dnscrypt-proxy service: use dynamic uid/gid

The daemon doesn't have any portable data, reserving a
UID/GID for it is redundant.

This frees up UID/GID 151.

+4 -5
-2
nixos/modules/misc/ids.nix
··· 176 seeks = 148; 177 prosody = 149; 178 i2pd = 150; 179 - dnscrypt-proxy = 151; 180 systemd-network = 152; 181 systemd-resolve = 153; 182 systemd-timesync = 154; ··· 414 seeks = 148; 415 prosody = 149; 416 i2pd = 150; 417 - dnscrypt-proxy = 151; 418 systemd-network = 152; 419 systemd-resolve = 153; 420 systemd-timesync = 154;
··· 176 seeks = 148; 177 prosody = 149; 178 i2pd = 150; 179 systemd-network = 152; 180 systemd-resolve = 153; 181 systemd-timesync = 154; ··· 413 seeks = 148; 414 prosody = 149; 415 i2pd = 150; 416 systemd-network = 152; 417 systemd-resolve = 153; 418 systemd-timesync = 154;
+4 -3
nixos/modules/services/networking/dnscrypt-proxy.nix
··· 173 } 174 '')); 175 176 - users.extraUsers.dnscrypt-proxy = { 177 - uid = config.ids.uids.dnscrypt-proxy; 178 description = "dnscrypt-proxy daemon user"; 179 }; 180 - users.extraGroups.dnscrypt-proxy.gid = config.ids.gids.dnscrypt-proxy; 181 182 systemd.sockets.dnscrypt-proxy = { 183 description = "dnscrypt-proxy listening socket";
··· 173 } 174 '')); 175 176 + users.users.dnscrypt-proxy = { 177 description = "dnscrypt-proxy daemon user"; 178 + isSystemUser = true; 179 + group = "dnscrypt-proxy"; 180 }; 181 + users.groups.dnscrypt-proxy = {}; 182 183 systemd.sockets.dnscrypt-proxy = { 184 description = "dnscrypt-proxy listening socket";