-
Notifications
You must be signed in to change notification settings - Fork 25
Expand file tree
/
Copy pathContainerfile.tests
More file actions
44 lines (38 loc) · 1.17 KB
/
Containerfile.tests
File metadata and controls
44 lines (38 loc) · 1.17 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
FROM fedora:42
# Install system dependencies
RUN dnf -y install \
gcc \
gcc-c++ \
make \
krb5-devel \
python3 \
python3-devel \
python3-copr \
python3-flexmock \
python3-koji \
python3-ogr \
python3-pip \
python3-pytest \
python3-pytest-asyncio \
python3-specfile \
python3-redis \
python3-requests \
python3-backoff \
python3-GitPython \
&& dnf clean all
RUN git config --global user.email "ymir-tests@example.com" \
&& git config --global user.name "Ymir Tests"
# Set PYTHONPATH so ymir namespace package can be imported
ENV PYTHONPATH=/src:$PYTHONPATH
# Install BeeAI Framework and FastMCP
RUN pip3 install --no-cache-dir \
"litellm!=1.82.7,!=1.82.8" \
beeai-framework[vertexai,mcp,duckduckgo]==0.1.55 \
fastmcp redis backoff
# Verify no malicious litellm_init.pth was introduced by compromised litellm packages (e.g. 1.82.7, 1.82.8)
RUN MALICIOUS=$(find /usr /opt -name "litellm_init.pth" 2>/dev/null); \
if [ -n "$MALICIOUS" ]; then \
echo "SECURITY ALERT: malicious litellm_init.pth detected: $MALICIOUS"; \
exit 1; \
fi
WORKDIR /src