
This ensures it has all the right permissions to access all the right files. Host is mounted read-only, so there's no real security risk.
This ensures it has all the right permissions to access all the right files. Host is mounted read-only, so there's no real security risk.