{ pkgs, lib, config, ... }:
let
  inherit (config) networking;
  inherit (config.services) tor;
  inherit (config.users) users;
  inherit (config.security) gnupg;
  ports = lib.flatten (map (map (p: p.port)) [tor.settings.ORPort tor.settings.DirPort]);
  onion = "5spcvlzbaxwo4knhwnrekjtnakxmvekmlc5qwsigi33rn45hd5gewlyd";
in
{
environment.systemPackages = [
  #pkgs.pythonPackages.stem
  pkgs.nyx
];
networking.nftables.ruleset = ''
  add rule inet filter fw2net meta skuid ${users.tor.name} meta l4proto tcp counter accept comment "Tor"
'' + lib.optionalString (ports != []) ''
  add rule inet filter net2fw tcp dport {${lib.concatMapStringsSep "," toString ports}} counter accept comment "Tor"
'';
#security.gnupg.secrets."tor/auth/julm" = {};
security.gnupg.secrets."tor/onion/${onion}/hs_ed25519_secret_key" = {
  systemdConfig.before = [ "tor.service" ];
  systemdConfig.requiredBy = [ "tor.service" ];
};
services.tor = {
  enable = true;
  enableGeoIP = true;
  controlSocket.enable = true;
  client.enable = true;
  client.dns.enable = true;
  relay.enable = false;
  relay.role = "private-bridge";
  #client.privoxy.enable = false;
  relay.onionServices = {
    "ssh/${networking.domain}/${networking.hostName}" = {
      secretKey = gnupg.secrets."tor/onion/${onion}/hs_ed25519_secret_key".path;
      map = [ 22 ];
      /*
      authorizedClients = [
        "descriptor:x25519:2EZQ3AOZXERDVSN6WO5LNSCOIIPL2AT2A7KOS4ZIYNVQDR5EFM2Q" # julm
      ];
      */
      settings = {
        #HiddenServiceNumIntroductionPoints = 20;
      };
    };
  };
  settings.AutomapHostsSuffixes = [".onion"];
  settings.ORPort = [
    #{ addr = "[::]"; port = 2222; NoAdvertise = false; IPv6Only = true; }
    { port = 2222; IPv4Only = false; }
    #{ addr = "80.67.180.251"; port = 222; IPv4Only = true; NoAdvertise = true; }
  ];
  settings.BandwidthRate = 500000;
  settings.ReducedExitPolicy = true;
  settings.ExitPolicy = [
    # irc.freenode.net
    "reject 185.30.166.38"
    "reject 185.30.166.37"
    "reject 38.229.70.22"
    "reject 130.185.232.126"
    "reject 185.191.225.10"
    "reject [2a01:7e00::f03c:91ff:fee2:413b]"
    "reject [2001:6b0:e:2a18::119]"
    "reject [2600:3c02::f03c:91ff:fe59:7d2e]"
  ];
  /*
  settings.TransPort = { port = 9040; };
  settings.DNSPort = { port = 9053; };
  #settings.ExtORPort = lib.mkForce null;
  settings.AutomapHostsOnResolve = true;
  */
};
/*
boot.initrd.secrets = {
  "/var/lib/tor/onion/ssh/hs_ed25519_secret_key" =
    gnupg.secrets."tor/onion/${onion}/hs_ed25519_secret_key".path;
};
boot.initrd.extraUtilsCommands = ''
  copy_bin_and_libs ${pkgs.tor}/bin/tor
'';
boot.initrd.network.postCommands = let
  torRc = pkgs.writeText "tor.rc" ''
    DataDirectory /var/lib/tor
    HiddenServicePort 22 127.0.0.1:2222
    HiddenServiceDir /var/lib/tor/onion/ssh
  '';
  in ''
  echo "tor: preparing onion folder"
  # have to do this otherwise tor does not want to start
  install -d -m 700 /var/lib/tor

  echo "make sure localhost is up"
  ip addr add 127.0.0.1/8 dev lo
  ip link set lo up

  echo "tor: starting tor"
  tor -f ${torRc} --verify-config
  tor -f ${torRc} &
'';
*/
}