twilio-ruby 3.11.5 → 3.12.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +13 -5
- data/.gitignore +1 -1
- data/.travis.yml +20 -8
- data/AUTHORS.md +29 -25
- data/{CHANGES → CHANGES.md} +45 -1
- data/Gemfile +8 -1
- data/{LICENSE → LICENSE.md} +1 -1
- data/Makefile +1 -2
- data/README.md +57 -26
- data/Rakefile +8 -10
- data/docs/getting-started.rst +3 -3
- data/docs/usage/applications.rst +5 -5
- data/docs/usage/basics.rst +17 -4
- data/docs/usage/caller-ids.rst +2 -2
- data/docs/usage/conferences.rst +5 -5
- data/docs/usage/errors.rst +1 -1
- data/docs/usage/messages.rst +6 -6
- data/docs/usage/notifications.rst +2 -2
- data/docs/usage/phone-calls.rst +7 -7
- data/docs/usage/phone-numbers.rst +12 -12
- data/docs/usage/queues.rst +6 -6
- data/docs/usage/recordings.rst +5 -5
- data/docs/usage/sip.rst +5 -5
- data/docs/usage/token-generation.rst +18 -3
- data/docs/usage/transcriptions.rst +1 -1
- data/docs/usage/twiml.rst +1 -1
- data/docs/usage/validation.rst +27 -1
- data/examples/print-call-log.rb +1 -1
- data/lib/rack/twilio_webhook_authentication.rb +40 -0
- data/lib/twilio-ruby/rest/call_feedback.rb +28 -0
- data/lib/twilio-ruby/rest/call_feedback_summary.rb +13 -0
- data/lib/twilio-ruby/rest/calls.rb +6 -1
- data/lib/twilio-ruby/rest/client.rb +43 -5
- data/lib/twilio-ruby/rest/list_resource.rb +10 -4
- data/lib/twilio-ruby/rest/usage/records.rb +2 -2
- data/lib/twilio-ruby/twiml/response.rb +1 -0
- data/lib/twilio-ruby/util/capability.rb +6 -3
- data/lib/twilio-ruby/util/configuration.rb +7 -0
- data/lib/twilio-ruby/util/request_validator.rb +3 -2
- data/lib/twilio-ruby/version.rb +1 -1
- data/lib/twilio-ruby.rb +25 -0
- data/spec/rack/twilio_webhook_authentication_spec.rb +76 -0
- data/spec/rest/account_spec.rb +20 -20
- data/spec/rest/call_feedback_spec.rb +12 -0
- data/spec/rest/call_feedback_summary_spec.rb +9 -0
- data/spec/rest/call_spec.rb +4 -4
- data/spec/rest/client_spec.rb +114 -38
- data/spec/rest/conference_spec.rb +2 -2
- data/spec/rest/instance_resource_spec.rb +3 -3
- data/spec/rest/message_spec.rb +2 -2
- data/spec/rest/numbers_spec.rb +12 -12
- data/spec/rest/queue_spec.rb +2 -2
- data/spec/rest/recording_spec.rb +2 -2
- data/spec/spec_helper.rb +12 -3
- data/spec/support/fakeweb.rb +2 -0
- data/spec/twilio_spec.rb +15 -0
- data/spec/util/capability_spec.rb +167 -118
- data/spec/util/configuration_spec.rb +13 -0
- data/spec/util/request_validator_spec.rb +31 -3
- data/spec/util/url_encode_spec.rb +1 -1
- data/twilio-ruby.gemspec +28 -27
- metadata +46 -71
@@ -1,137 +1,186 @@
|
|
1
1
|
require 'spec_helper'
|
2
2
|
|
3
3
|
describe Twilio::Util::Capability do
|
4
|
-
|
5
|
-
|
6
|
-
|
4
|
+
describe 'config' do
|
5
|
+
after(:each) do
|
6
|
+
Twilio.instance_variable_set('@configuration', nil)
|
7
|
+
end
|
7
8
|
|
8
|
-
|
9
|
-
|
10
|
-
|
9
|
+
it 'should set the account sid and auth token from a configuration block' do
|
10
|
+
Twilio.configure do |config|
|
11
|
+
config.account_sid = 'someSid'
|
12
|
+
config.auth_token = 'someToken'
|
13
|
+
end
|
11
14
|
|
12
|
-
|
13
|
-
|
14
|
-
|
15
|
-
|
16
|
-
decoded['iss'].should_not be_nil
|
17
|
-
decoded['exp'].should_not be_nil
|
18
|
-
end
|
15
|
+
capability = Twilio::Util::Capability.new
|
16
|
+
expect(capability.instance_variable_get('@account_sid')).to eq('someSid')
|
17
|
+
expect(capability.instance_variable_get('@auth_token')).to eq('someToken')
|
18
|
+
end
|
19
19
|
|
20
|
-
|
21
|
-
|
22
|
-
|
23
|
-
|
24
|
-
|
20
|
+
it 'should overwrite account sid and auth token if passed to initializer' do
|
21
|
+
Twilio.configure do |config|
|
22
|
+
config.account_sid = 'someSid'
|
23
|
+
config.auth_token = 'someToken'
|
24
|
+
end
|
25
25
|
|
26
|
-
|
27
|
-
|
28
|
-
|
29
|
-
|
30
|
-
decoded['exp'].should == seconds + 3600
|
31
|
-
end
|
26
|
+
capability = Twilio::Util::Capability.new'otherSid', 'otherToken'
|
27
|
+
expect(capability.instance_variable_get('@account_sid')).to eq('otherSid')
|
28
|
+
expect(capability.instance_variable_get('@auth_token')).to eq('otherToken')
|
29
|
+
end
|
32
30
|
|
33
|
-
|
34
|
-
|
35
|
-
|
36
|
-
|
37
|
-
|
38
|
-
decoded['exp'].should == seconds + ttl
|
39
|
-
end
|
31
|
+
it 'should overwrite the account sid if only the sid is given' do
|
32
|
+
Twilio.configure do |config|
|
33
|
+
config.account_sid = 'someSid'
|
34
|
+
config.auth_token = 'someToken'
|
35
|
+
end
|
40
36
|
|
41
|
-
|
42
|
-
|
43
|
-
|
44
|
-
|
45
|
-
queries(decoded['scope']).should == [['incoming', {'clientName' => 'andrew'}]]
|
46
|
-
end
|
37
|
+
capability = Twilio::Util::Capability.new 'otherSid'
|
38
|
+
expect(capability.instance_variable_get('@account_sid')).to eq('otherSid')
|
39
|
+
expect(capability.instance_variable_get('@auth_token')).to eq('someToken')
|
40
|
+
end
|
47
41
|
|
48
|
-
|
49
|
-
|
50
|
-
|
51
|
-
token = @capability.generate
|
52
|
-
decoded = JWT.decode token, 'myAuthToken'
|
53
|
-
queries(decoded['scope']).should == [
|
54
|
-
['incoming', {'clientName' => 'andrew'}],
|
55
|
-
['incoming', {'clientName' => 'bridget'}]
|
56
|
-
]
|
57
|
-
end
|
42
|
+
it 'should throw an argument error if the sid and token isn\'t set' do
|
43
|
+
expect { Twilio::Util::Capability.new }.to raise_error(ArgumentError)
|
44
|
+
end
|
58
45
|
|
59
|
-
|
60
|
-
|
61
|
-
|
62
|
-
decoded = JWT.decode token, 'myAuthToken'
|
63
|
-
queries(decoded['scope']).should == [['outgoing', {'appSid' => 'myAppSid'}]]
|
46
|
+
it 'should throw an argument error if only the account_sid is set' do
|
47
|
+
expect { Twilio::Util::Capability.new 'someSid' }.to raise_error(ArgumentError)
|
48
|
+
end
|
64
49
|
end
|
65
50
|
|
66
|
-
|
67
|
-
|
68
|
-
|
69
|
-
|
70
|
-
params_hash = {'appSid' => 'myAppSid', 'appParams' => app_params}
|
71
|
-
@capability.instance_eval {url_encode(params_hash)}
|
72
|
-
token = @capability.generate
|
73
|
-
decoded = JWT.decode token, 'myAuthToken'
|
74
|
-
queries(decoded['scope']).should == [['outgoing', params_hash]]
|
75
|
-
end
|
51
|
+
describe 'with a capability' do
|
52
|
+
before :each do
|
53
|
+
@capability = Twilio::Util::Capability.new 'myAccountSid', 'myAuthToken'
|
54
|
+
end
|
76
55
|
|
77
|
-
|
78
|
-
|
79
|
-
|
80
|
-
@capability.allow_client_outgoing 'myAppSid'
|
81
|
-
token = @capability.generate
|
82
|
-
decoded = JWT.decode token, 'myAuthToken'
|
83
|
-
queries(decoded['scope']).should == [
|
84
|
-
['incoming', {'clientName' => 'andrew'}],
|
85
|
-
['outgoing', {'clientName' => 'andrew', 'appSid' => 'myAppSid'}]
|
86
|
-
]
|
87
|
-
end
|
56
|
+
def queries(q)
|
57
|
+
q.scan(/scope:client:(incoming|outgoing)\?(\S+)/).map{|(type, query)| [type, Rack::Utils.parse_query(query)]}
|
58
|
+
end
|
88
59
|
|
89
|
-
|
90
|
-
|
91
|
-
|
92
|
-
|
93
|
-
|
94
|
-
|
95
|
-
|
96
|
-
end
|
60
|
+
it 'should return a valid jwt when #generate is called' do
|
61
|
+
token = @capability.generate
|
62
|
+
decoded, header = JWT.decode token, 'myAuthToken'
|
63
|
+
expect(decoded['scope']).not_to be_nil
|
64
|
+
expect(decoded['iss']).not_to be_nil
|
65
|
+
expect(decoded['exp']).not_to be_nil
|
66
|
+
end
|
97
67
|
|
98
|
-
|
99
|
-
|
100
|
-
|
101
|
-
|
102
|
-
|
103
|
-
|
104
|
-
|
105
|
-
|
106
|
-
|
107
|
-
|
108
|
-
|
109
|
-
|
110
|
-
|
111
|
-
|
112
|
-
|
113
|
-
|
114
|
-
|
115
|
-
|
116
|
-
|
68
|
+
it 'should properly set the iss key in the payload' do
|
69
|
+
token = @capability.generate
|
70
|
+
decoded, header = JWT.decode token, 'myAuthToken'
|
71
|
+
expect(decoded['iss']).to eq('myAccountSid')
|
72
|
+
end
|
73
|
+
|
74
|
+
it 'should properly set the exp key based on the default hour ttl' do
|
75
|
+
seconds = Time.now.to_i
|
76
|
+
token = @capability.generate
|
77
|
+
decoded, header = JWT.decode token, 'myAuthToken'
|
78
|
+
expect(decoded['exp']).to eq(seconds + 3600)
|
79
|
+
end
|
80
|
+
|
81
|
+
it 'should properly set the exp key based on the ttl passed to #generate' do
|
82
|
+
ttl = rand 10000
|
83
|
+
seconds = Time.now.to_i
|
84
|
+
token = @capability.generate ttl
|
85
|
+
decoded, header = JWT.decode token, 'myAuthToken'
|
86
|
+
expect(decoded['exp']).to eq(seconds + ttl)
|
87
|
+
end
|
88
|
+
|
89
|
+
it 'should generate a proper incoming client scope string' do
|
90
|
+
@capability.allow_client_incoming 'andrew'
|
91
|
+
token = @capability.generate
|
92
|
+
decoded, header = JWT.decode token, 'myAuthToken'
|
93
|
+
expect(queries(decoded['scope'])).to eq([['incoming', {'clientName' => 'andrew'}]])
|
94
|
+
end
|
95
|
+
|
96
|
+
it 'should generate multiple proper incoming client scope strings' do
|
97
|
+
@capability.allow_client_incoming 'andrew'
|
98
|
+
@capability.allow_client_incoming 'bridget'
|
99
|
+
token = @capability.generate
|
100
|
+
decoded, header = JWT.decode token, 'myAuthToken'
|
101
|
+
expect(queries(decoded['scope'])).to eq([
|
102
|
+
['incoming', {'clientName' => 'andrew'}],
|
103
|
+
['incoming', {'clientName' => 'bridget'}]
|
104
|
+
])
|
105
|
+
end
|
106
|
+
|
107
|
+
it 'should generate a proper outgoing client scope string' do
|
108
|
+
@capability.allow_client_outgoing 'myAppSid'
|
109
|
+
token = @capability.generate
|
110
|
+
decoded, header = JWT.decode token, 'myAuthToken'
|
111
|
+
expect(queries(decoded['scope'])).to eq([['outgoing', {'appSid' => 'myAppSid'}]])
|
112
|
+
end
|
113
|
+
|
114
|
+
it 'should generate a proper outgoing client scope string with parameters' do
|
115
|
+
app_params_hash = {'key' => 'a value', :foo => 'bar/baz'}
|
116
|
+
@capability.allow_client_outgoing 'myAppSid', app_params_hash
|
117
|
+
app_params = @capability.instance_eval {url_encode(app_params_hash)}
|
118
|
+
params_hash = {'appSid' => 'myAppSid', 'appParams' => app_params}
|
119
|
+
@capability.instance_eval {url_encode(params_hash)}
|
120
|
+
token = @capability.generate
|
121
|
+
decoded, header= JWT.decode token, 'myAuthToken'
|
122
|
+
expect(queries(decoded['scope'])).to eq([['outgoing', params_hash]])
|
123
|
+
end
|
124
|
+
|
125
|
+
it 'should generate a proper outgoing client scope string based on the ' +
|
126
|
+
'client name when calling #allow_client_incoming first' do
|
127
|
+
@capability.allow_client_incoming 'andrew'
|
128
|
+
@capability.allow_client_outgoing 'myAppSid'
|
129
|
+
token = @capability.generate
|
130
|
+
decoded, header = JWT.decode token, 'myAuthToken'
|
131
|
+
expect(queries(decoded['scope'])).to eq([
|
132
|
+
['incoming', {'clientName' => 'andrew'}],
|
133
|
+
['outgoing', {'clientName' => 'andrew', 'appSid' => 'myAppSid'}]
|
134
|
+
])
|
135
|
+
end
|
136
|
+
|
137
|
+
it 'should generate a proper outgoing client scope string based on the ' +
|
138
|
+
'client name when calling #allow_client_incoming second' do
|
139
|
+
@capability.allow_client_outgoing 'myAppSid'
|
140
|
+
@capability.allow_client_incoming 'andrew'
|
141
|
+
token = @capability.generate
|
142
|
+
decoded, header = JWT.decode token, 'myAuthToken'
|
143
|
+
expect(queries(decoded['scope'])).to eq([["incoming", {"clientName"=>"andrew"}], ["outgoing", {"clientName"=>"andrew", "appSid"=>"myAppSid"}]])
|
144
|
+
end
|
145
|
+
|
146
|
+
it 'should generate a proper outgoing client scope string with parameters ' +
|
147
|
+
'and a client name when calling #allow_client_incoming first' do
|
148
|
+
@capability.allow_client_incoming 'andrew'
|
149
|
+
app_params_hash = {'key' => 'a value', :foo => 'bar/baz'}
|
150
|
+
@capability.allow_client_outgoing 'myAppSid', app_params_hash
|
151
|
+
app_params = @capability.instance_eval {url_encode(app_params_hash)}
|
152
|
+
params_hash = {'appSid' => 'myAppSid', 'appParams' => app_params, 'clientName' => 'andrew'}
|
153
|
+
@capability.instance_eval {url_encode(params_hash)}
|
154
|
+
token = @capability.generate
|
155
|
+
decoded, header = JWT.decode token, 'myAuthToken'
|
156
|
+
scopes = queries(decoded['scope'])
|
157
|
+
expect(scopes.shift).to eq(["incoming", {"clientName"=>"andrew"}])
|
158
|
+
scope = scopes.shift
|
159
|
+
expect(scope.first).to eq('outgoing')
|
160
|
+
expect(Rack::Utils.parse_query(scope.last['appParams'])).to eq({'key' => 'a value', 'foo' => 'bar/baz'})
|
161
|
+
expect(scope.last["clientName"]).to eq("andrew")
|
162
|
+
expect(scope.last["appSid"]).to eq("myAppSid")
|
163
|
+
expect(scopes).to be_empty
|
164
|
+
end
|
117
165
|
|
118
|
-
|
119
|
-
|
120
|
-
|
121
|
-
|
122
|
-
|
123
|
-
|
124
|
-
|
125
|
-
|
126
|
-
|
127
|
-
|
128
|
-
|
129
|
-
|
130
|
-
|
131
|
-
|
132
|
-
|
133
|
-
|
134
|
-
|
135
|
-
|
166
|
+
it 'should generate a proper outgoing client scope string with parameters ' +
|
167
|
+
'and a client name when calling #allow_client_incoming second' do
|
168
|
+
app_params_hash = {'key' => 'a value', :foo => 'bar/baz'}
|
169
|
+
@capability.allow_client_outgoing 'myAppSid', app_params_hash
|
170
|
+
@capability.allow_client_incoming 'andrew'
|
171
|
+
app_params = @capability.instance_eval {url_encode(app_params_hash)}
|
172
|
+
params_hash = {'appSid' => 'myAppSid', 'appParams' => app_params, 'clientName' => 'andrew'}
|
173
|
+
@capability.instance_eval {url_encode(params_hash)}
|
174
|
+
token = @capability.generate
|
175
|
+
decoded, header = JWT.decode token, 'myAuthToken'
|
176
|
+
scopes = queries(decoded['scope'])
|
177
|
+
expect(scopes.shift).to eq(["incoming", {"clientName"=>"andrew"}])
|
178
|
+
scope = scopes.shift
|
179
|
+
expect(scope.first).to eq('outgoing')
|
180
|
+
expect(Rack::Utils.parse_query(scope.last['appParams'])).to eq({'key' => 'a value', 'foo' => 'bar/baz'})
|
181
|
+
expect(scope.last["clientName"]).to eq("andrew")
|
182
|
+
expect(scope.last["appSid"]).to eq("myAppSid")
|
183
|
+
expect(scopes).to be_empty
|
184
|
+
end
|
136
185
|
end
|
137
186
|
end
|
@@ -0,0 +1,13 @@
|
|
1
|
+
describe Twilio::Util::Configuration do
|
2
|
+
it 'should have an account sid attribute' do
|
3
|
+
config = Twilio::Util::Configuration.new
|
4
|
+
config.account_sid = 'someSid'
|
5
|
+
expect(config.account_sid).to eq('someSid')
|
6
|
+
end
|
7
|
+
|
8
|
+
it 'should have an auth token attribute' do
|
9
|
+
config = Twilio::Util::Configuration.new
|
10
|
+
config.auth_token = 'someToken'
|
11
|
+
expect(config.auth_token).to eq('someToken')
|
12
|
+
end
|
13
|
+
end
|
@@ -1,6 +1,34 @@
|
|
1
1
|
require 'spec_helper'
|
2
2
|
|
3
3
|
describe Twilio::Util::RequestValidator do
|
4
|
+
describe 'configuration' do
|
5
|
+
after(:each) do
|
6
|
+
Twilio.instance_variable_set('@configuration', nil)
|
7
|
+
end
|
8
|
+
|
9
|
+
it 'should set the auth token from a configuration block' do
|
10
|
+
Twilio.configure do |config|
|
11
|
+
config.auth_token = 'someToken'
|
12
|
+
end
|
13
|
+
|
14
|
+
validator = Twilio::Util::RequestValidator.new
|
15
|
+
expect(validator.instance_variable_get('@auth_token')).to eq('someToken')
|
16
|
+
end
|
17
|
+
|
18
|
+
it 'should overwrite the auth token if passed to initializer' do
|
19
|
+
Twilio.configure do |config|
|
20
|
+
config.auth_token = 'someToken'
|
21
|
+
end
|
22
|
+
|
23
|
+
validator = Twilio::Util::RequestValidator.new 'otherToken'
|
24
|
+
expect(validator.instance_variable_get('@auth_token')).to eq('otherToken')
|
25
|
+
end
|
26
|
+
|
27
|
+
it 'should throw an argument error if the auth token isn\'t set' do
|
28
|
+
expect { Twilio::Util::RequestValidator.new }.to raise_error(ArgumentError)
|
29
|
+
end
|
30
|
+
end
|
31
|
+
|
4
32
|
it 'should properly validate a Twilio Voice request' do
|
5
33
|
token = '2bd9e9638872de601313dc77410d3b23'
|
6
34
|
validator = Twilio::Util::RequestValidator.new token
|
@@ -34,7 +62,7 @@ describe Twilio::Util::RequestValidator do
|
|
34
62
|
'ApplicationSid' => 'AP44efecad51364e80b133bb7c07eb8204'
|
35
63
|
}
|
36
64
|
signature = 'oVb2kXoVy8GEfwBDjR8bk/ZZ6eA='
|
37
|
-
validator.validate(url, params, signature).
|
65
|
+
expect(validator.validate(url, params, signature)).to eq(true)
|
38
66
|
end
|
39
67
|
|
40
68
|
it 'should properly validate a Twilio SMS request' do
|
@@ -60,6 +88,6 @@ describe Twilio::Util::RequestValidator do
|
|
60
88
|
'SmsSid' => 'SM2003cbd5e6a3701999aa3e5f20ff2787'
|
61
89
|
}
|
62
90
|
signature = 'mxeiv65lEe0b8L6LdVw2jgJi8yw='
|
63
|
-
validator.validate(url, params, signature).
|
91
|
+
expect(validator.validate(url, params, signature)).to eq(true)
|
64
92
|
end
|
65
|
-
end
|
93
|
+
end
|
data/twilio-ruby.gemspec
CHANGED
@@ -1,33 +1,34 @@
|
|
1
|
-
|
1
|
+
# coding: utf-8
|
2
|
+
lib = File.expand_path('../lib', __FILE__)
|
3
|
+
$LOAD_PATH.unshift(lib) unless $LOAD_PATH.include?(lib)
|
4
|
+
require 'twilio-ruby/version'
|
2
5
|
|
3
|
-
Gem::Specification.new do |
|
4
|
-
|
5
|
-
|
6
|
-
|
7
|
-
|
6
|
+
Gem::Specification.new do |spec|
|
7
|
+
spec.name = 'twilio-ruby'
|
8
|
+
spec.version = Twilio::VERSION
|
9
|
+
spec.authors = ['Andrew Benton']
|
10
|
+
spec.email = ['andrew@twilio.com']
|
11
|
+
spec.summary = 'A simple library for communicating with the Twilio REST API, building TwiML, and generating Twilio Client Capability Tokens'
|
12
|
+
spec.description = 'A simple library for communicating with the Twilio REST API, building TwiML, and generating Twilio Client Capability Tokens'
|
13
|
+
spec.homepage = 'http://github.com/twilio/twilio-ruby'
|
14
|
+
spec.license = 'MIT'
|
8
15
|
|
9
|
-
|
10
|
-
|
11
|
-
|
12
|
-
|
16
|
+
spec.files = `git ls-files -z`.split("\x0")
|
17
|
+
spec.executables = spec.files.grep(%r{^bin/}) { |f| File.basename(f) }
|
18
|
+
spec.test_files = spec.files.grep(%r{^(test|spec|features)/})
|
19
|
+
spec.require_paths = ['lib']
|
20
|
+
spec.required_ruby_version = '>= 1.8.7'
|
21
|
+
spec.extra_rdoc_files = ['README.md', 'LICENSE.md']
|
22
|
+
spec.rdoc_options = ['--line-numbers', '--inline-source', '--title', 'twilio-ruby', '--main', 'README.md']
|
13
23
|
|
14
|
-
|
15
|
-
|
16
|
-
|
17
|
-
|
18
|
-
|
19
|
-
s.add_dependency('multi_json', '>= 1.3.0')
|
20
|
-
s.add_dependency('builder', '>= 2.1.2')
|
21
|
-
s.add_dependency('jwt', '>= 0.1.2')
|
22
|
-
s.add_dependency('jruby-openssl') if RUBY_PLATFORM == 'java'
|
24
|
+
spec.add_dependency('multi_json', '>= 1.3.0')
|
25
|
+
spec.add_dependency('builder', '>= 2.1.2')
|
26
|
+
spec.add_dependency('jwt', '~> 1.0.0')
|
27
|
+
spec.add_dependency('jruby-openssl') if RUBY_PLATFORM == 'java'
|
23
28
|
# Workaround for RBX <= 2.2.1, should be fixed in next version
|
24
|
-
|
25
|
-
|
26
|
-
s.add_development_dependency 'rake', '~> 0.9.0'
|
27
|
-
s.add_development_dependency 'rspec', '~> 2.6.0'
|
28
|
-
s.add_development_dependency 'fakeweb', '~> 1.3.0'
|
29
|
-
s.add_development_dependency 'rack', '~> 1.3.0'
|
29
|
+
spec.add_dependency('rubysl') if defined?(RUBY_ENGINE) && RUBY_ENGINE == 'rbx'
|
30
30
|
|
31
|
-
|
32
|
-
|
31
|
+
spec.add_development_dependency 'bundler', '~> 1.5'
|
32
|
+
spec.extra_rdoc_files = ['README.md', 'LICENSE.md']
|
33
|
+
spec.rdoc_options = ['--line-numbers', '--inline-source', '--title', 'twilio-ruby', '--main', 'README.md']
|
33
34
|
end
|