dotnet-docker/.mar/portal
..
README.aspnet.portal.md
README.monitor-base.portal.md
README.monitor.portal.md
README.runtime-deps.portal.md
README.runtime.portal.md
README.samples.portal.md
README.sdk.portal.md

README.sdk.portal.md

About

This image contains the .NET SDK which is comprised of three parts:

  1. .NET CLI
  2. .NET runtime
  3. ASP.NET Core

Use this image for your development process (developing, building and testing applications).

Watch discussions for Docker-related .NET announcements.

  • 8.0 (Long-Term Support)
    • docker pull mcr.microsoft.com/dotnet/sdk:8.0
  • 7.0 (Standard Support)
    • docker pull mcr.microsoft.com/dotnet/sdk:7.0
  • 6.0 (Long-Term Support)
    • docker pull mcr.microsoft.com/dotnet/sdk:6.0

.NET:

.NET Framework:

Usage

The .NET Docker samples show various ways to use .NET and Docker together. See Building Docker Images for .NET Applications to learn more.

Building .NET Apps with Docker

Develop .NET Apps in a Container

The following samples show how to develop, build and test .NET applications with Docker without the need to install the .NET SDK.

Image Variants

.NET container images have several variants that offer different combinations of flexibility and deployment size. The Image Variants documentation contains a summary of the image variants and their use-cases.

Support

Lifecycle

Image Update Policy

  • We update supported .NET images within 12 hours of any updates to their base images (e.g. debian:bookworm-slim, windows/nanoserver:ltsc2022, etc.).
  • We re-build all .NET images as part of releasing new versions of .NET including new major/minor versions and servicing.
  • Distroless images such as Ubuntu Chiseled have no base image, and as such will only be updated with .NET releases and CVE fixes as described below.

CVE Update Policy

.NET container images are regularly monitored for the presence of CVEs. A given image will be rebuilt to pick up fixes for a CVE when:

  • We detect the image contains a CVE with a CVSS score of "Critical"
  • AND the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
  • AND there is a CVE fix for the package available in the affected base image's package repository.

Feedback

License