From: Jan Engelhardt Date: 2016-12-07 11:36:34.201377440 +0100 Upstream: no build: unlock all krb5 versions The check is really stupid (like testing for "2.6.*" kernel was elsewhere), as it prevents using future versions. The check should have tested for {1.[0-9]:reject} instead. Anyway, unlock all versions. The minimum requirement is enforced in openSUSE by way of the spec file. --- src/external/pac_responder.m4 | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) Index: sssd-1.14.2/src/external/pac_responder.m4 =================================================================== --- sssd-1.14.2.orig/src/external/pac_responder.m4 +++ sssd-1.14.2/src/external/pac_responder.m4 @@ -11,7 +11,7 @@ then AC_MSG_CHECKING(for supported MIT krb5 version) KRB5_VERSION="`$KRB5_CONFIG --version`" case $KRB5_VERSION in - Kerberos\ 5\ release\ 1.9* | \ + Kerberos\ 5\ release\ 1.* | \ Kerberos\ 5\ release\ 1.10* | \ Kerberos\ 5\ release\ 1.11* | \ Kerberos\ 5\ release\ 1.12* | \