SHA256
1
0
forked from pool/sssd
sssd/0001-krb5-1.15-build-fix.patch

30 lines
1.0 KiB
Diff

From: Jan Engelhardt <jengelh@inai.de>
Date: 2016-12-07 11:36:34.201377440 +0100
Upstream: no
build: unlock all krb5 versions
The check is really stupid (like testing for "2.6.*" kernel was elsewhere), as
it prevents using future versions. The check should have tested
for {1.[0-9]:reject} instead.
Anyway, unlock all versions. The minimum requirement is enforced
in openSUSE by way of the spec file.
---
src/external/pac_responder.m4 | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
Index: sssd-1.14.2/src/external/pac_responder.m4
===================================================================
--- sssd-1.14.2.orig/src/external/pac_responder.m4
+++ sssd-1.14.2/src/external/pac_responder.m4
@@ -11,7 +11,7 @@ then
AC_MSG_CHECKING(for supported MIT krb5 version)
KRB5_VERSION="`$KRB5_CONFIG --version`"
case $KRB5_VERSION in
- Kerberos\ 5\ release\ 1.9* | \
+ Kerberos\ 5\ release\ 1.* | \
Kerberos\ 5\ release\ 1.10* | \
Kerberos\ 5\ release\ 1.11* | \
Kerberos\ 5\ release\ 1.12* | \