Skip to main content

Optimises indexing of object security for a Plone site.

Project description

https://api.travis-ci.org/ploneintranet/experimental.securityindexing.png https://coveralls.io/repos/ploneintranet/experimental.securityindexing/badge.png

experimental.securityindexing

Description

This package aims to address a long-standing performance issue in Plone:

Under circumstances which require security for an object to be re-indexed, for example, when adding roles to users or groups via the @@sharing view, the object for which the sharing form is being used and all of its decendant objects in the content tree are unconditionally fetched from the database (ZODB) and their security attributes (allowedRolesAndUsers) are re-indexed.

This can yield terrible performance for some sites, depending upon the size (number of objects), and workflow complexity.

Installation

To install this package, add experimental.securityindexing to your Plone sites’ eggs and re-run buildout:

Testing it out

This package provides some rudementry benchmarks which are aimed to be a sanity test answering the question:

“Are we at least faster than the previous implementation by default?”

These benchmarks should not be treated as authorative, nor indicative of the performance you should expect on a real site.

To do so, the best way to ascertain results is to install the package in a development/staging versions of your site aginst some realistic data.

Installation is as above, but add the extras [benchmarks,tests]:

Please read the benchmark docs for details.

Existing behaviour in Plone 4.x sites

When local roles are assigned to user on a given folderish content item, the folder will be indexed and all of it’s descendants (child folders) - unconditionally.

Depending upon the combination of:

  • The structure of the tree

  • The number of descendant content items (depth and breath of the sub-tree “beneath” the object being edited)

This behaviour is currently implemented twice (Dexterity and Archetypes), by the method reindexObjectSecurity. This method invoked on the context that local roles are being manipulated upon, in order to reflect the changes in the allowedRolesAndUsers Keywordindex in the ZCatalog.

The allowedRolesAndUsers index is used in Plone to determine which content a user can see. e.g:

In the site search

Within a Plone 4.x site, the two implementations of the reindexObjectSecurity API are:

  • Products.CMFCore.CMFCatalogAware.CatalogAware.reindexObjectSecuity(skip_self=False): Indexes the content item (self). The keyword parameter skip_self will be False when invoked from the @@sharing action. For each child node in the content tree “beneath” this content item, fetch that object, ultimately via the ZCatalog.unrestrictedTraverse API, and re-index each one, unconditionally.

  • Products.Archetypes.CatalogMultiplex.CatalogMultiplex The archetypes tool is used to look up all catalogs that have been registered for the meta_type of the content item (self).

N.B Both these implementations implement the Products.CMFCore.interfaces.ICatalogAware

interface.

The expensive operations seem to be:

  1. “Waking up” each child node via unrestrictedTraverse

  2. When any local roles of significance are assigned to the object, the indexer for local roles (Products.CMFPlone.CatalogTool.allowedRolesAndUsers) invokes Products.PlonePAS.plugins.local_roles.LocalRolesManager.getAllLocalRolesInContext API, which performs the following algorithm for each object to be indexed:

    1. Acquire the inner context.

    2. acquire the content object and it’s parent. and calculate the unique set of local roles for the content object.

    3. If __ac_block_local_roles__ is not set, exit and returns the local roles calculated.

    4. Repeats 2. until a parent is None (root of the tree).

The goals of any solution to address the previously described performance issue(s) are:

  1. Wake up as few objects as possible.

  2. Where local roles information has not changed, avoid re-indexing.

The following scheme was envisioned to optimise the above algorithm:

  1. When an object is indexed for the first time CatalogTool.indexObject, persist a unique token representing the unique set of local roles and the __ac_local_roles_block__ flag, along with the object’s id and physical path in a “shadow tree” which has the same form as the main content tree (ZODB).

  2. Avoid re-indexing where possible, avoid waking up content objects:

2.1 Given an item of content obj, determine the set of child objects that need to be re-indexed,

retrieve the node corresponding to the obj from the shadow tree, and each node representing obj’s corresponding descendants, and group these nodes by the unique local roles.

2.2 For each group of nodes, retrieve the content object corresponding to the first node in the group.

2.3 Ask the first object for it’s allowedRolesAndUsers (aka local roles)

2.4 Index each node in group, supplying a faux object (either the shadow node or some other

object standing-in for the content object)

Credit

This work has been done as part of the Plone Intranet project. Work sponsored by Netsight Internet Solutions.

Changelog

0.6 (2014-06-04)

  • Nothing changed yet.

0.5 (2014-06-04)

  • Nothing changed yet.

0.4 (2014-06-04)

  • Fix versioning metadata, bumped version for new release.

0.2 (2014-06-04)

  • Corrected package metadata.

  • Update README.rst to remove wrongly named branch in badge urls.

  • Control panel configlet for synchronising/view state of shadowtree.

  • Use itertools to group nodes

  • The shadowtree tool is now a site-local tool (but managed by a global utility)

  • Add functional tests

0.2dev (unreleasd)

0.1dev (unreleasd)

0.1 (2014-05-16)

  • Initial pypi release.

0.1 (2014-05-16)

  • Initial pypi release.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

experimental.securityindexing-0.6.zip (51.9 kB view details)

Uploaded Source

File details

Details for the file experimental.securityindexing-0.6.zip.

File metadata

File hashes

Hashes for experimental.securityindexing-0.6.zip
Algorithm Hash digest
SHA256 899450c4abb0ad2f80cbdfceef7f089a80ee1ee7fbc4ba706f01817b06a833e5
MD5 bcda09e8993fbcb6a5488d86dec8141b
BLAKE2b-256 193514e52eaa8ff714b62c741fa8ba0dd66b871a6f2f80666c84933572fc042d

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page