{"id":"iowoi-nfs-server","name":"nfs-server","homepage":"https://hub.docker.com/r/iowoi/nfs-server","repo_url":"https://hub.docker.com/r/iowoi/nfs-server","category":"storage","subcategories":[],"tags":["storage","infrastructure","nfs","self-hosted","file-sharing","linux"],"what_it_does":"nfs-server is a self-hosted service/package intended to provide an NFS (Network File System) server for sharing files over a network. (Details such as specific configuration options, security hardening, and API capabilities are not provided in the input.)","use_cases":["Self-hosted file sharing within a trusted network","Sharing home directories or application data across machines","Legacy infrastructure support requiring NFS exports"],"not_for":["Exposing file shares directly to the public internet","Multi-tenant environments without strong network isolation","Use cases requiring modern authenticated HTTPS APIs"],"best_when":"You control the network (e.g., private LAN/VPC), can configure NFS exports safely, and need file-level sharing via NFS.","avoid_when":"You cannot ensure network isolation or need fine-grained per-user authorization and auditability beyond what NFS setup provides.","alternatives":["SMB/CIFS (e.g., Samba) for Windows/mixed environments","NFS from a mature OS/vendor distribution","Object storage (S3-compatible) or NFS-over-Ganesha alternatives depending on workload","SSHFS/rsync for simpler, smaller-scale sharing"],"af_score":7.0,"security_score":26.8,"reliability_score":5.0,"package_type":"mcp_server","discovery_source":["docker_mcp"],"priority":"low","status":"evaluated","version_evaluated":null,"last_evaluated":"2026-04-04T19:54:58.391403+00:00","interface":{"has_rest_api":false,"has_graphql":false,"has_grpc":false,"has_mcp_server":false,"mcp_server_url":null,"has_sdk":false,"sdk_languages":[],"openapi_spec_url":null,"webhooks":false},"auth":{"methods":["OS-level permissions / NFS authentication via underlying network/host trust and export configuration (details not provided)"],"oauth":false,"scopes":false,"notes":"NFS typically relies on host-based access control (e.g., export rules, IP allowlists) and OS credentials/UID mapping rather than app-level OAuth scopes. Specific auth mechanisms and configuration are not included in the provided input."},"pricing":{"model":null,"free_tier_exists":false,"free_tier_limits":null,"paid_tiers":[],"requires_credit_card":false,"estimated_workload_costs":null,"notes":"As a server package, pricing is generally self-hosted infrastructure cost; no pricing data was provided."},"requirements":{"requires_signup":false,"requires_credit_card":false,"domain_verification":false,"data_residency":[],"compliance":[],"min_contract":null},"agent_readiness":{"af_score":7.0,"security_score":26.8,"reliability_score":5.0,"mcp_server_quality":0.0,"documentation_accuracy":0.0,"error_message_quality":0.0,"error_message_notes":null,"auth_complexity":30.0,"rate_limit_clarity":0.0,"tls_enforcement":10.0,"auth_strength":25.0,"scope_granularity":10.0,"dependency_hygiene":30.0,"secret_handling":60.0,"security_notes":"Security posture for NFS depends heavily on export configuration, network isolation, UID/GID mapping, and firewalling. TLS is not inherent to classic NFS; secure deployment typically requires network restrictions and careful export rules. No repository/dependency/manifests were provided, so dependency hygiene cannot be verified.","uptime_documented":0.0,"version_stability":0.0,"breaking_changes_history":0.0,"error_recovery":20.0,"idempotency_support":"false","idempotency_notes":null,"pagination_style":"none","retry_guidance_documented":false,"known_agent_gotchas":["No programmatic API/MCP details were provided; agents may need SSH/container orchestration rather than tool calls.","NFS security is highly configuration-dependent; misconfigured exports or network exposure can be severe."]}}