UBUNTU: [Packaging] update-version-dkms -- sync archive versions to package
We are deliberatly locking versions to specific tested versions.
This is necessary in part to keep control over when we switch between
those archive updates, and in part because we are going to be pulling
versions from the original series of the kernel when building backports.
Add a script to sync these versions from those published in the primary
archive.
UBUNTU: [Packaging] zfs/spl -- make zfs package version explicit
Switch from using package names to direct pointers to those packages.
This greatly simplifies keeping the zfs/spl versions in sync with those
tested with this kernel. It also ensures we keep the same versions when
building this kernel as a backport in previous series.
UBUNTU: [Packaging] zfs/spl -- remove packaging support for incorporated source
We are about to add builds of the zfs and spl module sets directly from
the DKMS packages themselves. Remove the packaging support for the
in-tree sources.
We are inconsistently joining provides content from the control.d data
and the rules generated provides data. Use dpkg's docuemnted tollerance
for trailing commas to our advantage and simplify how this is generated.
UBUNTU: [Packaging] dkms -- add general Built-Using: support
Add support for automatic generation of the Built-Using: attributes for
any binary package we add DKMS based .kos to. This allows us to reproduce
the build in the future should that be necessary.
UBUNTU: [Packaging] dkms -- save build objects artifacts for validation
Save the object files and associated artifacts generated during the build.
This in particular includes the retpoline information we generated during
that build. This allows us to include those in the ABI.
UBUNTU: [Packaging] dkms -- dkms package build packaging support
Add new dkms-build scripting which prepares a kernel headers tree and
then builds specified DKMS packages against those headers. The
resulting .kos are then incorporated into the specified package,
including signing them into this kernels module signing key. This
allows them to be loaded in a secure-boot environment.