| package escalationmanager |
|
|
| import ( |
| "context" |
| "database/sql" |
|
|
| "github.com/target/goalert/alert/alertlog" |
| "github.com/target/goalert/permission" |
| "github.com/target/goalert/util/log" |
| "github.com/target/goalert/util/sqlutil" |
|
|
| "github.com/pkg/errors" |
| ) |
|
|
| |
| func (db *DB) UpdateAll(ctx context.Context) error { |
| err := db.update(ctx, true, nil) |
| return err |
| } |
|
|
| func (db *DB) update(ctx context.Context, all bool, alertID *int) error { |
| err := permission.LimitCheckAny(ctx, permission.System) |
| if err != nil { |
| return err |
| } |
| log.Debugf(ctx, "Updating alert escalations.") |
|
|
| tx, err := db.lock.BeginTx(ctx, nil) |
| if err != nil { |
| return errors.Wrap(err, "begin tx") |
| } |
| defer sqlutil.Rollback(ctx, "escalation manager", tx) |
|
|
| _, err = tx.StmtContext(ctx, db.lockStmt).ExecContext(ctx) |
| if err != nil { |
| return errors.Wrap(err, "lock ep step table") |
| } |
| _, err = tx.StmtContext(ctx, db.updateOnCall).ExecContext(ctx) |
| if err != nil { |
| return errors.Wrap(err, "update ep step on-call") |
| } |
| err = tx.Commit() |
| if err != nil { |
| return errors.Wrap(err, "commit on-call update") |
| } |
|
|
| _, err = db.lock.Exec(ctx, db.clearMaintExpiredSvc) |
| if err != nil { |
| return errors.Wrap(err, "set maintenance_expires_at to null where expired") |
| } |
|
|
| _, err = db.lock.Exec(ctx, db.cleanupNoSteps) |
| if err != nil { |
| return errors.Wrap(err, "end policies with no steps") |
| } |
|
|
| err = db.processEscalations(ctx, db.newPolicies, func(rows *sql.Rows) (int, *alertlog.EscalationMetaData, error) { |
| var id int |
| var meta alertlog.EscalationMetaData |
| err := rows.Scan(&id, &meta.NoOneOnCall) |
| return id, &meta, err |
| }) |
| if err != nil { |
| return errors.Wrap(err, "trigger new policies") |
| } |
|
|
| err = db.processEscalations(ctx, db.deletedSteps, func(rows *sql.Rows) (int, *alertlog.EscalationMetaData, error) { |
| var id int |
| var meta alertlog.EscalationMetaData |
| err := rows.Scan(&id, &meta.Repeat, &meta.NewStepIndex, &meta.NoOneOnCall) |
| return id, &meta, err |
| }) |
| if err != nil { |
| return errors.Wrap(err, "escalate policies with deleted steps") |
| } |
|
|
| err = db.processEscalations(ctx, db.normalEscalation, func(rows *sql.Rows) (int, *alertlog.EscalationMetaData, error) { |
| var id int |
| var meta alertlog.EscalationMetaData |
| err := rows.Scan(&id, &meta.Repeat, &meta.NewStepIndex, &meta.OldDelayMinutes, &meta.Forced, &meta.NoOneOnCall) |
| return id, &meta, err |
| }) |
| if err != nil { |
| return errors.Wrap(err, "escalate forced or expired") |
| } |
|
|
| return nil |
| } |
|
|
| func (db *DB) processEscalations(ctx context.Context, stmt *sql.Stmt, scan func(*sql.Rows) (int, *alertlog.EscalationMetaData, error)) error { |
| tx, err := db.lock.BeginTx(ctx, nil) |
| if err != nil { |
| return err |
| } |
| defer sqlutil.Rollback(ctx, "escalation manager: process", tx) |
|
|
| rows, err := tx.StmtContext(ctx, stmt).QueryContext(ctx) |
| if err != nil { |
| return err |
| } |
| defer rows.Close() |
|
|
| batch := make(map[alertlog.EscalationMetaData][]int) |
|
|
| for rows.Next() { |
| id, esc, err := scan(rows) |
| if err != nil { |
| return err |
| } |
| batch[*esc] = append(batch[*esc], id) |
| } |
|
|
| for meta, ids := range batch { |
| err = db.log.LogManyTx(ctx, tx, ids, alertlog.TypeEscalated, meta) |
| if err != nil { |
| return errors.Wrap(err, "log escalation") |
| } |
| } |
|
|
| return tx.Commit() |
| } |
|
|