Skip to main content

A command-line tool for generating optimized NordVPN WireGuard configurations.

Project description

NordVPN WireGuard Configuration Generator

A command-line tool for generating optimized NordVPN WireGuard configurations.

Project Philosophy: A Focus on Quality

This project has been fundamentally refocused. Previously, multiple versions existed across several programming languages. This approach divided development effort and resulted in inconsistent quality.

The new directive is singular: to provide one exceptionally engineered tool that is robust, maintainable, and correct.

To this end, all previous language implementations have been archived. Development is now concentrated on two platforms:

  1. This Command-Line Tool: A complete rewrite in Python, packaged for professional use.
  2. A Web Interface: For users who require a graphical frontend.

This consolidated effort ensures a higher standard of quality and a more reliable end-product.

Core Capabilities

  • Package Distribution: The tool is a proper command-line application, installable via PyPI. This eliminates manual dependency management.
  • Performance: Asynchronous architecture processes the entire NordVPN server list in seconds.
  • Optimization: Intelligently sorts servers by current load and geographic proximity to the user, generating configurations for the most performant connections.
  • Structured Output: Automatically creates a clean directory structure containing standard configurations, a best_configs folder for optimal servers per location, and a servers.json file with detailed metadata for analysis.
  • Interactive and Non-Interactive: A guided rich-CLI for interactive use. The core logic is structured to be scriptable.

Installation

Prerequisites: Python 3.9+

Install the package using pip:

pip install nord-config-generator

Usage

Generate Configurations (Default Action)

Execute the application without any arguments. This is the primary function.

nordgen

The application will prompt for the required access token and configuration preferences.

Retrieve Private Key

To retrieve and display your NordLynx private key without generating configurations, use the get-key command:

nordgen get-key

Web Version

A graphical alternative is available for direct use in a web browser.

Support

Project visibility and continued development are supported by two actions:

  1. Star the Repository: Starring the project on GitHub increases its visibility.
  2. NordVPN Referral: Using the referral link for new subscriptions provides support at no additional cost. Link: https://ref.nordvpn.com/MXIVDoJGpKT

License

This project is distributed under the GNU General Public License v3.0. See the LICENSE file for full details.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

nord_config_generator-1.0.3.tar.gz (10.1 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

nord_config_generator-1.0.3-py3-none-any.whl (9.1 kB view details)

Uploaded Python 3

File details

Details for the file nord_config_generator-1.0.3.tar.gz.

File metadata

  • Download URL: nord_config_generator-1.0.3.tar.gz
  • Upload date:
  • Size: 10.1 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.13.3

File hashes

Hashes for nord_config_generator-1.0.3.tar.gz
Algorithm Hash digest
SHA256 fbea3d98c968f5a4984df415c2bd869882a899bb9767fcf3e7f680b9a440487b
MD5 fa2996ba7f6f72bfcc3ffaf2a075efcd
BLAKE2b-256 a51a439bc161b0e2b21658909cff2cf5a8dc6b2ce08cbccfb66c8d887a8080ee

See more details on using hashes here.

File details

Details for the file nord_config_generator-1.0.3-py3-none-any.whl.

File metadata

File hashes

Hashes for nord_config_generator-1.0.3-py3-none-any.whl
Algorithm Hash digest
SHA256 5d6385289b6068c8c597aac0a86ffd3291cefe9cd5d495135ba271be9ee7d2bd
MD5 d661d6a4d7d98cfd02f773304a29a074
BLAKE2b-256 185ff580a32199cb7711696822d9b85e1cdf0287687175235787c5c9d1542428

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page