Skip to content

Latest commit

 

History

History
217 lines (162 loc) · 18 KB

README.sdk.md

File metadata and controls

217 lines (162 loc) · 18 KB

.NET SDK

Important: The images from the dotnet/nightly repositories include last-known-good (LKG) builds for the next release of .NET.

See dotnet for images with official releases of .NET.

Featured Tags

  • 9.0 (Standard Support)
    • docker pull mcr.microsoft.com/dotnet/nightly/sdk:9.0
  • 8.0 (Long-Term Support)
    • docker pull mcr.microsoft.com/dotnet/nightly/sdk:8.0

About

This image contains the .NET SDK which is comprised of three parts:

  1. .NET CLI
  2. .NET runtime
  3. ASP.NET Core

Use this image for your development process (developing, building and testing applications).

Watch discussions for Docker-related .NET announcements.

Usage

The .NET Docker samples show various ways to use .NET and Docker together. See Building Docker Images for .NET Applications to learn more.

Building .NET Apps with Docker

Develop .NET Apps in a Container

The following samples show how to develop, build and test .NET applications with Docker without the need to install the .NET SDK.

Image Variants

.NET container images have several variants that offer different combinations of flexibility and deployment size. The Image Variants documentation contains a summary of the image variants and their use-cases.

Related Repositories

.NET:

.NET Framework:

Full Tag Listing

Linux amd64 Tags

Tags Dockerfile OS Version
9.0.101-bookworm-slim-amd64, 9.0-bookworm-slim-amd64, 9.0.101-bookworm-slim, 9.0-bookworm-slim, 9.0.101, 9.0, latest Dockerfile Debian 12
9.0.101-alpine3.21-amd64, 9.0-alpine3.21-amd64, 9.0.101-alpine3.21, 9.0-alpine3.21 Dockerfile Alpine 3.21
9.0.101-alpine3.21-aot-amd64, 9.0-alpine3.21-aot-amd64, 9.0.101-alpine3.21-aot, 9.0-alpine3.21-aot Dockerfile Alpine 3.21
9.0.101-alpine3.20-amd64, 9.0-alpine3.20-amd64, 9.0-alpine-amd64, 9.0.101-alpine3.20, 9.0-alpine3.20, 9.0-alpine Dockerfile Alpine 3.20
9.0.101-alpine3.20-aot-amd64, 9.0-alpine3.20-aot-amd64, 9.0-alpine-aot-amd64, 9.0.101-alpine3.20-aot, 9.0-alpine3.20-aot, 9.0-alpine-aot Dockerfile Alpine 3.20
9.0.101-noble-amd64, 9.0-noble-amd64, 9.0.101-noble, 9.0-noble Dockerfile Ubuntu 24.04
9.0.101-noble-aot-amd64, 9.0-noble-aot-amd64, 9.0.101-noble-aot, 9.0-noble-aot Dockerfile Ubuntu 24.04
9.0.101-azurelinux3.0-amd64, 9.0-azurelinux3.0-amd64, 9.0.101-azurelinux3.0, 9.0-azurelinux3.0 Dockerfile Azure Linux 3.0
9.0.101-azurelinux3.0-aot-amd64, 9.0-azurelinux3.0-aot-amd64, 9.0.101-azurelinux3.0-aot, 9.0-azurelinux3.0-aot Dockerfile Azure Linux 3.0
8.0.404-bookworm-slim-amd64, 8.0-bookworm-slim-amd64, 8.0.404-bookworm-slim, 8.0-bookworm-slim, 8.0.404, 8.0 Dockerfile Debian 12
8.0.404-alpine3.21-amd64, 8.0-alpine3.21-amd64, 8.0.404-alpine3.21, 8.0-alpine3.21 Dockerfile Alpine 3.21
8.0.404-alpine3.21-aot-amd64, 8.0-alpine3.21-aot-amd64, 8.0.404-alpine3.21-aot, 8.0-alpine3.21-aot Dockerfile Alpine 3.21
8.0.404-alpine3.20-amd64, 8.0-alpine3.20-amd64, 8.0-alpine-amd64, 8.0.404-alpine3.20, 8.0-alpine3.20, 8.0-alpine Dockerfile Alpine 3.20
8.0.404-alpine3.20-aot-amd64, 8.0-alpine3.20-aot-amd64, 8.0-alpine-aot-amd64, 8.0.404-alpine3.20-aot, 8.0-alpine3.20-aot, 8.0-alpine-aot Dockerfile Alpine 3.20
8.0.404-noble-amd64, 8.0-noble-amd64, 8.0.404-noble, 8.0-noble Dockerfile Ubuntu 24.04
8.0.404-noble-aot-amd64, 8.0-noble-aot-amd64, 8.0.404-noble-aot, 8.0-noble-aot Dockerfile Ubuntu 24.04
8.0.404-jammy-amd64, 8.0-jammy-amd64, 8.0.404-jammy, 8.0-jammy Dockerfile Ubuntu 22.04
8.0.404-jammy-aot-amd64, 8.0-jammy-aot-amd64, 8.0.404-jammy-aot, 8.0-jammy-aot Dockerfile Ubuntu 22.04
8.0.404-azurelinux3.0-amd64, 8.0-azurelinux3.0-amd64, 8.0.404-azurelinux3.0, 8.0-azurelinux3.0 Dockerfile Azure Linux 3.0
8.0.404-azurelinux3.0-aot-amd64, 8.0-azurelinux3.0-aot-amd64, 8.0.404-azurelinux3.0-aot, 8.0-azurelinux3.0-aot Dockerfile Azure Linux 3.0
8.0.404-cbl-mariner2.0-amd64, 8.0-cbl-mariner2.0-amd64, 8.0.404-cbl-mariner2.0, 8.0-cbl-mariner2.0 Dockerfile CBL-Mariner 2.0
8.0.404-cbl-mariner2.0-aot-amd64, 8.0-cbl-mariner2.0-aot-amd64, 8.0.404-cbl-mariner2.0-aot, 8.0-cbl-mariner2.0-aot Dockerfile CBL-Mariner 2.0

Linux arm64 Tags

Tags Dockerfile OS Version
9.0.101-bookworm-slim-arm64v8, 9.0-bookworm-slim-arm64v8, 9.0.101-bookworm-slim, 9.0-bookworm-slim, 9.0.101, 9.0, latest Dockerfile Debian 12
9.0.101-alpine3.21-arm64v8, 9.0-alpine3.21-arm64v8, 9.0.101-alpine3.21, 9.0-alpine3.21 Dockerfile Alpine 3.21
9.0.101-alpine3.21-aot-arm64v8, 9.0-alpine3.21-aot-arm64v8, 9.0.101-alpine3.21-aot, 9.0-alpine3.21-aot Dockerfile Alpine 3.21
9.0.101-alpine3.20-arm64v8, 9.0-alpine3.20-arm64v8, 9.0-alpine-arm64v8, 9.0.101-alpine3.20, 9.0-alpine3.20, 9.0-alpine Dockerfile Alpine 3.20
9.0.101-alpine3.20-aot-arm64v8, 9.0-alpine3.20-aot-arm64v8, 9.0-alpine-aot-arm64v8, 9.0.101-alpine3.20-aot, 9.0-alpine3.20-aot, 9.0-alpine-aot Dockerfile Alpine 3.20
9.0.101-noble-arm64v8, 9.0-noble-arm64v8, 9.0.101-noble, 9.0-noble Dockerfile Ubuntu 24.04
9.0.101-noble-aot-arm64v8, 9.0-noble-aot-arm64v8, 9.0.101-noble-aot, 9.0-noble-aot Dockerfile Ubuntu 24.04
9.0.101-azurelinux3.0-arm64v8, 9.0-azurelinux3.0-arm64v8, 9.0.101-azurelinux3.0, 9.0-azurelinux3.0 Dockerfile Azure Linux 3.0
9.0.101-azurelinux3.0-aot-arm64v8, 9.0-azurelinux3.0-aot-arm64v8, 9.0.101-azurelinux3.0-aot, 9.0-azurelinux3.0-aot Dockerfile Azure Linux 3.0
8.0.404-bookworm-slim-arm64v8, 8.0-bookworm-slim-arm64v8, 8.0.404-bookworm-slim, 8.0-bookworm-slim, 8.0.404, 8.0 Dockerfile Debian 12
8.0.404-alpine3.21-arm64v8, 8.0-alpine3.21-arm64v8, 8.0.404-alpine3.21, 8.0-alpine3.21 Dockerfile Alpine 3.21
8.0.404-alpine3.21-aot-arm64v8, 8.0-alpine3.21-aot-arm64v8, 8.0.404-alpine3.21-aot, 8.0-alpine3.21-aot Dockerfile Alpine 3.21
8.0.404-alpine3.20-arm64v8, 8.0-alpine3.20-arm64v8, 8.0-alpine-arm64v8, 8.0.404-alpine3.20, 8.0-alpine3.20, 8.0-alpine Dockerfile Alpine 3.20
8.0.404-alpine3.20-aot-arm64v8, 8.0-alpine3.20-aot-arm64v8, 8.0-alpine-aot-arm64v8, 8.0.404-alpine3.20-aot, 8.0-alpine3.20-aot, 8.0-alpine-aot Dockerfile Alpine 3.20
8.0.404-noble-arm64v8, 8.0-noble-arm64v8, 8.0.404-noble, 8.0-noble Dockerfile Ubuntu 24.04
8.0.404-noble-aot-arm64v8, 8.0-noble-aot-arm64v8, 8.0.404-noble-aot, 8.0-noble-aot Dockerfile Ubuntu 24.04
8.0.404-jammy-arm64v8, 8.0-jammy-arm64v8, 8.0.404-jammy, 8.0-jammy Dockerfile Ubuntu 22.04
8.0.404-jammy-aot-arm64v8, 8.0-jammy-aot-arm64v8, 8.0.404-jammy-aot, 8.0-jammy-aot Dockerfile Ubuntu 22.04
8.0.404-azurelinux3.0-arm64v8, 8.0-azurelinux3.0-arm64v8, 8.0.404-azurelinux3.0, 8.0-azurelinux3.0 Dockerfile Azure Linux 3.0
8.0.404-azurelinux3.0-aot-arm64v8, 8.0-azurelinux3.0-aot-arm64v8, 8.0.404-azurelinux3.0-aot, 8.0-azurelinux3.0-aot Dockerfile Azure Linux 3.0
8.0.404-cbl-mariner2.0-arm64v8, 8.0-cbl-mariner2.0-arm64v8, 8.0.404-cbl-mariner2.0, 8.0-cbl-mariner2.0 Dockerfile CBL-Mariner 2.0
8.0.404-cbl-mariner2.0-aot-arm64v8, 8.0-cbl-mariner2.0-aot-arm64v8, 8.0.404-cbl-mariner2.0-aot, 8.0-cbl-mariner2.0-aot Dockerfile CBL-Mariner 2.0

Linux arm32 Tags

Tags Dockerfile OS Version
9.0.101-bookworm-slim-arm32v7, 9.0-bookworm-slim-arm32v7, 9.0.101-bookworm-slim, 9.0-bookworm-slim, 9.0.101, 9.0, latest Dockerfile Debian 12
9.0.101-alpine3.21-arm32v7, 9.0-alpine3.21-arm32v7, 9.0.101-alpine3.21, 9.0-alpine3.21 Dockerfile Alpine 3.21
9.0.101-alpine3.20-arm32v7, 9.0-alpine3.20-arm32v7, 9.0-alpine-arm32v7, 9.0.101-alpine3.20, 9.0-alpine3.20, 9.0-alpine Dockerfile Alpine 3.20
9.0.101-noble-arm32v7, 9.0-noble-arm32v7, 9.0.101-noble, 9.0-noble Dockerfile Ubuntu 24.04
8.0.404-bookworm-slim-arm32v7, 8.0-bookworm-slim-arm32v7, 8.0.404-bookworm-slim, 8.0-bookworm-slim, 8.0.404, 8.0 Dockerfile Debian 12
8.0.404-alpine3.21-arm32v7, 8.0-alpine3.21-arm32v7, 8.0.404-alpine3.21, 8.0-alpine3.21 Dockerfile Alpine 3.21
8.0.404-alpine3.20-arm32v7, 8.0-alpine3.20-arm32v7, 8.0-alpine-arm32v7, 8.0.404-alpine3.20, 8.0-alpine3.20, 8.0-alpine Dockerfile Alpine 3.20
8.0.404-jammy-arm32v7, 8.0-jammy-arm32v7, 8.0.404-jammy, 8.0-jammy Dockerfile Ubuntu 22.04

Nano Server 2025 amd64 Tags

Tag Dockerfile
9.0.101-nanoserver-ltsc2025, 9.0-nanoserver-ltsc2025 Dockerfile
8.0.404-nanoserver-ltsc2025, 8.0-nanoserver-ltsc2025 Dockerfile

Windows Server Core 2025 amd64 Tags

Tag Dockerfile
9.0.101-windowsservercore-ltsc2025, 9.0-windowsservercore-ltsc2025 Dockerfile
8.0.404-windowsservercore-ltsc2025, 8.0-windowsservercore-ltsc2025 Dockerfile

Nano Server 2022 amd64 Tags

Tag Dockerfile
9.0.101-nanoserver-ltsc2022, 9.0-nanoserver-ltsc2022 Dockerfile
8.0.404-nanoserver-ltsc2022, 8.0-nanoserver-ltsc2022 Dockerfile

Windows Server Core 2022 amd64 Tags

Tag Dockerfile
9.0.101-windowsservercore-ltsc2022, 9.0-windowsservercore-ltsc2022 Dockerfile
8.0.404-windowsservercore-ltsc2022, 8.0-windowsservercore-ltsc2022 Dockerfile

Nano Server, version 1809 amd64 Tags

Tag Dockerfile
9.0.101-nanoserver-1809, 9.0-nanoserver-1809 Dockerfile
8.0.404-nanoserver-1809, 8.0-nanoserver-1809 Dockerfile

Windows Server Core 2019 amd64 Tags

Tag Dockerfile
9.0.101-windowsservercore-ltsc2019, 9.0-windowsservercore-ltsc2019 Dockerfile
8.0.404-windowsservercore-ltsc2019, 8.0-windowsservercore-ltsc2019 Dockerfile

Tags not listed in the table above are not supported. See the Supported Tags Policy. See the full list of tags for all supported and unsupported tags.

Support

Lifecycle

Image Update Policy

  • Base Image Updates: Images are re-built within 12 hours of any updates to their base images (e.g. debian:bookworm-slim, windows/nanoserver:ltsc2022, etc.).
  • .NET Releases: Images are re-built as part of releasing new .NET versions. This includes new major versions, minor versions, and servicing releases.
  • Critical CVEs: Images are re-built to pick up critical CVE fixes as described by the CVE Update Policy below.
  • Monthly Re-builds: Images are re-built monthly, typically on the second Tuesday of the month, in order to pick up lower-severity CVE fixes.
  • Out-Of-Band Updates: Images can sometimes be re-built when out-of-band updates are necessary to address critical issues. If this happens, new fixed version tags will be updated according to the Fixed version tags documentation.

CVE Update Policy

.NET container images are regularly monitored for the presence of CVEs. A given image will be rebuilt to pick up fixes for a CVE when:

  • We detect the image contains a CVE with a CVSS score of "Critical"
  • AND the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
  • AND there is a CVE fix for the package available in the affected base image's package repository.

Please refer to the Security Policy and Container Vulnerability Workflow for more detail about what to do when a CVE is encountered in a .NET image.

Feedback

License