Remove syslog.target workaround and send a patch upstream instead
https://github.com/gssapi/gssproxy/pull/91
No clue why this was hacked around in the PKGBUILD instead of sending a PR to upstream.
Due to an influx of spam, we have had to temporarily disable account registrations. Please write an email to accountsupport@archlinux.org, with your desired username, if you want to get access. Sorry for the inconvenience.
https://github.com/gssapi/gssproxy/pull/91
No clue why this was hacked around in the PKGBUILD instead of sending a PR to upstream.