Skip to content

Conversation

@dependabot
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Jan 26, 2026

Bumps github.com/slackhq/nebula from 1.9.7 to 1.10.2.

Release notes

Sourced from github.com/slackhq/nebula's releases.

Release v1.10.2

Fixed

  • Fix panic when using use_system_route_table that was introduced in v1.10.1. (#1580)

Changed

  • Fix some typos in comments. (#1582)
  • Dependency updates. (#1581)

Release v1.10.1

See the v1.10.1 milestone for a complete list of changes.

Fixed

  • Fix a bug where an unsafe route derived from the system route table could be lost on a config reload. (#1573)
  • Fix the PEM banner for ECDSA P256 public keys. (#1552)
  • Fix a regression on Windows from 1.9.x where nebula could fall back to a less performant UDP listener if non-critical ioctls failed. (#1568)
  • Fix a bug in handshake processing when a peer sends an unexpected public key. (#1566)

Added

  • Add a config option to control accepting recv_error packets which defaults to always. (#1569)

Changed

Release v1.10.0

See the v1.10.0 milestone for a complete list of changes.

NOTE: If you use unsafe_routes, please read the note in the Changed section about default_local_cidr_any. You may need to update your firewall rules in order to maintain connectivity.

Added

Changed

  • NOTE: default_local_cidr_any now defaults to false, meaning that any firewall rule intended to target an unsafe_routes entry must explicitly declare it via the local_cidr field. This is almost always the intended behavior. This flag is deprecated and will be removed in a future release. (#1373)

... (truncated)

Changelog

Sourced from github.com/slackhq/nebula's changelog.

[1.10.2] - 2026-01-21

Fixed

  • Fix panic when using use_system_route_table that was introduced in v1.10.1. (#1580)

Changed

  • Fix some typos in comments. (#1582)
  • Dependency updates. (#1581)

[1.10.1] - 2026-01-16

See the v1.10.1 milestone for a complete list of changes.

Fixed

  • Fix a bug where an unsafe route derived from the system route table could be lost on a config reload. (#1573)
  • Fix the PEM banner for ECDSA P256 public keys. (#1552)
  • Fix a regression on Windows from 1.9.x where nebula could fall back to a less performant UDP listener if non-critical ioctls failed. (#1568)
  • Fix a bug in handshake processing when a peer sends an unexpected public key. (#1566)

Added

  • Add a config option to control accepting recv_error packets which defaults to always. (#1569)

Changed

[1.10.0] - 2025-12-04

See the v1.10.0 milestone for a complete list of changes.

Added

Changed

  • NOTE: default_local_cidr_any now defaults to false, meaning that any firewall rule intended to target an unsafe_routes entry must explicitly declare it via the local_cidr field. This is almost always the intended behavior. This flag is

... (truncated)

Commits

Most Recent Ignore Conditions Applied to This Pull Request
Dependency Name Ignore Conditions
github.com/slackhq/nebula [>= 1.7.a, < 1.8]

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

@dependabot dependabot bot added dependencies Pull requests that update a dependency file go Pull requests that update Go code labels Jan 26, 2026
@step-ci step-ci enabled auto-merge January 26, 2026 17:13
@github-actions github-actions bot added the needs triage Waiting for discussion / prioritization by team label Jan 26, 2026
@hslatman hslatman added this to the v0.29.1 milestone Jan 26, 2026
Bumps [github.com/slackhq/nebula](https://github.com/slackhq/nebula) from 1.9.7 to 1.10.2.
- [Release notes](https://github.com/slackhq/nebula/releases)
- [Changelog](https://github.com/slackhq/nebula/blob/master/CHANGELOG.md)
- [Commits](slackhq/nebula@v1.9.7...v1.10.2)

---
updated-dependencies:
- dependency-name: github.com/slackhq/nebula
  dependency-version: 1.10.2
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot force-pushed the dependabot/go_modules/github.com/slackhq/nebula-1.10.2 branch from 4c95fb8 to 4272032 Compare January 27, 2026 01:06
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file go Pull requests that update Go code needs triage Waiting for discussion / prioritization by team

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant