README.md in vagrant-qubes-0.0.2 vs README.md in vagrant-qubes-0.0.3
- old
+ new
@@ -10,13 +10,13 @@
Right now, this should be considered alpha at best, basic "up" and "destroy" works for a minimally configured AppVM based on a Vagrantfile along these lines
```
vms = {
- "test1" => ["AppVM","red","fedora-33", 2, 2048, "sys-firewall"],
- "test2" => ["AppVM","red","fedora-33", 2, 2048, "sys-firewall"],
- "test3" => ["AppVM","red","fedora-33", 2, 2048, "sys-firewall"],
+ "test1" => ["AppVM","red","fedora-33", 2, 2048, "vagrant"],
+ "test2" => ["AppVM","red","fedora-33", 2, 2048, "vagrant"],
+ "test3" => ["AppVM","red","fedora-33", 2, 2048, "vagrant"],
}
Vagrant.configure("2") do |config|
vms.each do | (name, cfg) |
type, label, template, numvcpus, memory, network = cfg
@@ -41,26 +41,20 @@
This is not fully thought through or fully secured, use it at your own risk!
## Installation
-Add this line to your application's Gemfile:
+Run this in your AppVM
-```ruby
-gem 'vagrant-qubes'
+```
+vagrant plugin install vagrant-qubes
```
-And then execute:
+## TODO
- $ bundle install
-
-Or install it yourself as:
-
- $ gem install vagrant-qubes
-
-## Usage
-
-TODO: Write usage instructions here
+There is a lot to do, in no particular order:
+- Extend to support Standalone VMs/HVMs
+- Sort out networking, and therefore provisioning
## Contributing
Bug reports and pull requests are welcome on GitHub at https://github.com/gp397/vagrant-qubes. This project is intended to be a safe, welcoming space for collaboration, and contributors are expected to adhere to the [code of conduct](https://github.com/gp397/vagrant-qubes/blob/master/CODE_OF_CONDUCT.md).