diff --git a/integration/tailscale.go b/integration/tailscale.go index f397133e..4c9a761b 100644 --- a/integration/tailscale.go +++ b/integration/tailscale.go @@ -10,6 +10,7 @@ import ( "github.com/juanfont/headscale/hscontrol/util" "github.com/juanfont/headscale/integration/dockertestutil" "github.com/juanfont/headscale/integration/tsic" + "github.com/ory/dockertest/v3" "tailscale.com/ipn/ipnstate" "tailscale.com/net/netcheck" "tailscale.com/types/key" @@ -56,6 +57,7 @@ type TailscaleClient interface { MustID() types.NodeID ReadFile(path string) ([]byte, error) PacketFilter() ([]filter.Match, error) + ConnectToNetwork(network *dockertest.Network) error // FailingPeersAsString returns a formatted-ish multi-line-string of peers in the client // and a bool indicating if the clients online count and peer count is equal. diff --git a/integration/tsic/tsic.go b/integration/tsic/tsic.go index 879949d5..1cc4f46d 100644 --- a/integration/tsic/tsic.go +++ b/integration/tsic/tsic.go @@ -1393,7 +1393,7 @@ func (t *TailscaleInContainer) Ping(hostnameOrIP string, opts ...PingOption) err } if !args.direct { - if strings.Contains(result, "via DERP") { + if strings.Contains(result, "via DERP") || strings.Contains(result, "via relay") { return nil } else { return errTailscalePingNotDERP @@ -1615,6 +1615,11 @@ func (t *TailscaleInContainer) GetNodePrivateKey() (*key.NodePrivate, error) { return &p.Persist.PrivateNodeKey, nil } +// ConnectToNetwork connects the Tailscale container to an additional Docker network. +func (t *TailscaleInContainer) ConnectToNetwork(network *dockertest.Network) error { + return t.container.ConnectToNetwork(network) +} + // PacketFilter returns the current packet filter rules from the client's network map. // This is useful for verifying that policy changes have propagated to the client. func (t *TailscaleInContainer) PacketFilter() ([]filter.Match, error) {