# frozen_string_literal: true class ProcessWafEventJob < ApplicationJob queue_as :waf_events def perform(event_data:, headers:) # Handle both single event and events array events_to_process = [] if event_data.key?('events') && event_data['events'].is_a?(Array) # Multiple events in an array events_to_process = event_data['events'] elsif event_data.key?('request_id') || event_data.key?('event_id') || event_data.key?('correlation_id') # Single event (support new and old field names) events_to_process = [event_data] else Rails.logger.warn "Invalid event data format: missing request_id/event_id/correlation_id or events array" return end events_to_process.each do |single_event_data| begin event_start = Time.current # Generate unique event ID if not provided # Support both new (request_id) and old (event_id, correlation_id) field names during cutover request_id = single_event_data['request_id'] || single_event_data['event_id'] || single_event_data['correlation_id'] || SecureRandom.uuid # Skip if event already exists (duplicate in batch or retry) if Event.exists?(request_id: request_id) Rails.logger.debug "Skipping duplicate event #{request_id}" next end # Create the WAF event record create_start = Time.current event = Event.create_from_waf_payload!(request_id, single_event_data) Rails.logger.debug "Event creation took #{((Time.current - create_start) * 1000).round(2)}ms" # Process network intelligence and policies # Note: Event.before_save already created the /24 tracking network # and stored it in event.network_range_id if event.network_range_id.present? begin network_start = Time.current # The tracking network was already created in Event.before_save tracking_network = event.network_range Rails.logger.debug "Using tracking network #{tracking_network.cidr} (created in before_save)" # Queue IPAPI enrichment based on /24 tracking # The tracking network is the /24 that stores ipapi_queried_at if NetworkRange.should_fetch_ipapi_for_ip?(event.ip_address) # Atomically mark as fetching - this prevents duplicate jobs via database lock if tracking_network.mark_as_fetching_api_data!(:ipapi) Rails.logger.info "Queueing IPAPI fetch for IP #{event.ip_address} (tracking network: #{tracking_network.cidr})" FetchIpapiDataJob.perform_later(network_range_id: tracking_network.id) else Rails.logger.info "Skipping IPAPI fetch for #{tracking_network.cidr} - another job already started" end else Rails.logger.debug "Skipping IPAPI fetch for IP #{event.ip_address} - already queried or being fetched" end # Evaluate WAF policies inline if needed (lazy evaluation) # Only runs when: network never evaluated OR policies changed since last evaluation if tracking_network.needs_policy_evaluation? policy_start = Time.current result = WafPolicyMatcher.evaluate_and_mark!(event) Rails.logger.debug "Policy evaluation took #{((Time.current - policy_start) * 1000).round(2)}ms" if result[:generated_rules].any? Rails.logger.info "Generated #{result[:generated_rules].length} rules for event #{event.id} (network: #{tracking_network.cidr})" end end Rails.logger.debug "Network processing took #{((Time.current - network_start) * 1000).round(2)}ms" rescue => e Rails.logger.warn "Failed to process network range for event #{event.id}: #{e.message}" end elsif event.ip_address.present? Rails.logger.warn "Event #{event.id} has IP but no network_range_id (private IP?)" end total_time = ((Time.current - event_start) * 1000).round(2) Rails.logger.info "Processed WAF event #{request_id} in #{total_time}ms" rescue ActiveRecord::RecordInvalid => e Rails.logger.error "Failed to create WAF event: #{e.message}" Rails.logger.error e.record.errors.full_messages.join(", ") rescue => e Rails.logger.error "Error processing WAF event: #{e.message}" Rails.logger.error e.backtrace.join("\n") end end Rails.logger.info "Processed #{events_to_process.count} WAF events" end end