Configuration Management - 7.x-1.x

Test status
StatusResult
Last receivedMon, 08/06/2012 - 14:41:58
Last requestedMon, 08/06/2012 - 14:42:02
Last testedMon, 08/06/2012 - 14:43:49
Test count52
Environment status
MySQLpass
Code reviewfail
Overall Resultpass
Branch information
Identifier7.x-1.x
ProjectConfiguration Management
LinkProject information
SummaryPASSED: [[Coder]]: [Code review] 21 minor(s), 29 critical(s), and 20 normal(s); [[SimpleTest]]: [MySQL] 604 pass(es).
Details

MySQL

  1. Setup environment
  2. Detect an invalid patch URL
  3. Detect invalid repository information
  4. Detect invalid patch format
  5. Detect a non-applicable patch
  6. Detect invalid PHP syntax
  7. Detect a Drupal installation failure
  8. Detect a test run failure
  9. Detect a failing test
  10. Complete test suite with all tests passing
604 pass(es), 0 fail(s), and 0 exception(s)
Test namePassFailException
LeafActive store overridden test (ConfigurationActiveStoreOverriddenTest) [Configuration]20800
LeafTest tracking interface (ConfigurationTrackingTest) [Configuration]5900
LeafTest User Interface (ConfigurationUITest) [Configuration]33700

Code review

  1. Setup environment
  2. Detect an invalid patch URL
  3. Detect invalid repository information
  4. Detect invalid patch format
  5. Detect a non-applicable patch
  6. Detect invalid PHP syntax
  7. Detect a review run failure
  8. Detect coder flags
    Ensure that your code follows the Drupal standard and passes a coder review.
  9. Complete coder review with all passed
21 minor(s), 29 critical(s), and 20 normal(s)

Non-pass

Test nameMinorCriticalNormal
Expandconfiguration.admin.inc122
MessageGroupFilenameLineFunctionStatus
@file block missing (Drupal Docs)Otherconfiguration.admin.inc-1N/A
Potential problem: drupal_set_message() only accepts filtered text, be sure all !placeholders for $variables in t() are fully sanitized using check_plain(), filter_xss() or similar. (Drupal Docs)Otherconfiguration.admin.inc165N/A
table names should be enclosed in {curly_brackets}Otherconfiguration.admin.inc424N/A
The $message argument to drupal_set_message() should be enclosed within t() so that it is translatable.Otherconfiguration.admin.inc543N/A
Use an indent of 2 spaces, with no tabsOtherconfiguration.admin.inc804N/A
Expandconfiguration.export.inc421
MessageGroupFilenameLineFunctionStatus
@file block missing (Drupal Docs)Otherconfiguration.export.inc-1N/A
Potential problem: drupal_set_message() only accepts filtered text, be sure all !placeholders for $variables in t() are fully sanitized using check_plain(), filter_xss() or similar. (Drupal Docs)Otherconfiguration.export.inc225N/A
in most cases, replace the string function with the drupal_ equivalent string functionsOtherconfiguration.export.inc317N/A
in most cases, replace the string function with the drupal_ equivalent string functionsOtherconfiguration.export.inc324N/A
in most cases, replace the string function with the drupal_ equivalent string functionsOtherconfiguration.export.inc330N/A
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfiguration.export.inc507N/A
@see references should be separated by "," followed by a single space and with no trailing punctuationOtherconfiguration.export.inc854N/A
Expandconfiguration.install001
MessageGroupFilenameLineFunctionStatus
@file block missing (Drupal Docs)Otherconfiguration.install-1N/A
Expandconfiguration.module040
MessageGroupFilenameLineFunctionStatus
Potential problem: drupal_set_message() only accepts filtered text, be sure all !placeholders for $variables in t() are fully sanitized using check_plain(), filter_xss() or similar. (Drupal Docs)Otherconfiguration.module260N/A
Potential problem: drupal_set_message() only accepts filtered text, be sure all !placeholders for $variables in t() are fully sanitized using check_plain(), filter_xss() or similar. (Drupal Docs)Otherconfiguration.module263N/A
Potential problem: drupal_set_message() only accepts filtered text, be sure all !placeholders for $variables in t() are fully sanitized using check_plain(), filter_xss() or similar. (Drupal Docs)Otherconfiguration.module266N/A
Potential problem: drupal_set_message() only accepts filtered text, be sure to use check_plain(), filter_xss() or similar to ensure your $variable is fully sanitized.Otherconfiguration.module1073N/A
Expandincludes/configuration.block.inc101
MessageGroupFilenameLineFunctionStatus
@file block missing (Drupal Docs)Otherconfiguration.block.inc-1N/A
in most cases, replace the string function with the drupal_ equivalent string functionsOtherconfiguration.block.inc24N/A
Expandincludes/configuration.context.inc001
MessageGroupFilenameLineFunctionStatus
@file block missing (Drupal Docs)Otherconfiguration.context.inc-1N/A
Expandincludes/configuration.ctools.inc1133
MessageGroupFilenameLineFunctionStatus
@file block missing (Drupal Docs)Otherconfiguration.ctools.inc-1N/A
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfiguration.ctools.inc30N/A
The control statement should be on a separate line from the control conditionalOtherconfiguration.ctools.inc86N/A
string concatenation should be formatted with a space separating the operators (dot .) and non-quote termsOtherconfiguration.ctools.inc109N/A
Use an indent of 2 spaces, with no tabsOtherconfiguration.ctools.inc110N/A
Format should be * Implementation of hook_foo().Otherconfiguration.ctools.inc120N/A
'Implementation' should be at the start of the sentence and begin with a capitialized letterOtherconfiguration.ctools.inc120N/A
Format should be * Implementation of hook_foo().Otherconfiguration.ctools.inc140N/A
'Implementation' should be at the start of the sentence and begin with a capitialized letterOtherconfiguration.ctools.inc140N/A
Format should be * Implementation of hook_foo().Otherconfiguration.ctools.inc168N/A
'Implementation' should be at the start of the sentence and begin with a capitialized letterOtherconfiguration.ctools.inc168N/A
Format should be * Implementation of hook_foo().Otherconfiguration.ctools.inc197N/A
'Implementation' should be at the start of the sentence and begin with a capitialized letterOtherconfiguration.ctools.inc197N/A
in most cases, replace the string function with the drupal_ equivalent string functionsOtherconfiguration.ctools.inc369N/A
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfiguration.ctools.inc390N/A
in most cases, replace the string function with the drupal_ equivalent string functionsOtherconfiguration.ctools.inc426N/A
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfiguration.ctools.inc430N/A
Expandincludes/configuration.features.inc001
MessageGroupFilenameLineFunctionStatus
@file block missing (Drupal Docs)Otherconfiguration.features.inc-1N/A
Expandincludes/configuration.field.inc121
MessageGroupFilenameLineFunctionStatus
@file block missing (Drupal Docs)Otherconfiguration.field.inc-1N/A
Format should be * Implementation of hook_foo().Otherconfiguration.field.inc164N/A
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfiguration.field.inc231N/A
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfiguration.field.inc253N/A
Expandincludes/configuration.filter.inc021
MessageGroupFilenameLineFunctionStatus
@file block missing (Drupal Docs)Otherconfiguration.filter.inc-1N/A
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfiguration.filter.inc143N/A
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfiguration.filter.inc165N/A
Expandincludes/configuration.image.inc021
MessageGroupFilenameLineFunctionStatus
@file block missing (Drupal Docs)Otherconfiguration.image.inc-1N/A
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfiguration.image.inc125N/A
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfiguration.image.inc148N/A
Expandincludes/configuration.menu.inc042
MessageGroupFilenameLineFunctionStatus
@file block missing (Drupal Docs)Otherconfiguration.menu.inc-1N/A
global variables should start with a single underscore followed by the module and another underscoreOtherconfiguration.menu.inc134N/A
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfiguration.menu.inc331N/A
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfiguration.menu.inc353N/A
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfiguration.menu.inc372N/A
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfiguration.menu.inc433N/A
Expandincludes/configuration.node.inc021
MessageGroupFilenameLineFunctionStatus
@file block missing (Drupal Docs)Otherconfiguration.node.inc-1N/A
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfiguration.node.inc222N/A
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfiguration.node.inc245N/A
Expandincludes/configuration.taxonomy.inc221
MessageGroupFilenameLineFunctionStatus
@file block missing (Drupal Docs)Otherconfiguration.taxonomy.inc-1N/A
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfiguration.taxonomy.inc122N/A
in most cases, replace the string function with the drupal_ equivalent string functionsOtherconfiguration.taxonomy.inc122N/A
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfiguration.taxonomy.inc144N/A
in most cases, replace the string function with the drupal_ equivalent string functionsOtherconfiguration.taxonomy.inc144N/A
Expandincludes/configuration.user.inc041
MessageGroupFilenameLineFunctionStatus
@file block missing (Drupal Docs)Otherconfiguration.user.inc-1N/A
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfiguration.user.inc298N/A
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfiguration.user.inc327N/A
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfiguration.user.inc357N/A
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfiguration.user.inc429N/A
Expandincludes/diff.engine.inc001
MessageGroupFilenameLineFunctionStatus
@file block missing (Drupal Docs)Otherdiff.engine.inc-1N/A
Expandtheme/theme.inc001
MessageGroupFilenameLineFunctionStatus
@file block missing (Drupal Docs)Othertheme.inc-1N/A

All

Test nameMinorCriticalNormal
Expandconfiguration.admin.inc122
MessageGroupFilenameLineFunctionStatus
@file block missing (Drupal Docs)Otherconfiguration.admin.inc-1N/A
Potential problem: drupal_set_message() only accepts filtered text, be sure all !placeholders for $variables in t() are fully sanitized using check_plain(), filter_xss() or similar. (Drupal Docs)Otherconfiguration.admin.inc165N/A
table names should be enclosed in {curly_brackets}Otherconfiguration.admin.inc424N/A
The $message argument to drupal_set_message() should be enclosed within t() so that it is translatable.Otherconfiguration.admin.inc543N/A
Use an indent of 2 spaces, with no tabsOtherconfiguration.admin.inc804N/A
Expandconfiguration.export.inc421
MessageGroupFilenameLineFunctionStatus
@file block missing (Drupal Docs)Otherconfiguration.export.inc-1N/A
Potential problem: drupal_set_message() only accepts filtered text, be sure all !placeholders for $variables in t() are fully sanitized using check_plain(), filter_xss() or similar. (Drupal Docs)Otherconfiguration.export.inc225N/A
in most cases, replace the string function with the drupal_ equivalent string functionsOtherconfiguration.export.inc317N/A
in most cases, replace the string function with the drupal_ equivalent string functionsOtherconfiguration.export.inc324N/A
in most cases, replace the string function with the drupal_ equivalent string functionsOtherconfiguration.export.inc330N/A
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfiguration.export.inc507N/A
@see references should be separated by "," followed by a single space and with no trailing punctuationOtherconfiguration.export.inc854N/A
Expandconfiguration.install001
MessageGroupFilenameLineFunctionStatus
@file block missing (Drupal Docs)Otherconfiguration.install-1N/A
Expandconfiguration.module040
MessageGroupFilenameLineFunctionStatus
Potential problem: drupal_set_message() only accepts filtered text, be sure all !placeholders for $variables in t() are fully sanitized using check_plain(), filter_xss() or similar. (Drupal Docs)Otherconfiguration.module260N/A
Potential problem: drupal_set_message() only accepts filtered text, be sure all !placeholders for $variables in t() are fully sanitized using check_plain(), filter_xss() or similar. (Drupal Docs)Otherconfiguration.module263N/A
Potential problem: drupal_set_message() only accepts filtered text, be sure all !placeholders for $variables in t() are fully sanitized using check_plain(), filter_xss() or similar. (Drupal Docs)Otherconfiguration.module266N/A
Potential problem: drupal_set_message() only accepts filtered text, be sure to use check_plain(), filter_xss() or similar to ensure your $variable is fully sanitized.Otherconfiguration.module1073N/A
Leafconfiguration_stream.inc000
Expandincludes/configuration.block.inc101
MessageGroupFilenameLineFunctionStatus
@file block missing (Drupal Docs)Otherconfiguration.block.inc-1N/A
in most cases, replace the string function with the drupal_ equivalent string functionsOtherconfiguration.block.inc24N/A
Expandincludes/configuration.context.inc001
MessageGroupFilenameLineFunctionStatus
@file block missing (Drupal Docs)Otherconfiguration.context.inc-1N/A
Expandincludes/configuration.ctools.inc1133
MessageGroupFilenameLineFunctionStatus
@file block missing (Drupal Docs)Otherconfiguration.ctools.inc-1N/A
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfiguration.ctools.inc30N/A
The control statement should be on a separate line from the control conditionalOtherconfiguration.ctools.inc86N/A
string concatenation should be formatted with a space separating the operators (dot .) and non-quote termsOtherconfiguration.ctools.inc109N/A
Use an indent of 2 spaces, with no tabsOtherconfiguration.ctools.inc110N/A
Format should be * Implementation of hook_foo().Otherconfiguration.ctools.inc120N/A
'Implementation' should be at the start of the sentence and begin with a capitialized letterOtherconfiguration.ctools.inc120N/A
Format should be * Implementation of hook_foo().Otherconfiguration.ctools.inc140N/A
'Implementation' should be at the start of the sentence and begin with a capitialized letterOtherconfiguration.ctools.inc140N/A
Format should be * Implementation of hook_foo().Otherconfiguration.ctools.inc168N/A
'Implementation' should be at the start of the sentence and begin with a capitialized letterOtherconfiguration.ctools.inc168N/A
Format should be * Implementation of hook_foo().Otherconfiguration.ctools.inc197N/A
'Implementation' should be at the start of the sentence and begin with a capitialized letterOtherconfiguration.ctools.inc197N/A
in most cases, replace the string function with the drupal_ equivalent string functionsOtherconfiguration.ctools.inc369N/A
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfiguration.ctools.inc390N/A
in most cases, replace the string function with the drupal_ equivalent string functionsOtherconfiguration.ctools.inc426N/A
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfiguration.ctools.inc430N/A
Expandincludes/configuration.features.inc001
MessageGroupFilenameLineFunctionStatus
@file block missing (Drupal Docs)Otherconfiguration.features.inc-1N/A
Expandincludes/configuration.field.inc121
MessageGroupFilenameLineFunctionStatus
@file block missing (Drupal Docs)Otherconfiguration.field.inc-1N/A
Format should be * Implementation of hook_foo().Otherconfiguration.field.inc164N/A
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfiguration.field.inc231N/A
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfiguration.field.inc253N/A
Expandincludes/configuration.filter.inc021
MessageGroupFilenameLineFunctionStatus
@file block missing (Drupal Docs)Otherconfiguration.filter.inc-1N/A
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfiguration.filter.inc143N/A
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfiguration.filter.inc165N/A
Expandincludes/configuration.image.inc021
MessageGroupFilenameLineFunctionStatus
@file block missing (Drupal Docs)Otherconfiguration.image.inc-1N/A
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfiguration.image.inc125N/A
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfiguration.image.inc148N/A
Expandincludes/configuration.menu.inc042
MessageGroupFilenameLineFunctionStatus
@file block missing (Drupal Docs)Otherconfiguration.menu.inc-1N/A
global variables should start with a single underscore followed by the module and another underscoreOtherconfiguration.menu.inc134N/A
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfiguration.menu.inc331N/A
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfiguration.menu.inc353N/A
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfiguration.menu.inc372N/A
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfiguration.menu.inc433N/A
Expandincludes/configuration.node.inc021
MessageGroupFilenameLineFunctionStatus
@file block missing (Drupal Docs)Otherconfiguration.node.inc-1N/A
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfiguration.node.inc222N/A
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfiguration.node.inc245N/A
Expandincludes/configuration.taxonomy.inc221
MessageGroupFilenameLineFunctionStatus
@file block missing (Drupal Docs)Otherconfiguration.taxonomy.inc-1N/A
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfiguration.taxonomy.inc122N/A
in most cases, replace the string function with the drupal_ equivalent string functionsOtherconfiguration.taxonomy.inc122N/A
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfiguration.taxonomy.inc144N/A
in most cases, replace the string function with the drupal_ equivalent string functionsOtherconfiguration.taxonomy.inc144N/A
Expandincludes/configuration.user.inc041
MessageGroupFilenameLineFunctionStatus
@file block missing (Drupal Docs)Otherconfiguration.user.inc-1N/A
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfiguration.user.inc298N/A
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfiguration.user.inc327N/A
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfiguration.user.inc357N/A
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfiguration.user.inc429N/A
Expandincludes/diff.engine.inc001
MessageGroupFilenameLineFunctionStatus
@file block missing (Drupal Docs)Otherdiff.engine.inc-1N/A
Leafobservers/observer.field.inc000
Leafobservers/observer.filter.inc000
Leafobservers/observer.image.inc000
Leafobservers/observer.menu.inc000
Leafobservers/observer.node.inc000
Leafobservers/observer.taxonomy.inc000
Expandobservers/observer.user.inc100
MessageGroupFilenameLineFunctionStatus
put a space between the asterisk and the comment textOtherobserver.user.inc23N/A
Leaftests/configuration.contrib.test000
Leaftests/configuration.ctools.test000
Leaftests/configuration.test000
Leaftests/configuration_test.module000
Expandtheme/theme.inc001
MessageGroupFilenameLineFunctionStatus
@file block missing (Drupal Docs)Othertheme.inc-1N/A