File: westrun.sh

package info (click to toggle)
libreswan 4.3-1%2Bdeb11u4
  • links: PTS, VCS
  • area: main
  • in suites: bullseye
  • size: 62,688 kB
  • sloc: ansic: 108,293; sh: 25,973; xml: 11,756; python: 10,230; makefile: 1,580; javascript: 1,353; yacc: 825; sed: 647; perl: 584; lex: 159; awk: 156
file content (49 lines) | stat: -rwxr-xr-x 2,291 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
systemctl start ipsec.service || echo failed
systemctl status ipsec.service >/dev/null || echo failed
systemctl start ipsec.service && echo detected proper failure
systemctl status ipsec.service >/dev/null || echo failed
systemctl restart ipsec.service || echo failed
systemctl status ipsec.service >/dev/null || echo failed
systemctl stop ipsec.service || echo failed
systemctl status ipsec.service >/dev/null && echo detected proper failure
systemctl stop ipsec.service || echo failed
systemctl status ipsec.service >/dev/null && echo detected proper failure
systemctl start ipsec.service || echo failed
systemctl force-reload ipsec.service || echo failed
systemctl status ipsec.service >/dev/null || echo failed	
systemctl start ipsec.service || echo failed
systemctl restart ipsec.service || echo failed
systemctl status ipsec.service >/dev/null || echo failed	
systemctl start ipsec.service || echo failed
systemctl condrestart ipsec.service || echo failed
systemctl status ipsec.service >/dev/null || echo failed	
service ipsec start || echo failed
service ipsec status >/dev/null || echo failed
service ipsec start || echo failed
service ipsec status >/dev/null || echo failed
service ipsec restart || echo failed
service ipsec status >/dev/null || echo failed
service ipsec stop || echo failed
service ipsec status >/dev/null && echo detected proper failure
service ipsec stop || echo failed
service ipsec status >/dev/null && echo detected proper failure
service ipsec start || echo failed
service ipsec force-reload || echo failed
service ipsec status >/dev/null || echo failed	
service ipsec start || echo failed
service ipsec restart || echo failed
service ipsec status >/dev/null || echo failed	
service ipsec start || echo failed
service ipsec condrestart || echo failed
service ipsec status >/dev/null || echo failed	
# test for fix that starts ipsec only after nic/network is online, rhbz#1145245
grep "After=network-online.target" /lib/systemd/system/ipsec.service
# test for rhbz#1127313 (IPsec holes for IPv6 neighbour discovery)
ip -o xfrm pol |grep ipv6-icmp
# test for rhbz#1572620
ipsec auto --add mytunnel
# will fail
timeout 10s ipsec auto --up mytunnel
ipsec status > /dev/null || echo status should have returned 0
grep "pending IPsec SA" /tmp/pluto.log
echo done