OpenWrt router to work with Snowflake, circumventing censorship

I am using OpenWRT router 22.03.03 in a heavily censored country.
That said all the VPN protocols are filtered and stopped working and the only option for getting connected to the free internet is using Tor and the only bridge that functions properly iwith the Tor is the Snowflake.

I am wondering how can I bring the Snowflake functionality to my OpenWRT router,
the users that are connected to the OpenWRT router should get access to the uncensored internet via Snowflake bridge running with the Tor network.

I have not seen any tutorial on how to use snowflake on OpenWrt router, therefore I am asking for any hint or tutorial to shed a light on this subject.

I am looking for answers to the following questions.

(1) Is the snowflake functionality already built in the Tor package of the OpenWRT or it should be installed as a separate package?

(2) In the case if the snowflake should be installed as a separate package what is/are package(s) that should be installed on the OpenWRT router in order to make the router to access to the Snowflake bridge?

(3) In a case if the Snowflake is already bundled with the Tor package how can I activate it in the tor configuration file?

(4) What is the minimum required settings that I have to configure the OpenWRT router in order to do followings?

(a) Pssthorough all the ingoing and outgoing internet traffic of all of the LAN devices thorough the Snowflake bridge, including the DNS request and while the actual configuration should make the router to act like a VPN.

(b) In the case if the Snowflake bridge is not connected to the internet, all the internet traffic be blocked inside the router.

I would appreciate any tutorial or configuration settings for mentioned questions.

I'm not an expert anyhow - but here is the repo.

As you are not a proxy but rather the client, this could be the relevant this part of the documentation.

In software section it's 'snowflake-client' to be installed.
It's not build into Tor.

You can torrify entire router (LAN<>WAN) traffic as sending it into SOCKS5 Tor proxy - with Snowflake client as the way of accessing the Tor network(?) - instead of direct to Tor access.
But that is in general more than a few steps so there won't be any complete (an up to date) guide.

Note that Tor consume (could be seen by 'ps -p -o rss' or 'top -p ') as resident ~70MB and Snowflake ~25MB of available RAM and while in use they became quite CPU intensive so altogether with the rest of OS, 128-256MB RAM and dual-core CPU should be a bare minimum for prolonged operation.

Also take care of logs as they could be verbose and fill up the space after set-up is done.

Here is a relevant thread and overall the Tor documentation is usable.

--
Consider maybe Tails on USB stick for certain scenarios as it's more bulletproof rather than this on weak HW.