Razuna in a Docker container

I’m happy to announce that I just published the Razuna Docker script for Razuna v.1.8.x to our Razuna Github repository. You can download the script at https://github.com/razuna/razuna_docker_1.
The Razuna Docker script is the perfect way to build, run and maintain your Razuna installation and in the future will be the recommended installation for Razuna (yes, we are also building a Razuna Docker script for the upcoming Razuna 2.0).
(If you don’t know Docker, then I urge you to take a look what all the fuzz is about)
That said, please let me know if you run into any issues. Of course, feedback in general is also welcomed 🙂

A long awaited update about Razuna
It’s been a while since I have last written on here. I sincerely apologize for the radio silence. We’ve had to change some things within our company (I’ll write more about this in the future) and re-focus our efforts. That said, Razuna is going stronger than ever. Many customers are…

What does Open Source Mean for Digital Asset Management?
As you probably know, Razuna is an open source digital asset management software. This basically means that you can download the software and use it for free as long as you adhere to the AGPL license terms. So — the question is: Why do we do that? Why would we give our…

Razuna 1.8 RC1 (Release Candidate) is ready
It gives me great pleasure to announce that Razuna 1.8 RC1 is now available to the general public. This is the first release candidate, meaning we deem this release to be stable and if no bugs are being reported we will turn this into the master release. You can help…

Announcing Razuna 1.9.5
As outlined in my last post, Razuna is going strong, and we see that many customers take to Razuna, which after all is still one of the best open source alternatives to any Enterprise Digital Asset Management. Today, I’m thrilled to announce the immediate availability of Razuna 1.9.5. Razuna 1.9.5, despite…

Tomcat AJP vulnerability and Razuna
We got notified that there is an AJP security vulnerability with all Apache Tomcat releases. The issue is discussed as CVE-2929-1938. A remote, unauthenticated/untrusted attacker could exploit this AJP configuration to read web application files from a server exposing the AJP port to untrusted clients. That said, the default Tomcat…