Controller - 6.x-2.0-alpha1

Test status
StatusResult
Last receivedMon, 04/16/2012 - 05:18:30
Last requestedMon, 04/16/2012 - 05:19:03
Last testedMon, 04/16/2012 - 05:19:17
Test count2
Environment status
MySQLpass
Code reviewfail
Overall Resultpass
Branch information
Identifier6.x-2.0-alpha1
ProjectController
LinkProject information
SummaryPASSED: [[Coder]]: [Code review] 0 minor(s), 1 critical(s), and 0 normal(s); [[SimpleTest]]: [MySQL] 2 pass(es).
Details

MySQL

  1. Setup environment
  2. Detect an invalid patch URL
  3. Detect invalid repository information
  4. Detect invalid patch format
  5. Detect a non-applicable patch
  6. Detect invalid PHP syntax
  7. Detect a Drupal installation failure
  8. Detect a test run failure
  9. Detect a failing test
  10. Complete test suite with all tests passing
2 pass(es), 0 fail(s), and 0 exception(s)
Test namePassFailException
LeafControllerMenuItemsCollectorTestCase100
LeafControllerMenuItemsNormalizerTestCase100

Code review

  1. Setup environment
  2. Detect an invalid patch URL
  3. Detect invalid repository information
  4. Detect invalid patch format
  5. Detect a non-applicable patch
  6. Detect invalid PHP syntax
  7. Detect a review run failure
  8. Detect coder flags
    Ensure that your code follows the Drupal standard and passes a coder review.
  9. Complete coder review with all passed
0 minor(s), 1 critical(s), and 0 normal(s)

Non-pass

Test nameMinorCriticalNormal
Expandservices/MenuItemsCollector.php010
MessageGroupFilenameLineFunctionStatus
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)OtherMenuItemsCollector.php139N/A

All

Test nameMinorCriticalNormal
Leafcontroller.api.php000
Leafcontroller.module000
Leafcontrollers/SettingsController.php000
Leafforms/export_form.inc000
Leafforms/settings_form.inc000
Leafservices/CodeFormatter.php000
Expandservices/MenuItemsCollector.php010
MessageGroupFilenameLineFunctionStatus
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)OtherMenuItemsCollector.php139N/A
Leafservices/MenuItemsManager.php000
Leafservices/MenuItemsNormalizer.php000
Leafservices/NamingService.php000
Leaftests/controller.test000
Leaftests/_files/MyTestController.php000