
Security News
Official Go SDK for MCP in Development, Stable Release Expected in August
The official Go SDK for the Model Context Protocol is in development, with a stable, production-ready release expected by August 2025.
This Email API allows you to send plain-text only emails to clients through supported email service providers.
Supports sending to multiple email recipients, CCs, BCCs.
Supported Providers:
Add this line to your application's Gemfile:
gem 'email_api'
And then execute:
$ bundle
Or install it yourself as:
$ gem install email_api
The gem uses environment variables to hold sensitive information. Create a .env
file on the same directory level as where you are running the program.
Inside the .env
files, the following need to be defined:
export SENDGRID_API_USER='<Sendgrid account username>'
export SENDGRID_API_KEY='<Sendgrid account password'
export MAILGUN_PRIVATE_KEY='<API given by Mailgun when creating an account>'
export MAILGUN_DOMAIN='<Domain given by Mailgun when creating an account>'
export TEST_NAME='<The identity name used to perform tests with>'
export TEST_EMAIL='<The email address to perform tests with>'
All usages below denote <hosting_server>
. This is the URL path to get to the API on whichever service you host it on.
For demonstration purposes, see this example hosting server: Demonstration Email API
<hosting_server>/ping
{
"time": "2000-01-01T00:00:00+00:00"
}
Note: All Email Addresses below are expected in the format of YOUR NAME <your email>
from
YOUR NAME <your email>
to
YOUR NAME <your email>[, YOUR NAME <your email>]
cc
[optional]
to
bcc
[optional]
to
subject
content
<hosting_server>/send?from=My Name <my@email.com>&to=Your Name <your@email.com>&cc=Friend 1 <friend_1@email.com>,Friend 2 <friend_2@email.com>&subject=Hello World&content=How are you today?
{
"email":
{
"from":
{
"name": "My Name",
"email": "my@email.com"
},
"to":
[{
"name": "Your Name",
"email": "your@email.com"
}],
"cc":
[{
"name": "Friend 1",
"email": "friend_1@email.com"
},
{
"name": "Friend 2",
"email": "friend_2@email.com"
}],
"bcc": null,
"subject": "Hello World",
"content": "How are you today?"
},
"status":"200: OK"
}
After checking out the repo at https://github.com/VasiliMoisiadis/email-api:
There are two ways to install:
For complete scripted installation:
$ bash bin/setup
For more manual installation:
$ bundle install
The provided web service at Moisiadis.com uses Puma, and it is the primary supported web server.
Start using:
$ puma config.ru
By default it will start on port 9292. See instructions on Puma Configuration to alter this.
Tests are performed using the Minitest testing suite
Run using:
$ rake test
Note: Can only be tested after complete installation - this includes environment variables.
Bug reports and pull requests are welcome on GitHub at https://github.com/VasiliMoisiadis/email-api. This project is intended to be a safe, welcoming space for collaboration, and contributors are expected to adhere to the Contributor Covenant code of conduct.
The gem is available as open source under the terms of the MIT License.
Everyone interacting in the Email API project’s codebases, issue trackers, chat rooms and mailing lists is expected to follow the code of conduct.
FAQs
Unknown package
We found that email_api demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
The official Go SDK for the Model Context Protocol is in development, with a stable, production-ready release expected by August 2025.
Security News
New research reveals that LLMs often fake understanding, passing benchmarks but failing to apply concepts or stay internally consistent.
Security News
Django has updated its security policies to reject AI-generated vulnerability reports that include fabricated or unverifiable content.