):
class ColorControl():
mode: int
value: int
class DeviceHandle():
def __init__(self, device_id: int):
self._meta: DeviceMeta = DEVICE_METAS[device_id]
self._opened = True
self._cameras_started = False
self._imu_started = False
self._color_controls: Mapping[(ColorControlCommand, ColorControl)] = self._default_color_controls()
def _default_color_controls(self) -> Mapping[(ColorControlCommand, ColorControl)]:
return {color_control['color_control_command']: ColorControl(mode=color_control['default_mode'], value=color_control['default_value']) for color_control in self._meta.color_controls}
def close(self) -> int:
assert (self._opened is True)
self._opened = False
return Result.Success.value
def get_sync_jack(self) -> Tuple[(int, bool, bool)]:
assert (self._opened is True)
return (Result.Success.value, self._meta.jack_in, self._meta.jack_out)
def device_get_color_control(self, cmd: int) -> Tuple[(int, int, int)]:
assert (self._opened is True)
control = self._color_controls[ColorControlCommand(cmd)]
return (Result.Success.value, control.mode, control.value)
def device_set_color_control(self, cmd: int, mode: int, value: int):
assert (self._opened is True)
command = ColorControlCommand(cmd)
control = self._color_controls[command]
for color_control_meta in self._meta.color_controls:
if (color_control_meta['color_control_command'] == command):
control_meta: ColorControlCapabilities = color_control_meta
break
else:
raise ValueError(f'Unknown cmd: {cmd}')
if (ColorControlMode(mode) == ColorControlMode.AUTO):
if (not control_meta['supports_auto']):
return Result.Failed.value
control.mode = mode
control.value = control_meta['default_value']
else:
if ((value < color_control_meta['min_value']) or (value > color_control_meta['max_value'])):
return Result.Failed.value
control.mode = mode
control.value = value
return Result.Success.value
def device_get_color_control_capabilities(self, cmd: int) -> Tuple[(int, ColorControlCapabilities)]:
assert (self._opened is True)
command = ColorControlCommand(cmd)
for color_control_meta in self._meta.color_controls:
if (color_control_meta['color_control_command'] == command):
control_meta: ColorControlCapabilities = color_control_meta
break
else:
raise ValueError(f'Unknown cmd: {cmd}')
return (Result.Success.value, control_meta)
def device_start_cameras(self) -> int:
assert (self._opened is True)
if self._cameras_started:
return Result.Failed.value
self._cameras_started = True
return Result.Success.value
def device_stop_cameras(self) -> int:
assert (self._opened is True)
if (not self._cameras_started):
return Result.Failed.value
self._cameras_started = False
return Result.Success.value
def device_start_imu(self) -> int:
assert (self._opened is True)
if (not self._cameras_started):
return Result.Failed.value
if self._imu_started:
return Result.Failed.value
self._imu_started = True
return Result.Success.value
def device_stop_imu(self) -> int:
assert (self._opened is True)
if (not self._imu_started):
return Result.Failed.value
self._imu_started = False
return Result.Success.value
def device_get_capture(self) -> Tuple[(int, Optional[object])]:
assert (self._opened is True)
if (not self._cameras_started):
return (Result.Failed.value, None)
return (Result.Success.value, capture_factory())
def device_get_imu_sample(self) -> Tuple[(int, Optional[Tuple[(float, Tuple[(float, float, float)], int, Tuple[(float, float, float)], int)]])]:
assert (self._opened is True)
if (not self._cameras_started):
return (Result.Failed.value, None)
return (Result.Success.value, (36.6, (0.1, 9.8, 0.005), int((time.time() * 1000000.0)), (0.1, 0.2, 0.3), int((time.time() * 1000000.0))))
def device_get_calibration(self, depth_mode: int, color_resolution: int) -> Tuple[(int, Optional[object])]:
assert (self._opened is True)
calibration = Calibration.from_raw(calibration_raw, DepthMode.NFOV_UNBINNED, ColorResolution.RES_720P)
return (Result.Success.value, calibration._calibration_handle)
def device_get_raw_calibration(self) -> Optional[str]:
assert (self._opened is True)
return '{}'
def device_get_serialnum(self) -> str:
assert (self._opened is True)
return self._meta.serial
def _device_open(device_id: int, thread_safe: bool) -> Tuple[(int, object)]:
if (device_id not in DEVICE_METAS):
return (Result.Failed.value, None)
capsule = DeviceHandle(device_id)
return (Result.Success.value, capsule)
def _device_close(capsule: DeviceHandle, thread_safe: bool) -> int:
capsule.close()
return Result.Success.value
def _device_get_sync_jack(capsule: DeviceHandle, thread_safe: bool) -> Tuple[(int, bool, bool)]:
return capsule.get_sync_jack()
def _device_get_color_control(capsule: DeviceHandle, thread_safe: bool, cmd: int) -> Tuple[(int, int, int)]:
return capsule.device_get_color_control(cmd)
def _device_set_color_control(capsule: DeviceHandle, thread_safe: bool, cmd: int, mode: int, value: int) -> int:
return capsule.device_set_color_control(cmd, mode, value)
def _device_get_color_control_capabilities(capsule: DeviceHandle, thread_safe: bool, cmd: int) -> Tuple[(int, ColorControlCapabilities)]:
return capsule.device_get_color_control_capabilities(cmd)
def _device_start_cameras(capsule: DeviceHandle, thread_safe: bool, color_format: int, color_resolution: int, dept_mode: int, camera_fps: int, synchronized_images_only: bool, depth_delay_off_color_usec: int, wired_sync_mode: int, subordinate_delay_off_master_usec: int, disable_streaming_indicator: bool) -> int:
return capsule.device_start_cameras()
def _device_stop_cameras(capsule: DeviceHandle, thread_safe: bool) -> int:
return capsule.device_stop_cameras()
def _device_start_imu(capsule: DeviceHandle, thread_safe: bool) -> int:
return capsule.device_start_imu()
def _device_stop_imu(capsule: DeviceHandle, thread_safe: bool) -> int:
return capsule.device_stop_imu()
def _device_get_capture(capsule: DeviceHandle, thread_safe: bool, timeout: int) -> Tuple[(int, Optional[object])]:
return capsule.device_get_capture()
def _device_get_imu_sample(capsule: DeviceHandle, thread_safe: bool, timeout: int) -> Tuple[(int, Optional[Tuple[(float, Tuple[(float, float, float)], int, Tuple[(float, float, float)], int)]])]:
return capsule.device_get_imu_sample()
def _device_get_calibration(capsule: DeviceHandle, thread_safe, depth_mode: int, color_resolution: int) -> Tuple[(int, Optional[object])]:
return capsule.device_get_calibration(depth_mode, color_resolution)
def _device_get_raw_calibration(capsule: DeviceHandle, thread_safe) -> Optional[str]:
return capsule.device_get_raw_calibration()
def _device_get_installed_count() -> int:
return 1
def _device_get_serialnum(capsule: DeviceHandle, thread_safe) -> Optional[str]:
return capsule.device_get_serialnum()
monkeypatch.setattr('k4a_module.device_open', _device_open)
monkeypatch.setattr('k4a_module.device_close', _device_close)
monkeypatch.setattr('k4a_module.device_get_sync_jack', _device_get_sync_jack)
monkeypatch.setattr('k4a_module.device_get_color_control', _device_get_color_control)
monkeypatch.setattr('k4a_module.device_set_color_control', _device_set_color_control)
monkeypatch.setattr('k4a_module.device_get_color_control_capabilities', _device_get_color_control_capabilities)
monkeypatch.setattr('k4a_module.device_start_cameras', _device_start_cameras)
monkeypatch.setattr('k4a_module.device_stop_cameras', _device_stop_cameras)
monkeypatch.setattr('k4a_module.device_start_imu', _device_start_imu)
monkeypatch.setattr('k4a_module.device_stop_imu', _device_stop_imu)
monkeypatch.setattr('k4a_module.device_get_capture', _device_get_capture)
monkeypatch.setattr('k4a_module.device_get_imu_sample', _device_get_imu_sample)
monkeypatch.setattr('k4a_module.device_get_calibration', _device_get_calibration)
monkeypatch.setattr('k4a_module.device_get_raw_calibration', _device_get_raw_calibration)
monkeypatch.setattr('k4a_module.device_get_installed_count', _device_get_installed_count)
monkeypatch.setattr('k4a_module.device_get_serialnum', _device_get_serialnum) |
(eq=False)
class OSMNode(Tagged):
id_: int
coordinates: np.ndarray
visible: Optional[str] = None
changeset: Optional[str] = None
timestamp: Optional[datetime] = None
user: Optional[str] = None
uid: Optional[str] = None
def from_xml_structure(cls, element: Element) -> 'OSMNode':
attributes = element.attrib
tags: Tags = {x.attrib['k']: x.attrib['v'] for x in element if (x.tag == 'tag')}
return cls(tags, int(attributes['id']), np.array((float(attributes['lat']), float(attributes['lon']))), attributes.get('visible', None), attributes.get('changeset', None), (datetime.strptime(attributes['timestamp'], OSM_TIME_PATTERN) if ('timestamp' in attributes) else None), attributes.get('user', None), attributes.get('uid', None))
def parse_from_structure(cls, structure: dict[(str, Any)]) -> 'OSMNode':
return cls(structure.get('tags', {}), structure['id'], coordinates=np.array((structure['lat'], structure['lon'])))
def get_boundary_box(self) -> BoundaryBox:
return BoundaryBox(self.coordinates[1], self.coordinates[0], self.coordinates[1], self.coordinates[0])
def __hash__(self) -> int:
return self.id_
def __eq__(self, other) -> bool:
if (not isinstance(other, OSMNode)):
return False
return ((self.id_ == other.id_) and np.array_equal(self.coordinates, other.coordinates) and (self.visible == other.visible) and (self.changeset == other.changeset) and (self.timestamp == other.timestamp) and (self.user == other.user) and (self.uid == other.uid)) |
def config_get_value(args):
with open(get_configuration_file_path(), 'r') as f:
yaml_config = yaml.load(f, Loader=yaml.FullLoader)
if (args.option not in yaml_config):
raise SystemExit(f'The option [{args.option}] is not found in config.')
value = yaml_config[args.option]
print(value) |
class CubeTable(QWidget):
ps_color_changed = pyqtSignal(bool)
ps_history_backup = pyqtSignal(bool)
def __init__(self, wget, args):
super().__init__(wget)
self.setAttribute(Qt.WA_AcceptTouchEvents)
self._args = args
self._updated_colors = False
self.setMinimumSize(120, 10)
cube_grid_layout = QGridLayout(self)
cube_grid_layout.setContentsMargins(0, 0, 0, 0)
cube_grid_layout.setHorizontalSpacing(0)
cube_grid_layout.setVerticalSpacing(0)
scroll_area = QScrollArea(self)
scroll_area.setFrameShape(QFrame.Box)
scroll_area.setVerticalScrollBarPolicy(Qt.ScrollBarAlwaysOn)
scroll_area.setHorizontalScrollBarPolicy(Qt.ScrollBarAlwaysOff)
scroll_area.setWidgetResizable(True)
cube_grid_layout.addWidget(scroll_area)
scroll_contents = QWidget()
scroll_horizontal_layout = QHBoxLayout(scroll_contents)
scroll_horizontal_layout.setContentsMargins(0, 0, 0, 0)
scroll_area.setWidget(scroll_contents)
self._cubes = (Cube(scroll_contents, args, 0), Cube(scroll_contents, args, 1), Cube(scroll_contents, args, 2), Cube(scroll_contents, args, 3), Cube(scroll_contents, args, 4))
self.update_color()
for idx in (2, 1, 0, 3, 4):
scroll_horizontal_layout.addWidget(self._cubes[idx])
self._cubes[idx].square.ps_color_changed.connect((lambda x: self.update_color()))
self._cubes[idx].square.ps_color_changed.connect((lambda x: self.ps_history_backup.emit(True)))
self._cubes[idx].square.ps_index_changed.connect((lambda x: self.update_color()))
for ctp in ('r', 'g', 'b'):
obj = getattr(self._cubes[idx], 'hs_rgb_{}'.format(ctp))
obj.valueChanged.connect(self.modify_color(idx, 'direct', ctp))
obj = getattr(self._cubes[idx], 'sp_rgb_{}'.format(ctp))
obj.valueChanged.connect(self.modify_color(idx, 'frdire', ctp))
for ctp in ('h', 's', 'v'):
obj = getattr(self._cubes[idx], 'hs_hsv_{}'.format(ctp))
obj.valueChanged.connect(self.modify_color(idx, 'indire', ctp))
obj = getattr(self._cubes[idx], 'dp_hsv_{}'.format(ctp))
obj.valueChanged.connect(self.modify_color(idx, 'frdire', ctp))
self._cubes[idx].le_hec.textChanged.connect(self.modify_color(idx, 'frdire', 'hec'))
self.modify_box_visibility()
def sizeHint(self):
return QSize(600, 200)
def resizeEvent(self, event):
wid = self.geometry().width()
if ((wid < 650) and self._cubes[0].sp_rgb_r.isVisible()):
for idx in (2, 1, 0, 3, 4):
for ctp in ('r', 'g', 'b'):
obj = getattr(self._cubes[idx], 'sp_rgb_{}'.format(ctp))
obj.setVisible(False)
for ctp in ('h', 's', 'v'):
obj = getattr(self._cubes[idx], 'dp_hsv_{}'.format(ctp))
obj.setVisible(False)
if ((wid > 650) and (not self._cubes[0].sp_rgb_r.isVisible())):
for idx in (2, 1, 0, 3, 4):
for ctp in ('r', 'g', 'b'):
obj = getattr(self._cubes[idx], 'sp_rgb_{}'.format(ctp))
obj.setVisible(True)
for ctp in ('h', 's', 'v'):
obj = getattr(self._cubes[idx], 'dp_hsv_{}'.format(ctp))
obj.setVisible(True)
event.ignore()
def modify_color(self, idx, kword, ctp):
def _func_(value):
if self._updated_colors:
return
if (ctp == 'hec'):
value = Color.stri2color(value)
if (not value):
return
self._updated_colors = True
color = Color(self._args.sys_color_set[idx], tp='color', overflow=self._args.sys_color_set.get_overflow())
if (ctp == 'hec'):
color.setti(value, tp='color')
elif ((kword == 'direct') or (kword == 'frdire')):
color.setti(value, ctp)
else:
color.setti((value / 1000.0), ctp)
self._args.sys_color_set.modify(self._args.hm_rule, idx, color)
if (kword == 'frdire'):
self.update_color(skip_dp=(idx, ctp))
else:
self.update_color()
self._updated_colors = False
return _func_
def update_color(self, skip_dp=None):
self._updated_colors = True
for lc_idx in range(5):
if ((lc_idx == self._args.sys_activated_idx) and (self._args.sys_activated_assit_idx >= 0)):
curr_color = gen_assit_color(self._args.sys_color_set[lc_idx], *self._args.sys_grid_assitlocs[lc_idx][self._args.sys_activated_assit_idx][2:6])
else:
curr_color = self._args.sys_color_set[lc_idx]
curr_hec = curr_color.getti('hec')
(curr_h, curr_s, curr_v) = curr_color.getti('hsv')
if ((curr_hec == self._cubes[lc_idx].le_hec.text()) and (curr_s > 0.01) and (0.99 > curr_v > 0.01)):
continue
if (not (skip_dp and (skip_dp[0] == lc_idx) and (skip_dp[1] == 'hec'))):
self._cubes[lc_idx].le_hec.setText(curr_hec)
for lc_ctp in ('r', 'g', 'b'):
obj = getattr(self._cubes[lc_idx], 'hs_rgb_{}'.format(lc_ctp))
obj.setValue(curr_color.getti(lc_ctp))
if (not (skip_dp and (skip_dp[0] == lc_idx) and (skip_dp[1] == lc_ctp))):
obj = getattr(self._cubes[lc_idx], 'sp_rgb_{}'.format(lc_ctp))
obj.setValue(curr_color.getti(lc_ctp))
for lc_ctp in ('h', 's', 'v'):
obj = getattr(self._cubes[lc_idx], 'hs_hsv_{}'.format(lc_ctp))
obj.setValue((vars()['curr_{}'.format(lc_ctp)] * 1000.0))
if (not (skip_dp and (skip_dp[0] == lc_idx) and (skip_dp[1] == lc_ctp))):
obj = getattr(self._cubes[lc_idx], 'dp_hsv_{}'.format(lc_ctp))
obj.setValue(vars()['curr_{}'.format(lc_ctp)])
self.update_index()
self._updated_colors = False
def update_index(self):
for lc_idx in range(5):
self._cubes[lc_idx].update()
self.ps_color_changed.emit(True)
def modify_rule(self):
self._args.sys_color_set.create(self._args.hm_rule)
self.update_color()
self.ps_history_backup.emit(True)
def create_set(self, direct=False):
if ((not direct) and (True in [bool(i) for i in self._args.sys_grid_assitlocs])):
self._args.sys_grid_assitlocs = [[], [], [], [], []]
self._args.sys_assit_color_locs = [[], [], [], [], []]
self._args.sys_activated_assit_idx = (- 1)
else:
self._args.sys_color_set.initialize()
self._args.sys_color_set.create(self._args.hm_rule)
self.update_color()
self.ps_history_backup.emit(True)
def modify_box_visibility(self):
for i in range(5):
self._cubes[i].gbox_hsv.setVisible(self._args.show_hsv)
self._cubes[i].gbox_rgb.setVisible(self._args.show_rgb)
def update_all(self):
for lc_idx in range(5):
self._cubes[lc_idx].update()
self.update()
def clipboard_act(self, ctp):
def _func_():
color = self._args.sys_color_set[self._args.sys_activated_idx].getti(ctp)
if (ctp == 'hec'):
color = ((self._args.hec_prefix[0] + str(color)) + self._args.hec_prefix[1])
else:
color = self._args.rgb_prefix[1].join([((self._args.r_prefix[0] + str(color[coi])) + self._args.r_prefix[1]) for coi in range(3)])
color = ((self._args.rgb_prefix[0] + color) + self._args.rgb_prefix[2])
mimedata = QMimeData()
mimedata.setText(color)
clipboard = QApplication.clipboard()
clipboard.setMimeData(mimedata)
return _func_
def active_by_num(self, idx):
def _func_():
self._args.sys_activated_idx = idx
self._args.sys_activated_assit_idx = (- 1)
self.update_index()
return _func_ |
def get_tracks(server, username, fromuts, touts, startpage=1, sleep_func=time.sleep, tracktype='recenttracks'):
page = startpage
response = connect_server(server, username, page, fromuts, touts, sleep_func, tracktype)
totalpages = get_pageinfo(response, tracktype)
if (startpage > totalpages):
raise ValueError(('First page (%s) is higher than total pages (%s).' % (startpage, totalpages)))
while (page <= totalpages):
if (page > startpage):
response = connect_server(server, username, page, fromuts, touts, sleep_func, tracktype)
tracklist = get_tracklist(response)
tracks = []
for trackelement in tracklist:
if (('nowplaying' not in trackelement.attrib) or (not trackelement.attrib['nowplaying'])):
tracks.append(parse_track(trackelement))
(yield (page, totalpages, tracks))
page += 1
sleep_func(0.5) |
def test():
from instakit.utils.static import asset
from instakit.utils.mode import Mode
from clu.predicates import isslotted
image_paths = list(map((lambda image_file: asset.path('img', image_file)), asset.listfiles('img')))
image_inputs = list(map((lambda image_path: Mode.RGB.open(image_path)), image_paths))
processors = (Contour(), Detail(), Emboss(), EdgeEnhance(), EdgeEnhanceMore(), FindEdges(), Smooth(), SmoothMore(), Sharpen(), UnsharpMask(), GaussianBlur(sigmaX=3), SimpleGaussianBlur(radius=3))
for processor in processors:
assert isslotted(processor)
for image_input in image_inputs:
GaussianBlur(sigmaX=3).process(image_input).show()
print(image_paths) |
class OptionSeriesPyramidSonificationTracksMappingTremoloDepth(Options):
def mapFunction(self):
return self._config_get(None)
def mapFunction(self, value: Any):
self._config(value, js_type=False)
def mapTo(self):
return self._config_get(None)
def mapTo(self, text: str):
self._config(text, js_type=False)
def max(self):
return self._config_get(None)
def max(self, num: float):
self._config(num, js_type=False)
def min(self):
return self._config_get(None)
def min(self, num: float):
self._config(num, js_type=False)
def within(self):
return self._config_get(None)
def within(self, value: Any):
self._config(value, js_type=False) |
class OptionPlotoptionsOrganizationLevels(Options):
def borderColor(self):
return self._config_get(None)
def borderColor(self, text: str):
self._config(text, js_type=False)
def borderWidth(self):
return self._config_get(None)
def borderWidth(self, num: float):
self._config(num, js_type=False)
def color(self):
return self._config_get(None)
def color(self, text: str):
self._config(text, js_type=False)
def colorByPoint(self):
return self._config_get(True)
def colorByPoint(self, flag: bool):
self._config(flag, js_type=False)
def dataLabels(self) -> 'OptionPlotoptionsOrganizationLevelsDatalabels':
return self._config_sub_data('dataLabels', OptionPlotoptionsOrganizationLevelsDatalabels)
def level(self):
return self._config_get(None)
def level(self, num: float):
self._config(num, js_type=False)
def linkOpacity(self):
return self._config_get(0.5)
def linkOpacity(self, num: float):
self._config(num, js_type=False)
def states(self) -> 'OptionPlotoptionsOrganizationLevelsStates':
return self._config_sub_data('states', OptionPlotoptionsOrganizationLevelsStates) |
def test_proxy_object_is_returned_from_calls(accounts, tester):
addr = accounts[1]
value = ['blahblah', addr, ['yesyesyes', '0x1234']]
tester.setTuple(value)
with brownie.multicall:
ret_val = tester.getTuple(addr)
assert (inspect.getattr_static(ret_val, '__wrapped__') != value)
assert isinstance(ret_val, Proxy)
assert (ret_val.__wrapped__ == value) |
def create_osmocore_logging_header(timestamp=datetime.datetime.now(), process_name='', pid=0, level=0, subsys_name='', filename='', line_number=0):
if (type(process_name) == str):
process_name = process_name.encode('utf-8')
if (type(subsys_name) == str):
subsys_name = subsys_name.encode('utf-8')
if (type(filename) == str):
filename = filename.encode('utf-8')
logging_hdr = struct.pack('!LL16sLB3x16s32sL', int(timestamp.timestamp()), timestamp.microsecond, process_name, pid, level, subsys_name, filename, line_number)
return logging_hdr |
class Border():
def __init__(self, leaf):
self.file = Projection.leaf_to_string(leaf, 'File')
self.filetype = str.upper(Projection.leaf_to_string(leaf, 'Type', 'shp'))
self.draw = Projection.leaf_to_bool(leaf, 'Draw', False)
self.encoding = Projection.leaf_to_string(leaf, 'Encoding', 'utf-8')
self.path = (ClipBorder.readPath(self.file, 0) if (self.filetype != 'SHP') else None)
self.polygon = str.upper(Projection.leaf_to_string(leaf, 'Polygon', 'on'))
self.linewidth = Projection.leaf_to_float(leaf, 'LineWidth', 1)
self.linecolor = Projection.leaf_to_string(leaf, 'LineColor', 'k')
def readPolygon(filename):
try:
file_object = open(filename)
all_the_text = file_object.read().strip()
file_object.close()
poses = re.split('[,]+|[\\s]+', all_the_text)
lon = [float(p) for p in poses[0::2]]
lat = [float(p) for p in poses[1::2]]
path = Path(zip(lon, lat))
return path
except Exception as err:
print('{0}{1}-{2}'.format(filename, err, datetime.now()))
return None |
def fortios_log_fortianalyzer_cloud(data, fos):
fos.do_member_operation('log.fortianalyzer-cloud', 'override-filter')
if data['log_fortianalyzer_cloud_override_filter']:
resp = log_fortianalyzer_cloud_override_filter(data, fos)
else:
fos._module.fail_json(msg=('missing task body: %s' % 'log_fortianalyzer_cloud_override_filter'))
return ((not is_successful_status(resp)), (is_successful_status(resp) and (resp['revision_changed'] if ('revision_changed' in resp) else True)), resp, {}) |
def fixReleasePacket(data):
expect = ['srcname', 'series', 'vol', 'chp', 'published', 'itemurl', 'postfix', 'author', 'tl_type']
maybe = ['match_author', 'loose_match', 'prefix_match']
assert (len(expect) <= len(data)), ("Invalid number of items in release packet! Expected: '%s', received '%s'" % (expect, list(data.keys())))
assert all([(key in data) for key in expect]), ("Missing key in release message! Expect: '%s', received '%s'" % (expect, list(data.keys())))
data['series'] = fix_string(data['series'])
data['postfix'] = fix_string(data['postfix'])
data['author'] = fix_string(data['author'])
if (('scribblehub' in data['itemurl']) and (data['postfix'] == '')):
with open(('no_desc_sh_release_%s.txt' % time.time()), 'w') as fp:
fp.write('Stack:\n')
for line in traceback.format_stack():
fp.write(line)
fp.write('\n\n')
fp.write('Message:\n')
fp.write(pprint.pformat(data))
return data |
class AttachableTest(QuickbooksTestCase):
def setUp(self):
super(AttachableTest, self).setUp()
self.time = datetime.now()
def test_create_note(self):
attachable = Attachable()
vendor = Vendor.all(max_results=1, qb=self.qb_client)[0]
attachable_ref = AttachableRef()
attachable_ref.EntityRef = vendor.to_ref()
attachable.AttachableRef.append(attachable_ref)
attachable.Note = 'Test note added on {}'.format(self.time.strftime('%Y-%m-%d %H:%M:%S'))
attachable.save(qb=self.qb_client)
query_attachable = Attachable.get(attachable.Id, qb=self.qb_client)
self.assertEqual(query_attachable.AttachableRef[0].EntityRef.value, vendor.Id)
self.assertEqual(query_attachable.Note, 'Test note added on {}'.format(self.time.strftime('%Y-%m-%d %H:%M:%S')))
def test_update_note(self):
attachable = Attachable.all(max_results=1, qb=self.qb_client)[0]
attachable.Note = 'Note updated on {}'.format(self.time.strftime('%Y-%m-%d %H:%M:%S'))
attachable.save(qb=self.qb_client)
query_attachable = Attachable.get(attachable.Id, qb=self.qb_client)
self.assertEqual(query_attachable.Note, 'Note updated on {}'.format(self.time.strftime('%Y-%m-%d %H:%M:%S')))
def test_create_file(self):
attachable = Attachable()
test_file = tempfile.NamedTemporaryFile(suffix='.txt')
vendor = Vendor.all(max_results=1, qb=self.qb_client)[0]
attachable_ref = AttachableRef()
attachable_ref.EntityRef = vendor.to_ref()
attachable.AttachableRef.append(attachable_ref)
attachable.FileName = os.path.basename(test_file.name)
attachable._FilePath = test_file.name
attachable.ContentType = 'text/plain'
attachable.save(qb=self.qb_client)
query_attachable = Attachable.get(attachable.Id, qb=self.qb_client)
self.assertEqual(query_attachable.AttachableRef[0].EntityRef.value, vendor.Id) |
def test_reward_monitoring():
env = build_dummy_maze_env()
env = MazeEnvMonitoringWrapper.wrap(env, observation_logging=False, action_logging=False, reward_logging=True)
env = LogStatsWrapper.wrap(env)
env.reset()
env.step(env.action_space.sample())
for ii in range(2):
env.step(env.action_space.sample())
reward_events = env.get_last_step_events(query=[RewardEvents.reward_original, RewardEvents.reward_processed])
assert (len(reward_events) == 2)
for event in reward_events:
assert issubclass(event.interface_class, RewardEvents)
assert (event.attributes['value'] == 10)
assert (event.interface_method in [RewardEvents.reward_original, RewardEvents.reward_processed]) |
def test_unknown_language():
with pytest.raises(UnsupportedLanguage):
compiler.generate_input_json({'foo': ''}, language='Bar')
with pytest.raises(UnsupportedLanguage):
compiler.compile_from_input_json({'language': 'FooBar'})
with pytest.raises(UnsupportedLanguage):
compiler.generate_build_json({'language': 'BarBaz'}, {}) |
class HStack(Stack):
def __init__(self, workspace_name: str, params: List[Any]):
super().__init__(LayoutName.HSTACK, workspace_name, params)
def _first_direction(self) -> Direction:
return Direction.VERTICAL
def _resize_direction(self) -> ResizeDirection:
return ResizeDirection.HEIGHT
def _second_axe_position(self, second_axe_position: str) -> VerticalPosition:
return VerticalPosition(second_axe_position)
def _default_second_axe_position(self) -> VerticalPosition:
return VerticalPosition.UP
def create(cls, workspace_name: str, params: List[Any]) -> Optional['Layout']:
return HStack(workspace_name, params) |
class perm102_bmm_rcr_bias(perm102_bmm_rcr):
def __init__(self):
super().__init__()
self._attrs['op'] = 'perm102_bmm_rcr_bias'
def _infer_shapes(self, a: Tensor, b: Tensor, bias: Tensor):
bias_shapes = bias._attrs['shape']
if (len(bias_shapes) != 2):
raise RuntimeError('Bias should be 2D vector ')
bias_shape = bias_shapes[1]
if (not isinstance(bias_shape, IntImm)):
raise RuntimeError('Bias should be fixed 2D vector')
outshape = super()._infer_shapes(a, b)
if (outshape[2] != bias_shape):
raise RuntimeError("GEMM/Bias shape doesn't match")
return outshape
def __call__(self, a: Tensor, b: Tensor, bias: Tensor) -> Tensor:
self._attrs['inputs'] = [a, b, bias]
self._attrs['input_accessors'] = [TensorAccessor(tensor) for tensor in self._attrs['inputs']]
self._set_depth()
self._sanity_check(a, b)
output_shape = self._infer_shapes(a, b, bias)
self._extract_epilogue_alignment(output_shape)
output = Tensor(output_shape, src_ops={self}, dtype=a.dtype())
self._attrs['outputs'] = [output]
self._attrs['output_accessors'] = [TensorAccessor(tensor) for tensor in self._attrs['outputs']]
return output |
def find_graph_differences_summary(previous_graph: Optional[GraphRepr], current_graph: GraphRepr, previous_results: Dict[(str, Optional[List[Row]])], previous_erasure_results: Dict[(str, int)]) -> Optional[GraphDiffSummary]:
graph_diff: Optional[GraphDiff] = _find_graph_differences(previous_graph, current_graph, previous_results, previous_erasure_results)
if (not graph_diff):
return None
return GraphDiffSummary(prev_collection_count=len(graph_diff.previous_collections), curr_collection_count=len(graph_diff.current_collections), added_collection_count=len(graph_diff.added_collections), removed_collection_count=len(graph_diff.removed_collections), added_edge_count=len(graph_diff.added_edges), removed_edge_count=len(graph_diff.removed_edges), already_processed_access_collection_count=len(graph_diff.already_processed_access_collections), already_processed_erasure_collection_count=len(graph_diff.already_processed_erasure_collections), skipped_added_edge_count=len(graph_diff.skipped_added_edges)) |
def test_example_generation() -> None:
option = Option(id='option', description='Option', examples=['selection'])
number = Number(id='number', description='Number', examples=[('number', 2)], many=True)
text = Text(id='text', description='Text', examples=[('text', '3')], many=True)
selection = Selection(id='selection', description='Selection', options=[option], null_examples=['foo'], many=True)
obj = Object(id='object', description='object', examples=[('another number', {'number': 1})], attributes=[number, text, selection], many=True)
examples = generate_examples(obj)
assert (examples == [('another number', {'object': [{'number': 1}]}), ('number', {'object': [{'number': [2]}]}), ('text', {'object': [{'text': ['3']}]}), ('selection', {'object': [{'selection': ['option']}]}), ('foo', {})]) |
def in_progress():
try:
(current_year, current_month) = TaskLog.objects.values_list('year', 'month').distinct().order_by('-year', '-month')[0]
except IndexError:
return False
return (not TaskLog.objects.filter(year=current_year, month=current_month, task_name='fetch_and_import').exists()) |
(input_signature=(tf.TensorSpec(shape=[None], dtype=tf.string), tf.TensorSpec(shape=[None, 4], dtype=tf.int32)))
def decode_and_crop_and_serve(image_bytes, crop_window):
return {tf.saved_model.CLASSIFY_OUTPUT_SCORES: classifier(decode_and_crop(image_bytes=image_bytes, crop_window=crop_window)), tf.saved_model.CLASSIFY_OUTPUT_CLASSES: classifier.layers[1].columns} |
class ExecutionContextAPI(ABC):
def coinbase(self) -> Address:
...
def timestamp(self) -> int:
...
def block_number(self) -> BlockNumber:
...
def difficulty(self) -> int:
...
def mix_hash(self) -> Hash32:
...
def gas_limit(self) -> int:
...
def prev_hashes(self) -> Iterable[Hash32]:
...
def chain_id(self) -> int:
...
def base_fee_per_gas(self) -> Optional[int]:
... |
class Instance():
def __init__(self, location: Location) -> None:
self.location = location
(self.multiplexer, self.oef_search_dialogues, self.crypto, self.connection) = make_multiplexer_and_dialogues()
self.thread = Thread(target=self.multiplexer.connect)
def address(self) -> str:
return self.crypto.address
def start(self) -> None:
self.thread.start()
wait_for_condition((lambda : self.multiplexer.is_connected), timeout=5)
self.register_location()
def stop(self):
self.multiplexer.disconnect()
self.thread.join()
def register_location(self, disclosure_accuracy: Optional[str]=None) -> None:
service_instance: Dict[(str, Any)] = {'location': self.location}
if disclosure_accuracy:
service_instance['disclosure_accuracy'] = disclosure_accuracy
service_description = Description(service_instance, data_model=models.AGENT_LOCATION_MODEL)
(message, sending_dialogue) = self.oef_search_dialogues.create(counterparty=str(SOEFConnection.connection_id.to_any()), performative=OefSearchMessage.Performative.REGISTER_SERVICE, service_description=service_description)
envelope = Envelope(to=message.to, sender=message.sender, message=message)
logger.info('Registering agent at location=({},{}) by agent={}'.format(self.location.latitude, self.location.longitude, self.crypto.address))
self.multiplexer.put(envelope)
envelope = self.get()
assert envelope
message = cast(OefSearchMessage, envelope.message)
receiving_dialogue = self.oef_search_dialogues.update(message)
assert (sending_dialogue == receiving_dialogue)
def wait_registered(self) -> None:
wait_for_condition((lambda : self.connection.channel.unique_page_address), timeout=10)
def register_personality_pieces(self, piece: str='genus', value: str='service') -> None:
service_instance = {'piece': piece, 'value': value}
service_description = Description(service_instance, data_model=models.AGENT_PERSONALITY_MODEL)
(message, sending_dialogue) = self.oef_search_dialogues.create(counterparty=str(SOEFConnection.connection_id.to_any()), performative=OefSearchMessage.Performative.REGISTER_SERVICE, service_description=service_description)
envelope = Envelope(to=message.to, sender=message.sender, message=message)
logger.info('Registering agent personality')
self.multiplexer.put(envelope)
envelope = self.get()
assert envelope
message = cast(OefSearchMessage, envelope.message)
receiving_dialogue = self.oef_search_dialogues.update(message)
assert (sending_dialogue == receiving_dialogue)
def register_service_key(self, key: str, value: str) -> None:
service_instance = {'key': 'test', 'value': 'test'}
service_description = Description(service_instance, data_model=models.SET_SERVICE_KEY_MODEL)
(message, sending_dialogue) = self.oef_search_dialogues.create(counterparty=str(SOEFConnection.connection_id.to_any()), performative=OefSearchMessage.Performative.REGISTER_SERVICE, service_description=service_description)
envelope = Envelope(to=message.to, sender=message.sender, message=message)
logger.info('Registering agent service key')
self.multiplexer.put(envelope)
envelope = self.get()
assert envelope
message = cast(OefSearchMessage, envelope.message)
receiving_dialogue = self.oef_search_dialogues.update(message)
assert (sending_dialogue == receiving_dialogue)
def search(self, query: Query) -> OefSearchMessage:
(message, sending_dialogue) = self.oef_search_dialogues.create(counterparty=str(SOEFConnection.connection_id.to_any()), performative=OefSearchMessage.Performative.SEARCH_SERVICES, query=query)
search_envelope = Envelope(to=message.to, sender=message.sender, message=message)
logger.info(f'Searching for agents with query: {query}')
self.multiplexer.put(search_envelope)
envelope = self.get()
assert envelope
message = cast(OefSearchMessage, envelope.message)
receiving_dialogue = self.oef_search_dialogues.update(message)
assert (sending_dialogue == receiving_dialogue)
return message
def get(self):
wait_for_condition((lambda : (not self.multiplexer.in_queue.empty())), timeout=20)
return self.multiplexer.get()
def generic_command(self, command: str, parameters: Optional[dict]=None) -> None:
service_instance = {'command': command}
if parameters:
service_instance['parameters'] = urlencode(parameters)
service_description = Description(service_instance, data_model=models.AGENT_GENERIC_COMMAND_MODEL)
(message, _) = self.oef_search_dialogues.create(counterparty=str(SOEFConnection.connection_id.to_any()), performative=OefSearchMessage.Performative.REGISTER_SERVICE, service_description=service_description)
envelope = Envelope(to=message.to, sender=message.sender, message=message)
logger.info(f'Send generic command {command} {parameters}')
self.multiplexer.put(envelope) |
class DataModelBuilder(object):
def __init__(self, global_configs, scanner_configs, service_config, model_name):
self.global_configs = global_configs
self.scanner_configs = scanner_configs
self.service_config = service_config
self.model_name = model_name
def build(self):
data_models = []
requirements_map = data_model_requirements_map.REQUIREMENTS_MAP
for scanner in self.scanner_configs.get('scanners'):
scanner_name = scanner.get('name')
if (scanner.get('enabled') and requirements_map.get(scanner_name)):
data_model = self._instantiate_data_model(scanner_name)
if data_model:
data_models.append(data_model)
return data_models
def _instantiate_data_model(self, data_model_name):
module_path = 'google.cloud.forseti.scanner.scanners.config_validator_util.data_models.{}'
requirements_map = data_model_requirements_map.REQUIREMENTS_MAP
LOGGER.debug('Initializing Config Validator data model: %s - %s', data_model_name, requirements_map.get(data_model_name))
module_name = module_path.format(requirements_map.get(data_model_name).get('module_name'))
try:
module = importlib.import_module(module_name)
except (ImportError, TypeError, ValueError):
LOGGER.exception('Unable to import %s for building Config Validator data model.\n', module_name)
return None
class_name = requirements_map.get(data_model_name).get('class_name')
try:
data_model_class = getattr(module, class_name)
except AttributeError:
LOGGER.exception('Unable to instantiate %s for building Config Validator data model.\n', class_name)
return None
data_model = data_model_class(self.global_configs, self.scanner_configs, self.service_config, self.model_name)
return data_model |
def load_modules(package):
modules = pkgutil.iter_modules(package.__path__, (package.__name__ + '.'))
for (_, name, _) in modules:
logger.debug(f'loading module: {name}')
try:
importlib.import_module(name)
except ModuleNotFoundError as error:
logger.warning(f'failed to import module: {name}. ModuleNotFoundError: {error}') |
('orca')
def test_nitrobenzene():
inp_1 = {'xyz': 'lib:redox/nitrobenzene.xyz', 'charge': 0, 'mult': 1, 'opt': False}
inp_2 = {'xyz': 'lib:redox/nitrobenzene_anion.xyz', 'charge': (- 1), 'mult': 2, 'opt': False}
orca_gas = {'keywords': 'uks b3lyp 6-31G** rijcosx autoaux', 'pal': 4}
orca_solv = orca_gas.copy()
orca_solv['keywords'] += ' cpcm(acetonitrile)'
orca_kwargs = {'calc_cls': ORCA, 'gas_kwargs': orca_gas, 'solv_kwargs': orca_solv}
test_redox(inp_1, inp_2, **orca_kwargs)
import pdb
pdb.set_trace()
pass |
class _L2Responder_pcap(_L2Responder):
_fd = None
_inject = None
_c_int_ = None
def __init__(self, server_address, response_interface, qtags=None):
import ctypes
self._c_int_ = ctypes.c_int
import ctypes.util
from . import getifaddrslib
pcap = ctypes.util.find_library('pcap')
if (not pcap):
raise Exception('libpcap not found')
pcap = ctypes.cdll.LoadLibrary(pcap)
errbuf = ctypes.create_string_buffer(256)
self._fd = pcap.pcap_open_live(response_interface.encode('utf-8'), ctypes.c_int(0), ctypes.c_int(0), ctypes.c_int(0), errbuf)
if (not self._fd):
import errno
raise IOError(errno.EACCES, errbuf.value)
elif errbuf.value:
import warnings
warnings.warn(errbuf.value)
try:
mac = bytes(MAC(getifaddrslib.get_mac_address(response_interface)))
except Exception:
pcap.pcap_close(self._fd)
raise
else:
_L2Responder.__init__(self, server_address, mac, qtags=qtags)
self._inject = pcap.pcap_inject
def _send_(self, packet):
return self._inject(self._fd, packet, self._c_int_(len(packet))) |
class PollOption(JsonDeserializable):
def de_json(cls, json_string):
if (json_string is None):
return None
obj = cls.check_json(json_string, dict_copy=False)
return cls(**obj)
def __init__(self, text, voter_count=0, **kwargs):
self.text: str = text
self.voter_count: int = voter_count |
def extension_controller_fortigate(data, fos):
vdom = data['vdom']
state = data['state']
extension_controller_fortigate_data = data['extension_controller_fortigate']
filtered_data = underscore_to_hyphen(filter_extension_controller_fortigate_data(extension_controller_fortigate_data))
if ((state == 'present') or (state is True)):
return fos.set('extension-controller', 'fortigate', data=filtered_data, vdom=vdom)
elif (state == 'absent'):
return fos.delete('extension-controller', 'fortigate', mkey=filtered_data['name'], vdom=vdom)
else:
fos._module.fail_json(msg='state must be present or absent!') |
class MESH_OT_YAVNEBase(bpy.types.Operator):
bl_idname = 'mesh.yavne_base'
bl_label = 'YAVNE Base Operator'
bl_options = {'INTERNAL'}
addon_key = __package__.split('.')[0]
def poll(cls, context):
edit_object = context.edit_object
return (edit_object and (edit_object.type == 'MESH') and (edit_object.mode == 'EDIT') and (context.space_data.type == 'VIEW_3D'))
def __init__(self):
mesh = bpy.context.edit_object.data
bm = bmesh.from_edit_mesh(mesh)
vert_int_layers = bm.verts.layers.int
face_int_layers = bm.faces.layers.int
loop_float_layers = bm.loops.layers.float
self.addon = bpy.context.preferences.addons[self.addon_key]
if (not ('vertex-normal-weight' in vert_int_layers.keys())):
vert_int_layers.new('vertex-normal-weight')
if (not ('face-normal-influence' in face_int_layers.keys())):
face_int_layers.new('face-normal-influence')
if (not ('loop-normal-x' in loop_float_layers.keys())):
loop_float_layers.new('loop-normal-x')
if (not ('loop-normal-y' in loop_float_layers.keys())):
loop_float_layers.new('loop-normal-y')
if (not ('loop-normal-z' in loop_float_layers.keys())):
loop_float_layers.new('loop-normal-z')
bmesh.update_edit_mesh(mesh) |
(config_path='./conf', config_name='conf_apex_dqn')
def main(cfg):
if (cfg.seed is not None):
random_utils.manual_seed(cfg.seed)
logging.info(hydra_utils.config_to_json(cfg))
env = atari_wrapper.make_atari_env(**cfg.env)
model = AtariDQNModel(env.action_space.n, network=cfg.network, dueling_dqn=cfg.dueling_dqn, spectral_norm=cfg.spectral_norm, double_dqn=cfg.double_dqn).to(cfg.train_device)
infer_model = copy.deepcopy(model).to(cfg.infer_device)
infer_model.eval()
model_pool = RemotableModelPool(infer_model, seed=cfg.seed)
optimizer = make_optimizer(model.parameters(), **cfg.optimizer)
replay_buffer = ReplayBuffer(TensorCircularBuffer(cfg.replay_buffer_size), PrioritizedSampler(priority_exponent=cfg.priority_exponent))
ctrl = Controller()
m_server = Server(cfg.m_server_name, cfg.m_server_addr)
r_server = Server(cfg.r_server_name, cfg.r_server_addr)
c_server = Server(cfg.c_server_name, cfg.c_server_addr)
m_server.add_service(model_pool)
r_server.add_service(replay_buffer)
c_server.add_service(ctrl)
servers = ServerList([m_server, r_server, c_server])
learner_model = wrap_downstream_model(model, m_server)
t_actor_model = make_remote_model(model, m_server, version=ModelVersion.LATEST)
e_actor_model = make_remote_model(model, m_server, version=ModelVersion.LATEST)
learner_ctrl = remote_utils.make_remote(ctrl, c_server)
t_actor_ctrl = remote_utils.make_remote(ctrl, c_server)
e_actor_ctrl = remote_utils.make_remote(ctrl, c_server)
learner_replay_buffer = make_remote_replay_buffer(replay_buffer, r_server, prefetch=cfg.prefetch)
t_actor_replay_buffer = make_remote_replay_buffer(replay_buffer, r_server)
env_fac = atari_wrapper.AtariWrapperFactory(**cfg.env)
t_agent_fac = ApexDQNAgentFactory(t_actor_model, FlexibleEpsFunc(cfg.eps, cfg.num_training_rollouts), replay_buffer=t_actor_replay_buffer, n_step=cfg.n_step, gamma=cfg.gamma, max_abs_reward=cfg.max_abs_reward, rescale_value=cfg.rescale_value)
e_agent_fac = ApexDQNAgentFactory(e_actor_model, ConstantEpsFunc(cfg.evaluation_eps))
t_loop = ParallelLoop(env_fac, t_agent_fac, t_actor_ctrl, running_phase=Phase.TRAIN, should_update=True, num_rollouts=cfg.num_training_rollouts, num_workers=cfg.num_training_workers, seed=cfg.seed)
e_loop = ParallelLoop(env_fac, e_agent_fac, e_actor_ctrl, running_phase=Phase.EVAL, should_update=False, num_rollouts=cfg.num_evaluation_rollouts, num_workers=cfg.num_evaluation_workers, seed=(None if (cfg.seed is None) else (cfg.seed + cfg.num_training_rollouts)))
loops = LoopList([t_loop, e_loop])
learner = ApexDQNAgent(learner_model, replay_buffer=learner_replay_buffer, controller=learner_ctrl, optimizer=optimizer, batch_size=cfg.batch_size, max_grad_norm=cfg.max_grad_norm, n_step=cfg.n_step, gamma=cfg.gamma, importance_sampling_exponent=cfg.importance_sampling_exponent, value_clipping_eps=cfg.value_clipping_eps, fr_kappa=cfg.fr_kappa, target_sync_period=cfg.target_sync_period, learning_starts=cfg.learning_starts, model_push_period=cfg.model_push_period)
servers.start()
loops.start()
learner.connect()
learner_model.init_model()
learner_model.push()
start_time = time.perf_counter()
for epoch in range(cfg.num_epochs):
stats = learner.train(cfg.steps_per_epoch)
cur_time = (time.perf_counter() - start_time)
info = f'T Epoch {epoch}'
if cfg.table_view:
logging.info((('\n\n' + stats.table(info, time=cur_time)) + '\n'))
else:
logging.info(stats.json(info, phase='Train', epoch=epoch, time=cur_time))
time.sleep(1)
stats = learner.eval(cfg.num_evaluation_episodes, keep_training_loops=True)
cur_time = (time.perf_counter() - start_time)
info = f'E Epoch {epoch}'
if cfg.table_view:
logging.info((('\n\n' + stats.table(info, time=cur_time)) + '\n'))
else:
logging.info(stats.json(info, phase='Eval', epoch=epoch, time=cur_time))
torch.save(model.state_dict(), f'dqn_agent-{epoch}.pth')
time.sleep(1)
loops.terminate()
servers.terminate() |
.parametrize('elasticapm_client', [{'service_name': '%&!'}], indirect=True)
def test_invalid_service_name_disables_send(elasticapm_client):
assert (len(elasticapm_client.config.errors) == 1)
assert ('SERVICE_NAME' in elasticapm_client.config.errors)
assert elasticapm_client.config.disable_send |
def test_supervisor_not_started():
timeout = 0.1
sleep_time = 0.5
exec_limiter = ExecTimeoutThreadGuard(timeout)
with exec_limiter as exec_limit:
assert (not exec_limiter._future_guard_task)
TestThreadGuard.slow_function(sleep_time)
assert (not exec_limit.is_cancelled_by_timeout()) |
def branches(src_dir, remote=True):
clean_src = io.escape_path(src_dir)
if remote:
return _cleanup_remote_branch_names(process.run_subprocess_with_output(f"git -C {clean_src} for-each-ref refs/remotes/ --format='%(refname:short)'"))
else:
return _cleanup_local_branch_names(process.run_subprocess_with_output(f"git -C {clean_src} for-each-ref refs/heads/ --format='%(refname:short)'")) |
class SimpleDocker(object):
def __init__(self, use_udocker=None):
self.identifier = LongIdentifier()
if (use_udocker is None):
self._with_udocker = self._use_udocker()
else:
self._with_udocker = use_udocker
def _use_udocker(self):
if is_docker_installed():
return False
if (not is_udocker_installed()):
return False
return True
def _splitter(name):
name = name.split('/')
if (len(name) == 2):
org = name[0]
img = name[1]
else:
org = None
img = name[0]
img_ = img.split(':')
if (len(img_) == 2):
img = img_[0]
tag = img_[1]
else:
img = img_[0]
return (org, img, tag)
def _image_name(org, img, tag):
return ('%s/%s:%s' % (org, img, tag))
def images(self):
tmp_dir = tempfile.mkdtemp(prefix='ersilia-')
tmp_file = os.path.join(tmp_dir, 'images.txt')
if (not self._with_udocker):
cmd = 'docker images > {0}'.format(tmp_file)
run_command(cmd)
img_dict = {}
with open(tmp_file, 'r') as f:
h = next(f)
rep_idx = h.find('REPOSITORY')
tag_idx = h.find('TAG')
img_idx = h.find('IMAGE ID')
crt_idx = h.find('CREATED')
for l in f:
rep = l[rep_idx:tag_idx].strip()
tag = l[tag_idx:img_idx].strip()
img = l[img_idx:crt_idx].strip()
img_dict['{0}:{1}'.format(rep, tag)] = img
return img_dict
else:
cmd = 'sudo -u {0} udocker images > {1}'.format(DEFAULT_UDOCKER_USERNAME, tmp_file)
run_command(cmd)
with open(tmp_file, 'r') as f:
h = next(f)
for l in f:
img = l.split(' ')[0]
img_dict[img] = img
return img_dict
def containers(self, only_run):
tmp_dir = tempfile.mkdtemp(prefix='ersilia-')
tmp_file = os.path.join(tmp_dir, 'containers.txt')
if (not only_run):
all_str = '-a'
else:
all_str = ''
cmd = 'docker ps {0} > {1}'.format(all_str, tmp_file)
run_command(cmd)
cnt_dict = {}
with open(tmp_file, 'r') as f:
h = next(f)
cnt_idx = h.find('CONTAINER ID')
img_idx = h.find('IMAGE')
cmd_idx = h.find('COMMAND')
sts_idx = h.find('STATUS')
pts_idx = h.find('PORTS')
nam_idx = h.find('NAMES')
for l in f:
cnt = l[cnt_idx:img_idx].strip()
img = l[img_idx:cmd_idx].strip()
sts = l[sts_idx:pts_idx].strip()
nam = l[nam_idx:].strip()
cnt_dict[nam] = img
return cnt_dict
def exists(self, org, img, tag):
bash_script = '\n #!/bin/bash\n image_and_tag="$1"\n image_and_tag_array=(${image_and_tag//:/ })\n if [[ "$(docker images ${image_and_tag_array[0]} | grep ${image_and_tag_array[1]} 2> /dev/null)" != "" ]]; then\n echo "True"\n else\n echo "False"\n fi\n '
tmp_folder = tempfile.mkdtemp(prefix='ersilia-')
tmp_script = os.path.join(tmp_folder, 'exists.sh')
with open(tmp_script, 'w') as f:
f.write(bash_script)
cmd = ['bash', tmp_script, self._image_name(org, img, tag)]
res = run_command_check_output(cmd)
res = res.strip()
if (res == b'False'):
return False
if (res == b'True'):
return True
return None
def build(self, path, org, img, tag):
if self._with_udocker:
raise Exception('Cannot built with udocker')
path = os.path.abspath(path)
cwd = os.getcwd()
os.chdir(path)
cmd = ('docker build -t %s %s' % (self._image_name(org, img, tag), path))
run_command(cmd)
os.chdir(cwd)
def delete(self, org, img, tag):
if (not self._with_udocker):
cmd = ('docker rmi %s' % self._image_name(org, img, tag))
run_command(cmd)
else:
cmd = 'sudo -u {0} udocker rmi {1}'.format(DEFAULT_UDOCKER_USERNAME, self._image_name(org, img, tag))
def run(self, org, img, tag, name, memory=None):
if (name is None):
name = self.identifier.encode()
if (not self._with_udocker):
if (memory is None):
cmd = 'docker run -it -d --platform {0} --name {1} {2} bash'.format(resolve_platform(), name, self._image_name(org, img, tag))
else:
cmd = 'docker run -it -d --memory="{3}" --platform {0} --name {1} {2} bash'.format(resolve_platform(), name, self._image_name(org, img, tag), (str(memory) + 'g'))
run_command(cmd)
else:
cmd = 'sudo -u {0} udocker run {2} bash'.format(DEFAULT_UDOCKER_USERNAME, self._image_name(org, img, tag))
run_command(cmd)
return name
def kill(name):
cmd = 'docker kill {0}'.format(name)
run_command(cmd)
def remove(name):
cmd = 'docker rm -f {0}'.format(name)
run_command(cmd)
def cp_from_container(name, img_path, local_path, org=None, img=None, tag=None):
local_path = os.path.abspath(local_path)
tmp_file = os.path.join(tempfile.mkdtemp(prefix='ersilia-'), 'tmp.txt')
cmd = ('docker cp %s:%s %s &> %s' % (name, img_path, local_path, tmp_file))
run_command(cmd)
with open(tmp_file, 'r') as f:
output = f.read()
if ('No such container' in output):
img_name = '{0}/{1}:{2}'.format(org, img, tag)
cmd = 'docker run --platform linux/amd64 -d --name={0} {1}'.format(name, img_name)
run_command(cmd)
cmd = ('docker cp %s:%s %s' % (name, img_path, local_path))
run_command(cmd)
def cp_from_image(self, img_path, local_path, org, img, tag):
name = self.run(org, img, tag, name=None)
self.cp_from_container(name, img_path, local_path, org=org, img=img, tag=tag)
self.remove(name)
def exec_container(name, cmd):
cmd = ('docker exec -i %s bash -c "%s"' % (name, cmd))
run_command(cmd)
def exec(self, cmd, org, img, tag, name):
name = self.run(org, img, tag, name=name)
self.exec_container(name, cmd)
self.kill(name) |
def test_equal_szts_straight():
kwargs = copy.copy(KWARGS)
kwargs['images'] = 10
kwargs['max_step'] = 0.04
convergence = {'rms_force_thresh': 2.4}
kwargs['convergence'] = convergence
szts_equal = SimpleZTS(get_geoms(('A', 'B')), param='equal')
opt = run_cos_opt(szts_equal, SteepestDescent, **kwargs)
return opt |
class Txt(Generator):
def __init__(self, rmap=None, path='regs.txt', **args):
super().__init__(rmap, **args)
self.path = path
def generate(self):
self.validate()
for reg in self.rmap:
if (len(reg) > 1):
raise ValueError(('Only registers with single bitfield are allowed for %s generator.' % self._name()))
data_w = config.globcfg['data_width']
address_w = config.globcfg['address_width']
address_digits = ((address_w // 4) + (1 if (address_w % 4) else 0))
address_str = '0x%0{0}x'.format(address_digits)
reset_digits = ((data_w // 4) + (1 if (data_w % 4) else 0))
reset_str = '0x%0{0}x'.format(reset_digits)
row_template = '| %-{0}s | %-{1}s | %-{2}s | %-{3}s | %-{4}s | %-{5}s | %-{6}s |\n'
row_top = ['Address', 'Name', 'Width', 'Access', 'Hardware', 'Reset', 'Description']
col_address = [(address_str % reg.address) for reg in self.rmap]
col_names = self.rmap.reg_names
col_width = [('%d' % reg.bitfields[0].width) for reg in self.rmap]
col_access = [reg.bitfields[0].access for reg in self.rmap]
col_hardware = [reg.bitfields[0].hardware for reg in self.rmap]
col_reset = [(reset_str % reg.reset) for reg in self.rmap]
col_description = [reg.description for reg in self.rmap]
cols_w = [max((address_digits + 2), len(row_top[0])), max(max([len(s) for s in col_names]), len(row_top[1])), max(max([len(s) for s in col_width]), len(row_top[2])), max(max([len(s) for s in col_access]), len(row_top[3])), max(max([len(s) for s in col_hardware]), len(row_top[4])), max((reset_digits + 2), len(row_top[5])), max(max([len(s) for s in col_description]), len(row_top[6]))]
row_template = row_template.format(*cols_w)
out_lines = [(row_template % tuple(row_top))]
out_lines.append((row_template % tuple([('-' * w) for w in cols_w])))
for i in range(len(col_names)):
out_lines.append((row_template % (col_address[i], col_names[i], col_width[i], col_access[i], col_hardware[i], col_reset[i], col_description[i])))
utils.create_dirs(self.path)
with open(self.path, 'w') as f:
f.writelines(out_lines) |
class OptionPlotoptionsTreegraphSonificationContexttracksMappingTremoloDepth(Options):
def mapFunction(self):
return self._config_get(None)
def mapFunction(self, value: Any):
self._config(value, js_type=False)
def mapTo(self):
return self._config_get(None)
def mapTo(self, text: str):
self._config(text, js_type=False)
def max(self):
return self._config_get(None)
def max(self, num: float):
self._config(num, js_type=False)
def min(self):
return self._config_get(None)
def min(self, num: float):
self._config(num, js_type=False)
def within(self):
return self._config_get(None)
def within(self, value: Any):
self._config(value, js_type=False) |
def extractMadsnailRu(item):
(vol, chp, frag, postfix) = extractVolChapterFragmentPostfix(item['title'])
if ((not (chp or vol)) or ('preview' in item['title'].lower())):
return False
if ('WATTT' in item['tags']):
return buildReleaseMessageWithType(item, 'WATTT', vol, chp, frag=frag, postfix=postfix)
return False |
(Output('forward-week', 'style'), [Input('week-ending', 'children')])
def toggle_forward_arrow_display(week_ending):
if (calc_next_saturday(datetime.strptime(week_ending, '%A %b %d, %Y')) == calc_next_saturday(get_max_week_ending())):
return {'color': 'rgba(0,0,0,0)', 'backgroundColor': 'rgba(0,0,0,0)', 'border': '0'}
else:
return {'display': 'inline-block', 'backgroundColor': 'rgba(0,0,0,0)', 'border': '0'} |
def check_provider_constraints(provider_name: str, feature: str, subfeature: str, phase: Optional[str]=None, constraints: Optional[Dict]=None) -> Tuple[(bool, str)]:
subfeatures_providers = list_features(as_dict=True)
provider_info = subfeatures_providers.get(provider_name, None)
if (not provider_info):
return (False, f"Provider : '{provider_name}' unknown.")
if (feature not in provider_info):
return (False, f"Provider : '{provider_name}' does not provide an API for '{feature} {subfeature}'")
if (subfeature not in provider_info[feature]):
return (False, f"Provider : '{provider_name}' does not provide an API for '{feature} {subfeature}'")
if phase:
if ((not isinstance(provider_info[feature][subfeature], dict)) or (isinstance(provider_info[feature][subfeature], dict) and (phase not in provider_info[feature][subfeature].keys()))):
return (False, (f"Provider : '{provider_name}' does not provide an API for " + "'{feature} {subfeature} {phase}'"))
if constraints:
for (key, values) in constraints:
for value in values:
if (not (value in load_provider(ProviderDataEnum.PROVIDER_INFO, provider_name=provider_name, feature=feature, subfeature=subfeature, phase=phase)[key])):
return (False, f"constraint : '{key} - {values}' not filled for '{provider_name}'")
return (True, 'All Good!') |
class SingleSiteUniformMetropolisHastingsTest(unittest.TestCase):
class SampleBernoulliModel(object):
_variable
def foo(self):
return dist.Beta(torch.tensor(2.0), torch.tensor(2.0))
_variable
def bar(self):
return dist.Bernoulli(self.foo())
class SampleCategoricalModel(object):
_variable
def foo(self):
return dist.Dirichlet(torch.tensor([0.5, 0.5]))
_variable
def bar(self):
return dist.Categorical(self.foo())
def test_single_site_uniform_mh_with_bernoulli(self):
model = self.SampleBernoulliModel()
mh = bm.SingleSiteUniformMetropolisHastings()
foo_key = model.foo()
bar_key = model.bar()
sampler = mh.sampler([foo_key], {bar_key: torch.tensor(0.0)}, num_samples=5)
for world in sampler:
self.assertTrue((foo_key in world))
self.assertTrue((bar_key in world))
self.assertTrue((foo_key in world.get_variable(bar_key).parents))
self.assertTrue((bar_key in world.get_variable(foo_key).children))
def test_single_site_uniform_mh_with_categorical(self):
model = self.SampleCategoricalModel()
mh = bm.SingleSiteUniformMetropolisHastings()
foo_key = model.foo()
bar_key = model.bar()
sampler = mh.sampler([foo_key], {bar_key: torch.tensor(0.0)}, num_samples=5)
for world in sampler:
self.assertTrue((foo_key in world))
self.assertTrue((bar_key in world))
self.assertTrue((foo_key in world.get_variable(bar_key).parents))
self.assertTrue((bar_key in world.get_variable(foo_key).children)) |
def test_average_regions_range_in_bins_end():
outfile = NamedTemporaryFile(suffix='.npz', prefix='average_region', delete=False)
matrix = (ROOT + 'small_test_matrix.cool')
bed_file = (ROOT + 'hicAverageRegions/regions_multi.bed')
args = '--matrix {} --regions {} -o {} --rangeInBins 100 100 -cb {}'.format(matrix, bed_file, outfile.name, 'end').split()
compute(hicAverageRegions.main, args, 5)
test_file = load_npz((ROOT + 'hicAverageRegions/regions_multi_range_in_bins_end.npz'))
new_file = load_npz(outfile.name)
nt.assert_almost_equal(test_file.data, new_file.data, decimal=0)
os.remove(outfile.name) |
class BatchProcessor():
def __init__(self, batch_size=50, concurrent_requests=4):
self.batch_size = batch_size
self.concurrent_requests = concurrent_requests
def process_event_requests(self, event_requests_async):
async def process():
async for _ in self.process_event_requests_generator(event_requests_async):
pass
asyncio.run(process())
async def process_event_requests_generator(self, event_requests_async):
index = 0
while (index < len(event_requests_async)):
batch = event_requests_async[index:(index + self.concurrent_requests)]
responses = []
for request in batch:
response = (await request.execute())
responses.append(response)
(yield responses)
index += self.concurrent_requests
def process_events(self, event_request_async_to_clone, events):
async def process():
async for _ in self.process_events_generator(event_request_async_to_clone, events):
pass
asyncio.run(process())
async def process_events_generator(self, event_request_async_to_clone, events):
index = 0
while (index < len(events)):
responses = []
while ((index < len(events)) and (len(responses) < self.concurrent_requests)):
event_request = event_request_async_to_clone.clone_without_events()
event_request.events = events[index:(index + self.batch_size)]
response = (await event_request.execute())
responses.append(response)
index += self.batch_size
(yield responses) |
class EventEmailTemplateForm(EmailTemplateForm):
def __init__(self, event, location):
domain = Site.objects.get_current().domain
super(EventEmailTemplateForm, self).__init__()
self.fields['sender'].initial = location.from_email()
self.fields['footer'].initial = forms.CharField(widget=forms.Textarea(attrs={'readonly': 'readonly'}))
path = reverse('gather_view_event', args=(location.slug, event.id, event.slug))
self.fields['footer'].initial = ("\nThis message was sent to attendees of the event '%s' at %s. You can view event details and update your RSVP status on the event page % (event.title, location.name, domain, path))
self.fields['recipient'].initial = ', '.join([attendee.email for attendee in list(event.attendees.all())])
self.fields['subject'].initial = (((('[' + location.email_subject_prefix) + '] Update for event "') + event.title) + '"') |
def apply_encryption(message: PlainMessage, credentials: V3, security_name: bytes, security_engine_id: bytes, engine_boots: int, engine_time: int) -> Union[(PlainMessage, EncryptedMessage)]:
if ((credentials.priv is not None) and (not credentials.priv.method)):
raise UnsupportedSecurityLevel('Encryption method is missing')
if (credentials.priv is None):
return replace(message, security_parameters=bytes(USMSecurityParameters(security_engine_id, engine_boots, engine_time, security_name, b'', b'')))
priv_method = priv.create(credentials.priv.method)
localised_key = localise_key(credentials, security_engine_id)
try:
(encrypted, salt) = priv_method.encrypt_data(localised_key, security_engine_id, engine_boots, engine_time, bytes(message.scoped_pdu))
scoped_pdu = OctetString(encrypted)
except Exception as exc:
raise EncryptionError(f'Unable to encrypt message ({exc})') from exc
unauthed_message = replace(message, scoped_pdu=scoped_pdu, security_parameters=bytes(USMSecurityParameters(security_engine_id, engine_boots, engine_time, security_name, b'', salt)))
return unauthed_message |
class OptionSeriesColumnDataDragdrop(Options):
def draggableX(self):
return self._config_get(None)
def draggableX(self, flag: bool):
self._config(flag, js_type=False)
def draggableY(self):
return self._config_get(None)
def draggableY(self, flag: bool):
self._config(flag, js_type=False)
def dragHandle(self) -> 'OptionSeriesColumnDataDragdropDraghandle':
return self._config_sub_data('dragHandle', OptionSeriesColumnDataDragdropDraghandle)
def dragMaxX(self):
return self._config_get(None)
def dragMaxX(self, num: float):
self._config(num, js_type=False)
def dragMaxY(self):
return self._config_get(None)
def dragMaxY(self, num: float):
self._config(num, js_type=False)
def dragMinX(self):
return self._config_get(None)
def dragMinX(self, num: float):
self._config(num, js_type=False)
def dragMinY(self):
return self._config_get(None)
def dragMinY(self, num: float):
self._config(num, js_type=False)
def dragPrecisionX(self):
return self._config_get(0)
def dragPrecisionX(self, num: float):
self._config(num, js_type=False)
def dragPrecisionY(self):
return self._config_get(0)
def dragPrecisionY(self, num: float):
self._config(num, js_type=False)
def dragSensitivity(self):
return self._config_get(2)
def dragSensitivity(self, num: float):
self._config(num, js_type=False)
def groupBy(self):
return self._config_get(None)
def groupBy(self, text: str):
self._config(text, js_type=False)
def guideBox(self) -> 'OptionSeriesColumnDataDragdropGuidebox':
return self._config_sub_data('guideBox', OptionSeriesColumnDataDragdropGuidebox)
def liveRedraw(self):
return self._config_get(True)
def liveRedraw(self, flag: bool):
self._config(flag, js_type=False) |
def _bail_if_private(candidate: str, allow_private: bool) -> None:
if (candidate.startswith('_') and (not allow_private) and (not (candidate.startswith('__') and candidate.endswith('__')))):
raise ValueError("It's disencouraged to patch/mock private interfaces.\nThis would result in way too coupled tests and implementation. Please consider using patterns like dependency injection instead. If you really need to do this use the allow_private=True argument.") |
def _StashRepos(repos_and_branch, params, pop=False):
commands = []
for (repo, _branch) in repos_and_branch:
if pop:
cmd = [params.config.git, 'stash', 'pop']
else:
cmd = [params.config.git, 'stash', '-u']
commands.append(ParallelCmd(repo, cmd))
ExecuteInParallel(commands) |
_flyte_cli.command('update-plugin-override', cls=_FlyteSubCommand)
_host_option
_insecure_option
_project_option
_domain_option
_optional_name_option
_click.option('--task-type', help='Task type for which to apply plugin implementation overrides')
_click.option('--plugin-id', multiple=True, help='Plugin id(s) to be used in place of the default for the task type.')
_click.option('--missing-plugin-behavior', help='Behavior when no specified plugin_id has an associated handler.', default='FAIL')
def update_plugin_override(host, insecure, project, domain, name, task_type, plugin_id, missing_plugin_behavior):
_welcome_message()
client = _get_client(host, insecure)
plugin_override = _PluginOverride(task_type, list(plugin_id), _PluginOverride.string_to_enum(missing_plugin_behavior.upper()))
matching_attributes = _MatchingAttributes(plugin_overrides=_PluginOverrides(overrides=[plugin_override]))
if (name is not None):
client.update_workflow_attributes(project, domain, name, matching_attributes)
_click.echo('Successfully updated plugin override for project: {}, domain: {}, and workflow: {}'.format(project, domain, name))
else:
client.update_project_domain_attributes(project, domain, matching_attributes)
_click.echo('Successfully updated plugin override for project: {} and domain: {}'.format(project, domain)) |
def lab_to_din99o(lab: Vector) -> Vector:
(l, a, b) = lab
val = (1 + (C2 * l))
l99o = ((C1 * math.copysign(math.log(abs(val)), val)) / KE)
if ((a == 0) and (b == 0)):
a99o = b99o = 0.0
else:
eo = ((a * math.cos(RADS)) + (b * math.sin(RADS)))
fo = (FACTOR * ((b * math.cos(RADS)) - (a * math.sin(RADS))))
go = math.sqrt(((eo ** 2) + (fo ** 2)))
val = (1 + (C3 * go))
c99o = (math.copysign(math.log(abs(val)), val) / ((C4 * KE) * KCH))
h99o = (math.atan2(fo, eo) + RADS)
a99o = (c99o * math.cos(h99o))
b99o = (c99o * math.sin(h99o))
return [l99o, a99o, b99o] |
class SlaPolicyResponseHandler(GenericZendeskResponseHandler):
def applies_to(api, response):
return get_endpoint_path(api, response).startswith('/slas')
def deserialize(self, response_json):
if ('definitions' in response_json):
definitions = self.object_mapping.object_from_json('definitions', response_json['definitions'])
return dict(definitions=definitions)
return super(SlaPolicyResponseHandler, self).deserialize(response_json)
def build(self, response):
response_json = response.json()
response_objects = self.deserialize(response_json)
if ('sla_policies' in response_objects):
return ZendeskResultGenerator(self, response.json(), response_objects=response_objects['sla_policies'])
elif ('sla_policy' in response_objects):
return response_objects['sla_policy']
elif response_objects:
return response_objects['definitions']
raise ZenpyException('Could not handle response: {}'.format(response_json)) |
class TestUserUpdateClipper():
def _init_user_model(self, param_value):
user_model = utils.TwoFC()
user_model.fill_all(param_value)
return user_model
def test_calc_clip_factor(self) -> None:
clip_factor = calc_clip_factor(clipping_value=5, norm=10)
assertAlmostEqual(clip_factor, 0.5, places=3)
clip_factor = calc_clip_factor(clipping_value=1, norm=1)
assertAlmostEqual(clip_factor, 1, places=3)
clip_factor = calc_clip_factor(clipping_value=2, norm=0.8)
assertAlmostEqual(clip_factor, 1, places=3)
def test_calc_user_update_norm(self) -> None:
model = utils.TwoFC()
model.fill_all(2.0)
model_params = model.parameters()
norm = calc_norm(model_params)
assertAlmostEqual(norm, 9., delta=1e-06)
model.fill_all(1.0)
model_params = model.parameters()
norm = calc_norm(model_params)
assertAlmostEqual(norm, 4., delta=1e-06)
def test_clipped_updates_are_smaller(self) -> None:
max_norm = 0.0003
previous_model = self._init_user_model(6)
current_model = self._init_user_model(7)
clipper = UserUpdateClipper(max_norm=max_norm)
model_diff = clipper.calc_model_diff(current_model, previous_model)
orignal = deepcopy(model_diff)
assertGreater(calc_norm(model_diff.parameters()), max_norm)
clipper.clip(model_diff)
assertAlmostEqual(calc_norm(model_diff.parameters()), max_norm, delta=1e-06)
for (o, c) in zip(orignal.parameters(), model_diff.parameters()):
assertTrue(torch.all(o.gt(c)))
def test_clipped_user_updates_non_zero(self) -> None:
max_norm = 0.0003
previous_model = self._init_user_model(6)
current_model = self._init_user_model(7)
clipper = UserUpdateClipper(max_norm=max_norm)
model_diff = clipper.calc_model_diff(current_model, previous_model)
clipper.clip(model_diff)
clipped_model_diff_params = [p for p in model_diff.parameters() if p.requires_grad]
for clipped in clipped_model_diff_params:
allzeros = torch.zeros_like(clipped)
assertFalse(torch.allclose(clipped, allzeros))
def test_clipping_to_high_value_does_not_clip(self) -> None:
max_norm = 1000
previous_model = self._init_user_model(6)
current_model = self._init_user_model(7)
clipper = UserUpdateClipper(max_norm=max_norm)
model_diff = clipper.calc_model_diff(current_model, previous_model)
original = deepcopy(model_diff)
clipper.clip(model_diff)
mismatched = utils.verify_models_equivalent_after_training(original, model_diff)
assertEmpty(mismatched, msg=mismatched) |
class LocalEnsembleReader():
def __init__(self, storage: LocalStorageReader, path: Path):
self._storage: Union[(LocalStorageReader, LocalStorageAccessor)] = storage
self._path = path
self._index = _Index.model_validate_json((path / 'index.json').read_text(encoding='utf-8'))
self._experiment_path = (self._path / 'experiment')
self._state_map = self._load_state_map()
def mount_point(self) -> Path:
return self._path
def name(self) -> str:
return self._index.name
def id(self) -> UUID:
return self._index.id
def experiment_id(self) -> UUID:
return self._index.experiment_id
def ensemble_size(self) -> int:
return self._index.ensemble_size
def started_at(self) -> datetime:
return self._index.started_at
def iteration(self) -> int:
return self._index.iteration
def state_map(self) -> List[RealizationStorageState]:
return self._state_map
def experiment(self) -> Union[(LocalExperimentReader, LocalExperimentAccessor)]:
return self._storage.get_experiment(self.experiment_id)
def is_initalized(self) -> bool:
return ((RealizationStorageState.INITIALIZED in self.state_map) or self.has_data)
def has_data(self) -> bool:
return (RealizationStorageState.HAS_DATA in self.state_map)
def close(self) -> None:
self.sync()
def sync(self) -> None:
pass
def get_realization_mask_from_state(self, states: List[RealizationStorageState]) -> npt.NDArray[np.bool_]:
return np.array([(s in states) for s in self._state_map], dtype=bool)
def _load_state_map(self) -> List[RealizationStorageState]:
state_map_file = (self._experiment_path / 'state_map.json')
if state_map_file.exists():
with open(state_map_file, 'r', encoding='utf-8') as f:
data = json.load(f)
return [RealizationStorageState(v) for v in data['state_map']]
else:
return [RealizationStorageState.UNDEFINED for _ in range(self.ensemble_size)]
def realizations_initialized(self, realizations: List[int]) -> bool:
initialized_realizations = set(self.realization_list(RealizationStorageState.INITIALIZED))
return all(((real in initialized_realizations) for real in realizations))
def has_parameter_group(self, group: str) -> bool:
param_group_file = (self.mount_point / f'realization-0/{group}.nc')
return param_group_file.exists()
def _filter_active_realizations(self, realization_index: Optional[int]=None) -> List[int]:
realizations = self.realization_list(RealizationStorageState.HAS_DATA)
if (realization_index is not None):
if (realization_index not in realizations):
raise IndexError(f'No such realization {realization_index}')
realizations = [realization_index]
return realizations
def realization_list(self, state: RealizationStorageState) -> List[int]:
return [i for (i, s) in enumerate(self._state_map) if (s == state)]
def get_summary_keyset(self) -> List[str]:
realization_folders = list(self.mount_point.glob('realization-*'))
if (not realization_folders):
return []
summary_path = (realization_folders[0] / 'summary.nc')
if (not summary_path.exists()):
return []
realization_nr = int(str(realization_folders[0])[(- 1)])
response = self.load_responses('summary', (realization_nr,))
keys = sorted(response['name'].values)
return keys
def _get_gen_data_config(self, key: str) -> GenDataConfig:
config = self.experiment.response_configuration[key]
assert isinstance(config, GenDataConfig)
return config
def get_gen_data_keyset(self) -> List[str]:
keylist = [k for (k, v) in self.experiment.response_info.items() if (('_ert_kind' in v) and (v['_ert_kind'] == 'GenDataConfig'))]
gen_data_list = []
for key in keylist:
gen_data_config = self._get_gen_data_config(key)
if (gen_data_config.report_steps is None):
gen_data_list.append(f'{key}')
else:
for report_step in gen_data_config.report_steps:
gen_data_list.append(f'{key}{report_step}')
return sorted(gen_data_list, key=(lambda k: k.lower()))
def get_gen_kw_keyset(self) -> List[str]:
gen_kw_list = []
for key in self.experiment.parameter_info:
gen_kw_config = self.experiment.parameter_configuration[key]
assert isinstance(gen_kw_config, GenKwConfig)
for keyword in [e.name for e in gen_kw_config.transfer_functions]:
gen_kw_list.append(f'{key}:{keyword}')
if gen_kw_config.shouldUseLogScale(keyword):
gen_kw_list.append(f'LOG10_{key}:{keyword}')
return sorted(gen_kw_list, key=(lambda k: k.lower()))
def _load_single_dataset(self, group: str, realization: int) -> xr.Dataset:
try:
return xr.open_dataset(((self.mount_point / f'realization-{realization}') / f'{group}.nc'), engine='scipy')
except FileNotFoundError as e:
raise KeyError(f"No dataset '{group}' in storage for realization {realization}") from e
def _load_dataset(self, group: str, realizations: Union[(int, npt.NDArray[np.int_], None)]) -> xr.Dataset:
if isinstance(realizations, int):
return self._load_single_dataset(group, realizations).isel(realizations=0, drop=True)
if (realizations is None):
datasets = [xr.open_dataset(p, engine='scipy') for p in sorted(self.mount_point.glob(f'realization-*/{group}.nc'))]
else:
datasets = [self._load_single_dataset(group, i) for i in realizations]
return xr.combine_nested(datasets, 'realizations')
def load_parameters(self, group: str, realizations: Union[(int, npt.NDArray[np.int_], None)]=None) -> xr.Dataset:
return self._load_dataset(group, realizations)
_cache
def load_responses(self, key: str, realizations: npt.NDArray[np.int_]) -> xr.Dataset:
if (key not in self.experiment.response_configuration):
raise ValueError(f'{key} is not a response')
loaded = []
for realization in realizations:
input_path = ((self.mount_point / f'realization-{realization}') / f'{key}.nc')
if (not input_path.exists()):
raise KeyError(f'No response for key {key}, realization: {realization}')
ds = xr.open_dataset(input_path, engine='scipy')
loaded.append(ds)
response = xr.combine_nested(loaded, concat_dim='realization')
assert isinstance(response, xr.Dataset)
return response
def load_all_summary_data(self, keys: Optional[List[str]]=None, realization_index: Optional[int]=None) -> pd.DataFrame:
summary_keys = self.get_summary_keyset()
try:
df = self.load_responses('summary', tuple(self._filter_active_realizations(realization_index))).to_dataframe()
except (ValueError, KeyError):
return pd.DataFrame()
df = df.unstack(level='name')
df.columns = [col[1] for col in df.columns.values]
df.index = df.index.rename({'time': 'Date', 'realization': 'Realization'}).reorder_levels(['Realization', 'Date'])
if keys:
summary_keys = sorted([key for key in keys if (key in summary_keys)])
return df[summary_keys]
return df
def load_gen_data(self, key: str, report_step: int, realization_index: Optional[int]=None) -> pd.DataFrame:
realizations = self._filter_active_realizations(realization_index)
try:
vals = self.load_responses(key, tuple(realizations)).sel(report_step=report_step, drop=True)
except KeyError as e:
raise KeyError(f'Missing response: {key}') from e
index = pd.Index(vals.index.values, name='axis')
return pd.DataFrame(data=vals['values'].values.reshape(len(vals.realization), (- 1)).T, index=index, columns=realizations)
def load_all_gen_kw_data(self, group: Optional[str]=None, realization_index: Optional[int]=None) -> pd.DataFrame:
ens_mask = self.get_realization_mask_from_state([RealizationStorageState.INITIALIZED, RealizationStorageState.HAS_DATA])
realizations = (np.array([realization_index]) if (realization_index is not None) else np.flatnonzero(ens_mask))
dataframes = []
gen_kws = [config for config in self.experiment.parameter_configuration.values() if isinstance(config, GenKwConfig)]
if group:
gen_kws = [config for config in gen_kws if (config.name == group)]
for key in gen_kws:
try:
ds = self.load_parameters(key.name, realizations)['transformed_values']
assert isinstance(ds, xr.DataArray)
ds['names'] = np.char.add(f'{key.name}:', ds['names'].astype(np.str_))
df = ds.to_dataframe().unstack(level='names')
df.columns = df.columns.droplevel()
for parameter in df.columns:
if key.shouldUseLogScale(parameter.split(':')[1]):
df[f'LOG10_{parameter}'] = np.log10(df[parameter])
dataframes.append(df)
except KeyError:
pass
if (not dataframes):
return pd.DataFrame()
dataframe = pd.concat(dataframes, axis=1)
dataframe.columns.name = None
dataframe.index.name = 'Realization'
return dataframe.sort_index(axis=1) |
def gen_function_call(func_attrs, backend_spec, indent=' ', bias_add=False):
x = func_attrs['inputs'][0]
xshape = x._attrs['shape']
y = func_attrs['outputs'][0]
yshape = y._attrs['shape']
if bias_add:
r = func_attrs['inputs'][1]
return FUNC_CALL_TEMPLATE.render(func_name=func_attrs['name'], index_type=backend_spec.index_type, in_ptr=x._attrs['name'], res_ptr=r._attrs['name'], out_ptr=y._attrs['name'], p_batch=('&' + xshape[0]._attrs['name']), p_in_ch=('&' + xshape[3]._attrs['name']), p_in_h=('&' + xshape[1]._attrs['name']), p_in_w=('&' + xshape[2]._attrs['name']), p_out_batch=('&' + yshape[0]._attrs['name']), p_out_h=('&' + yshape[1]._attrs['name']), p_out_w=('&' + yshape[2]._attrs['name']), indent=indent, bias_add=bias_add)
else:
return FUNC_CALL_TEMPLATE.render(func_name=func_attrs['name'], index_type=backend_spec.index_type, in_ptr=x._attrs['name'], out_ptr=y._attrs['name'], p_batch=('&' + xshape[0]._attrs['name']), p_in_ch=('&' + xshape[3]._attrs['name']), p_in_h=('&' + xshape[1]._attrs['name']), p_in_w=('&' + xshape[2]._attrs['name']), p_out_batch=('&' + yshape[0]._attrs['name']), p_out_h=('&' + yshape[1]._attrs['name']), p_out_w=('&' + yshape[2]._attrs['name']), indent=indent, bias_add=bias_add) |
class HFConfigKeys():
def conv_rotary_embedding_base(config: GPTNeoXConfig) -> int:
assert (config.layer.attention.rotary_embeddings is not None)
return config.layer.attention.rotary_embeddings.rotary_base
def conv_rotary_embedding_fraction(config: GPTNeoXConfig) -> float:
assert (config.layer.attention.rotary_embeddings is not None)
return config.layer.attention.rotary_embeddings.rotary_fraction
ROTARY_EMB_BASE = HFConfigKey('rotary_emb_base', 'rotary_embedding_base', (lambda c: HFConfigKeys.conv_rotary_embedding_base(c)))
ROTARY_PCT = HFConfigKey('rotary_pct', 'rotary_embedding_fraction', (lambda c: HFConfigKeys.conv_rotary_embedding_fraction(c))) |
class LRUCache():
def __init__(self, capacity: int):
self.capacity = capacity
self.cache = {}
self.head = ListNode(None, None)
self.tail = ListNode(None, None)
self.head.next = self.tail
self.tail.prev = self.head
def get(self, key: int) -> int:
if (key not in self.cache):
return (- 1)
node = self.cache[key]
self.delete_node(node)
self.insert_after_head(node)
return node.val
def delete_node(self, node: ListNode) -> None:
node.prev.next = node.next
node.next.prev = node.prev
node.next = None
node.prev = None
def insert_after_head(self, node: ListNode) -> None:
second = self.head.next
self.head.next = node
node.next = second
second.prev = node
node.prev = self.head
def put(self, key: int, value: int) -> None:
if (key in self.cache):
self.get(key)
self.cache[key].val = value
return
if (len(self.cache) >= self.capacity):
second_last = self.tail.prev
self.delete_node(second_last)
del self.cache[second_last.key]
node = ListNode(key, value)
self.cache[key] = node
self.insert_after_head(node)
def debug(self):
curr = self.head.next
print(self.cache)
while (curr != self.tail):
print(curr.key, curr.val, end=' ')
curr = curr.next
print() |
class ObjectWithEqualityComparisonMode(HasTraits):
list_values = List(comparison_mode=ComparisonMode.equality)
dict_values = Dict(comparison_mode=ComparisonMode.equality)
set_values = Set(comparison_mode=ComparisonMode.equality)
number = Any(comparison_mode=ComparisonMode.equality)
calculated = Property(depends_on='number')
def _get_calculated(self):
return None |
class Driver():
def __init__(self, user, password, db, u_search='', g_search='', c_search='', regex=''):
try:
self.driver = GraphDatabase.driver('neo4j://localhost:7687', auth=(user, password))
self.database = db
self.user_search = u_search
self.group_search = g_search
self.computer_search = c_search
self.regex = regex
self.queries = {'1': {'query': 'MATCH (n:User {hasspn: true}) RETURN n.name AS result ORDER BY n.name', 'desc': 'List all kerberoastable users', 'message_generator': (lambda r: (((r.get('result') is not None) and f"{log.default}User {log.reset}{log.red}{r['result']}{log.reset}{log.default} is kerberoastable{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '2': {'query': 'MATCH (n:User {owned: true, hasspn: true}) RETURN n.name AS result ORDER BY n.name', 'desc': 'List all kerberoastable users for owned principals', 'message_generator': (lambda r: (((r.get('result') is not None) and f"{log.default}User {log.reset}{log.red}{r['result']}{log.reset}{log.default} is kerberoastable{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '3': {'query': 'MATCH p=(u:User)-[:CanRDP]->(c:Computer) RETURN u.name,c.name ORDER BY u.name', 'desc': 'List all user RDP privileges', 'message_generator': (lambda r: ((((r.get('u.name') is not None) and (r.get('c.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['u.name']}{log.reset}{log.default} CanRDP to {log.reset}{log.red}{r['c.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '4': {'query': 'MATCH p=(g:Group)-[:CanRDP]->(c:Computer) RETURN g.name,c.name ORDER BY g.name', 'desc': 'List all group RDP privileges', 'message_generator': (lambda r: ((((r.get('g.name') is not None) and (r.get('c.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['g.name']}{log.reset}{log.default} CanRDP to {log.reset}{log.red}{r['c.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '5': {'query': 'MATCH p=(g:Group)-[:CanRDP]->(c:Computer) WHERE (g.objectid =~ "(?i)S-1-5-21-.*-513" OR g.objectid =~ "(?i).*-S-1-5-11" OR g.objectid =~ "(?i).*-S-1-1-0" OR g.objectid =~ "(?i).*-S-1-5-32-545") RETURN g.name,c.name ORDER BY g.name', 'desc': 'List all RDP privileges for Users, Domain Users, Authenticated Users, or Everyone groups', 'message_generator': (lambda r: ((((r.get('g.name') is not None) and (r.get('c.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['g.name']}{log.reset}{log.default} CanRDP to {log.reset}{log.red}{r['c.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '6': {'query': 'MATCH p=(m:Group)-[:MemberOf]->(g:Group)-[:CanRDP]->(n:Computer) WHERE (m.objectid =~ "(?i)S-1-5-21-.*-513" OR m.objectid =~ "(?i).*-S-1-5-11" OR m.objectid =~ "(?i).*-S-1-1-0" OR m.objectid =~ "(?i).*-S-1-5-32-545") RETURN m.name,n.name,g.name ORDER BY m.name', 'desc': 'List all group-delegated RDP privileges for Users, Domain Users, Authenticated Users, or Everyone groups', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None) and (r.get('g.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} is MemberOf {log.reset}{log.red}{r['g.name']} {log.reset}{log.default}which CanRDP to {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '7': {'query': 'MATCH p=(m {owned: true})-[:CanRDP]->(c:Computer) RETURN m.name,c.name,labels(m) ORDER BY m.name', 'desc': 'List all RDP privileges for owned principals', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('c.name') is not None)) and f"{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}{log.default} CanRDP to {log.reset}{log.red}{r['c.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '8': {'query': 'MATCH (n {owned: true})-[:MemberOf]->(g:Group)-[:CanRDP]->(m:Computer) RETURN n.name,labels(n),m.name,g.name ORDER BY n.name', 'desc': 'List all group-delegated RDP privileges for owned principals', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None) and (r.get('g.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} is MemberOf {log.reset}{log.red}{r['g.name']} {log.reset}{log.default}which CanRDP to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '9': {'query': 'MATCH (c:Computer {unconstraineddelegation: true}) RETURN c.name ORDER BY c.name', 'desc': 'List all Unconstrained Delegation', 'message_generator': (lambda r: (((r.get('c.name') is not None) and f"{log.default}Computer {log.reset}{log.red}{r['c.name']}{log.reset}{log.default} has unconstrained delegation privilege{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '10': {'query': "MATCH (H:Computer) WHERE H.operatingsystem =~ '.*(2000|2003|2008|xp|vista|7|me).*' RETURN H.name,H.operatingsystem ORDER BY H.name", 'desc': 'List all unsupported OSs', 'message_generator': (lambda r: ((((r.get('H.name') is not None) and (r.get('H.operatingsystem') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['H.name']}{log.reset}{log.default} is unsupported with OS {log.reset}{log.red}{r['H.operatingsystem']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '11': {'query': "MATCH (g:Group) WHERE g.name =~ '.*((?i)admin|adm).*' RETURN g.name ORDER BY g.name", 'desc': 'List groups containing "admin"', 'message_generator': (lambda r: (((r.get('g.name') is not None) and f"{log.default}Admin group {log.reset}{log.red}{r['g.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '12': {'query': "MATCH (u:User) WHERE u.name =~ '.*((?i)admin|adm).*' RETURN u.name ORDER BY u.name", 'desc': 'List users containing "admin"', 'message_generator': (lambda r: (((r.get('u.name') is not None) and f"{log.default}Admin user {log.reset}{log.red}{r['u.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '13': {'query': 'MATCH p=shortestPath((m:User)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)admin|adm).*" AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all user shortest paths to admin groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '14': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)admin|adm).*" AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all group shortest paths to admin groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '15': {'query': 'MATCH p=shortestPath((m:Computer)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)admin|adm).*" AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all computer shortest paths to admin groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '16': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE (m.objectid =~ "(?i)S-1-5-21-.*-513" OR m.objectid =~ "(?i).*-S-1-5-11" OR m.objectid =~ "(?i).*-S-1-1-0" OR m.objectid =~ "(?i).*-S-1-5-32-545") AND n.name =~ ".*((?i)admin|adm).*" AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to admin groups for Users, Domain Users, Authenticated Users, or Everyone groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '17': {'query': 'MATCH p=shortestPath((m {owned: true})-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)admin|adm).*" AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to admin groups for owned principals', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '18': {'query': "MATCH (g:Group) WHERE g.name =~ '.*((?i)sql).*' RETURN g.name ORDER BY g.name", 'desc': 'List groups containing "sql"', 'message_generator': (lambda r: (((r.get('g.name') is not None) and f"{log.default}SQL group {log.reset}{log.red}{r['g.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '19': {'query': "MATCH (u:User) WHERE u.name =~ '.*((?i)sql).*' RETURN u.name ORDER BY u.name", 'desc': 'List users containing "sql"', 'message_generator': (lambda r: (((r.get('u.name') is not None) and f"{log.default}SQL user {log.reset}{log.red}{r['u.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '20': {'query': "MATCH (c:Computer) WHERE c.name =~ '.*((?i)sql).*' RETURN c.name ORDER BY c.name", 'desc': 'List computers containing "sql"', 'message_generator': (lambda r: (((r.get('c.name') is not None) and f"{log.default}SQL computer {log.reset}{log.red}{r['c.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '21': {'query': 'MATCH p=shortestPath((m:User)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)SQL).*" AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all user shortest paths to SQL groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '22': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)SQL).*" AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all group shortest paths to SQL groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '23': {'query': 'MATCH p=shortestPath((m:Computer)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)SQL).*" AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all computer shortest paths to SQL groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '24': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE (m.objectid =~ "(?i)S-1-5-21-.*-513" OR m.objectid =~ "(?i).*-S-1-5-11" OR m.objectid =~ "(?i).*-S-1-1-0" OR m.objectid =~ "(?i).*-S-1-5-32-545") AND n.name =~ ".*((?i)SQL).*" AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to SQL groups for Users, Domain Users, Authenticated Users, or Everyone groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '25': {'query': 'MATCH p=shortestPath((m {owned: true})-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)SQL).*" AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to SQL groups for owned principals', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '26': {'query': "MATCH (u:User) WHERE u.name =~ '.*((?i)svc|service).*' RETURN u.name ORDER BY u.name", 'desc': 'List users containing "svc/service"', 'message_generator': (lambda r: (((r.get('u.name') is not None) and f"{log.default}Service user {log.reset}{log.red}{r['u.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '27': {'query': "MATCH (g:Group) WHERE g.name =~ '.*((?i)svc|service).*' RETURN g.name ORDER BY g.name", 'desc': 'List groups containing "svc/service"', 'message_generator': (lambda r: (((r.get('g.name') is not None) and f"{log.default}Service group {log.reset}{log.red}{r['g.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '28': {'query': 'MATCH p=shortestPath((m:User)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)service|svc).*" AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all user shortest paths to service groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '29': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)service|svc).*" AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all group shortest paths to service groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '30': {'query': 'MATCH p=shortestPath((m:Computer)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)service|svc).*" AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all computer shortest paths to service groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '31': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE (m.objectid =~ "(?i)S-1-5-21-.*-513" OR m.objectid =~ "(?i).*-S-1-5-11" OR m.objectid =~ "(?i).*-S-1-1-0" OR m.objectid =~ "(?i).*-S-1-5-32-545") AND n.name =~ ".*((?i)service|svc).*" AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to service groups for Users, Domain Users, Authenticated Users, or Everyone groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '32': {'query': 'MATCH p=shortestPath((m {owned: true})-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)service|svc).*" AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to service groups for owned principals', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '33': {'query': "MATCH (u:User) WHERE u.name =~ '.*((?i)web).*' RETURN u.name ORDER BY u.name", 'desc': 'List users containing "web"', 'message_generator': (lambda r: (((r.get('u.name') is not None) and f"{log.default}Web user {log.reset}{log.red}{r['u.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '34': {'query': "MATCH (g:Group) WHERE g.name =~ '.*((?i)web).*' RETURN g.name ORDER BY g.name", 'desc': 'List groups containing "web"', 'message_generator': (lambda r: (((r.get('g.name') is not None) and f"{log.default}Web group {log.reset}{log.red}{r['g.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '35': {'query': "MATCH (c:Computer) WHERE c.name =~ '.*((?i)web).*' RETURN c.name ORDER BY c.name", 'desc': 'List computers containing "web"', 'message_generator': (lambda r: (((r.get('c.name') is not None) and f"{log.default}Web computer {log.reset}{log.red}{r['c.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '36': {'query': 'MATCH p=shortestPath((m:User)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)WEB).*" AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all user shortest paths to web groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '37': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)WEB).*" AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all group shortest paths to web groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '38': {'query': 'MATCH p=shortestPath((m:Computer)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)WEB).*" AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all computer shortest paths to web groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '39': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE (m.objectid =~ "(?i)S-1-5-21-.*-513" OR m.objectid =~ "(?i).*-S-1-5-11" OR m.objectid =~ "(?i).*-S-1-1-0" OR m.objectid =~ "(?i).*-S-1-5-32-545") AND n.name =~ ".*((?i)WEB).*" AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to web groups for Users, Domain Users, Authenticated Users, or Everyone groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '40': {'query': 'MATCH p=shortestPath((m {owned: true})-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)WEB).*" AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to web groups for owned principals', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '41': {'query': "MATCH (u:User) WHERE u.name =~ '.*((?i)dev).*' RETURN u.name ORDER BY u.name", 'desc': 'List users containing "dev"', 'message_generator': (lambda r: (((r.get('u.name') is not None) and f"{log.default}Dev user {log.reset}{log.red}{r['u.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '42': {'query': "MATCH (g:Group) WHERE g.name =~ '.*((?i)dev).*' RETURN g.name ORDER BY g.name", 'desc': 'List groups containing "dev"', 'message_generator': (lambda r: (((r.get('g.name') is not None) and f"{log.default}Dev group {log.reset}{log.red}{r['g.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '43': {'query': "MATCH (c:Computer) WHERE c.name =~ '.*((?i)dev).*' RETURN c.name ORDER BY c.name", 'desc': 'List computers containing "dev"', 'message_generator': (lambda r: (((r.get('c.name') is not None) and f"{log.default}Dev computer {log.reset}{log.red}{r['c.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '44': {'query': "MATCH (u:User) WHERE u.name =~ '.*((?i)prod).*' RETURN u.name ORDER BY u.name", 'desc': 'List users containing "prod"', 'message_generator': (lambda r: (((r.get('u.name') is not None) and f"{log.default}Prod user {log.reset}{log.red}{r['u.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '45': {'query': "MATCH (g:Group) WHERE g.name =~ '.*((?i)prod).*' RETURN g.name ORDER BY g.name", 'desc': 'List groups containing "prod"', 'message_generator': (lambda r: (((r.get('g.name') is not None) and f"{log.default}Prod group {log.reset}{log.red}{r['g.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '46': {'query': "MATCH (c:Computer) WHERE c.name =~ '.*((?i)prod).*' RETURN c.name ORDER BY c.name", 'desc': 'List computers containing "prod"', 'message_generator': (lambda r: (((r.get('c.name') is not None) and f"{log.default}Prod computer {log.reset}{log.red}{r['c.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '47': {'query': 'MATCH (n:Group) WHERE n.objectid =~ "(?i)S-1-5-21-.*-512" WITH n MATCH p=(n)<-[r:MemberOf*1..]-(m) RETURN m.name ORDER BY m.name', 'desc': 'List all Domain Admins', 'message_generator': (lambda r: (((r.get('m.name') is not None) and f"{log.default}User {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} is MemberOf Domain Admins{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '48': {'query': 'MATCH p=shortestPath((m:User)-[r*1..]->(n:Group)) WHERE n.objectid =~ "(?i)S-1-5-21-.*-512" AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all user shortest paths to Domain Admins', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '49': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE n.objectid =~ "(?i)S-1-5-21-.*-512" AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all group shortest paths to Domain Admins', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '50': {'query': 'MATCH p=shortestPath((m:Computer)-[r*1..]->(n:Group)) WHERE n.objectid =~ "(?i)S-1-5-21-.*-512" AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all computer shortest paths to Domain Admins', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '51': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE (m.objectid =~ "(?i)S-1-5-21-.*-513" OR m.objectid =~ "(?i).*-S-1-5-11" OR m.objectid =~ "(?i).*-S-1-1-0" OR m.objectid =~ "(?i).*-S-1-5-32-545") AND n.objectid =~ "(?i)S-1-5-21-.*-512" AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to Domain Admins for Users, Domain Users, Authenticated Users, or Everyone groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '52': {'query': 'MATCH p=shortestPath((m {owned: true})-[r*1..]->(n:Group)) WHERE n.objectid =~ "(?i)S-1-5-21-.*-512" AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to Domain Admins for owned principals', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '53': {'query': 'MATCH (n:Group) WHERE n.objectid =~ "(?i)S-1-5-21-.*-519" WITH n MATCH p=(n)<-[r:MemberOf*1..]-(m) RETURN m.name ORDER BY m.name', 'desc': 'List all Enterprise Admins', 'message_generator': (lambda r: (((r.get('m.name') is not None) and f"{log.default}User {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} is MemberOf Enterprise Admins{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '54': {'query': 'MATCH p=shortestPath((m:User)-[r*1..]->(n:Group)) WHERE n.objectid =~ "(?i)S-1-5-21-.*-519" AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all user shortest paths to Enterprise Admins', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '55': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE n.objectid =~ "(?i)S-1-5-21-.*-519" AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all group shortest paths to Enterprise Admins', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '56': {'query': 'MATCH p=shortestPath((m:Computer)-[r*1..]->(n:Group)) WHERE n.objectid =~ "(?i)S-1-5-21-.*-519" AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all computer shortest paths to Enterprise Admins', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '57': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE (m.objectid =~ "(?i)S-1-5-21-.*-513" OR m.objectid =~ "(?i).*-S-1-5-11" OR m.objectid =~ "(?i).*-S-1-1-0" OR m.objectid =~ "(?i).*-S-1-5-32-545") AND n.objectid =~ "(?i)S-1-5-21-.*-519" AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to Enterprise Admins for Users, Domain Users, Authenticated Users, or Everyone groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '58': {'query': 'MATCH p=shortestPath((m {owned: true})-[r*1..]->(n:Group)) WHERE n.objectid =~ "(?i)S-1-5-21-.*-519" AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to Enterprise Admins for owned principals', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '59': {'query': 'MATCH p=(m:Computer)-[r:HasSession]->(n:User) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all sessions', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} HasSession on {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '60': {'query': 'MATCH p=(m:Computer)-[r:HasSession]->(n:User {owned: true}) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all sessions for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} HasSession on {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '61': {'query': 'MATCH (u:User {dontreqpreauth: true}) RETURN u.name ORDER BY u.name', 'desc': 'List all AS-REP roastable users', 'message_generator': (lambda r: (((r.get('u.name') is not None) and f"{log.default}User {log.reset}{log.red}{r['u.name']}{log.reset}{log.default} is AS-REP roastable{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '62': {'query': 'MATCH (u:User {dontreqpreauth: true, owned: true}) RETURN u.name ORDER BY u.name', 'desc': 'List all AS-REP roastable users for owned principals', 'message_generator': (lambda r: (((r.get('u.name') is not None) and f"{log.default}User {log.reset}{log.red}{r['u.name']}{log.reset}{log.default} is AS-REP roastable{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '63': {'query': 'MATCH (m:User {highvalue: true}) RETURN m.name ORDER BY m.name', 'desc': 'List all high-value users', 'message_generator': (lambda r: (((r.get('m.name') is not None) and f"{log.default}User {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} is high value{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '64': {'query': 'MATCH (m:Group {highvalue: true}) RETURN m.name ORDER BY m.name', 'desc': 'List all high-value groups', 'message_generator': (lambda r: (((r.get('m.name') is not None) and f"{log.default}Group {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} is high value{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '65': {'query': 'MATCH (m:Computer {highvalue: true}) RETURN m.name ORDER BY m.name', 'desc': 'List all high-value computers', 'message_generator': (lambda r: (((r.get('m.name') is not None) and f"{log.default}Computer {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} is high value{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '66': {'query': 'MATCH p=(n {highvalue: true}) RETURN n.name,labels(n) ORDER BY n.name', 'desc': 'List all high-value principals', 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} is high value{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '67': {'query': 'MATCH (m {highvalue: true, owned: true}) RETURN m.name,labels(m) ORDER BY m.name', 'desc': 'List all high-value owned principals', 'message_generator': (lambda r: (((r.get('m.name') is not None) and f"{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}{log.default} is high value{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '68': {'query': 'MATCH p=(n:User)-[r:MemberOf*1..]->(m:Group {highvalue: true}) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all members of high-value groups', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is MemberOf high value group {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '69': {'query': 'MATCH p=(n {owned: true})-[r:MemberOf*1..]->(m:Group {highvalue: true}) RETURN n.name,m.name,labels(n) ORDER BY n.name', 'desc': 'List all members of high-value groups for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} is MemberOf high value group {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '70': {'query': 'MATCH (m:User),(n {highvalue: true}),p=shortestPath((m)-[r*1..]->(n)) WHERE NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") AND NOT m=n RETURN m.name,p ORDER BY m.name', 'desc': 'List all user shortest paths to high-value targets', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '71': {'query': 'MATCH (m:Group),(n {highvalue: true}),p=shortestPath((m)-[r*1..]->(n)) WHERE NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") AND NOT m=n RETURN m.name,p ORDER BY m.name', 'desc': 'List all group shortest paths to high-value targets', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '72': {'query': 'MATCH (m:Computer),(n {highvalue: true}),p=shortestPath((m)-[r*1..]->(n)) WHERE NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") AND NOT m=n RETURN m.name,p ORDER BY m.name', 'desc': 'List all computer shortest paths to high-value targets', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '73': {'query': 'MATCH (m:Group),(n {highvalue: true}),p=shortestPath((m)-[r*1..]->(n)) WHERE (m.objectid =~ "(?i)S-1-5-21-.*-513" OR m.objectid =~ "(?i).*-S-1-5-11" OR m.objectid =~ "(?i).*-S-1-1-0" OR m.objectid =~ "(?i).*-S-1-5-32-545") AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") AND NOT m=n RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to high-value targets for Users, Domain Users, Authenticated Users, or Everyone groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '74': {'query': 'MATCH (m {owned: true}),(n {highvalue: true}),p=shortestPath((m)-[r*1..]->(n)) WHERE NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") AND NOT m=n RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to high-value targets for owned principals', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '75': {'query': 'MATCH p=shortestPath((m:User)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)EXCHANGE).*" AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all user shortest paths to Exchange groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '76': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)EXCHANGE).*" AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all group shortest paths to Exchange groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '77': {'query': 'MATCH p=shortestPath((m:Computer)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)EXCHANGE).*" AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all computer shortest paths to Exchange groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '78': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE (m.objectid =~ "(?i)S-1-5-21-.*-513" OR m.objectid =~ "(?i).*-S-1-5-11" OR m.objectid =~ "(?i).*-S-1-1-0" OR m.objectid =~ "(?i).*-S-1-5-32-545") AND n.name =~ ".*((?i)EXCHANGE).*" AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") AND NOT m=n RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to Exchange groups for Users, Domain Users, Authenticated Users, or Everyone groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '79': {'query': 'MATCH p=shortestPath((m {owned: true})-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)EXCHANGE).*" AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") AND NOT m=n RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to Exchange groups for owned principals', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '80': {'query': 'MATCH p=(m:User)-[r:AdminTo]->(n:Computer) RETURN m.name, n.name ORDER BY m.name', 'desc': 'List all user AdminTo privileges', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} is AdminTo {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '81': {'query': 'MATCH p=(m:Group)-[r:AdminTo]->(n:Computer) RETURN m.name,n.name ORDER BY m.name', 'desc': 'List all group AdminTo privileges', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} is AdminTo {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '82': {'query': 'MATCH p=(m:Computer)-[r:AdminTo]->(n:Computer) RETURN m.name,n.name ORDER BY m.name', 'desc': 'List all computer AdminTo privileges', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} is AdminTo {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '83': {'query': 'MATCH p=(m:Group)-[r:AdminTo]->(n:Computer) WHERE (m.objectid =~ "(?i)S-1-5-21-.*-513" OR m.objectid =~ "(?i).*-S-1-5-11" OR m.objectid =~ "(?i).*-S-1-1-0" OR m.objectid =~ "(?i).*-S-1-5-32-545") RETURN m.name,n.name ORDER BY m.name', 'desc': 'List all AdminTo privileges for Users, Domain Users, Authenticated Users, or Everyone groups', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} is AdminTo {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '84': {'query': 'MATCH p=(m:Group)-[:MemberOf]->(g:Group)-[:AdminTo]->(n:Computer) WHERE (m.objectid =~ "(?i)S-1-5-21-.*-513" OR m.objectid =~ "(?i).*-S-1-5-11" OR m.objectid =~ "(?i).*-S-1-1-0" OR m.objectid =~ "(?i).*-S-1-5-32-545") RETURN m.name,n.name,g.name ORDER BY m.name', 'desc': 'List all group-delegated AdminTo privileges for Users, Domain Users, Authenticated Users, or Everyone groups', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None) and (r.get('g.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} is MemberOf {log.reset}{log.red}{r['g.name']} {log.reset}{log.default}which is AdminTo {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '85': {'query': 'MATCH p=(m {owned: true})-[r:AdminTo]->(n:Computer) RETURN m.name,n.name,labels(m) ORDER BY m.name', 'desc': 'List all AdminTo privileges for owned principals', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}{log.default} is AdminTo {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '86': {'query': 'MATCH (n {owned: true})-[:MemberOf]->(g:Group)-[:AdminTo]->(m:Computer) RETURN n.name,labels(n),m.name,g.name ORDER BY n.name', 'desc': 'List all group-delegated AdminTo privileges for owned principals', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None) and (r.get('g.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} is MemberOf {log.reset}{log.red}{r['g.name']} {log.reset}{log.default}which is AdminTo {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '87': {'query': 'MATCH p=(n:User)-[r:ReadLAPSPassword]->(m:Computer) RETURN n.name,m.name ORDER by n.name', 'desc': 'List all user ReadLAPSPassword privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can read LAPS passwords for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '88': {'query': 'MATCH p=(n:Group)-[r:ReadLAPSPassword]->(m:Computer) RETURN n.name,m.name ORDER by n.name', 'desc': 'List all group ReadLAPSPassword privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can read LAPS passwords for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '89': {'query': 'MATCH p=(n:Computer)-[r:ReadLAPSPassword]->(m:Computer) RETURN n.name,m.name ORDER by n.name', 'desc': 'List all computer ReadLAPSPassword privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can read LAPS passwords for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '90': {'query': 'MATCH p=(n:Group)-[r:ReadLAPSPassword]->(m:Computer) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,m.name ORDER by n.name', 'desc': 'List all ReadLAPSPassword privileges for Users, Domain Users, Authenticated Users, or Everyone groups', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can read LAPS passwords for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '91': {'query': 'MATCH p=(m {owned: true})-[r:ReadLAPSPassword]->(n:Computer) RETURN n.name,m.name,labels(m) ORDER by m.name', 'desc': 'List all ReadLAPSPassword privileges for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}{log.default} can read LAPS passwords for {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '92': {'query': 'MATCH p=(n:User)-[r:SyncLAPSPassword]->(m:Computer) RETURN n.name,m.name ORDER by n.name', 'desc': 'List all user SyncLAPSPassword privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can sync LAPS passwords for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '93': {'query': 'MATCH p=(n:Group)-[r:SyncLAPSPassword]->(m:Computer) RETURN n.name,m.name ORDER by n.name', 'desc': 'List all group SyncLAPSPassword privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can sync LAPS passwords for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '94': {'query': 'MATCH p=(n:Computer)-[r:SyncLAPSPassword]->(m:Computer) RETURN n.name,m.name ORDER by n.name', 'desc': 'List all computer SyncLAPSPassword privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can sync LAPS passwords for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '95': {'query': 'MATCH p=(n:Group)-[r:SyncLAPSPassword]->(m:Computer) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,m.name ORDER by n.name', 'desc': 'List all SyncLAPSPassword privileges for Users, Domain Users, Authenticated Users, or Everyone groups', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can sync LAPS passwords for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '96': {'query': 'MATCH p=(m {owned: true})-[r:SyncLAPSPassword]->(n:Computer) RETURN n.name,m.name,labels(m) ORDER by m.name', 'desc': 'List all SyncLAPSPassword privileges for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}{log.default} can sync LAPS passwords for {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '97': {'query': 'MATCH (n:User)-[r:DumpSMSAPassword]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all user DumpSMSAPassword privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has DumpSMSAPassword over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '98': {'query': 'MATCH (n:Group)-[r:DumpSMSAPassword]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all group DumpSMSAPassword privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has DumpSMSAPassword over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '99': {'query': 'MATCH (n:Computer)-[r:DumpSMSAPassword]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all computer DumpSMSAPassword privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has DumpSMSAPassword over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '100': {'query': 'MATCH (n:Group)-[r:DumpSMSAPassword]->(m) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all DumpSMSAPassword privileges for Users, Domain Users, Authenticated Users, and Everyone groups', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has DumpSMSAPassword over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '101': {'query': 'MATCH (n {owned: true})-[r:DumpSMSAPassword]->(m) RETURN n.name,m.name,labels(m),labels(n) ORDER BY n.name', 'desc': 'List all DumpSMSAPassword privileges for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} has DumpSMSAPassword over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '102': {'query': "MATCH (n:User)-[:MemberOf*1..]->(g:Group) WHERE g.objectid ENDS WITH '-512' MATCH p = (c:Computer)-[:HasSession]->(n) RETURN n.name,c.name ORDER BY n.name", 'desc': 'List Domain Admin sessions', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('c.name') is not None)) and f"{log.default}Domain admin {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} HasSession on {log.reset}{log.red}{r['c.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '103': {'query': "MATCH (n:User)-[:MemberOf*1..]->(g:Group) WHERE g.objectid ENDS WITH '-519' MATCH p = (c:Computer)-[:HasSession]->(n) RETURN n.name,c.name ORDER BY n.name", 'desc': 'List Enterprise Admin sessions', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('c.name') is not None)) and f"{log.default}Enterprise admin {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} HasSession on {log.reset}{log.red}{r['c.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '104': {'query': 'MATCH (n:User) RETURN n.name ORDER BY n.name', 'desc': 'List all users', 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '105': {'query': 'MATCH (n:Group) RETURN n.name ORDER BY n.name', 'desc': 'List all groups', 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '106': {'query': 'MATCH (n:Computer) RETURN n.name ORDER BY n.name', 'desc': 'List all computers', 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '107': {'query': 'MATCH (m {owned: true}) RETURN m.name,labels(m) ORDER BY m.name', 'desc': 'List all owned principals', 'message_generator': (lambda r: (((r.get('m.name') is not None) and f"{log.default}Owned principal {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '108': {'query': 'MATCH (n:Computer {enabled: true}) RETURN n.name ORDER BY n.name', 'desc': 'List all enabled computers', 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']} {log.reset}{log.default}is enabled{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '109': {'query': 'MATCH (n:Computer {enabled: false}) RETURN n.name ORDER BY n.name', 'desc': 'List all disabled computers', 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']} {log.reset}{log.default}is disabled{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '110': {'query': 'MATCH (n:Group) WHERE n.objectid =~ "(?i)S-1-5-21-.*-516" WITH n MATCH p=(n)<-[r:MemberOf*1..]-(m) RETURN m.name ORDER BY m.name', 'desc': 'List all Domain Controllers', 'message_generator': (lambda r: (((r.get('m.name') is not None) and f"{log.default}Computer {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} is a Domain Controller{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '111': {'query': 'MATCH (n:Group) WHERE n.objectid =~ "(?i)S-1-5-21-.*-516" WITH n MATCH p=(n)<-[r:MemberOf*1..]-(m) RETURN m.name,m.operatingsystem ORDER BY m.name', 'desc': 'List all Domain Controllers OSs', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('m.operatingsystem') is not None)) and f"{log.default}Domain Controller {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} OS {log.reset}{log.red}{r['m.operatingsystem']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '112': {'query': 'MATCH p=shortestPath((m:User)-[r*1..]->(n:Group)) WHERE n.objectid =~ "(?i)S-1-5-21-.*-516" AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all user shortest paths to Domain Controllers', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '113': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE n.objectid =~ "(?i)S-1-5-21-.*-516" AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all group shortest paths to Domain Controllers', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '114': {'query': 'MATCH p=shortestPath((m:Computer)-[r*1..]->(n:Group)) WHERE n.objectid =~ "(?i)S-1-5-21-.*-516" AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all computer shortest paths to Domain Controllers', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '115': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE (m.objectid =~ "(?i)S-1-5-21-.*-513" OR m.objectid =~ "(?i).*-S-1-5-11" OR m.objectid =~ "(?i).*-S-1-1-0" OR m.objectid =~ "(?i).*-S-1-5-32-545") AND n.objectid =~ "(?i)S-1-5-21-.*-516" AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to Domain Controllers for Users, Domain Users, Authenticated Users, or Everyone groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '116': {'query': 'MATCH p=shortestPath((m {owned: true})-[r*1..]->(n:Group)) WHERE n.objectid =~ "(?i)S-1-5-21-.*-516" AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to Domain Controllers for owned principals', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '117': {'query': 'MATCH (n:User {passwordnotreqd: true}) RETURN n.name ORDER BY n.name', 'desc': "List all users that don't require a password", 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is not required to have a password{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '118': {'query': 'MATCH (n:User {passwordnotreqd: true, owned: true}) RETURN n.name ORDER BY n.name', 'desc': "List all users that don't require a password for owned principals", 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is not required to have a password{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '119': {'query': 'MATCH (n:User {pwdneverexpires: true}) RETURN n.name ORDER BY n.name', 'desc': 'List all users where password never expires', 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.default}User's {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} password is set to never expire{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '120': {'query': 'MATCH (n:User {pwdneverexpires: true, owned: true}) RETURN n.name ORDER BY n.name', 'desc': 'List all users where password never expires for owned principals', 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.default}User's {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} password is set to never expire{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '121': {'query': 'MATCH (u:User)-[:AllowedToDelegate]->(c:Computer) RETURN u.name,c.name ORDER BY u.name', 'desc': 'List all user Constrained Delegation', 'message_generator': (lambda r: ((((r.get('u.name') is not None) and (r.get('c.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['u.name']}{log.reset}{log.default} is allowed to delegate for {log.reset}{log.red}{r['c.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '122': {'query': 'MATCH (g:Group)-[:AllowedToDelegate]->(c:Computer) RETURN g.name,c.name ORDER BY g.name', 'desc': 'List all group Constrained Delegation', 'message_generator': (lambda r: ((((r.get('g.name') is not None) and (r.get('c.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['g.name']}{log.reset}{log.default} is allowed to delegate for {log.reset}{log.red}{r['c.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '123': {'query': 'MATCH (c1:Computer)-[:AllowedToDelegate]->(c2:Computer) RETURN c1.name,c2.name ORDER BY c1.name', 'desc': 'List all computer Constrained Delegation', 'message_generator': (lambda r: ((((r.get('c1.name') is not None) and (r.get('c2.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['c1.name']}{log.reset}{log.default} is allowed to delegate for {log.reset}{log.red}{r['c2.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '124': {'query': 'MATCH (n:GPO) RETURN n.name ORDER BY n.name', 'desc': 'List all GPOs', 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.default}GPO {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '125': {'query': 'MATCH (n:Domain) RETURN n.name ORDER BY n.name', 'desc': 'List all domains', 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.default}Domain {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '126': {'query': 'MATCH p=(n:Domain)-[r:TrustedBy]->(m:Domain) RETURN r.trusttype,n.name,m.name ORDER by n.name', 'desc': 'List all domain trusts', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None) and (r.get('r.trusttype') is not None)) and f"{log.default}Domain {log.reset}{log.red}{r['n.name']} {log.reset}{log.default}is trusted by {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}with type {log.reset}{log.red}{r['r.trusttype']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '127': {'query': 'MATCH p=shortestPath((m:User)-[r*1..]->(n:Domain)) WHERE NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") AND NOT m=n RETURN m.name,p ORDER BY m.name', 'desc': 'List all user shortest paths to domains', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '128': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Domain)) WHERE NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") AND NOT m=n RETURN m.name,p ORDER BY m.name', 'desc': 'List all group shortest paths to domains', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '129': {'query': 'MATCH p=shortestPath((m:Computer)-[r*1..]->(n:Domain)) WHERE NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") AND NOT m=n RETURN m.name,p ORDER BY m.name', 'desc': 'List all computer shortest paths to domains', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '130': {'query': 'MATCH p=shortestPath((m:Domain)-[r*1..]->(n:Domain)) WHERE NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") AND NONE (r in relationships(p) WHERE type(r)="TrustedBy") AND NOT m=n RETURN m.name,p ORDER BY m.name', 'desc': 'List all domain shortest paths to domains', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '131': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Domain)) WHERE (m.objectid =~ "(?i)S-1-5-21-.*-513" OR m.objectid =~ "(?i).*-S-1-5-11" OR m.objectid =~ "(?i).*-S-1-1-0" OR m.objectid =~ "(?i).*-S-1-5-32-545") AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") AND NOT m=n RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to domains for Users, Domain Users, Authenticated Users, or Everyone groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '132': {'query': 'MATCH p=shortestPath((m {owned: true})-[r*1..]->(n:Domain)) WHERE NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") AND NOT m=n RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to domains for owned principals', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'general'}, '133': {'query': 'MATCH (c:Computer) WHERE c.haslaps = true RETURN c.name ORDER BY c.name', 'desc': 'List computers with LAPS enabled', 'message_generator': (lambda r: (((r.get('c.name') is not None) and f"{log.default}Computer {log.reset}{log.red}{r['c.name']}{log.reset}{log.default} has LAPS enabled{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '134': {'query': 'MATCH (c:Computer) WHERE c.haslaps = false RETURN c.name ORDER BY c.name', 'desc': 'List computers with LAPS disabled', 'message_generator': (lambda r: (((r.get('c.name') is not None) and f"{log.default}Computer {log.reset}{log.red}{r['c.name']}{log.reset}{log.default} has LAPS disabled{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '135': {'query': "MATCH (u:User) WHERE u.description =~ '.*((?i)pass|pw|:).*' RETURN u.name,u.description ORDER BY u.name", 'desc': 'List potential passwords in descriptions', 'message_generator': (lambda r: ((((r.get('u.name') is not None) and (r.get('u.description') is not None)) and f"{log.default}User {log.reset}{log.red}{r['u.name']}{log.reset}{log.default} may have password in description {log.reset}{log.red}{r['u.description']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '136': {'query': 'MATCH (m:User {highvalue: true}) RETURN m.name ORDER BY m.name', 'desc': 'List all high-value users', 'message_generator': (lambda r: (((r.get('m.name') is not None) and f"{log.default}User {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} is high value{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '137': {'query': 'MATCH (m:User {sensitive: true}) RETURN m.name ORDER BY m.name', 'desc': 'List all sensitive users', 'message_generator': (lambda r: (((r.get('m.name') is not None) and f"{log.default}User {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} is sensitive{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '138': {'query': 'MATCH (m:User {admincount: true}) RETURN m.name ORDER BY m.name', 'desc': 'List all users with an admin count', 'message_generator': (lambda r: (((r.get('m.name') is not None) and f"{log.default}User {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} has an admin count{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '139': {'query': 'MATCH (m:Group {admincount: true}) RETURN m.name ORDER BY m.name', 'desc': 'List all groups with an admin count', 'message_generator': (lambda r: (((r.get('m.name') is not None) and f"{log.default}Group {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} has an admin count{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '140': {'query': 'MATCH (m:Computer {admincount: true}) RETURN m.name ORDER BY m.name', 'desc': 'List all computers with an admin count', 'message_generator': (lambda r: (((r.get('m.name') is not None) and f"{log.default}Computer {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} has an admin count{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '141': {'query': 'MATCH (m {admincount: true, owned: true}) RETURN labels(m),m.name ORDER BY m.name', 'desc': 'List all owned principals with an admin count', 'message_generator': (lambda r: (((r.get('m.name') is not None) and f"{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}{log.default} has an admin count{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '142': {'query': 'MATCH p=(n:User)-[r:ReadGMSAPassword]->(m:User) RETURN n.name,m.name ORDER by n.name', 'desc': 'List all user ReadGMSAPassword privileges', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can read GMSA passwords for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '143': {'query': 'MATCH p=(n:Group)-[r:ReadGMSAPassword]->(m:User) RETURN n.name,m.name ORDER by n.name', 'desc': 'List all group ReadGMSAPassword privileges', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can read GMSA passwords for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '144': {'query': 'MATCH p=(n:Computer)-[r:ReadGMSAPassword]->(m:User) RETURN n.name,m.name ORDER by n.name', 'desc': 'List all computer ReadGMSAPassword privileges', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can read GMSA passwords for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '145': {'query': 'MATCH (n:Group)-[r:ReadGMSAPassword]->(m:User) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all ReadGMSAPassword privileges for Users, Domain Users, Authenticated Users, and Everyone groups', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can read GMSA passwords for {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '146': {'query': 'MATCH p=(m {owned: true})-[r:ReadGMSAPassword]->(n:User) RETURN n.name,m.name,labels(m) ORDER by m.name', 'desc': 'List all ReadGMSAPassword privileges for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}{log.default} can read GMSA passwords for {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '147': {'query': 'MATCH (n:User)-[r:DCSync]->(m:Domain) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all user DCSync privileges', 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has DCSync privileges for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '148': {'query': 'MATCH (n:Group)-[r:DCSync]->(m:Domain) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all group DCSync privileges', 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has DCSync privileges for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '149': {'query': 'MATCH (n:Computer)-[r:DCSync]->(m:Domain) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all computer DCSync privileges', 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has DCSync privileges for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '150': {'query': 'MATCH (n)-[r:DCSync]->(m:Domain) RETURN n.name,labels(n),m.name ORDER BY n.name', 'desc': 'List all DCSync privileges', 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}) {log.red}{r['n.name']}{log.reset}{log.default} has DCSync privileges for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '151': {'query': 'MATCH (n:Group)-[r:DCSync]->(m:Domain) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all DCSync privileges for Users, Domain Users, Authenticated Users, or Everyone groups', 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.red}{r['n.name']}{log.reset}{log.default} has DCSync privileges for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '152': {'query': 'MATCH p=(m {owned: true})-[r:DCSync]->(n:Domain) RETURN n.name,m.name,labels(m) ORDER by m.name', 'desc': 'List all DCSync privileges for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['m.name']}{log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}{log.default} has DCSync privileges for {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '153': {'query': 'MATCH (n:User)-[r:ForceChangePassword]->(m:User) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all user ForceChangePassword privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can force change password for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '154': {'query': 'MATCH (n:Group)-[r:ForceChangePassword]->(m:User) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all group ForceChangePassword privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can force change password for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '155': {'query': 'MATCH (n:Computer)-[r:ForceChangePassword]->(m:User) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all computer ForceChangePassword privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can force change password for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '156': {'query': 'MATCH (n:Group)-[r:ForceChangePassword]->(m:User) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all ForceChangePassword privileges for Users, Domain Users, Authenticated Users, and Everyone groups', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has ForceChangePassword over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '157': {'query': 'MATCH (n {owned: true})-[r:ForceChangePassword]->(m:User) RETURN n.name,m.name,labels(m),labels(n) ORDER BY n.name', 'desc': 'List all ForceChangePassword privileges for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} has ForceChangePassword over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '158': {'query': 'MATCH (n:User)-[r:AddMember]->(m:Group) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all user AddMember privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can add members to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '159': {'query': 'MATCH (n:Group)-[r:AddMember]->(m:Group) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all group AddMember privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can add members to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '160': {'query': 'MATCH (n:Computer)-[r:AddMember]->(m:Group) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all computer AddMember privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can add members to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '161': {'query': 'MATCH (n:Group)-[r:AddMember]->(m:Group) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all AddMember privileges for Users, Domain Users, Authenticated Users, and Everyone groups', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has AddMember over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '162': {'query': 'MATCH (n {owned: true})-[r:AddMember]->(m:Group) RETURN n.name,m.name,labels(m),labels(n) ORDER BY n.name', 'desc': 'List all AddMember privileges for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} has AddMember over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '163': {'query': 'MATCH (n:User)-[r:AddSelf]->(m:Group) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all user AddSelf privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can add itself to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '164': {'query': 'MATCH (n:Group)-[r:AddSelf]->(m:Group) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all group AddSelf privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can add itself to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '165': {'query': 'MATCH (n:Computer)-[r:AddSelf]->(m:Group) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all computer AddSelf privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can add itself to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '166': {'query': 'MATCH (n:Group)-[r:AddSelf]->(m:Group) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all AddSelf privileges for Users, Domain Users, Authenticated Users, and Everyone groups', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has AddSelf over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '167': {'query': 'MATCH (n {owned: true})-[r:AddSelf]->(m:Group) RETURN n.name,m.name,labels(m),labels(n) ORDER BY n.name', 'desc': 'List all AddSelf privileges for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} has AddSelf over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '168': {'query': 'MATCH (n:User)-[r:SQLAdmin]->(m:Computer) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all user SQLAdmin privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is SQLAdmin to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '169': {'query': 'MATCH (n:Group)-[r:SQLAdmin]->(m:Computer) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all group SQLAdmin privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is SQLAdmin to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '170': {'query': 'MATCH (n:Computer)-[r:SQLAdmin]->(m:Computer) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all computer SQLAdmin privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is SQLAdmin to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '171': {'query': 'MATCH (n:Group)-[r:SQLAdmin]->(m:Computer) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all SQLAdmin privileges for Users, Domain Users, Authenticated Users, and Everyone groups', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has SQLAdmin over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '172': {'query': 'MATCH (n {owned: true})-[r:SQLAdmin]->(m:Computer) RETURN n.name,m.name,labels(m),labels(n) ORDER BY n.name', 'desc': 'List all SQLAdmin privileges for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} has SQLAdmin over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '173': {'query': 'MATCH (n:User)-[r:CanPSRemote]->(m:Computer) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all user CanPSRemote privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can PSRemote to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '174': {'query': 'MATCH (n:Group)-[r:CanPSRemote]->(m:Computer) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all group CanPSRemote privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can PSRemote to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '175': {'query': 'MATCH (n:Computer)-[r:CanPSRemote]->(m:Computer) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all computer CanPSRemote privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can PSRemote to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '176': {'query': 'MATCH (n:Group)-[r:CanPSRemote]->(m:Computer) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all CanPSRemote privileges for Users, Domain Users, Authenticated Users, and Everyone groups', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has CanPSRemote over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '177': {'query': 'MATCH (n {owned: true})-[r:CanPSRemote]->(m:Computer) RETURN n.name,m.name,labels(m),labels(n) ORDER BY n.name', 'desc': 'List all CanPSRemote privileges for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} has CanPSRemote over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '178': {'query': 'MATCH (n:User)-[r:ExecuteDCOM]->(m:Computer) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all user ExecuteDCOM privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can ExecuteDCOM on {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '179': {'query': 'MATCH (n:Group)-[r:ExecuteDCOM]->(m:Computer) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all group ExecuteDCOM privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can ExecuteDCOM on {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '180': {'query': 'MATCH (n:Computer)-[r:ExecuteDCOM]->(m:Computer) RETURN n.name,m.name ORDER BY n.name', 'desc': 'List all computer ExecuteDCOM privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can ExecuteDCOM on {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '181': {'query': 'MATCH (n:Group)-[r:ExecuteDCOM]->(m:Computer) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all ExecuteDCOM privileges for Users, Domain Users, Authenticated Users, and Everyone groups', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has ExecuteDCOM over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '182': {'query': 'MATCH (n {owned: true})-[r:ExecuteDCOM]->(m:Computer) RETURN n.name,m.name,labels(m),labels(n) ORDER BY n.name', 'desc': 'List all ExecuteDCOM privileges for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} has ExecuteDCOM over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '183': {'query': 'MATCH (n:User)-[r:AllowedToAct]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all user AllowedToAct privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is AllowedToAct for {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '184': {'query': 'MATCH (n:Group)-[r:AllowedToAct]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all group AllowedToAct privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is AllowedToAct for {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '185': {'query': 'MATCH (n:Computer)-[r:AllowedToAct]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all computer AllowedToAct privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is AllowedToAct for {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '186': {'query': 'MATCH (n:Group)-[r:AllowedToAct]->(m:Computer) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all AllowedToAct privileges for Users, Domain Users, Authenticated Users, and Everyone groups', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has AllowedToAct over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '187': {'query': 'MATCH (n {owned: true})-[r:AllowedToAct]->(m:Computer) RETURN n.name,m.name,labels(m),labels(n) ORDER BY n.name', 'desc': 'List all AllowedToAct privileges for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} has AllowedToAct over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '188': {'query': 'MATCH (n:User)-[r:Owns]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all user Owns privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} Owns {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '189': {'query': 'MATCH (n:Group)-[r:Owns]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all group Owns privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} Owns {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '190': {'query': 'MATCH (n:Computer)-[r:Owns]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all computer Owns privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} Owns {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '191': {'query': 'MATCH (n:Group)-[r:Owns]->(m) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all Owns privileges for Users, Domain Users, Authenticated Users, and Everyone groups', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has Owns over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '192': {'query': 'MATCH (n {owned: true})-[r:Owns]->(m) RETURN n.name,m.name,labels(m),labels(n) ORDER BY n.name', 'desc': 'List all Owns privileges for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} has Owns over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '193': {'query': 'MATCH (n:User)-[r:AllExtendedRights]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all user AllExtendedRights privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has AllExtendedRights over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '194': {'query': 'MATCH (n:Group)-[r:AllExtendedRights]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all group AllExtendedRights privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has AllExtendedRights over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '195': {'query': 'MATCH (n:Computer)-[r:AllExtendedRights]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all computer AllExtendedRights privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has AllExtendedRights over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '196': {'query': 'MATCH (n:Group)-[r:AllExtendedRights]->(m) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all AllExtendedRights privileges for Users, Domain Users, Authenticated Users, and Everyone groups', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has AllExtendedRights over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '197': {'query': 'MATCH (n {owned: true})-[r:AllExtendedRights]->(m) RETURN n.name,m.name,labels(m),labels(n) ORDER BY n.name', 'desc': 'List all AllExtendedRights privileges for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} has AllExtendedRights over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '198': {'query': 'MATCH (n:User)-[r:MemberOf]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all user memberships', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is MemberOf {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '199': {'query': 'MATCH (n:Group)-[r:MemberOf]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all group memberships', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is MemberOf {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '200': {'query': 'MATCH (n:Computer)-[r:MemberOf]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all computer memberships', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is MemberOf {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '201': {'query': 'MATCH (n:Group)-[r:MemberOf]->(m) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all memberships for Users, Domain Users, Authenticated Users, and Everyone groups', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has MemberOf over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '202': {'query': 'MATCH (n {owned: true})-[r:MemberOf]->(m) RETURN n.name,m.name,labels(m),labels(n) ORDER BY n.name', 'desc': 'List all memberships for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} has MemberOf over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '203': {'query': 'MATCH (n:User)-[r:AddKeyCredentialLink]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all user AddKeyCredentialLink privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has AddKeyCredentialLink over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '204': {'query': 'MATCH (n:Group)-[r:AddKeyCredentialLink]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all group AddKeyCredentialLink privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has AddKeyCredentialLink over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '205': {'query': 'MATCH (n:Computer)-[r:AddKeyCredentialLink]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all computer AddKeyCredentialLink privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has AddKeyCredentialLink over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '206': {'query': 'MATCH (n:Group)-[r:AddKeyCredentialLink]->(m) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all AddKeyCredentialLink privileges for Users, Domain Users, Authenticated Users, and Everyone groups', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has AddKeyCredentialLink over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '207': {'query': 'MATCH (n {owned: true})-[r:AddKeyCredentialLink]->(m) RETURN n.name,m.name,labels(m),labels(n) ORDER BY n.name', 'desc': 'List all AddKeyCredentialLink privileges for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} has AddKeyCredentialLink over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '208': {'query': 'MATCH (n:User)-[r:GenericAll]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all user GenericAll privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has GenericAll over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '209': {'query': 'MATCH (n:Group)-[r:GenericAll]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all group GenericAll privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has GenericAll over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '210': {'query': 'MATCH (n:Computer)-[r:GenericAll]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all computer GenericAll privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has GenericAll over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '211': {'query': 'MATCH (n:Group)-[r:GenericAll]->(m) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all GenericAll privileges for Users, Domain Users, Authenticated Users, and Everyone groups', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has GenericAll over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '212': {'query': 'MATCH (n {owned: true})-[r:GenericAll]->(m) RETURN n.name,m.name,labels(m),labels(n) ORDER BY n.name', 'desc': 'List all GenericAll privileges for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} has GenericAll over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '213': {'query': 'MATCH (n:User)-[r:WriteDacl]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all user WriteDacl privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteDacl over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '214': {'query': 'MATCH (n:Group)-[r:WriteDacl]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all group WriteDacl privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteDacl over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '215': {'query': 'MATCH (n:Computer)-[r:WriteDacl]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all computer WriteDacl privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteDacl over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '216': {'query': 'MATCH (n:Group)-[r:WriteDacl]->(m) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all WriteDacl privileges for Users, Domain Users, Authenticated Users, and Everyone groups', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteDacl over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '217': {'query': 'MATCH (n {owned: true})-[r:WriteDacl]->(m) RETURN n.name,m.name,labels(m),labels(n) ORDER BY n.name', 'desc': 'List all WriteDacl privileges for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} has WriteDacl over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '218': {'query': 'MATCH (n:User)-[r:WriteOwner]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all user WriteOwner privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteOwner over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '219': {'query': 'MATCH (n:Group)-[r:WriteOwner]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all group WriteOwner privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteOwner over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '220': {'query': 'MATCH (n:Computer)-[r:WriteOwner]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all computer WriteOwner privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteOwner over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '221': {'query': 'MATCH (n:Group)-[r:WriteOwner]->(m) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all WriteOwner privileges for Users, Domain Users, Authenticated Users, and Everyone groups', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteOwner over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '222': {'query': 'MATCH (n {owned: true})-[r:WriteOwner]->(m) RETURN n.name,m.name,labels(m),labels(n) ORDER BY n.name', 'desc': 'List all WriteOwner privileges for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} has WriteOwner over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '223': {'query': 'MATCH (n:User)-[r:WriteSPN]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all user WriteSPN privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteSPN over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '224': {'query': 'MATCH (n:Group)-[r:WriteSPN]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all group WriteSPN privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteSPN over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '225': {'query': 'MATCH (n:Computer)-[r:WriteSPN]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all computer WriteSPN privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteSPN over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '226': {'query': 'MATCH (n:Group)-[r:WriteSPN]->(m) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all WriteSPN privileges for Users, Domain Users, Authenticated Users, and Everyone groups', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteSPN over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '227': {'query': 'MATCH (n {owned: true})-[r:WriteSPN]->(m) RETURN n.name,m.name,labels(m),labels(n) ORDER BY n.name', 'desc': 'List all WriteSPN privileges for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} has WriteSPN over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '228': {'query': 'MATCH (n:User)-[r:WriteAccountRestrictions]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all user WriteAccountRestrictions privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteAccountRestrictions over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '229': {'query': 'MATCH (n:Group)-[r:WriteAccountRestrictions]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all group WriteAccountRestrictions privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteAccountRestrictions over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '230': {'query': 'MATCH (n:Computer)-[r:WriteAccountRestrictions]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all computer WriteAccountRestrictions privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteAccountRestrictions over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '231': {'query': 'MATCH (n:Group)-[r:WriteAccountRestrictions]->(m) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all WriteAccountRestrictions privileges for Users, Domain Users, Authenticated Users, and Everyone groups', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteAccountRestrictions over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '232': {'query': 'MATCH (n {owned: true})-[r:WriteAccountRestrictions]->(m) RETURN n.name,m.name,labels(m),labels(n) ORDER BY n.name', 'desc': 'List all WriteAccountRestrictions privileges for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} has WriteAccountRestrictions over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '233': {'query': 'MATCH (n:User)-[r:GenericWrite]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all user GenericWrite privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has GenericWrite over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '234': {'query': 'MATCH (n:Group)-[r:GenericWrite]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all group GenericWrite privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has GenericWrite over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '235': {'query': 'MATCH (n:Computer)-[r:GenericWrite]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all computer GenericWrite privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has GenericWrite over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '236': {'query': 'MATCH (n:Group)-[r:GenericWrite]->(m) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all GenericWrite privileges for Users, Domain Users, Authenticated Users, and Everyone groups', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has GenericWrite over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '237': {'query': 'MATCH (n {owned: true})-[r:GenericWrite]->(m) RETURN n.name,m.name,labels(m),labels(n) ORDER BY n.name', 'desc': 'List all GenericWrite privileges for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} has GenericWrite over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '238': {'query': 'MATCH (n:User)-[r:HasSIDHistory]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all user HasSIDHistory privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has HasSIDHistory over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '239': {'query': 'MATCH (n:Group)-[r:HasSIDHistory]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all group HasSIDHistory privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has HasSIDHistory over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '240': {'query': 'MATCH (n:Computer)-[r:HasSIDHistory]->(m) RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all computer HasSIDHistory privileges', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has HasSIDHistory over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '241': {'query': 'MATCH (n:Group)-[r:HasSIDHistory]->(m) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,m.name,labels(m) ORDER BY n.name', 'desc': 'List all HasSIDHistory privileges for Users, Domain Users, Authenticated Users, and Everyone groups', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has HasSIDHistory over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '242': {'query': 'MATCH (n {owned: true})-[r:HasSIDHistory]->(m) RETURN n.name,m.name,labels(m),labels(n) ORDER BY n.name', 'desc': 'List all HasSIDHistory privileges for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} has HasSIDHistory over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '243': {'query': 'MATCH (u:User) RETURN u.name,u.description ORDER BY u.name', 'desc': 'List all user descriptions', 'message_generator': (lambda r: ((((r.get('u.description') is not None) and (r.get('u.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['u.name']}{log.reset}{log.default} description {log.reset}{log.red}{r['u.description']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '244': {'query': 'MATCH (g:Group) RETURN g.name,g.description ORDER BY g.name', 'desc': 'List all group descriptions', 'message_generator': (lambda r: ((((r.get('g.description') is not None) and (r.get('g.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['g.name']}{log.reset}{log.default} description {log.reset}{log.red}{r['g.description']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '245': {'query': 'MATCH (u:User) RETURN u.name,u.email ORDER BY u.name', 'desc': 'List all emails', 'message_generator': (lambda r: ((((r.get('u.email') is not None) and (r.get('u.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['u.name']}{log.reset}{log.default} email {log.reset}{log.red}{r['u.email']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '246': {'query': 'MATCH (o:OU) RETURN o.name ORDER BY o.name', 'desc': 'List all OUs', 'message_generator': (lambda r: (((r.get('o.name') is not None) and f"{log.default}OU {log.reset}{log.red}{r['o.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '247': {'query': 'MATCH (c:Container) RETURN c.name ORDER BY c.name', 'desc': 'List all Containers', 'message_generator': (lambda r: (((r.get('c.name') is not None) and f"{log.default}Container {log.reset}{log.red}{r['c.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '248': {'query': 'MATCH (n:Domain) RETURN n.name ORDER BY n.name', 'desc': 'List all Domains', 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.default}Domain {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '249': {'query': 'MATCH (d:Domain) RETURN d.name,d.functionallevel ORDER BY d.name', 'desc': 'List all Domains functional level', 'message_generator': (lambda r: ((((r.get('d.name') is not None) and (r.get('d.functionallevel') is not None)) and f"{log.default}Domain {log.reset}{log.red}{r['d.name']}{log.reset}{log.default} functional level {log.reset}{log.red}{r['d.functionallevel']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '250': {'query': 'MATCH (n)-[r:Owns|AllExtendedRights|WriteDacl|GenericAll|WriteOwner|GenericWrite]->(o:OU) RETURN n.name,o.name,TYPE(r),labels(n) ORDER BY n.name', 'desc': 'List all object control over OUs', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('o.name') is not None)) and f"({r['labels(n)'][0]}/{r['labels(n)'][1]}) {log.red}{r['n.name']} {log.reset}{log.default}has {log.reset}{log.red}{r['TYPE(r)']}{log.reset}{log.default} over OU {log.reset}{log.red}{r['o.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '251': {'query': 'MATCH (n {owned: true})-[r:Owns|AllExtendedRights|WriteDacl|GenericAll|WriteOwner|GenericWrite]->(o:OU) RETURN n.name,o.name,TYPE(r),labels(n) ORDER BY n.name', 'desc': 'List all object control over OUs for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('o.name') is not None)) and f"({r['labels(n)'][0]}/{r['labels(n)'][1]}) {log.red}{r['n.name']} {log.reset}{log.default}has {log.reset}{log.red}{r['TYPE(r)']}{log.reset}{log.default} over OU {log.reset}{log.red}{r['o.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '252': {'query': 'MATCH (n)-[r:Owns|AllExtendedRights|WriteDacl|GenericAll|WriteOwner|GenericWrite]->(c:Container) RETURN n.name,c.name,TYPE(r),labels(n) ORDER BY n.name', 'desc': 'List all object control over Containers', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('c.name') is not None)) and f"{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}) {log.red}{r['n.name']} {log.reset}{log.default}has {log.reset}{log.red}{r['TYPE(r)']}{log.reset}{log.default} over Container {log.reset}{log.red}{r['c.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '253': {'query': 'MATCH (n {owned: true})-[r:Owns|AllExtendedRights|WriteDacl|GenericAll|WriteOwner|GenericWrite]->(c:Container) RETURN n.name,c.name,TYPE(r),labels(n) ORDER BY n.name', 'desc': 'List all object control over Containers for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('c.name') is not None)) and f"{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}) {log.red}{r['n.name']} {log.reset}{log.default}has {log.reset}{log.red}{r['TYPE(r)']}{log.reset}{log.default} over Container {log.reset}{log.red}{r['c.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '254': {'query': 'MATCH (n)-[r:Owns|AllExtendedRights|WriteDacl|GenericAll|WriteOwner|GenericWrite]->(g:GPO) RETURN n.name,g.name,TYPE(r),labels(n) ORDER BY n.name', 'desc': 'List all object control over GPOs', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('g.name') is not None)) and f"({r['labels(n)'][0]}/{r['labels(n)'][1]}) {log.red}{r['n.name']} {log.reset}{log.default}has {log.reset}{log.red}{r['TYPE(r)']}{log.reset}{log.default} over GPO {log.reset}{log.red}{r['g.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '255': {'query': 'MATCH (n {owned: true})-[r:Owns|AllExtendedRights|WriteDacl|GenericAll|WriteOwner|GenericWrite]->(g:GPO) RETURN n.name,g.name,TYPE(r),labels(n) ORDER BY n.name', 'desc': 'List all object control over GPOs for owned principals', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('g.name') is not None)) and f"({r['labels(n)'][0]}/{r['labels(n)'][1]}) {log.red}{r['n.name']} {log.reset}{log.default}has {log.reset}{log.red}{r['TYPE(r)']}{log.reset}{log.default} over GPO {log.reset}{log.red}{r['g.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '256': {'query': 'MATCH (g1)-[:GPLink]->(g2) RETURN g1.name,g2.name,labels(g2) ORDER BY g1.name', 'desc': 'List all GP Links', 'message_generator': (lambda r: ((((r.get('g1.name') is not None) and (r.get('g2.name') is not None)) and f"{log.default}GPO {log.reset}{log.red}{r['g1.name']}{log.reset}{log.default} is linked to {log.reset}{log.red}{r['g2.name']}{log.reset}{log.default} ({r['labels(g2)'][0]}/{r['labels(g2)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '257': {'query': 'MATCH (n:User)-[r]->(m) RETURN n.name,TYPE(r),labels(m),m.name ORDER BY TYPE(r)', 'desc': 'List all user privileges', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has {log.reset}{log.red}{r['TYPE(r)']}{log.reset}{log.default} over {log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '258': {'query': 'MATCH (n:Group)-[r]->(m) RETURN n.name,TYPE(r),labels(m),m.name ORDER BY TYPE(r)', 'desc': 'List all group privileges', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has {log.reset}{log.red}{r['TYPE(r)']}{log.reset}{log.default} over {log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '259': {'query': 'MATCH (n:Computer)-[r]->(m) RETURN n.name,TYPE(r),labels(m),m.name ORDER BY TYPE(r)', 'desc': 'List all computer privileges', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has {log.reset}{log.red}{r['TYPE(r)']}{log.reset}{log.default} over {log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '260': {'query': 'MATCH (n:Group)-[r]->(m) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,TYPE(r),labels(m),m.name ORDER BY TYPE(r)', 'desc': 'List all privileges for Users, Domain Users, Authenticated Users, or Everyone groups', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has {log.reset}{log.red}{r['TYPE(r)']}{log.reset}{log.default} over {log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '261': {'query': 'MATCH (n:Group)-[:MemberOf]->(g:Group)-[r]->(m) WHERE (n.objectid =~ "(?i)S-1-5-21-.*-513" OR n.objectid =~ "(?i).*-S-1-5-11" OR n.objectid =~ "(?i).*-S-1-1-0" OR n.objectid =~ "(?i).*-S-1-5-32-545") RETURN n.name,TYPE(r),labels(m),m.name,g.name ORDER BY TYPE(r)', 'desc': 'List all group-delegated privileges for Users, Domain Users, Authenticated Users, or Everyone groups', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is MemberOf {log.reset}{log.red}{r['g.name']} {log.reset}{log.default}which has {log.reset}{log.red}{r['TYPE(r)']}{log.reset}{log.default} over {log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '262': {'query': 'MATCH (n {owned: true})-[r]->(m) RETURN n.name,TYPE(r),labels(m),labels(n),m.name ORDER BY TYPE(r)', 'desc': 'List all privileges for owned principals', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} has {log.reset}{log.red}{r['TYPE(r)']}{log.reset}{log.default} over {log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '263': {'query': 'MATCH (n {owned: true})-[:MemberOf]->(g:Group),(g)-[r]->(m) RETURN n.name,TYPE(r),labels(m),labels(n),m.name,g.name ORDER BY TYPE(r)', 'desc': 'List all group-delegated privileges for owned principals', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None) and (r.get('g.name') is not None)) and f"{log.red}{r['n.name']} {log.reset}{log.default}({r['labels(n)'][0]}/{r['labels(n)'][1]}){log.reset}{log.default} is MemberOf {log.reset}{log.red}{r['g.name']} {log.reset}{log.default}which has {log.reset}{log.red}{r['TYPE(r)']}{log.reset}{log.default} over {log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '264': {'query': "MATCH p=(u:User)-[:CanRDP]->(c:Computer) WHERE u.name =~ '((?i)USER_SEARCH)' RETURN u.name,c.name", 'desc': "List this user's RDP privileges", 'message_generator': (lambda r: ((((r.get('u.name') is not None) and (r.get('c.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['u.name']}{log.reset}{log.default} CanRDP to {log.reset}{log.red}{r['c.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '265': {'query': "MATCH (n:User)-[:MemberOf]->(m:Group),(m)-[:CanRDP]->(c:Computer) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN DISTINCT n.name,m.name,c.name ORDER BY m.name", 'desc': "List this user's group-delegated RDP privileges", 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None) and (r.get('c.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is MemberOf {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}which CanRDP to {log.red}{r['c.name']}{log.default}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '266': {'query': "MATCH p=(m:User)-[r:AdminTo]->(n:Computer) WHERE m.name =~ '((?i)USER_SEARCH)' RETURN m.name, n.name ORDER BY m.name", 'desc': "List this user's AdminTo privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} is AdminTo {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '267': {'query': "MATCH (n:User)-[:MemberOf]->(m:Group),(m)-[:AdminTo]->(c:Computer) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN DISTINCT n.name,m.name,c.name ORDER BY m.name", 'desc': "List this user's group-delegated AdminTo privileges", 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None) and (r.get('c.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is MemberOf {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} which is AdminTo {log.red}{r['c.name']}{log.default}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '268': {'query': "MATCH p=(m:Computer)-[r:HasSession]->(n:User) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,m.name", 'desc': "List this user's sessions", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} HasSession on {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '269': {'query': "MATCH p=(n:User)-[r:ReadLAPSPassword]->(m:Computer) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,m.name ORDER by n.name", 'desc': "List this user's ReadLAPSPassword privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can read LAPS passwords for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '270': {'query': "MATCH p=(n:User)-[r:SyncLAPSPassword]->(m:Computer) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,m.name ORDER by n.name", 'desc': "List this user's SyncLAPSPassword privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can sync LAPS passwords for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '271': {'query': "MATCH (n:User)-[r:DumpSMSAPassword]->(m) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this user's DumpSMSAPassword privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has DumpSMSAPassword over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '272': {'query': "MATCH p=(n:User)-[r:ReadGMSAPassword]->(m:User) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,m.name ORDER by n.name", 'desc': "List this user's ReadGMSAPassword privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can read GMSA passwords for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '273': {'query': "MATCH (u:User)-[:AllowedToDelegate]->(c:Computer) WHERE u.name =~ '((?i)USER_SEARCH)' RETURN u.name,c.name", 'desc': "List this user's Constrained Delegation privileges", 'message_generator': (lambda r: ((((r.get('u.name') is not None) and (r.get('c.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['u.name']}{log.reset}{log.default} is allowed to delegate for {log.reset}{log.red}{r['c.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '274': {'query': "MATCH (n:User)-[r:ForceChangePassword]->(m:User) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,m.name ORDER BY n.name", 'desc': "List this user's ForceChangePassword privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can force change password for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '275': {'query': "MATCH (n:User)-[r:AddMember]->(m:Group) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,m.name ORDER BY n.name", 'desc': "List this user's AddMember privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can add members to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '276': {'query': "MATCH (n:User)-[r:AddSelf]->(m:Group) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,m.name ORDER BY n.name", 'desc': "List this user's AddSelf privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can add itself to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '277': {'query': "MATCH (n:User)-[r:SQLAdmin]->(m:Computer) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,m.name ORDER BY n.name", 'desc': "List this user's SQLAdmin privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is SQLAdmin to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '278': {'query': "MATCH (n:User)-[r:CanPSRemote]->(m:Computer) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,m.name ORDER BY n.name", 'desc': "List this user's CanPSRemote privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can PSRemote to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '279': {'query': "MATCH (n:User)-[r:ExecuteDCOM]->(m:Computer) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,m.name ORDER BY n.name", 'desc': "List this user's ExecuteDCOM privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can ExecuteDCOM on {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '280': {'query': "MATCH (n:User)-[r:AllowedToAct]->(m) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this user's AllowedToAct privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is AllowedToAct for {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '281': {'query': "MATCH (n:User)-[r:Owns]->(m) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this user's Owns privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} Owns {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '282': {'query': "MATCH (n:User)-[r:AllExtendedRights]->(m) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this user's AllExtendedRights privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has AllExtendedRights over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '283': {'query': "MATCH (n:User)-[r:AddKeyCredentialLink]->(m) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this user's AddKeyCredentialLink privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has AddKeyCredentialLink over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '284': {'query': "MATCH (n:User)-[r:GenericAll]->(m) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this user's GenericAll privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has GenericAll over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '285': {'query': "MATCH (n:User)-[r:WriteDacl]->(m) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this user's WriteDacl privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteDacl over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '286': {'query': "MATCH (n:User)-[r:WriteOwner]->(m) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this user's WriteOwner privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteOwner over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '287': {'query': "MATCH (n:User)-[r:WriteSPN]->(m) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this user's WriteSPN privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteSPN over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '288': {'query': "MATCH (n:User)-[r:WriteAccountRestrictions]->(m) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this user's WriteAccountRestrictions privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteAccountRestrictions over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '289': {'query': "MATCH (n:User)-[r:GenericWrite]->(m) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this user's GenericWrite privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has GenericWrite over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '290': {'query': "MATCH (n:User)-[r:HasSIDHistory]->(m) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this user's HasSIDHistory privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has HasSIDHistory over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '291': {'query': "MATCH (u:User) WHERE u.name =~ '((?i)USER_SEARCH)' RETURN u.name,u.description ORDER BY u.name", 'desc': "List this user's description", 'message_generator': (lambda r: ((((r.get('u.description') is not None) and (r.get('u.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['u.name']}{log.reset}{log.default} description {log.reset}{log.red}{r['u.description']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '292': {'query': "MATCH (u:User) WHERE u.name =~ '((?i)USER_SEARCH)' RETURN u.name,u.email ORDER BY u.name", 'desc': "List this user's email", 'message_generator': (lambda r: (((r.get('u.email') is not None) and f"{log.default}User {log.reset}{log.red}{r['u.name']}{log.reset}{log.default} email {log.reset}{log.red}{r['u.email']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '293': {'query': "MATCH (n:User)-[r:MemberOf]->(m) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this user's group memberships", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is MemberOf {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '294': {'query': "MATCH (u:User {dontreqpreauth: true}) WHERE u.name =~ '((?i)USER_SEARCH)' RETURN u.name", 'desc': "List if this user's AS-REP roastable", 'message_generator': (lambda r: (((r.get('u.name') is not None) and f"{log.default}User {log.reset}{log.red}{r['u.name']}{log.reset}{log.default} is AS-REP roastable{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '295': {'query': "MATCH (n:User) WHERE n.hasspn=true AND n.name =~ '((?i)USER_SEARCH)' RETURN n.name AS result ORDER BY n.name", 'desc': "List if this user's kerberoastable", 'message_generator': (lambda r: (((r.get('result') is not None) and f"{log.default}User {log.reset}{log.red}{r['result']}{log.reset}{log.default} is kerberoastable{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '296': {'query': "MATCH (n:User)-[r]->(m) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,TYPE(r),labels(m),m.name ORDER BY TYPE(r)", 'desc': 'List all privileges for this user', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None) and (r.get('TYPE(r)') is not None) and (r.get('labels(m)') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has {log.reset}{log.red}{r['TYPE(r)']}{log.reset}{log.default} over {log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'general'}, '297': {'query': "MATCH (n:User)-[:MemberOf]->(m:Group),(m)-[r]->(v) WHERE n.name =~ '((?i)USER_SEARCH)' RETURN n.name,TYPE(r),labels(v),m.name,v.name ORDER BY m.name", 'desc': 'List all group-delegated privileges for this user', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('m.name') is not None) and (r.get('v.name') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']} {log.reset}{log.default}is MemberOf {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}which has {log.reset}{log.red}{r['TYPE(r)']}{log.reset}{log.default} over {log.red}{r['v.name']} {log.reset}{log.default}({r['labels(v)'][0]}/{r['labels(v)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'user'}, '298': {'query': 'MATCH (m:User),(n {highvalue: true}),p=shortestPath((m)-[r*1..]->(n)) WHERE NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") AND NOT m=n AND m.name =~ \'((?i)USER_SEARCH)\' RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to high-value targets for this user', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'user'}, '299': {'query': 'MATCH p=shortestPath((m:User)-[r*1..]->(n:Group)) WHERE n.objectid =~ "(?i)S-1-5-21-.*-512" AND m.name =~ \'((?i)USER_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to Domain Admins for this user', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'user'}, '300': {'query': 'MATCH p=shortestPath((m:User)-[r*1..]->(n:Group)) WHERE n.objectid =~ "(?i)S-1-5-21-.*-519" AND m.name =~ \'((?i)USER_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to Enterprise Admins for this user', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'user'}, '301': {'query': 'MATCH p=shortestPath((m:User)-[r*1..]->(n:Group)) WHERE n.objectid =~ "(?i)S-1-5-21-.*-516" AND m.name =~ \'((?i)USER_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to Domain Controllers for this user', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'user'}, '302': {'query': 'MATCH p=shortestPath((m:User)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)EXCHANGE).*" AND m.name =~ \'((?i)USER_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to Exchange groups for this user', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'user'}, '303': {'query': 'MATCH p=shortestPath((m:User)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)admin|adm).*" AND m.name =~ \'((?i)USER_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to admin groups for this user', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'user'}, '304': {'query': 'MATCH p=shortestPath((m:User)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)SQL).*" AND m.name =~ \'((?i)USER_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to sql groups for this user', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'user'}, '305': {'query': 'MATCH p=shortestPath((m:User)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)WEB).*" AND m.name =~ \'((?i)USER_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to web groups for this user', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'user'}, '306': {'query': 'MATCH p=shortestPath((m:User)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)service|svc).*" AND m.name =~ \'((?i)USER_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to service groups for this user', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'user'}, '307': {'query': 'MATCH p=shortestPath((m)-[r*1..]->(n:User)) WHERE n.name =~ \'((?i)USER_SEARCH)\' AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to this user', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'user'}, '308': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:User)) WHERE (m.objectid =~ "(?i)S-1-5-21-.*-513" OR m.objectid =~ "(?i).*-S-1-5-11" OR m.objectid =~ "(?i).*-S-1-1-0" OR m.objectid =~ "(?i).*-S-1-5-32-545") AND n.name =~ \'((?i)USER_SEARCH)\' AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to this user for Users, Domain Users, Authenticated Users, or Everyone groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'user'}, '309': {'query': 'MATCH p=shortestPath((m {owned: true})-[r*1..]->(n:User)) WHERE n.name =~ \'((?i)USER_SEARCH)\' AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to this user for owned principals', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'user'}, '310': {'query': "MATCH p=(g:Group)-[:CanRDP]->(c:Computer) WHERE g.name =~ '((?i)GROUP_SEARCH)' RETURN g.name,c.name", 'desc': "List this group's RDP privileges", 'message_generator': (lambda r: ((((r.get('g.name') is not None) and (r.get('c.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['g.name']}{log.reset}{log.default} CanRDP to {log.reset}{log.red}{r['c.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '311': {'query': "MATCH (n:Group)-[:MemberOf]->(m:Group),(m)-[:CanRDP]->(c:Computer) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN DISTINCT n.name,m.name,c.name ORDER BY m.name", 'desc': "List this group's group-delegated RDP privileges", 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('c.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is MemberOf {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}which CanRDP to {log.red}{r['c.name']}{log.default}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '312': {'query': "MATCH p=(m:Group)-[r:AdminTo]->(n:Computer) WHERE m.name =~ '((?i)GROUP_SEARCH)' RETURN m.name, n.name ORDER BY m.name", 'desc': "List this group's AdminTo privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} is AdminTo {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '313': {'query': "MATCH (n:Group)-[:MemberOf]->(m:Group),(m)-[:AdminTo]->(c:Computer) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN DISTINCT n.name,m.name,c.name ORDER BY m.name", 'desc': "List this group's group-delegated AdminTo privileges", 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('c.name') is not None) and (r.get('m.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is MemberOf {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} which is AdminTo {log.red}{r['c.name']}{log.default}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '314': {'query': "MATCH p=(n:Group)-[r:ReadLAPSPassword]->(m:Computer) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,m.name ORDER by n.name", 'desc': "List this group's ReadLAPSPassword privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can read LAPS passwords for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '315': {'query': "MATCH p=(n:Group)-[r:SyncLAPSPassword]->(m:Computer) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,m.name ORDER by n.name", 'desc': "List this group's SyncLAPSPassword privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can sync LAPS passwords for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '316': {'query': "MATCH (n:Group)-[r:DumpSMSAPassword]->(m) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this group's DumpSMSAPassword privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has DumpSMSAPassword over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '317': {'query': "MATCH p=(n:Group)-[r:ReadGMSAPassword]->(m:User) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,m.name ORDER by n.name", 'desc': "List this group's ReadGMSAPassword privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can read GMSA passwords for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '318': {'query': "MATCH (g:Group)-[:AllowedToDelegate]->(c:Computer) WHERE g.name =~ '((?i)GROUP_SEARCH)' RETURN g.name,c.name", 'desc': "List this group's Constrained Delegation privileges", 'message_generator': (lambda r: ((((r.get('g.name') is not None) and (r.get('c.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['g.name']}{log.reset}{log.default} is allowed to delegate for {log.reset}{log.red}{r['c.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '319': {'query': "MATCH (n:Group)-[r:ForceChangePassword]->(m:User) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,m.name ORDER BY n.name", 'desc': "List this group's ForceChangePassword privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can force change password for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '320': {'query': "MATCH (n:Group)-[r:AddMember]->(m:Group) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,m.name ORDER BY n.name", 'desc': "List this group's AddMember privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can add members to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '321': {'query': "MATCH (n:Group)-[r:AddSelf]->(m:Group) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,m.name ORDER BY n.name", 'desc': "List this group's AddSelf privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can add itself to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '322': {'query': "MATCH (n:Group)-[r:SQLAdmin]->(m:Computer) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,m.name ORDER BY n.name", 'desc': "List this group's SQLAdmin privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is SQLAdmin to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '323': {'query': "MATCH (n:Group)-[r:CanPSRemote]->(m:Computer) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,m.name ORDER BY n.name", 'desc': "List this group's CanPSRemote privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can PSRemote to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '324': {'query': "MATCH (n:Group)-[r:ExecuteDCOM]->(m:Computer) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,m.name ORDER BY n.name", 'desc': "List this group's ExecuteDCOM privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can ExecuteDCOM on {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '325': {'query': "MATCH (n:Group)-[r:AllowedToAct]->(m) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this group's AllowedToAct privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is AllowedToAct for {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '326': {'query': "MATCH (n:Group)-[r:Owns]->(m) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this group's Owns privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} Owns {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '327': {'query': "MATCH (n:Group)-[r:AllExtendedRights]->(m) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this group's AllExtendedRights privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has AllExtendedRights over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '328': {'query': "MATCH (n:Group)-[r:AddKeyCredentialLink]->(m) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this group's AddKeyCredentialLink privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has AddKeyCredentialLink over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '329': {'query': "MATCH (n:Group)-[r:GenericAll]->(m) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this group's GenericAll privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has GenericAll over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '330': {'query': "MATCH (n:Group)-[r:WriteDacl]->(m) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this group's WriteDacl privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteDacl over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '331': {'query': "MATCH (n:Group)-[r:WriteOwner]->(m) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this group's WriteOwner privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteOwner over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '332': {'query': "MATCH (n:Group)-[r:WriteSPN]->(m) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this group's WriteSPN privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteSPN over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '333': {'query': "MATCH (n:Group)-[r:WriteAccountRestrictions]->(m) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this group's WriteAccountRestrictions privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteAccountRestrictions over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '334': {'query': "MATCH (n:Group)-[r:GenericWrite]->(m) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this group's GenericWrite privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has GenericWrite over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '335': {'query': "MATCH (n:Group)-[r:HasSIDHistory]->(m) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this group's HasSIDHistory privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has HasSIDHistory over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '336': {'query': "MATCH (g:Group) WHERE g.name =~ '((?i)GROUP_SEARCH)' RETURN g.name,g.description ORDER BY g.name", 'desc': "List this group's description", 'message_generator': (lambda r: ((((r.get('g.description') is not None) and (r.get('g.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['g.name']}{log.reset}{log.default} description {log.reset}{log.red}{r['g.description']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '337': {'query': "MATCH (n:Group)-[r:MemberOf]->(m) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this group's group memberships", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is MemberOf {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '338': {'query': "MATCH (n)-[r:MemberOf]->(m) WHERE m.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,m.name,labels(m),labels(n) ORDER BY n.name", 'desc': "List this group's members", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.red}{r['n.name']}{log.reset}{log.default} ({r['labels(n)'][0]}/{r['labels(n)'][1]}) is MemberOf {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '339': {'query': "MATCH (n:Group)-[r:AdminTo|HasSession|ForceChangePassword|AddMember|AddSelf|CanPSRemote|ExecuteDCOM|SQLAdmin|AllowedToDelegate|GenericAll|GenericWrite|WriteDacl|HasSIDHistory|DumpSMSAPassword|WriteSPN|WriteAccountRestrictions|Owns|AddKeyCredentialLink|ReadLAPSPassword|SyncLAPSPassword|ReadGMSAPassword|AllExtendedRights|AllowedToAct]->(m) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,TYPE(r),labels(m),m.name ORDER BY TYPE(r)", 'desc': 'List all privileges for this group', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has {log.reset}{log.red}{r['TYPE(r)']}{log.reset}{log.default} over {log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '340': {'query': "MATCH (n:Group)-[:MemberOf]->(m:Group),(m)-[r]->(v) WHERE n.name =~ '((?i)GROUP_SEARCH)' RETURN n.name,TYPE(r),labels(v),m.name,v.name ORDER BY m.name", 'desc': 'List all group-delegated privileges for this group', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None) and (r.get('v.name') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']} {log.reset}{log.default}is MemberOf {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}which has {log.reset}{log.red}{r['TYPE(r)']}{log.reset}{log.default} over {log.red}{r['v.name']} {log.reset}{log.default}({r['labels(v)'][0]}/{r['labels(v)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'group'}, '341': {'query': 'MATCH (m:Group),(n {highvalue: true}),p=shortestPath((m)-[r*1..]->(n)) WHERE NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") AND NOT m=n AND m.name =~ \'((?i)GROUP_SEARCH)\' RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to high-value targets for this group', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'group'}, '342': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE n.objectid =~ "(?i)S-1-5-21-.*-512" AND NOT m=n AND m.name =~ \'((?i)GROUP_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to Domain Admins for this group', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'group'}, '343': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE n.objectid =~ "(?i)S-1-5-21-.*-519" AND NOT m=n AND m.name =~ \'((?i)GROUP_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to Enterprise Admins for this group', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'group'}, '344': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE n.objectid =~ "(?i)S-1-5-21-.*-516" AND NOT m=n AND m.name =~ \'((?i)GROUP_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to Domain Controllers for this group', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'group'}, '345': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)EXCHANGE).*" AND NOT m=n AND m.name =~ \'((?i)GROUP_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to Exchange groups for this group', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'group'}, '346': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)admin|adm).*" AND NOT m=n AND m.name =~ \'((?i)GROUP_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to admin groups for this group', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'group'}, '347': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)SQL).*" AND NOT m=n AND m.name =~ \'((?i)GROUP_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to sql groups for this group', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'group'}, '348': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)WEB).*" AND NOT m=n AND m.name =~ \'((?i)GROUP_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to web groups for this group', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'group'}, '349': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)service|svc).*" AND NOT m=n AND m.name =~ \'((?i)GROUP_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to service groups for this group', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'group'}, '350': {'query': 'MATCH p=shortestPath((m)-[r*1..]->(n:Group)) WHERE n.name =~ \'((?i)GROUP_SEARCH)\' AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to this group', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'group'}, '351': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Group)) WHERE (m.objectid =~ "(?i)S-1-5-21-.*-513" OR m.objectid =~ "(?i).*-S-1-5-11" OR m.objectid =~ "(?i).*-S-1-1-0" OR m.objectid =~ "(?i).*-S-1-5-32-545") AND n.name =~ \'((?i)GROUP_SEARCH)\' AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to this group for Users, Domain Users, Authenticated Users, or Everyone groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'group'}, '352': {'query': 'MATCH p=shortestPath((m {owned: true})-[r*1..]->(n:Group)) WHERE n.name =~ \'((?i)GROUP_SEARCH)\' AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to this group for owned principals', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'group'}, '353': {'query': "MATCH p=(m:Computer)-[r:AdminTo]->(n:Computer) WHERE m.name =~ '((?i)COMPUTER_SEARCH)' RETURN m.name, n.name ORDER BY m.name", 'desc': "List this computer's AdminTo privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} is AdminTo {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '354': {'query': "MATCH (n:Computer)-[:MemberOf]->(m:Group),(m)-[:AdminTo]->(c:Computer) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN DISTINCT n.name,m.name,c.name ORDER BY m.name", 'desc': "List this computer's group-delegated AdminTo privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None) and (r.get('c.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is MemberOf {log.reset}{log.red}{r['m.name']}{log.reset}{log.default} which is AdminTo {log.red}{r['c.name']}{log.default}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '355': {'query': "MATCH p=(n:Computer)-[r:ReadLAPSPassword]->(m:Computer) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,m.name ORDER by n.name", 'desc': "List this computer's ReadLAPSPassword privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can read LAPS passwords for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '356': {'query': "MATCH p=(n:Computer)-[r:SyncLAPSPassword]->(m:Computer) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,m.name ORDER by n.name", 'desc': "List this computer's SyncLAPSPassword privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can sync LAPS passwords for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '357': {'query': "MATCH (n:Computer)-[r:DumpSMSAPassword]->(m) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this computer's DumpSMSAPassword privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has DumpSMSAPassword over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '358': {'query': "MATCH p=(n:Computer)-[r:ReadGMSAPassword]->(m:User) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,m.name ORDER by n.name", 'desc': "List this computer's ReadGMSAPassword privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can read GMSA passwords for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '359': {'query': "MATCH (n:Computer)-[:AllowedToDelegate]->(c:Computer) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,c.name", 'desc': "List this computer's Constrained Delegation privileges", 'message_generator': (lambda r: ((((r.get('c.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is allowed to delegate for {log.reset}{log.red}{r['c.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '360': {'query': "MATCH (n:Computer)-[r:ForceChangePassword]->(m:User) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,m.name ORDER BY n.name", 'desc': "List this computer's ForceChangePassword privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can force change password for {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '361': {'query': "MATCH (n:Computer)-[r:AddMember]->(m:Group) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,m.name ORDER BY n.name", 'desc': "List this computer's AddMember privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can add members to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '362': {'query': "MATCH (n:Computer)-[r:AddSelf]->(m:Group) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,m.name ORDER BY n.name", 'desc': "List this computer's AddSelf privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can add itself to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '363': {'query': "MATCH (n:Computer)-[r:SQLAdmin]->(m:Computer) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,m.name ORDER BY n.name", 'desc': "List this computer's SQLAdmin privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is SQLAdmin to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '364': {'query': "MATCH (n:Computer)-[r:CanPSRemote]->(m:Computer) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,m.name ORDER BY n.name", 'desc': "List this computer's CanPSRemote privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can PSRemote to {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '365': {'query': "MATCH (n:Computer)-[r:ExecuteDCOM]->(m:Computer) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,m.name ORDER BY n.name", 'desc': "List this computer's ExecuteDCOM privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} can ExecuteDCOM on {log.reset}{log.red}{r['m.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '366': {'query': "MATCH (n:Computer)-[r:AllowedToAct]->(m) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this computer's AllowedToAct privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is AllowedToAct for {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '367': {'query': "MATCH (n:Computer)-[r:Owns]->(m) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this computer's Owns privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} Owns {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '368': {'query': "MATCH (n:Computer)-[r:AllExtendedRights]->(m) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this computer's AllExtendedRights privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has AllExtendedRights over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '369': {'query': "MATCH (n:Computer)-[r:AddKeyCredentialLink]->(m) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this computer's AddKeyCredentialLink privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has AddKeyCredentialLink over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '370': {'query': "MATCH (n:Computer)-[r:GenericAll]->(m) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this computer's GenericAll privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has GenericAll over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '371': {'query': "MATCH (n:Computer)-[r:WriteDacl]->(m) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this computer's WriteDacl privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteDacl over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '372': {'query': "MATCH (n:Computer)-[r:WriteOwner]->(m) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this computer's WriteOwner privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteOwner over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '373': {'query': "MATCH (n:Computer)-[r:WriteSPN]->(m) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this computer's WriteSPN privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteSPN over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '374': {'query': "MATCH (n:Computer)-[r:WriteAccountRestrictions]->(m) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this computer's WriteAccountRestrictions privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has WriteAccountRestrictions over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '375': {'query': "MATCH (n:Computer)-[r:GenericWrite]->(m) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this computer's GenericWrite privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has GenericWrite over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '376': {'query': "MATCH (n:Computer)-[r:HasSIDHistory]->(m) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this computer's HasSIDHistory privileges", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has HasSIDHistory over {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '377': {'query': "MATCH (n:Computer)-[r:MemberOf]->(m) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,m.name,labels(m) ORDER BY n.name", 'desc': "List this computer's group memberships", 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} is MemberOf {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '378': {'query': "MATCH (n:Computer)-[r]->(m) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,TYPE(r),labels(m),m.name ORDER BY TYPE(r)", 'desc': 'List all privileges for this computer', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}{log.default} has {log.reset}{log.red}{r['TYPE(r)']}{log.reset}{log.default} over {log.red}{r['m.name']} {log.reset}{log.default}({r['labels(m)'][0]}/{r['labels(m)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '379': {'query': "MATCH (n:Computer)-[:MemberOf]->(m:Group),(m)-[r]->(v) WHERE n.name =~ '((?i)COMPUTER_SEARCH)' RETURN n.name,TYPE(r),labels(v),m.name,v.name ORDER BY m.name", 'desc': 'List all group-delegated privileges for this computer', 'message_generator': (lambda r: ((((r.get('m.name') is not None) and (r.get('n.name') is not None) and (r.get('v.name') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']} {log.reset}{log.default}is MemberOf {log.reset}{log.red}{r['m.name']} {log.reset}{log.default}which has {log.reset}{log.red}{r['TYPE(r)']}{log.reset}{log.default} over {log.red}{r['v.name']} {log.reset}{log.default}({r['labels(v)'][0]}/{r['labels(v)'][1]}){log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'computer'}, '380': {'query': 'MATCH (m:Computer),(n {highvalue: true}),p=shortestPath((m)-[r*1..]->(n)) WHERE NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") AND NOT m=n AND m.name =~ \'((?i)COMPUTER_SEARCH)\' RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to high-value targets for this computer', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'computer'}, '381': {'query': 'MATCH p=shortestPath((m:Computer)-[r*1..]->(n:Group)) WHERE n.objectid =~ "(?i)S-1-5-21-.*-512" AND m.name =~ \'((?i)COMPUTER_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to Domain Admins for this computer', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'computer'}, '382': {'query': 'MATCH p=shortestPath((m:Computer)-[r*1..]->(n:Group)) WHERE n.objectid =~ "(?i)S-1-5-21-.*-519" AND m.name =~ \'((?i)COMPUTER_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to Enterprise Admins for this computer', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'computer'}, '383': {'query': 'MATCH p=shortestPath((m:Computer)-[r*1..]->(n:Group)) WHERE n.objectid =~ "(?i)S-1-5-21-.*-516" AND m.name =~ \'((?i)COMPUTER_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to Domain Controllers for this computer', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'computer'}, '384': {'query': 'MATCH p=shortestPath((m:Computer)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)EXCHANGE).*" AND m.name =~ \'((?i)COMPUTER_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to Exchange groups for this computer', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'computer'}, '385': {'query': 'MATCH p=shortestPath((m:Computer)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)admin|adm).*" AND m.name =~ \'((?i)COMPUTER_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to admin groups for this computer', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'computer'}, '386': {'query': 'MATCH p=shortestPath((m:Computer)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)SQL).*" AND m.name =~ \'((?i)COMPUTER_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to sql groups for this computer', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'computer'}, '387': {'query': 'MATCH p=shortestPath((m:Computer)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)WEB).*" AND m.name =~ \'((?i)COMPUTER_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to web groups for this computer', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'computer'}, '388': {'query': 'MATCH p=shortestPath((m:Computer)-[r*1..]->(n:Group)) WHERE n.name =~ ".*((?i)service|svc).*" AND m.name =~ \'((?i)COMPUTER_SEARCH)\' AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to service groups for this computer', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'computer'}, '389': {'query': 'MATCH p=shortestPath((m)-[r*1..]->(n:Computer)) WHERE n.name =~ \'((?i)COMPUTER_SEARCH)\' AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to this computer', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'computer'}, '390': {'query': 'MATCH p=shortestPath((m:Group)-[r*1..]->(n:Computer)) WHERE (m.objectid =~ "(?i)S-1-5-21-.*-513" OR m.objectid =~ "(?i).*-S-1-5-11" OR m.objectid =~ "(?i).*-S-1-1-0" OR m.objectid =~ "(?i).*-S-1-5-32-545") AND n.name =~ \'((?i)COMPUTER_SEARCH)\' AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to this computer for Users, Domain Users, Authenticated Users, or Everyone groups', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'computer'}, '391': {'query': 'MATCH p=shortestPath((m {owned: true})-[r*1..]->(n:Computer)) WHERE n.name =~ \'((?i)COMPUTER_SEARCH)\' AND NOT m=n AND NONE (r IN relationships(p) WHERE type(r)= "GetChanges") AND NONE (r in relationships(p) WHERE type(r)="GetChangesAll") AND NONE (r in relationships(p) WHERE type(r)="GetChangesInFilteredSet") RETURN m.name,p ORDER BY m.name', 'desc': 'List all shortest paths to this computer for owned principals', 'message_generator': None, 'handler': self.handle_path_query, 'type': 'computer'}, '392': {'query': "MATCH (n:Group) WHERE n.name =~ 'REGEX' RETURN n.name ORDER BY n.name", 'desc': 'Search for groups matching the regex', 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.default}Group {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'regex'}, '393': {'query': "MATCH (n:User) WHERE n.name =~ 'REGEX' RETURN n.name ORDER BY n.name", 'desc': 'Search for users matching the regex', 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.default}User {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'regex'}, '394': {'query': "MATCH (n:Computer) WHERE n.name =~ 'REGEX' RETURN n.name ORDER BY n.name", 'desc': 'Search for computers matching the regex', 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'regex'}, '395': {'query': "MATCH (n:User) WHERE n.description =~ 'REGEX' RETURN n.name,n.description ORDER BY n.name", 'desc': 'Search for user descriptions matching the regex', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('n.description') is not None)) and f"{log.default}User {log.reset}{log.red}{r['n.name']} {log.reset}{log.default}description {log.reset}{log.red}{r['n.description']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'regex'}, '396': {'query': "MATCH (n:Group) WHERE n.description =~ 'REGEX' RETURN n.name,n.description ORDER BY n.name", 'desc': 'Search for group descriptions matching the regex', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('n.description') is not None)) and f"{log.default}Group {log.reset}{log.red}{r['n.name']} {log.reset}{log.default}description {log.reset}{log.red}{r['n.description']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'regex'}, '397': {'query': "MATCH (n:Computer) WHERE n.operatingsystem =~ 'REGEX' RETURN n.name,n.operatingsystem ORDER BY n.name", 'desc': 'Search for OSs matching the regex', 'message_generator': (lambda r: ((((r.get('n.name') is not None) and (r.get('n.operatingsystem') is not None)) and f"{log.default}Computer {log.reset}{log.red}{r['n.name']} {log.reset}{log.default}OS {log.reset}{log.red}{r['n.operatingsystem']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'regex'}, '398': {'query': "MATCH (n:GPO) WHERE n.name =~ 'REGEX' RETURN n.name ORDER BY n.name", 'desc': 'Search for GPOs matching the regex', 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.default}GPO {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'regex'}, '399': {'query': "MATCH (n:Container) WHERE n.name =~ 'REGEX' RETURN n.name ORDER BY n.name", 'desc': 'Search for Containers matching the regex', 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.default}Container {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'regex'}, '400': {'query': "MATCH (n:OU) WHERE n.name =~ 'REGEX' RETURN n.name ORDER BY n.name", 'desc': 'Search for OUs matching the regex', 'message_generator': (lambda r: (((r.get('n.name') is not None) and f"{log.default}OU {log.reset}{log.red}{r['n.name']}{log.reset}") or None)), 'handler': self.handle_standard_query, 'type': 'regex'}}
except Exception as e:
log.log_error(e)
def close(self):
self.driver.close()
def set_user_param(self, param):
self.user_search = param
def get_user_param(self):
return self.user_search
def set_group_param(self, param):
self.group_search = param
def get_group_param(self):
return self.group_search
def set_computer_param(self, param):
self.computer_search = param
def get_computer_param(self):
return self.computer_search
def set_regex(self, r):
self.regex = r
def get_regex(self):
return self.regex
def search_queries(self, search_string):
results = {k: v for (k, v) in self.queries.items() if (search_string.lower() in v['desc'].lower())}
if results:
print(f'{log.green}Cypher matches for "{search_string}":{log.reset}')
for (key, value) in results.items():
print(f"{log.red}{key}.{log.reset} {value['desc']}")
else:
print(f'{log.yellow}No matches found for "{search_string}".{log.reset}')
def print_queries_by_type(self, type):
if (type == 'all'):
self.print_all_queries()
return
print(f'{log.default}{type.capitalize()} Cyphers{log.reset}')
for (num, data) in self.queries.items():
if (data['type'] == type):
print(f"{log.default}{num}.) {log.reset}{data['desc']}")
def print_all_queries(self):
print(f'{log.default}All Cyphers{log.reset}')
for (num, data) in self.queries.items():
print(f"{log.default}{num}.) {log.reset}{data['desc']}")
def replace_fillers_in_string(self, string):
replacements = {'USER_SEARCH': self.user_search, 'GROUP_SEARCH': self.group_search, 'COMPUTER_SEARCH': self.computer_search, 'REGEX': self.regex}
for (filler, replacement) in replacements.items():
string = string.replace(filler, replacement)
return string
def handle_standard_query(self, query_data, f):
try:
with self.driver.session(database=self.database) as session:
results = session.run(self.replace_fillers_in_string(query_data['query']))
if (results.peek() is None):
log.log_no_results()
else:
count = 0
for r in results:
msg = query_data['message_generator'](r)
if (msg is None):
continue
self.handle_output(f, msg)
count += 1
if (count == 0):
log.log_no_results()
if f:
util.handle_export(count, f)
except Exception as e:
log.log_error(e)
def handle_path_query(self, query_data, f):
try:
with self.driver.session(database=self.database) as session:
results = session.run(self.replace_fillers_in_string(query_data['query']))
if (results.peek() is None):
log.log_no_results()
else:
count = 0
p_count = 1
for r in results:
if ((r['m.name'] is not None) and (r['p'] is not None)):
path = r['p']
if ((path.start_node['name'] is not None) and (path.end_node['name'] is not None)):
n_count = 0
p_len = len(path)
final = ''
mid_len = len(f"*Path {p_count}* {path.start_node['name']} -> {path.end_node['name']}*")
self.handle_output(f, ('*' * mid_len))
self.handle_output(f, f"*Path {p_count}* {path.start_node['name']} -> {path.end_node['name']}*")
self.handle_output(f, ('*' * mid_len))
for rel in path:
if ((rel.start_node['name'] is not None) and (rel.end_node['name'] is not None)):
s_labels = list(rel.start_node.labels)
e_labels = list(rel.end_node.labels)
if (n_count != (p_len - 1)):
final += f"{log.red}{rel.start_node['name']}{log.reset}{log.default} ({s_labels[0]}/{s_labels[1]}) has {log.red}{rel.type}{log.reset} over {log.reset}{log.red}{rel.end_node['name']} {log.reset}{log.default}({e_labels[0]}/{e_labels[1]}) and {log.reset}"
n_count += 1
else:
final += f"{log.red}{rel.start_node['name']}{log.reset}{log.default} ({s_labels[0]}/{s_labels[1]}) has {log.red}{rel.type}{log.reset} over {log.reset}{log.red}{rel.end_node['name']} {log.reset}{log.default}({e_labels[0]}/{e_labels[1]}){log.reset}"
n_count += 1
self.handle_output(f, final)
p_count += 1
count += 1
if (count == 0):
log.log_no_results()
if f:
util.handle_export(count, f)
except Exception as e:
log.log_error(e)
def handle_output(self, f, message):
if (f == ''):
print(message)
else:
with open(f, 'a+') as file:
print(message)
file.write((util.strip_ansi_escape_sequences(message) + '\n'))
def run_query(self, option, f):
try:
query_data = self.queries.get(option)
if (query_data is not None):
query_data['handler'](query_data, f)
else:
log.log_error('Cypher does not exist!')
except Exception as e:
log.log_error(e) |
def test_distance_nearest_projection():
spacing = 0.3
coords = grid_coordinates((5, 10, (- 20), (- 17)), spacing=spacing, adjust='region')
distance = median_distance(coords, k_nearest=1, projection=(lambda i, j: ((i * 2), (j * 2))))
npt.assert_allclose(distance, (spacing * 2))
assert (distance.shape == coords[0].shape) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.