Skip to main content

A command-line tool for generating optimized NordVPN WireGuard configurations.

Project description

NordVPN WireGuard Configuration Generator

A command-line tool for generating optimized NordVPN WireGuard configurations.

Project Philosophy: A Focus on Quality

This project has been fundamentally refocused. Previously, multiple versions existed across several programming languages. This approach divided development effort and resulted in inconsistent quality.

The new directive is singular: to provide one exceptionally engineered tool that is robust, maintainable, and correct.

To this end, all previous language implementations have been archived. Development is now concentrated on two platforms:

  1. This Command-Line Tool: A complete rewrite in Python, packaged for professional use.
  2. A Web Interface: For users who require a graphical frontend.

This consolidated effort ensures a higher standard of quality and a more reliable end-product.

Core Capabilities

  • Package Distribution: The tool is a proper command-line application, installable via PyPI. This eliminates manual dependency management.
  • Performance: Asynchronous architecture processes the entire NordVPN server list in seconds.
  • Optimization: Intelligently sorts servers by current load and geographic proximity to the user, generating configurations for the most performant connections.
  • Structured Output: Automatically creates a clean directory structure containing standard configurations, a best_configs folder for optimal servers per location, and a servers.json file with detailed metadata for analysis.
  • Interactive and Non-Interactive: A guided rich-CLI for interactive use. The core logic is structured to be scriptable.

Installation

Prerequisites: Python 3.9+

Install the package using pip:

pip install nord-config-generator

Usage

Generate Configurations (Default Action)

Execute the application without any arguments. This is the primary function.

nordgen

The application will prompt for the required access token and configuration preferences.

Retrieve Private Key

To retrieve and display your NordLynx private key without generating configurations, use the get-key command:

nordgen get-key

Web Version

A graphical alternative is available for direct use in a web browser.

Support

Project visibility and continued development are supported by two actions:

  1. Star the Repository: Starring the project on GitHub increases its visibility.
  2. NordVPN Referral: Using the referral link for new subscriptions provides support at no additional cost. Link: https://ref.nordvpn.com/MXIVDoJGpKT

License

This project is distributed under the GNU General Public License v3.0. See the LICENSE file for full details.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

nord_config_generator-1.0.1.tar.gz (9.6 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

nord_config_generator-1.0.1-py3-none-any.whl (8.9 kB view details)

Uploaded Python 3

File details

Details for the file nord_config_generator-1.0.1.tar.gz.

File metadata

  • Download URL: nord_config_generator-1.0.1.tar.gz
  • Upload date:
  • Size: 9.6 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.13.3

File hashes

Hashes for nord_config_generator-1.0.1.tar.gz
Algorithm Hash digest
SHA256 02fefea0ef20e048c5b721821008171c946f7630082006e14344f660f75dcd36
MD5 aea90ca5c580e4f894d568b2e99f6692
BLAKE2b-256 5cc6a1ec93a108a09dbfb61bd312a1f1430a322fa35122a5b0a4d50e191a0d0a

See more details on using hashes here.

File details

Details for the file nord_config_generator-1.0.1-py3-none-any.whl.

File metadata

File hashes

Hashes for nord_config_generator-1.0.1-py3-none-any.whl
Algorithm Hash digest
SHA256 3db896eb856e86e1d79797e234fe27240450f1f1d4802e14ba2061226942ea7c
MD5 b84b0ed37d06c2245211a85c3e1772af
BLAKE2b-256 24e071943e7531c251f9d2d0ee8b3558ed27b264ac7eecde7d97ae9992d37c07

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page