// Copyright(c) 2015-present, Gabi Melman & spdlog contributors. // Distributed under the MIT License (http://opensource.org/licenses/MIT) // Writing to Windows Event Log requires the registry entries below to be present, with the following modifications: // 1. should be replaced with your log name (e.g. your application name) // 2. should be replaced with the specific source name and the key should be duplicated for // each source used in the application // // Since typically modifications of this kind require elevation, it's better to do it as a part of setup procedure. // The snippet below uses mscoree.dll as the message file as it exists on most of the Windows systems anyway and // happens to contain the needed resource. // // You can also specify a custom message file if needed. // Please refer to Event Log functions descriptions in MSDN for more details on custom message files. /*--------------------------------------------------------------------------------------- Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\] [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\\] "TypesSupported"=dword:00000007 "EventMessageFile"=hex(2):25,00,73,00,79,00,73,00,74,00,65,00,6d,00,72,00,6f,\ 00,6f,00,74,00,25,00,5c,00,53,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,\ 5c,00,6d,00,73,00,63,00,6f,00,72,00,65,00,65,00,2e,00,64,00,6c,00,6c,00,00,\ 00 -----------------------------------------------------------------------------------------*/ #pragma once #include #include #include #include #include #include #include namespace spdlog { namespace sinks { namespace win_eventlog { namespace internal { struct local_alloc_t { HLOCAL hlocal_; SPDLOG_CONSTEXPR local_alloc_t() SPDLOG_NOEXCEPT : hlocal_(nullptr) {} local_alloc_t(local_alloc_t const &) = delete; local_alloc_t &operator=(local_alloc_t const &) = delete; ~local_alloc_t() SPDLOG_NOEXCEPT { if (hlocal_) { LocalFree(hlocal_); } } }; /** Windows error */ struct win32_error : public spdlog_ex { /** Formats an error report line: "user-message: error-code (system message)" */ static std::string format(std::string const &user_message, DWORD error_code = GetLastError()) { std::string system_message; local_alloc_t format_message_result{}; auto format_message_succeeded = ::FormatMessageA(FORMAT_MESSAGE_ALLOCATE_BUFFER | FORMAT_MESSAGE_FROM_SYSTEM | FORMAT_MESSAGE_IGNORE_INSERTS, nullptr, error_code, MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT), (LPSTR)&format_message_result.hlocal_, 0, nullptr); if (format_message_succeeded && format_message_result.hlocal_) { system_message = fmt_lib::format(" ({})", (LPSTR)format_message_result.hlocal_); } return fmt_lib::format("{}: {}{}", user_message, error_code, system_message); } explicit win32_error(std::string const &func_name, DWORD error = GetLastError()) : spdlog_ex(format(func_name, error)) {} }; /** Wrapper for security identifiers (SID) on Windows */ struct sid_t { std::vector buffer_; public: sid_t() {} /** creates a wrapped SID copy */ static sid_t duplicate_sid(PSID psid) { if (!::IsValidSid(psid)) { throw_spdlog_ex("sid_t::sid_t(): invalid SID received"); } auto const sid_length{::GetLengthSid(psid)}; sid_t result; result.buffer_.resize(sid_length); if (!::CopySid(sid_length, (PSID)result.as_sid(), psid)) { SPDLOG_THROW(win32_error("CopySid")); } return result; } /** Retrieves pointer to the internal buffer contents as SID* */ SID *as_sid() const { return buffer_.empty() ? nullptr : (SID *)buffer_.data(); } /** Get SID for the current user */ static sid_t get_current_user_sid() { /* create and init RAII holder for process token */ struct process_token_t { HANDLE token_handle_ = INVALID_HANDLE_VALUE; explicit process_token_t(HANDLE process) { if (!::OpenProcessToken(process, TOKEN_QUERY, &token_handle_)) { SPDLOG_THROW(win32_error("OpenProcessToken")); } } ~process_token_t() { ::CloseHandle(token_handle_); } } current_process_token(::GetCurrentProcess()); // GetCurrentProcess returns pseudohandle, no leak here! // Get the required size, this is expected to fail with ERROR_INSUFFICIENT_BUFFER and return the token size DWORD tusize = 0; if (::GetTokenInformation(current_process_token.token_handle_, TokenUser, NULL, 0, &tusize)) { SPDLOG_THROW(win32_error("GetTokenInformation should fail")); } // get user token std::vector buffer(static_cast(tusize)); if (!::GetTokenInformation(current_process_token.token_handle_, TokenUser, (LPVOID)buffer.data(), tusize, &tusize)) { SPDLOG_THROW(win32_error("GetTokenInformation")); } // create a wrapper of the SID data as stored in the user token return sid_t::duplicate_sid(((TOKEN_USER *)buffer.data())->User.Sid); } }; struct eventlog { static WORD get_event_type(details::log_msg const &msg) { switch (msg.level) { case level::trace: case level::debug: return EVENTLOG_SUCCESS; case level::info: return EVENTLOG_INFORMATION_TYPE; case level::warn: return EVENTLOG_WARNING_TYPE; case level::err: case level::critical: case level::off: return EVENTLOG_ERROR_TYPE; default: return EVENTLOG_INFORMATION_TYPE; } } static WORD get_event_category(details::log_msg const &msg) { return (WORD)msg.level; } }; } // namespace internal /* * Windows Event Log sink */ template class win_eventlog_sink : public base_sink { private: HANDLE hEventLog_{NULL}; internal::sid_t current_user_sid_; std::string source_; DWORD event_id_; HANDLE event_log_handle() { if (!hEventLog_) { hEventLog_ = ::RegisterEventSourceA(nullptr, source_.c_str()); if (!hEventLog_ || hEventLog_ == (HANDLE)ERROR_ACCESS_DENIED) { SPDLOG_THROW(internal::win32_error("RegisterEventSource")); } } return hEventLog_; } protected: void sink_it_(const details::log_msg &msg) override { using namespace internal; bool succeeded; memory_buf_t formatted; base_sink::formatter_->format(msg, formatted); formatted.push_back('\0'); #ifdef SPDLOG_WCHAR_TO_UTF8_SUPPORT wmemory_buf_t buf; details::os::utf8_to_wstrbuf(string_view_t(formatted.data(), formatted.size()), buf); LPCWSTR lp_wstr = buf.data(); succeeded = static_cast(::ReportEventW(event_log_handle(), eventlog::get_event_type(msg), eventlog::get_event_category(msg), event_id_, current_user_sid_.as_sid(), 1, 0, &lp_wstr, nullptr)); #else LPCSTR lp_str = formatted.data(); succeeded = static_cast(::ReportEventA(event_log_handle(), eventlog::get_event_type(msg), eventlog::get_event_category(msg), event_id_, current_user_sid_.as_sid(), 1, 0, &lp_str, nullptr)); #endif if (!succeeded) { SPDLOG_THROW(win32_error("ReportEvent")); } } void flush_() override {} public: win_eventlog_sink(std::string const &source, DWORD event_id = 1000 /* according to mscoree.dll */) : source_(source) , event_id_(event_id) { try { current_user_sid_ = internal::sid_t::get_current_user_sid(); } catch (...) { // get_current_user_sid() is unlikely to fail and if it does, we can still proceed without // current_user_sid but in the event log the record will have no user name } } ~win_eventlog_sink() { if (hEventLog_) DeregisterEventSource(hEventLog_); } }; } // namespace win_eventlog using win_eventlog_sink_mt = win_eventlog::win_eventlog_sink; using win_eventlog_sink_st = win_eventlog::win_eventlog_sink; } // namespace sinks } // namespace spdlog