261 lines
		
	
	
		
			8.7 KiB
		
	
	
	
		
			C++
		
	
	
	
			
		
		
	
	
			261 lines
		
	
	
		
			8.7 KiB
		
	
	
	
		
			C++
		
	
	
	
| // Copyright(c) 2015-present, Gabi Melman & spdlog contributors.
 | |
| // Distributed under the MIT License (http://opensource.org/licenses/MIT)
 | |
| 
 | |
| // Writing to Windows Event Log requires the registry entries below to be present, with the
 | |
| // following modifications:
 | |
| // 1. <log_name>    should be replaced with your log name (e.g. your application name)
 | |
| // 2. <source_name> should be replaced with the specific source name and the key should be
 | |
| // duplicated for
 | |
| //                  each source used in the application
 | |
| //
 | |
| // Since typically modifications of this kind require elevation, it's better to do it as a part of
 | |
| // setup procedure. The snippet below uses mscoree.dll as the message file as it exists on most of
 | |
| // the Windows systems anyway and happens to contain the needed resource.
 | |
| //
 | |
| // You can also specify a custom message file if needed.
 | |
| // Please refer to Event Log functions descriptions in MSDN for more details on custom message
 | |
| // files.
 | |
| 
 | |
| /*---------------------------------------------------------------------------------------
 | |
| 
 | |
| Windows Registry Editor Version 5.00
 | |
| 
 | |
| [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\<log_name>]
 | |
| 
 | |
| [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\<log_name>\<source_name>]
 | |
| "TypesSupported"=dword:00000007
 | |
| "EventMessageFile"=hex(2):25,00,73,00,79,00,73,00,74,00,65,00,6d,00,72,00,6f,\
 | |
|   00,6f,00,74,00,25,00,5c,00,53,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,\
 | |
|   5c,00,6d,00,73,00,63,00,6f,00,72,00,65,00,65,00,2e,00,64,00,6c,00,6c,00,00,\
 | |
|   00
 | |
| 
 | |
| -----------------------------------------------------------------------------------------*/
 | |
| 
 | |
| #pragma once
 | |
| 
 | |
| #include <spdlog/details/null_mutex.h>
 | |
| #include <spdlog/sinks/base_sink.h>
 | |
| 
 | |
| #include <spdlog/details/windows_include.h>
 | |
| #include <winbase.h>
 | |
| 
 | |
| #include <mutex>
 | |
| #include <string>
 | |
| #include <vector>
 | |
| 
 | |
| namespace spdlog {
 | |
| namespace sinks {
 | |
| 
 | |
| namespace win_eventlog {
 | |
| 
 | |
| namespace internal {
 | |
| 
 | |
| struct local_alloc_t {
 | |
|     HLOCAL hlocal_;
 | |
| 
 | |
|     SPDLOG_CONSTEXPR local_alloc_t() SPDLOG_NOEXCEPT : hlocal_(nullptr) {}
 | |
| 
 | |
|     local_alloc_t(local_alloc_t const &) = delete;
 | |
|     local_alloc_t &operator=(local_alloc_t const &) = delete;
 | |
| 
 | |
|     ~local_alloc_t() SPDLOG_NOEXCEPT {
 | |
|         if (hlocal_) {
 | |
|             LocalFree(hlocal_);
 | |
|         }
 | |
|     }
 | |
| };
 | |
| 
 | |
| /** Windows error */
 | |
| struct win32_error : public spdlog_ex {
 | |
|     /** Formats an error report line: "user-message: error-code (system message)" */
 | |
|     static std::string format(std::string const &user_message, DWORD error_code = GetLastError()) {
 | |
|         std::string system_message;
 | |
| 
 | |
|         local_alloc_t format_message_result{};
 | |
|         auto format_message_succeeded =
 | |
|             ::FormatMessageA(FORMAT_MESSAGE_ALLOCATE_BUFFER | FORMAT_MESSAGE_FROM_SYSTEM |
 | |
|                                  FORMAT_MESSAGE_IGNORE_INSERTS,
 | |
|                              nullptr, error_code, MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT),
 | |
|                              (LPSTR)&format_message_result.hlocal_, 0, nullptr);
 | |
| 
 | |
|         if (format_message_succeeded && format_message_result.hlocal_) {
 | |
|             system_message = fmt_lib::format(" ({})", (LPSTR)format_message_result.hlocal_);
 | |
|         }
 | |
| 
 | |
|         return fmt_lib::format("{}: {}{}", user_message, error_code, system_message);
 | |
|     }
 | |
| 
 | |
|     explicit win32_error(std::string const &func_name, DWORD error = GetLastError())
 | |
|         : spdlog_ex(format(func_name, error)) {}
 | |
| };
 | |
| 
 | |
| /** Wrapper for security identifiers (SID) on Windows */
 | |
| struct sid_t {
 | |
|     std::vector<char> buffer_;
 | |
| 
 | |
| public:
 | |
|     sid_t() {}
 | |
| 
 | |
|     /** creates a wrapped SID copy */
 | |
|     static sid_t duplicate_sid(PSID psid) {
 | |
|         if (!::IsValidSid(psid)) {
 | |
|             throw_spdlog_ex("sid_t::sid_t(): invalid SID received");
 | |
|         }
 | |
| 
 | |
|         auto const sid_length{::GetLengthSid(psid)};
 | |
| 
 | |
|         sid_t result;
 | |
|         result.buffer_.resize(sid_length);
 | |
|         if (!::CopySid(sid_length, (PSID)result.as_sid(), psid)) {
 | |
|             SPDLOG_THROW(win32_error("CopySid"));
 | |
|         }
 | |
| 
 | |
|         return result;
 | |
|     }
 | |
| 
 | |
|     /** Retrieves pointer to the internal buffer contents as SID* */
 | |
|     SID *as_sid() const { return buffer_.empty() ? nullptr : (SID *)buffer_.data(); }
 | |
| 
 | |
|     /** Get SID for the current user */
 | |
|     static sid_t get_current_user_sid() {
 | |
|         /* create and init RAII holder for process token */
 | |
|         struct process_token_t {
 | |
|             HANDLE token_handle_ = INVALID_HANDLE_VALUE;
 | |
|             explicit process_token_t(HANDLE process) {
 | |
|                 if (!::OpenProcessToken(process, TOKEN_QUERY, &token_handle_)) {
 | |
|                     SPDLOG_THROW(win32_error("OpenProcessToken"));
 | |
|                 }
 | |
|             }
 | |
| 
 | |
|             ~process_token_t() { ::CloseHandle(token_handle_); }
 | |
| 
 | |
|         } current_process_token(
 | |
|             ::GetCurrentProcess());  // GetCurrentProcess returns pseudohandle, no leak here!
 | |
| 
 | |
|         // Get the required size, this is expected to fail with ERROR_INSUFFICIENT_BUFFER and return
 | |
|         // the token size
 | |
|         DWORD tusize = 0;
 | |
|         if (::GetTokenInformation(current_process_token.token_handle_, TokenUser, NULL, 0,
 | |
|                                   &tusize)) {
 | |
|             SPDLOG_THROW(win32_error("GetTokenInformation should fail"));
 | |
|         }
 | |
| 
 | |
|         // get user token
 | |
|         std::vector<unsigned char> buffer(static_cast<size_t>(tusize));
 | |
|         if (!::GetTokenInformation(current_process_token.token_handle_, TokenUser,
 | |
|                                    (LPVOID)buffer.data(), tusize, &tusize)) {
 | |
|             SPDLOG_THROW(win32_error("GetTokenInformation"));
 | |
|         }
 | |
| 
 | |
|         // create a wrapper of the SID data as stored in the user token
 | |
|         return sid_t::duplicate_sid(((TOKEN_USER *)buffer.data())->User.Sid);
 | |
|     }
 | |
| };
 | |
| 
 | |
| struct eventlog {
 | |
|     static WORD get_event_type(details::log_msg const &msg) {
 | |
|         switch (msg.level) {
 | |
|             case level::trace:
 | |
|             case level::debug:
 | |
|                 return EVENTLOG_SUCCESS;
 | |
| 
 | |
|             case level::info:
 | |
|                 return EVENTLOG_INFORMATION_TYPE;
 | |
| 
 | |
|             case level::warn:
 | |
|                 return EVENTLOG_WARNING_TYPE;
 | |
| 
 | |
|             case level::err:
 | |
|             case level::critical:
 | |
|             case level::off:
 | |
|                 return EVENTLOG_ERROR_TYPE;
 | |
| 
 | |
|             default:
 | |
|                 return EVENTLOG_INFORMATION_TYPE;
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     static WORD get_event_category(details::log_msg const &msg) { return (WORD)msg.level; }
 | |
| };
 | |
| 
 | |
| }  // namespace internal
 | |
| 
 | |
| /*
 | |
|  * Windows Event Log sink
 | |
|  */
 | |
| template <typename Mutex>
 | |
| class win_eventlog_sink : public base_sink<Mutex> {
 | |
| private:
 | |
|     HANDLE hEventLog_{NULL};
 | |
|     internal::sid_t current_user_sid_;
 | |
|     std::string source_;
 | |
|     DWORD event_id_;
 | |
| 
 | |
|     HANDLE event_log_handle() {
 | |
|         if (!hEventLog_) {
 | |
|             hEventLog_ = ::RegisterEventSourceA(nullptr, source_.c_str());
 | |
|             if (!hEventLog_ || hEventLog_ == (HANDLE)ERROR_ACCESS_DENIED) {
 | |
|                 SPDLOG_THROW(internal::win32_error("RegisterEventSource"));
 | |
|             }
 | |
|         }
 | |
| 
 | |
|         return hEventLog_;
 | |
|     }
 | |
| 
 | |
| protected:
 | |
|     void sink_it_(const details::log_msg &msg) override {
 | |
|         using namespace internal;
 | |
| 
 | |
|         bool succeeded;
 | |
|         memory_buf_t formatted;
 | |
|         base_sink<Mutex>::formatter_->format(msg, formatted);
 | |
|         formatted.push_back('\0');
 | |
| 
 | |
| #ifdef SPDLOG_WCHAR_TO_UTF8_SUPPORT
 | |
|         wmemory_buf_t buf;
 | |
|         details::os::utf8_to_wstrbuf(string_view_t(formatted.data(), formatted.size()), buf);
 | |
| 
 | |
|         LPCWSTR lp_wstr = buf.data();
 | |
|         succeeded = static_cast<bool>(::ReportEventW(
 | |
|             event_log_handle(), eventlog::get_event_type(msg), eventlog::get_event_category(msg),
 | |
|             event_id_, current_user_sid_.as_sid(), 1, 0, &lp_wstr, nullptr));
 | |
| #else
 | |
|         LPCSTR lp_str = formatted.data();
 | |
|         succeeded = static_cast<bool>(::ReportEventA(
 | |
|             event_log_handle(), eventlog::get_event_type(msg), eventlog::get_event_category(msg),
 | |
|             event_id_, current_user_sid_.as_sid(), 1, 0, &lp_str, nullptr));
 | |
| #endif
 | |
| 
 | |
|         if (!succeeded) {
 | |
|             SPDLOG_THROW(win32_error("ReportEvent"));
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     void flush_() override {}
 | |
| 
 | |
| public:
 | |
|     win_eventlog_sink(std::string const &source,
 | |
|                       DWORD event_id = 1000 /* according to mscoree.dll */)
 | |
|         : source_(source),
 | |
|           event_id_(event_id) {
 | |
|         try {
 | |
|             current_user_sid_ = internal::sid_t::get_current_user_sid();
 | |
|         } catch (...) {
 | |
|             // get_current_user_sid() is unlikely to fail and if it does, we can still proceed
 | |
|             // without current_user_sid but in the event log the record will have no user name
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     ~win_eventlog_sink() {
 | |
|         if (hEventLog_) DeregisterEventSource(hEventLog_);
 | |
|     }
 | |
| };
 | |
| 
 | |
| }  // namespace win_eventlog
 | |
| 
 | |
| using win_eventlog_sink_mt = win_eventlog::win_eventlog_sink<std::mutex>;
 | |
| using win_eventlog_sink_st = win_eventlog::win_eventlog_sink<details::null_mutex>;
 | |
| 
 | |
| }  // namespace sinks
 | |
| }  // namespace spdlog
 |