Check the dev.tty.ldisc_autoload sysctl
[kconfig-hardened-check.git] / setup.cfg
index 168169f3e7c31577885e5e6e840dd7f8ef64f171..1cc8b64974cccc105d1ef73d6a002f11e167a24c 100644 (file)
--- a/setup.cfg
+++ b/setup.cfg
@@ -6,7 +6,7 @@ home_page = https://github.com/a13xp0p0v/kconfig-hardened-check
 description = A tool for checking the security hardening options of the Linux kernel
 long_description = file: README.md
 license = GNU General Public License v3 (GPLv3)
-license_file = LICENSE.txt
+license_files = LICENSE.txt
 classifiers =
        Development Status :: 5 - Production/Stable
        License :: OSI Approved :: GNU General Public License v3 (GPLv3)
@@ -17,12 +17,14 @@ classifiers =
 
 [options]
 setup_requires = setuptools
-packages = find_namespace:
+packages =
+       kconfig_hardened_check
+       kconfig_hardened_check.config_files
+       kconfig_hardened_check.config_files.defconfigs
+       kconfig_hardened_check.config_files.distros
+       kconfig_hardened_check.config_files.kspp-recommendations
 include_package_data = true
 
-[options.packages.find]
-where = kconfig_hardened_check
-
 [options.entry_points]
 console_scripts =
        kconfig-hardened-check = kconfig_hardened_check:main