It obviously takes a bit more knowledge on the end user side, but again I’m not opposed to bringing this up, and I will bring it up and keep you posted. I will bring this topic up to some others and see what they ultimately think. sudo sh -c 'echo -e "\nregistries = " > /etc/containers/nf'
#Give docker more disk space install
sudo apt-get install -qq -y software-properties-common podman sudo add-apt-repository -y ppa:projectatomic/ppa You can certainly replace Docker with Podman via: dist: xenial These limitations can be a garden variety of different things, rate limit, all the way from people try nefarious things.įlannel VXLAN seems to work via how it encapsulates packets, all in all there’s a lot of runtime vulnerabilities. The problem with rootless containers is, when doing so it emulates a TCP/IP stack in userland and allows to use a network namespace from a container and let it access the outside world (with some limitations). Podman assumes a Fedora/CentOS/RHEL container configuration (/etc/containers/nf). Podman is not available in the default Ubuntu repositories and a newer version of Ubuntu than the default Travis one is needed. What’s Travis CI opinion to these observations ? Wether we’re talking about podman or rootless docker, it’s challenging to set those up in a generic way on all those “exotic” platforms and incurs a maintenance cost on projects working around the “native docker service” limitations offered by Travis CI which should thus be fixed by providing alternatives.
Ppc64le docker buildx permission issues depending on which group of workers the job runs on - #3 by mayeut) and would have helped here. It certainly helps with some permission issues (c.f. IMHO, Travis CI should offer the option to run rootless docker or podman in LXD builders. This pypa/auditwheel job also runs perfectly showing a disk usage which increased by ~1.6GB (the peak usage is certainly higher, and higher than for the cibuildwheel job, but not as high as to reach the limit).