From 650138aae6a2d6ae26f57a22056bdf0ea5fa8c77 Mon Sep 17 00:00:00 2001 From: Petri Hienonen Date: Sun, 28 Sep 2025 10:45:49 +0300 Subject: Initial commit --- index.html | 80 ++++++++++++++++++++++++++++++++++++++++++++++++++++++ main.go | 72 ++++++++++++++++++++++++++++++++++++++++++++++++ network-ui.service | 18 ++++++++++++ requirements.json | 62 ++++++++++++++++++++++++++++++++++++++++++ 4 files changed, 232 insertions(+) create mode 100644 index.html create mode 100644 main.go create mode 100644 network-ui.service create mode 100644 requirements.json diff --git a/index.html b/index.html new file mode 100644 index 0000000..618f523 --- /dev/null +++ b/index.html @@ -0,0 +1,80 @@ + + + + + + Systemd-networkd Control Panel + + + + + + +

Systemd-networkd Control Panel

+

This page shows network status, logs, and allows you to restart network services or reboot the device. + For more details see systemd-networkd documentation.

+ +
+

1. Network Status

+

The command networkctl status --json=short shows current interfaces, addresses, and routes.

+ Refresh Status +
[Waiting for data]
+
+ +
+

2. Network Logs

+

Logs come from journalctl -u systemd-networkd.service. This helps diagnose DHCP and link issues. +

+ Show Logs +
[Waiting for logs]
+
+ +
+

3. Manage Services

+

+ - Reload networkd after configuration changes.
+ - Reboot device if required. +

+ Restart networkd + Reboot device +
+ + + + + + diff --git a/main.go b/main.go new file mode 100644 index 0000000..046ad91 --- /dev/null +++ b/main.go @@ -0,0 +1,72 @@ +package main + +import ( + "encoding/json" + "html/template" + "log" + "net/http" + "os/exec" +) + +// Templates +var tpl = template.Must(template.ParseFiles("index.html")) + +// Handlers +func indexHandler(w http.ResponseWriter, r *http.Request) { + tpl.Execute(w, nil) +} + +// Run `networkctl status --json=short` +func statusHandler(w http.ResponseWriter, r *http.Request) { + cmd := exec.Command("networkctl", "status", "--json=short") + out, err := cmd.Output() + if err != nil { + http.Error(w, err.Error(), 500) + return + } + w.Header().Set("Content-Type", "application/json") + w.Write(out) +} + +// Run `journalctl -u systemd-networkd.service --no-pager -n 200` +func logsHandler(w http.ResponseWriter, r *http.Request) { + cmd := exec.Command("journalctl", "-u", "systemd-networkd.service", "--no-pager", "-n", "200") + out, err := cmd.Output() + if err != nil { + http.Error(w, err.Error(), 500) + return + } + w.Header().Set("Content-Type", "text/plain") + w.Write(out) +} + +// Reload systemd-networkd +func reloadHandler(w http.ResponseWriter, r *http.Request) { + cmd := exec.Command("systemctl", "restart", "systemd-networkd") + if err := cmd.Run(); err != nil { + http.Error(w, err.Error(), 500) + return + } + json.NewEncoder(w).Encode(map[string]string{"status": "restarted"}) +} + +// Reboot the system +func rebootHandler(w http.ResponseWriter, r *http.Request) { + cmd := exec.Command("systemctl", "reboot") + if err := cmd.Start(); err != nil { + http.Error(w, err.Error(), 500) + return + } + json.NewEncoder(w).Encode(map[string]string{"status": "rebooting"}) +} + +func main() { + http.HandleFunc("/", indexHandler) + http.HandleFunc("/api/status", statusHandler) + http.HandleFunc("/api/logs", logsHandler) + http.HandleFunc("/api/reload", reloadHandler) + http.HandleFunc("/api/reboot", rebootHandler) + + log.Println("Listening on :8080") + log.Fatal(http.ListenAndServe(":8080", nil)) +} diff --git a/network-ui.service b/network-ui.service new file mode 100644 index 0000000..6b3f0f8 --- /dev/null +++ b/network-ui.service @@ -0,0 +1,18 @@ +[Unit] +Description=Web UI for systemd-networkd +After=network.target + +[Service] +ExecStart=/usr/local/bin/network-ui +WorkingDirectory=/var/lib/network-ui +User=network-ui +Group=network-ui +ProtectSystem=strict +ProtectHome=yes +NoNewPrivileges=yes +PrivateTmp=yes +AmbientCapabilities=CAP_SYS_BOOT CAP_NET_ADMIN + +[Install] +WantedBy=multi-user.target + diff --git a/requirements.json b/requirements.json new file mode 100644 index 0000000..3e0b728 --- /dev/null +++ b/requirements.json @@ -0,0 +1,62 @@ +{ + "project": "systemd-networkd Web UI", + "version": "0.1", + "requirements": { + "functional": [ + { + "id": "F-001", + "description": "The system shall provide a web-based dashboard to display current network status (interfaces, addresses, routes) by invoking `networkctl status --json=short`." + }, + { + "id": "F-002", + "description": "The system shall provide access to logs of `systemd-networkd.service` via `journalctl`." + }, + { + "id": "F-003", + "description": "The system shall provide controls to restart `systemd-networkd` without rebooting the device." + }, + { + "id": "F-004", + "description": "The system shall provide a control to reboot the device." + }, + { + "id": "F-005", + "description": "The system shall present contextual teaching information (e.g., IPv4 basics, logs explanation, restart rationale) directly within the web interface." + }, + { + "id": "F-006", + "description": "The system shall use a single-page design with minimal dependencies (HTML + Fluent UI web components from CDN)." + } + ], + "technical": [ + { + "id": "T-001", + "description": "The backend shall be implemented in Go, exposing HTTP endpoints on port 80." + }, + { + "id": "T-002", + "description": "The system shall run as a `systemd` service with restricted privileges (User=network-ui, ProtectSystem=strict, NoNewPrivileges=yes)." + }, + { + "id": "T-003", + "description": "The backend shall execute only specific whitelisted commands: `networkctl`, `journalctl`, `systemctl restart systemd-networkd`, and `systemctl reboot`." + }, + { + "id": "T-004", + "description": "The frontend shall consume backend endpoints via REST-style APIs returning UTF8-SON" + }, + { + "id": "T-005", + "description": "The system shall require no external database or file storage beyond access to `systemd` configuration and logs." + }, + { + "id": "T-006", + "description": "The service shall start automatically at boot and remain persistent under `systemd` supervision." + }, + { + "id": "T-007", + "description": "The design shall ensure sandboxing: no direct shell access beyond intended commands, no write access to arbitrary filesystem locations." + } + ] + } +} -- cgit v1.2.3-70-g09d2