https://github.com/eum3l/hysteria-nix
Nix package and NixOS module for Hysteria
https://github.com/eum3l/hysteria-nix
censorship-circumvention censorship-resistance censorship-resistant hysteria hysteria-2 hysteria-server hysteria2 nix nix-darwin nix-flake nix-flakes nixos nixpkgs vpn vpn-client vpn-server vpn-service
Last synced: 4 months ago
JSON representation
Nix package and NixOS module for Hysteria
- Host: GitHub
- URL: https://github.com/eum3l/hysteria-nix
- Owner: eum3l
- License: mit
- Created: 2024-05-30T18:35:46.000Z (about 1 year ago)
- Default Branch: main
- Last Pushed: 2025-02-04T07:16:24.000Z (5 months ago)
- Last Synced: 2025-02-04T08:21:39.204Z (5 months ago)
- Topics: censorship-circumvention, censorship-resistance, censorship-resistant, hysteria, hysteria-2, hysteria-server, hysteria2, nix, nix-darwin, nix-flake, nix-flakes, nixos, nixpkgs, vpn, vpn-client, vpn-server, vpn-service
- Language: Nix
- Homepage: https://v2.hysteria.network
- Size: 81.1 KB
- Stars: 1
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# hysteria-nix
> Nix Package and NixOS Module ([Options](OPTIONS.md)) for [Hysteria](https://v2.hysteria.network/)```sh
nix run github:eum3l/hysteria-nix
``````nix
{
inputs = {
nixpkgs.url = "github:nixos/nixpkgs/nixos-unstable";
hysteria.url = "github:eum3l/hysteria-nix";
};outputs = {
hysteria,
nixpkgs,
...
}: {
nixosConfigurations.default = let
system = "x86_64-linux";
in nixpkgs.lib.nixosSystem {
inherit system;
modules = [
hysteria.nixosModules.default
{
# Module
services.hysteria.enable = true;
# Package
environment.systemPackages = [
hysteria.packages.${system}.default
];
# Cache
nix.settings = {
trusted-public-keys = [
"hysteria.cachix.org-1:zAG2qV/akrj0TPOf28gxWTDj57f8SuYjqjHw2u38vZI="
];
substituters = [
"https://hysteria.cachix.org"
];
};
}
];
};
};
}
```