README.md in vagrant-qubes-0.0.2 vs README.md in vagrant-qubes-0.0.3

- old
+ new

@@ -10,13 +10,13 @@ Right now, this should be considered alpha at best, basic "up" and "destroy" works for a minimally configured AppVM based on a Vagrantfile along these lines ``` vms = { - "test1" => ["AppVM","red","fedora-33", 2, 2048, "sys-firewall"], - "test2" => ["AppVM","red","fedora-33", 2, 2048, "sys-firewall"], - "test3" => ["AppVM","red","fedora-33", 2, 2048, "sys-firewall"], + "test1" => ["AppVM","red","fedora-33", 2, 2048, "vagrant"], + "test2" => ["AppVM","red","fedora-33", 2, 2048, "vagrant"], + "test3" => ["AppVM","red","fedora-33", 2, 2048, "vagrant"], } Vagrant.configure("2") do |config| vms.each do | (name, cfg) | type, label, template, numvcpus, memory, network = cfg @@ -41,26 +41,20 @@ This is not fully thought through or fully secured, use it at your own risk! ## Installation -Add this line to your application's Gemfile: +Run this in your AppVM -```ruby -gem 'vagrant-qubes' +``` +vagrant plugin install vagrant-qubes ``` -And then execute: +## TODO - $ bundle install - -Or install it yourself as: - - $ gem install vagrant-qubes - -## Usage - -TODO: Write usage instructions here +There is a lot to do, in no particular order: +- Extend to support Standalone VMs/HVMs +- Sort out networking, and therefore provisioning ## Contributing Bug reports and pull requests are welcome on GitHub at https://github.com/gp397/vagrant-qubes. This project is intended to be a safe, welcoming space for collaboration, and contributors are expected to adhere to the [code of conduct](https://github.com/gp397/vagrant-qubes/blob/master/CODE_OF_CONDUCT.md).