Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump devcontainers/ci from 0.2 to 0.3 #384

Open
wants to merge 873 commits into
base: master
Choose a base branch
from

Conversation

dependabot[bot]
Copy link

@dependabot dependabot bot commented on behalf of github Feb 24, 2023

Bumps devcontainers/ci from 0.2 to 0.3.

Release notes

Sourced from devcontainers/ci's releases.

Release v0.2.1900000266

No release notes provided.

Release v0.2.1900000264

No release notes provided.

Release v0.2.1900000250

No release notes provided.

Release v0.2.1900000245

No release notes provided.

Release v0.2.1900000228

No release notes provided.

Release v0.2.1900000215

No release notes provided.

Release v0.2.1900000210

No release notes provided.

Release v0.2.1900000206

No release notes provided.

Release v0.2.1900000203

No release notes provided.

Release v0.2.1900000198

No release notes provided.

Release v0.2.1900000195

No release notes provided.

Release v0.2.1900000193

No release notes provided.

Release v0.2.1900000145

No release notes provided.

Release v0.2.1900000143

No release notes provided.

Release v0.2.1900000142

No release notes provided.

Release v0.2.1900000137

No release notes provided.

Release v0.2.1900000134

No release notes provided.

... (truncated)

Commits

Dependabot compatibility score

You can trigger a rebase of this PR by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Note
Automatic rebases have been disabled on this pull request as it has been open for over 30 days.

dansterenson and others added 30 commits January 25, 2023 22:50
* Update Okta User investigation playbook
change condition value on task 13 "Found results from Okta?"

* Update Okta User investigation playbook release note
Update parameter on condition task 13 "Found results from Okta?"

* Update Okta User investigation playbook release note
Update parameter on condition task 13 "Found results from Okta?"

* Release note update
* added sections

* fix validate

* added RN

* fix lint
* Updated Metadata Of Pack AWS-ACM

* Added release notes to pack AWS-ACM

* Packs/AWS-ACM/Integrations/AWS-ACM/AWS-ACM.yml Docker image update

* Updated Metadata Of Pack AWS-CloudWatchLogs

* Added release notes to pack AWS-CloudWatchLogs

* Packs/AWS-CloudWatchLogs/Integrations/AWS-CloudWatchLogs/AWS-CloudWatchLogs.yml Docker image update

* Updated Metadata Of Pack AWS-EC2

* Added release notes to pack AWS-EC2

* Packs/AWS-EC2/Integrations/AWS-EC2/AWS-EC2.yml Docker image update

* Updated Metadata Of Pack AWS-Lambda

* Added release notes to pack AWS-Lambda

* Packs/AWS-Lambda/Integrations/AWS-Lambda/AWS-Lambda.yml Docker image update

* Updated Metadata Of Pack AWS-SQS

* Added release notes to pack AWS-SQS

* Packs/AWS-SQS/Integrations/AWS-SQS/AWS-SQS.yml Docker image update
* Updated Metadata Of Pack GoogleCloudTranslate

* Added release notes to pack GoogleCloudTranslate

* Packs/GoogleCloudTranslate/Integrations/GoogleCloudTranslate/GoogleCloudTranslate.yml Docker image update
* Updated Metadata Of Pack Slack

* Added release notes to pack Slack

* Packs/Slack/Integrations/SlackV3/SlackV3.yml Docker image update
* using getIncidents instead of GetIncidentsByQuery

* fixed None not iteratable

* fix processing rule

* fix lint
* Updated Metadata Of Pack GraphQL

* Added release notes to pack GraphQL

* Packs/GraphQL/Integrations/GraphQL/GraphQL.yml Docker image update

Co-authored-by: Shelly Tzohar <[email protected]>
* Updated Metadata Of Pack IBMResilientSystems

* Added release notes to pack IBMResilientSystems

* Packs/IBMResilientSystems/Integrations/IBMResilientSystems/IBMResilientSystems.yml Docker image update

Co-authored-by: Shelly Tzohar <[email protected]>
…emisto#24107)

* Fixed an issue where the old authentication was not working properly

* commit

* commit
* added support for ssl connection to postgres

* RN

* known_words were updated

* MyPy error
* Updated Metadata Of Pack AzureCompute

* Added release notes to pack AzureCompute

* Packs/AzureCompute/Integrations/AzureCompute_v2/AzureCompute_v2.yml Docker image update

* Updated Metadata Of Pack AzureDevOps

* Added release notes to pack AzureDevOps

* Packs/AzureDevOps/Integrations/AzureDevOps/AzureDevOps.yml Docker image update

* Updated Metadata Of Pack AzureKubernetesServices

* Added release notes to pack AzureKubernetesServices

* Packs/AzureKubernetesServices/Integrations/AzureKubernetesServices/AzureKubernetesServices.yml Docker image update

* Updated Metadata Of Pack AzureRiskyUsers

* Added release notes to pack AzureRiskyUsers

* Packs/AzureRiskyUsers/Integrations/AzureRiskyUsers/AzureRiskyUsers.yml Docker image update

* Updated Metadata Of Pack AzureSecurityCenter

* Added release notes to pack AzureSecurityCenter

* Packs/AzureSecurityCenter/Integrations/AzureSecurityCenter_v2/AzureSecurityCenter_v2.yml Docker image update

* Skipping failed tests

Co-authored-by: sberman <[email protected]>
* Updated Metadata Of Pack GCP-IAM

* Added release notes to pack GCP-IAM

* Packs/GCP-IAM/Integrations/GCPIAM/GCPIAM.yml Docker image update

* Updated Metadata Of Pack Gmail

* Added release notes to pack Gmail

* Packs/Gmail/Integrations/Gmail/Gmail.yml Docker image update

* Updated Metadata Of Pack GoogleCloudFunctions

* Added release notes to pack GoogleCloudFunctions

* Packs/GoogleCloudFunctions/Integrations/GoogleCloudFunctions/GoogleCloudFunctions.yml Docker image update

* Skipping failed tests

Co-authored-by: sberman <[email protected]>
* Updated Metadata Of Pack CyberArkIdentity

* Added release notes to pack CyberArkIdentity

* Packs/CyberArkIdentity/Integrations/CyberArkIdentityEventCollector/CyberArkIdentityEventCollector.yml Docker image update

* Updated Metadata Of Pack Dropbox

* Added release notes to pack Dropbox

* Packs/Dropbox/Integrations/DropboxEventCollector/DropboxEventCollector.yml Docker image update

* Updated Metadata Of Pack GitLab

* Added release notes to pack GitLab

* Packs/GitLab/Integrations/GitLabEventCollector/GitLabEventCollector.yml Docker image update

* fix the import error

* ignore flake8 error

Co-authored-by: meichlerpanw <[email protected]>
…ommand if the 'userAccountControl' attribute was returned empty. (demisto#24118)

* list index out of range fix
* update docker + added test
…4104)

* New function and test

* More tests

* Update Packs/Base/Scripts/CommonServerPython/CommonServerPython.py

Co-authored-by: Binat Ziser <[email protected]>

* Update Packs/Base/ReleaseNotes/1_31_56.md

Co-authored-by: Binat Ziser <[email protected]>

* Update Packs/Base/Scripts/CommonServerPython/CommonServerPython.py

Co-authored-by: Binat Ziser <[email protected]>

* Minor fix

* Minor fix

Co-authored-by: Binat Ziser <[email protected]>
* Fixed 2 bugs in the File retrieve logic:
1. Fixed the error print, where the Sha256 was not printed correctly.
2. Changed the `action_process_image_sha256` to `actor_process_image_sha256` in the path set task.

* Updated RN
* failed unit test

* bump rn

* update docker image
* Removed underscore ("_") as a valid character in domain names.

* Removed underscore ("_") as a valid character in domain names.

* Removed underscore ("_") as a valid character in domain names in domain regex as well.

* RN

* RN

* Removed "\b" as it didnt catch non ascii chars in domains.

* Fixed extraction test playbook for URL and updated RN.
…to#24032)

* add support for latin-1

* fix

* add size limitation

* fix rn

* cr fix

* remove None encoding

* fix rn

* fix rn
* save the small bathes installation

* save one by one

* installing packs one by one

* installing packs one by one changes

* save xsiam -> cloud

* fix validations

* refactoring

* apply changes from cr
* Rapid7 InsightIDR Hunting Playbooks

* Fixed PNG links of readme files and created RN

* Update playbook-Rapid7_InsightIDR_-_Execution_Flow_Indicators_Hunting.yml

Done.

* Update playbook-Rapid7_InsightIDR_-_Execution_Flow_Indicators_Hunting_README.md

Done.

* Update playbook-Rapid7_InsightIDR_-_File_Indicators_Hunting.yml

Done.

* Update playbook-Rapid7_InsightIDR_-_File_Indicators_Hunting_README.md

Done.

* Update playbook-Rapid7_InsightIDR_-_HTTP_Requests_Indicators_Hunting.yml

Done.

* Update playbook-Rapid7_InsightIDR_-_HTTP_Requests_Indicators_Hunting_README.md

Done.

* Update playbook-Rapid7_InsightIDR_-_Indicator_Hunting.yml

Done.

* Update playbook-Rapid7_InsightIDR_-_Indicator_Hunting_README.md

Done.

* Update playbook-Rapid7_InsightIDR_-_Traffic_Indicators_Hunting.yml

Done.

* Update playbook-Rapid7_InsightIDR_-_Traffic_Indicators_Hunting_README.md

Done.

* Update README.md

Done.

* Update 1_0_16.md

Done.

* Added the phrase 'Field' to all needed inputs, updated README files and RN.

* Added tasks for hunting results (load Jason and set in context).
Fixed RN

* PNG name changes

* updated 'Rapid7_InsightIDR.yml' from master

* updated 'Rapid7_InsightIDR.yml' from master

* Delete Rapid7_InsightIDR.yml

deleted to push the original file

* updated 'Rapid7_InsightIDR.yml' from master

* updated 'Rapid7_InsightIDR.yml' from master

* updated docker image to '3.10.9.45313' and fixed output descriptions.

Co-authored-by: ShirleyDenkberg <[email protected]>
* Cortex Xpanse XSOAR Pack (demisto#23592)

* update docker

Co-authored-by: johnnywilkes <[email protected]>
Co-authored-by: Adi Daud <[email protected]>
Co-authored-by: adi88d <[email protected]>
*Fixed an issue in the parsing of certificate filed 
Related to a server bug


---------

Co-authored-by: Binat Ziser <[email protected]>
Co-authored-by: bziser <[email protected]>
* test

* test

* Cryptomining for XSIAM + added input to Cloud Response - Generic

* fixes and RN

* fixes

* fixes

* fixes

* fixes

* fixes

* fixes

* fixes

---------

Co-authored-by: evisochek <[email protected]>
* toUTCString was changed toString

* regex was changed to the new format

* revert

* after format

* after format

* changed transformer to index 0 instead of firstArrayElement

* another condition for 6.11+ was added

* note about new format was changed

* RN

* fix TPB

* beatify TPB

* Update Packs/CommonScripts/Scripts/GetTime/GetTime.yml

Co-authored-by: yuvalbenshalom <[email protected]>

* Flake8 errors

---------

Co-authored-by: yuvalbenshalom <[email protected]>
* add sections

* fix conflicts

* fix conflicts

* fix conflicts

* fix conflicts

* fixed a bug for empty responses.

* fix taxi server tpb

* Apply suggestions from code review

* Apply suggestions from code review

* fix lint

* fix linting

* fix conflicts

* moved taxii to another pr

* fix conflicts

* revert changes on deprecated pack

* Update AzureSentinel.yml

* fix conflicts

* Update MicrosoftCloudAppSecurity.yml

* fix conflicts

* fix lint
content-bot and others added 27 commits February 8, 2023 10:31
* Updated Metadata Of Pack Cylance_Protect

* Added release notes to pack Cylance_Protect

* Packs/Cylance_Protect/Integrations/Cylance_Protect_v2/Cylance_Protect_v2.yml Docker image update
* Updated Metadata Of Pack Sixgill-Darkfeed

* Added release notes to pack Sixgill-Darkfeed

* Packs/Sixgill-Darkfeed/Integrations/Sixgill_Darkfeed/Sixgill_Darkfeed.yml Docker image update

* Packs/Sixgill-Darkfeed/Integrations/Sixgill_Darkfeed_Enrichment/Sixgill_Darkfeed_Enrichment.yml Docker image update
* Updated Metadata Of Pack FeedUnit42v2

* Added release notes to pack FeedUnit42v2

* Packs/FeedUnit42v2/Integrations/FeedUnit42v2/FeedUnit42v2.yml Docker image update

---------

Co-authored-by: Shelly Tzohar <[email protected]>
* First SSO Access playbook yml, md and png

* First SSO Access investigation playbook yml, md and png

* First SSO Access - set verdict playbook yml, md and png

* User Investigation -generic playbook
remove count task for failed login - there is a count inside the sub-playbooks so the output's values are already counted.

* Release note for Cortex XDR First SSO Access

* Release note for User Investigation Generic

* Cortex_XDR_Alerts_Handling - "Cortex XDR - First SSO Access" as a sub-playbook.

* First SSO Access - change incident field
add new incidents fields

* Add new incidents fields - Common types fields

* Release note for new incidents fields - Common types fields
ASN Name
Containment status

* Release note for new Layout First SSO Access on Cortex XDR Incident

* Release note for First SSO Access

* Release note for New incident fields - common types:
ASN Name
Containment Status

* Update condition -if-then-else- set verdict

* Update survey question on task "Get Manager Response"

* change incident field name

* Update release note after change incident field name

* Add a new task to set key value to zero if there is no result for okta. necessary to math action between the okta and the siem failed login number

* Update release note after add a task to set key value to zero if there is no result from failed login search.

* Add a new task to set key value to zero if there is no result from SIEM. necessary to math action between the okta and the siem failed login number

* Update Release note after Add a new task to set key value to zero if there is no result from SIEM.

* reset password task removed from remediation.

* reset password task removed from remediation.

* update condition

* Update 2_3_29.md

Done.

* Update Cortex_XDR_Alerts_Handling.yml

Done.

* Update playbook-Cortex_XDR_-_First_SSO_Access.yml

Done.

* Update playbook-Cortex_XDR_-_First_SSO_Access_-_Set_Verdict.yml

Done.

* Update playbook-Cortex_XDR_-_First_SSO_Access_-_Set_Verdict_README.md

Done.

* Update playbook-Cortex_XDR_-_First_SSO_Access_-_Set_Verdict.yml

Done.

* Update playbook-Cortex_XDR_-_First_SSO_Access_README.md

Done.

* Update playbook-Cortex_XDR_-_First_SSO_Investigation.yml

Done.

* Update playbook-Cortex_XDR_-_First_SSO_Investigation_README.md

Done.

* Update 4_10_4.md

Done.

* Update 3_1_8.md

Done.

* change incident field and layout

* update release note

* update incident field and update release note

* update release note

* Add ASN Check to the Okta - user investigation playbook

* Update release note after add ASN Check to the Okta - user investigation playbook

* Added new input `ASN` - user investigation playbook

* release note after added new input `ASN` - user investigation playbook

* release note after added new input `ASN` - user investigation playbook

* Remove First sso investigation playbook
Add section headers on `set verdict playbook` and move tasks location.

* Remove First sso investigation playbook
Add manager engagement
change on action based on verdict

* Update release note after:
Remove First sso investigation playbook
Add manager engagement
change on action based on verdict

* Remove line

* Add check -check if ASN is defined.

* Update release note

* Update release note

---------

Co-authored-by: ShirleyDenkberg <[email protected]>
* Revert ML docker image

* Added RNs

* Updated to new docker image

* Update Packs/Base/ReleaseNotes/1_31_60.md

Co-authored-by: yuvalbenshalom <[email protected]>

* updated version

* updated RN version

---------

Co-authored-by: yuvalbenshalom <[email protected]>
* Created pack for Corelight_zeek

* Updated Zeek

* Updated enums for proto

* Updated Zeek ModelingRules

* Updated schema

* Updated README

* ReadMe Update

* Updated README

* Updated Modeling Rule

* Update Packs/CorelightZeek/README.md

Co-authored-by: ShirleyDenkberg <[email protected]>

* Update Packs/CorelightZeek/README.md

Co-authored-by: ShirleyDenkberg <[email protected]>

* Update Packs/CorelightZeek/README.md

Co-authored-by: ShirleyDenkberg <[email protected]>

* Update Packs/CorelightZeek/README.md

Co-authored-by: ShirleyDenkberg <[email protected]>

* Update Packs/CorelightZeek/README.md

Co-authored-by: ShirleyDenkberg <[email protected]>

* Update Packs/CorelightZeek/README.md

Co-authored-by: ShirleyDenkberg <[email protected]>

* Update Packs/CorelightZeek/README.md

Co-authored-by: ShirleyDenkberg <[email protected]>

* Update Packs/CorelightZeek/README.md

Co-authored-by: ShirleyDenkberg <[email protected]>

* Update Packs/CorelightZeek/README.md

Co-authored-by: ShirleyDenkberg <[email protected]>

* Removed image

* updated ModelingRules

* Updated FromVersion

* Updated FromVersion

* Updated ModelingRules

* Completly Removed ip_protocol_snp

* Updated ParsingRules

---------

Co-authored-by: ShirleyDenkberg <[email protected]>
* Trend micro vision one (demisto#24442)

* removed microsocks

Potentially harmful

* imported urllib3 and removed reference to requests.packages. Updated release notes and TrendMicroVisionOne.yml

* added action to add file entry from incident to sandbox and action to get result of file entry analysis status

* removed redundant action to check sandbox submission status

* added polling command for sandbox submissions

* added unit tests for file entry to sandbox and polling for sandbox submissions

* added unit tests for submit file entry and sandbox polling command

* updated yml to include submit-file-entry-to-sandbox and run-sandbox-submission-polling

* Update README.md

Added hints for command execution order

* Update README.md

Updated Notes for better readability.

* Update README.md

Updated README.md for better readability.

* updated release notes to indicate addition of submit file entry to sandbox and sandbox submission polling command

* formatted files per XSOAR standards

* Added command examples for V2 actions

* added test_data folder containing example responses

* Update README.md

Added link to supported file types in submit file to sandbox and submit file entry to sandbox.

* removed unused mock test case for submit file entry to sandbox and test_data folder with mock responses

* Added submit file entry to sandbox and run sandbox submission polling and their respective unit tests and command_examples

* added demosti.patch.object to get custom data for demisto.getFilePath in submit file entry to sandbox

* updated polling comamnd per XSOAR standards and updated YAML to include polling in sandbox submissing polling command root

* TrendMicroVisionOne_description

* updated sandbox submission command example to include polling arg

* updated yml to include polling in root of sandbox submission polling

* removed unused variable declarations

* updated doc string for sandbox submission polling

* updated min server version to 6.2.0 in sandbox polling unit test

* updated if check to differentiate between cmd instead of args

* added dbotscore for sandbox submissions status and sandbox polling commands

* added doc string for dbot severity helper function

* Updated Vendor Name to match integration pack

* updated risk to look for obj instead of str and updated release notes and updated docker image version

* added dbotscore to VisionOne context data and updated YML and README.md accordingly

* small context output fix

* Update 1_3_0.md

* updated description in YML for V3.

---------

Co-authored-by: yaakovpraisler <[email protected]>
Co-authored-by: Yaakov Praisler <[email protected]>

* Update 2_0_2.md

---------

Co-authored-by: shaqnawe <[email protected]>
Co-authored-by: yaakovpraisler <[email protected]>
Co-authored-by: Yaakov Praisler <[email protected]>
…ok (demisto#24375)

* Changed CrowdStrike pb to CrowdStrike Falcon pb

* Added SHA256 check before running cs-falcon sub-pb

* Added 'description' field in missing places

* Updated RN to 2_3_32

* Resolved conflict, Upgraded RN to 2_3_33

* Updated PB: Search Endpoints By Hash - Generic V2

* Updated Search Endpoints By Hash-Generic V2 README

* Updated Search_Endpoints_By_Hash-Generic V2 image

* Resolved conflict: Updated RN to 2_3_34

* Fixed validation errors in yml file

* Fixed validation error in yml
…#24437) (demisto#24485)

* fix(SEKOIAIntelligenceCenter): fix endpoint for test command

* Apply suggestions from code review by @yaakovpraisler



---------

Co-authored-by: lilyus <[email protected]>
Co-authored-by: Yaakov Praisler <[email protected]>
* fix

* rn

* docker

* fix UT

* remove space

* conflicts
* added xpanse to FiltersAndTransformers

* empty commit
* Recreate Quttera branch (demisto#21350)

* Re-create the branch

* Fixed some comments from the PR

* Fixed pack_metadata file

* Fixed secrets. Added missing pipfile for test

* Cleanup. Added pipfile for test

* Update python version in pipfile

* Fixed unittests

* Added test-module

* Fixed version in Readme

* Fixed lint errors

* Added more unit tests

* Fixed lint again

* More unit test

* Update Packs/QutteraWebsiteMalwareScanner/Integrations/QutteraWebsiteMalwareScanner/QutteraWebsiteMalwareScanner.py

Co-authored-by: Yuval Hayun <[email protected]>

* Update Packs/QutteraWebsiteMalwareScanner/Integrations/QutteraWebsiteMalwareScanner/QutteraWebsiteMalwareScanner.py

Co-authored-by: Yuval Hayun <[email protected]>

* Update Packs/QutteraWebsiteMalwareScanner/Integrations/QutteraWebsiteMalwareScanner/QutteraWebsiteMalwareScanner.py

Co-authored-by: Yuval Hayun <[email protected]>

* Update Packs/QutteraWebsiteMalwareScanner/Integrations/QutteraWebsiteMalwareScanner/QutteraWebsiteMalwareScanner.yml

Co-authored-by: Yuval Hayun <[email protected]>

* Update Packs/QutteraWebsiteMalwareScanner/Integrations/QutteraWebsiteMalwareScanner/QutteraWebsiteMalwareScanner.py

Co-authored-by: Yuval Hayun <[email protected]>

* fixes

* Fixed comments

* Fixed unittests and yml updates

* Fixed formatting and blacklist unittest

* Fixed unittest error

* Fixed pack_metadata file

* Update python version in yml file

* Update report output

* Fixed report and unittest

* Fixed broken pack metadata

---------

Co-authored-by: Yuval Hayun <[email protected]>
Co-authored-by: YuvHayun <[email protected]>

* fix

---------

Co-authored-by: Thomas Maier <[email protected]>
Co-authored-by: Yuval Hayun <[email protected]>
Co-authored-by: YuvHayun <[email protected]>
* CiscoISE PR

* Readme modification and adding release notes

* Modifications to modeling rules and parsing rules.

* Modifications to parsing rules.

* Modifications to Readme

* Update Packs/cisco-ise/README.md

Co-authored-by: ShirleyDenkberg <[email protected]>

* Update Packs/cisco-ise/README.md

Co-authored-by: ShirleyDenkberg <[email protected]>

* Update Packs/cisco-ise/README.md

Co-authored-by: ShirleyDenkberg <[email protected]>

* Update Packs/cisco-ise/README.md

Co-authored-by: ShirleyDenkberg <[email protected]>

* Update Packs/cisco-ise/ReleaseNotes/1_0_9.md

Co-authored-by: ShirleyDenkberg <[email protected]>

* Update Packs/cisco-ise/ReleaseNotes/1_0_9.md

Co-authored-by: ShirleyDenkberg <[email protected]>

---------

Co-authored-by: ShirleyDenkberg <[email protected]>
* Removed XDM_CONST.IP_PROTOCOL_S

* Removed XDM_CONST.IP_PROTOCOL_S
* hotfix

* update sdk

* sdk update 2

* new sdk

* lock file
Bumps [devcontainers/ci](https://github.com/devcontainers/ci) from 0.2 to 0.3.
- [Release notes](https://github.com/devcontainers/ci/releases)
- [Commits](devcontainers/ci@v0.2...v0.3)

---
updated-dependencies:
- dependency-name: devcontainers/ci
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot @github
Copy link
Author

dependabot bot commented on behalf of github Feb 24, 2023

The following labels could not be found: github_actions, dependencies, docs-approved.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.