Development Roadmap
What's next. What we've built.
V2 transforms xenvsync from a single-user tool into a zero-trust secrets manager for teams and automated pipelines.
5 planned
V2 Phases
7 / 7
V1 Phases
38+
Tests
V2 — Collaboration & Scale
PlannedThe next evolution — asymmetric cryptography, multi-environment support, CI/CD integrations, and an extensible plugin system.
Phase 8: Multi-Environment Mastery
Manage staging, production, and local environments with a single tool.
- Targeted push/pull with --env flag
- Environment fallbacks (.env.shared < .env.staging < .env.local)
- Smart run injection with XENVSYNC_ENV auto-detect
- xenvsync envs command to list all environments
Phase 9: Asymmetric Cryptography
Zero-trust key sharing for teams — no more passing symmetric keys around.
- X25519 keypair generation (xenvsync keygen)
- Team roster management (add/remove/list public keys)
- Multi-key vault encryption (per-member key slots)
- Backward-compatible vault format versioning
Phase 10: CI/CD & DevOps Integrations
First-class support for automated pipelines and containers.
- Official GitHub Action (nasimstg/xenvsync-action@v1)
- Docker integration (Alpine image, entrypoint best practices)
- Format exporting (JSON, YAML, shell, tfvars) — stdout only
- CI templates for GitLab, CircleCI, Bitbucket Pipelines
Phase 11: Hardening & Auditing
Enterprise-grade rotation, audit trails, and integrity verification.
- Secret rotation (xenvsync rotate) with team re-encryption
- Audit logging (xenvsync log — Git-backed change history)
- Integrity verification without decryption (xenvsync verify)
- Memory zeroing, passphrase protection, xenvsync doctor
Phase 12: Ecosystem & Community
Extensibility, package managers, and developer ergonomics.
- Shell completions (bash/zsh/fish/powershell)
- Plugin system for custom vault backends
- Documentation site with migration guides
- Homebrew tap, Scoop bucket, AUR, Nix flake
Want to help shape V2?
We welcome contributions, feature requests, and feedback. Check out our open issues or start a discussion.
V1 — Secure Single-User Sync
CompletePhase 1: Scaffolding & CLI
- ✓Go module with Cobra CLI framework
- ✓Command routing (init, push, pull, run, diff, status)
- ✓Structured error handling via RunE
Phase 2: Cryptography Engine
- ✓32-byte key generation via crypto/rand
- ✓AES-256-GCM encrypt/decrypt with random nonce
- ✓Key file permissions enforced at 0600
Phase 3: File I/O & Parsing
- ✓.env parser (quotes, multiline, comments, export prefix)
- ✓Vault format (header/base64/footer, 76-char wrapping)
- ✓.gitignore auto-manipulation
Phase 4: Process Execution
- ✓In-memory decryption (plaintext never on disk)
- ✓Cross-platform child process spawning
- ✓Signal forwarding (SIGINT/SIGTERM) and exit code propagation
Phase 5: Testing
- ✓Crypto unit tests (round-trip, bad key, tampered ciphertext)
- ✓Parser unit tests (edge cases, multiline, round-trip)
- ✓Vault format tests (encode/decode, CRLF, malformed input)
- ✓CLI integration tests (init, push, pull end-to-end)
Phase 6: Hardening & UX
- ✓Multiline variable support
- ✓--force flag for key regeneration
- ✓diff and status commands
- ✓Key permission validation on load
Phase 7: Packaging & Distribution
- ✓GoReleaser for cross-platform builds
- ✓GitHub Actions CI (test matrix, lint, release)
- ✓Installation documentation