Microsoft.NET.Build.Containers 8.0.122

Prefix Reserved
There is a newer version of this package available.
See the version list below for details.
dotnet add package Microsoft.NET.Build.Containers --version 8.0.122
                    
NuGet\Install-Package Microsoft.NET.Build.Containers -Version 8.0.122
                    
This command is intended to be used within the Package Manager Console in Visual Studio, as it uses the NuGet module's version of Install-Package.
<PackageReference Include="Microsoft.NET.Build.Containers" Version="8.0.122" />
                    
For projects that support PackageReference, copy this XML node into the project file to reference the package.
<PackageVersion Include="Microsoft.NET.Build.Containers" Version="8.0.122" />
                    
Directory.Packages.props
<PackageReference Include="Microsoft.NET.Build.Containers" />
                    
Project file
For projects that support Central Package Management (CPM), copy this XML node into the solution Directory.Packages.props file to version the package.
paket add Microsoft.NET.Build.Containers --version 8.0.122
                    
#r "nuget: Microsoft.NET.Build.Containers, 8.0.122"
                    
#r directive can be used in F# Interactive and Polyglot Notebooks. Copy this into the interactive tool or source code of the script to reference the package.
#:package Microsoft.NET.Build.Containers@8.0.122
                    
#:package directive can be used in C# file-based apps starting in .NET 10 preview 4. Copy this into a .cs file before any lines of code to reference the package.
#addin nuget:?package=Microsoft.NET.Build.Containers&version=8.0.122
                    
Install as a Cake Addin
#tool nuget:?package=Microsoft.NET.Build.Containers&version=8.0.122
                    
Install as a Cake Tool

.NET SDK Containers

This package lets you build container images from your projects with a single command.

Getting Started

To build a container from the SDK, add this package and run the publish command, specifying the DefaultContainer PublishProfile. You can learn more about Publish Profiles in the documentation.

>dotnet add package Microsoft.NET.Build.Containers
>dotnet publish --os linux --arch x64 -p:PublishProfile=DefaultContainer
...
Pushed container '<your app name>:<your app version>' to registry 'docker://'
...

Out of the box, this package will infer a number of properties about the generated container image, including which base image to use, which version of that image to use, and where to push the generated image. You have control over all of these properties, however. You can read more about these customizations here.

Note: This package only supports Web projects (those that use the Microsoft.NET.Sdk.Web SDK) in this version.

There are no supported framework assets in this package.

Learn more about Target Frameworks and .NET Standard.

  • net8.0

    • No dependencies.

NuGet packages (5)

Showing the top 5 NuGet packages that depend on Microsoft.NET.Build.Containers:

Package Downloads
UtilityBelt.Server

UBNet server.

IPP.PORTIC.SAFHE.Library

This software regards the project number 070200, SAFHE - Safe Health Elderly Monitoring, an EU funded project, and constitutes the technical contribution of the PORTIC-IPP together with the ESS-IPP (specifically both entities PORTIC - Porto Research, Technology and Innovation Center, and ESS - Escola Superior de Saúde, both sub-entities from the institution IPP - Instituto Politécnico do Porto) to the project.! The url of the project is: https://www.portic.ipp.pt/project.html

SotracomEntities

Package Description

MultiChannelReportLog-ex-1

Package Description

SotracomEntities_2024

Package Description

GitHub repositories (4)

Showing the top 4 popular GitHub repositories that depend on Microsoft.NET.Build.Containers:

Repository Stars
microsoft/dotnet-podcasts
.NET reference application shown at .NET Conf featuring ASP.NET Core, Blazor, .NET MAUI, Microservices, Orleans, Playwright, and more!
asynkron/protoactor-dotnet
Proto Actor - Ultra fast distributed actors for Go, C# and Java/Kotlin
rstropek/Samples
richlander/container-workshop
Documents fundamental .NET Container workflows
Version Downloads Last Updated
10.0.100 1,237 11/11/2025
10.0.100-rc.2.25502.107 238 10/14/2025
10.0.100-rc.1.25451.107 203 9/9/2025
10.0.100-preview.7.25380.108 175 8/12/2025
10.0.100-preview.6.25358.103 149 7/15/2025
10.0.100-preview.5.25277.114 163 6/6/2025
10.0.100-preview.4.25258.110 277 5/12/2025
10.0.100-preview.3.25201.16 249 4/10/2025
10.0.100-preview.2.25164.34 203 3/18/2025
10.0.100-preview.1.25120.13 190 2/25/2025
9.0.308 350 11/19/2025
9.0.307 294 11/11/2025
9.0.306 2,163 10/14/2025
9.0.305 3,369 9/9/2025
9.0.304 5,567 8/4/2025
9.0.303 1,378 7/17/2025
9.0.302 1,269 7/8/2025
9.0.301 4,487 6/10/2025
9.0.300 4,146 5/13/2025
9.0.205 561 6/10/2025
9.0.204 531 5/13/2025
9.0.203 8,117 4/8/2025
9.0.202 3,847 3/18/2025
9.0.201 4,147 3/11/2025
9.0.200 5,697 2/11/2025
9.0.200-preview.0.24575.35 609 12/10/2024
9.0.112 332 11/11/2025
9.0.111 321 10/14/2025
9.0.110 400 9/9/2025
9.0.109 452 8/4/2025
9.0.108 392 7/8/2025
9.0.107 574 6/10/2025
9.0.106 541 5/13/2025
9.0.105 583 4/8/2025
9.0.104 619 3/11/2025
9.0.103 761 2/11/2025
9.0.102 13,433 1/14/2025
9.0.101 5,760 12/3/2024
9.0.100 12,075 11/12/2024
9.0.100-rc.2.24474.11 464 10/8/2024
9.0.100-rc.1.24452.12 259 9/10/2024
9.0.100-preview.7.24407.12 287 8/13/2024
9.0.100-preview.6.24328.19 258 7/9/2024
9.0.100-preview.5.24307.3 484 6/11/2024
9.0.100-preview.4.24267.43 280 5/21/2024
9.0.100-preview.3.24204.14 352 4/11/2024
9.0.100-preview.2.24157.36 376 3/12/2024
9.0.100-preview.1.24101.1 1,207 2/13/2024
8.0.416 489 11/11/2025
8.0.415 784 10/14/2025
8.0.414 918 9/9/2025
8.0.413 753 8/5/2025
8.0.412 843 7/8/2025
8.0.411 894 6/10/2025
8.0.410 662 5/22/2025
8.0.409 639 5/13/2025
8.0.408 1,150 4/8/2025
8.0.407 4,625 3/11/2025
8.0.406 1,231 2/11/2025
8.0.405 3,385 1/14/2025
8.0.404 7,299 11/12/2024
8.0.403 35,644 10/8/2024
8.0.402 4,585 9/24/2024
8.0.401 36,215 8/15/2024
8.0.400 3,262 8/13/2024
8.0.319 290 11/11/2025
8.0.318 303 10/14/2025
8.0.317 362 9/9/2025
8.0.316 470 8/5/2025
8.0.315 357 7/8/2025
8.0.314 512 6/10/2025
8.0.313 391 5/22/2025
8.0.312 496 5/13/2025
8.0.311 496 4/8/2025
8.0.310 535 3/11/2025
8.0.309 619 2/11/2025
8.0.308 576 1/14/2025
8.0.307 671 11/12/2024
8.0.306 687 10/8/2024
8.0.304 677 8/13/2024
8.0.303 15,146 7/9/2024
8.0.302 18,153 6/11/2024
8.0.301 3,992 5/28/2024
8.0.300 15,371 5/14/2024
8.0.206 2,101 5/28/2024
8.0.205 739 5/14/2024
8.0.204 41,975 4/9/2024
8.0.202 19,730 3/12/2024
8.0.200 38,313 2/13/2024
8.0.122 309 11/11/2025
8.0.121 303 10/14/2025
8.0.120 360 9/9/2025
8.0.119 445 8/5/2025
8.0.118 360 7/8/2025
8.0.117 525 6/10/2025
8.0.116 486 5/13/2025
8.0.115 1,021 4/8/2025
8.0.114 548 3/11/2025
8.0.113 584 2/11/2025
8.0.112 593 1/14/2025
8.0.111 678 11/12/2024
8.0.110 843 10/8/2024
8.0.108 722 8/13/2024
8.0.107 746 7/9/2024
8.0.106 750 5/28/2024
8.0.105 715 5/14/2024
8.0.104 796 4/9/2024
8.0.103 820 3/12/2024
8.0.102 916 2/13/2024
8.0.101 45,710 1/9/2024
8.0.100 111,399 11/14/2023
8.0.100-rc.2.23480.5 2,249 10/10/2023
8.0.100-rc.1.23462.41 1,256 9/14/2023
8.0.100-rc.1.23455.21 715 9/12/2023
8.0.100-preview.7.23376.5 1,436 8/8/2023
8.0.100-preview.6.23330.7 1,315 7/11/2023
8.0.100-preview.5.23303.1 1,263 6/13/2023
8.0.100-preview.4.23260.11 1,243 5/16/2023
7.0.410 14,101 5/28/2024
7.0.409 1,534 5/14/2024
7.0.408 2,441 4/9/2024
7.0.407 3,707 3/12/2024
7.0.406 6,118 2/13/2024
7.0.405 83,268 1/9/2024
7.0.404 23,930 11/14/2023
7.0.403 37,989 10/24/2023
7.0.402 19,302 10/10/2023
7.0.401 57,004 9/12/2023
7.0.400 145,684 8/8/2023
7.0.317 465 5/28/2024
7.0.316 458 5/14/2024
7.0.315 589 4/9/2024
7.0.314 571 3/12/2024
7.0.313 588 2/13/2024
7.0.312 534 1/9/2024
7.0.311 1,003 11/14/2023
7.0.310 660 10/24/2023
7.0.309 681 10/10/2023
7.0.308 719 9/12/2023
7.0.307 8,620 8/8/2023
7.0.306 48,149 7/11/2023 7.0.306 has at least one vulnerability with high severity.
7.0.305 34,886 6/22/2023 7.0.305 has at least one vulnerability with high severity.
7.0.304 16,539 6/13/2023 7.0.304 has at least one vulnerability with high severity.
7.0.302 75,494 5/16/2023 7.0.302 has at least one vulnerability with high severity.
0.4.0 206,714 3/22/2023 0.4.0 has at least one vulnerability with high severity.
0.3.2 187,470 1/20/2023 0.3.2 has at least one vulnerability with high severity.
0.2.7 163,606 10/27/2022 0.2.7 has at least one vulnerability with high severity.
0.1.8 15,745 8/25/2022 0.1.8 has at least one vulnerability with high severity.

# Microsoft.NET.Build.Containers 8.0.100

This version brings the following new features and enhancements:

* For .NET 8-targeting applications, the generated container user will not have root permissions by default. This is a breaking change from previous versions, but it is a more secure default. If you need to run your container as root, you can set the `ContainerUser` property to `root` in your project file. Note also that in .NET 8 several changes were made to the Microsoft .NET base images, like changing the default ASP.NET port to 8080, so applications newly-targeting .NET may have to adjust to these settings.
* Generated container images now default to using the `latest` tag instead of the value of the MSBuild `Version` property, to align with other container tooling. You can still override this behavior by setting the `ContainerTag` property in your project file.
* The `ContainerFamily` property was added to support choosing from different variants of image tags without needing to specify the entire base image. For example, to target Alpine Linux you can now set `ContainerFamily` to `alpine`.
* The generated images will now correctly set `User` and `ExposedPort` metadata based on well-known .NET Environment variables for these settings.
* We now support using base images that set `Entrypoint` instead of `Cmd`. The previous `ContainerEntrypoint` and `ContainerEntrypointArgs` properties are still supported, but will log a warning when used. You should now use `ContainerAppCommand` and `ContainerAppCommandArgs` instead to set the desired start application - these properties allow the tooling to select the proper app start command based on the base images' use of Entrypoint or Cmd. Thanks to @tmds for this functionality!
* We explicitly support using podman as a local destination for your containers. If `podman` is present on the system and `docker` is not, we will opt to use `podman` instead. If you'd like to make this behavior explicit you can set `LocalRegistry` to either `docker` or `podman`. Thanks to @tmds for this contribution!
* Permissions for files in the images not don't have the executable bit set unless it is necessary.
* Support for authenticating using Identity Token flows was added. This unblocks support for Azure Managed Identities, as well as all other registries where the result of `docker login <registry url>` is an Identity Token instead of an Access Token or Username/Password pair.