UC Estcard - 6.x-1.x

Test status
StatusResult
Last receivedTue, 05/08/2012 - 08:48:47
Last requestedTue, 05/08/2012 - 08:49:03
Last testedTue, 05/08/2012 - 08:49:30
Test count2
Environment status
MySQLpass
Code reviewpass
Overall Resultpass
Branch information
Identifier6.x-1.x
ProjectUC Estcard
LinkProject information
SummaryPASSED: [[Coder]]: [Code review] 30 minor(s); [[SimpleTest]]: [MySQL] 0 pass(es).
Details

MySQL

  1. Setup environment
  2. Detect an invalid patch URL
  3. Detect invalid repository information
  4. Detect invalid patch format
  5. Detect a non-applicable patch
  6. Detect invalid PHP syntax
  7. Detect a Drupal installation failure
  8. Detect a test run failure
  9. Detect a failing test
  10. Complete test suite with all tests passing

Code review

  1. Setup environment
  2. Detect an invalid patch URL
  3. Detect invalid repository information
  4. Detect invalid patch format
  5. Detect a non-applicable patch
  6. Detect invalid PHP syntax
  7. Detect a review run failure
  8. Detect coder flags
  9. Complete coder review with all passed
30 minor(s), 0 critical(s), and 0 normal(s)
Test nameMinorCriticalNormal
Expanduc_estcard.install500
MessageGroupFilenameLineFunctionStatus
Use an indent of 2 spaces, with no tabsOtheruc_estcard.install11N/A
Use an indent of 2 spaces, with no tabsOtheruc_estcard.install12N/A
Use an indent of 2 spaces, with no tabsOtheruc_estcard.install13N/A
Use an indent of 2 spaces, with no tabsOtheruc_estcard.install14N/A
Use an indent of 2 spaces, with no tabsOtheruc_estcard.install15N/A
Expanduc_estcard.module2500
MessageGroupFilenameLineFunctionStatus
Use an indent of 2 spaces, with no tabsOtheruc_estcard.module97N/A
Use an indent of 2 spaces, with no tabsOtheruc_estcard.module116N/A
Use an indent of 2 spaces, with no tabsOtheruc_estcard.module117N/A
Use an indent of 2 spaces, with no tabsOtheruc_estcard.module118N/A
Use an indent of 2 spaces, with no tabsOtheruc_estcard.module119N/A
Use an indent of 2 spaces, with no tabsOtheruc_estcard.module120N/A
Potential problem: use the Form API to prevent against CSRF attacks. If you need to use $_POST variables, ensure they are fully sanitized if displayed by using check_plain(), filter_xss() or similar. (Drupal Docs)Otheruc_estcard.module149N/A
Potential problem: use the Form API to prevent against CSRF attacks. If you need to use $_POST variables, ensure they are fully sanitized if displayed by using check_plain(), filter_xss() or similar. (Drupal Docs)Otheruc_estcard.module150N/A
Potential problem: use the Form API to prevent against CSRF attacks. If you need to use $_POST variables, ensure they are fully sanitized if displayed by using check_plain(), filter_xss() or similar. (Drupal Docs)Otheruc_estcard.module151N/A
Potential problem: use the Form API to prevent against CSRF attacks. If you need to use $_POST variables, ensure they are fully sanitized if displayed by using check_plain(), filter_xss() or similar. (Drupal Docs)Otheruc_estcard.module152N/A
Potential problem: use the Form API to prevent against CSRF attacks. If you need to use $_POST variables, ensure they are fully sanitized if displayed by using check_plain(), filter_xss() or similar. (Drupal Docs)Otheruc_estcard.module153N/A
Potential problem: use the Form API to prevent against CSRF attacks. If you need to use $_POST variables, ensure they are fully sanitized if displayed by using check_plain(), filter_xss() or similar. (Drupal Docs)Otheruc_estcard.module154N/A
Potential problem: use the Form API to prevent against CSRF attacks. If you need to use $_POST variables, ensure they are fully sanitized if displayed by using check_plain(), filter_xss() or similar. (Drupal Docs)Otheruc_estcard.module155N/A
Potential problem: use the Form API to prevent against CSRF attacks. If you need to use $_POST variables, ensure they are fully sanitized if displayed by using check_plain(), filter_xss() or similar. (Drupal Docs)Otheruc_estcard.module156N/A
Potential problem: use the Form API to prevent against CSRF attacks. If you need to use $_POST variables, ensure they are fully sanitized if displayed by using check_plain(), filter_xss() or similar. (Drupal Docs)Otheruc_estcard.module157N/A
Potential problem: use the Form API to prevent against CSRF attacks. If you need to use $_POST variables, ensure they are fully sanitized if displayed by using check_plain(), filter_xss() or similar. (Drupal Docs)Otheruc_estcard.module158N/A
in most cases, replace the string function with the drupal_ equivalent string functionsOtheruc_estcard.module161N/A
Potential problem: use the Form API to prevent against CSRF attacks. If you need to use $_POST variables, ensure they are fully sanitized if displayed by using check_plain(), filter_xss() or similar. (Drupal Docs)Otheruc_estcard.module161N/A
in most cases, replace the string function with the drupal_ equivalent string functionsOtheruc_estcard.module162N/A
Potential problem: use the Form API to prevent against CSRF attacks. If you need to use $_POST variables, ensure they are fully sanitized if displayed by using check_plain(), filter_xss() or similar. (Drupal Docs)Otheruc_estcard.module162N/A
Use an indent of 2 spaces, with no tabsOtheruc_estcard.module166N/A
Potential problem: use the Form API to prevent against CSRF attacks. If you need to use $_POST variables, ensure they are fully sanitized if displayed by using check_plain(), filter_xss() or similar. (Drupal Docs)Otheruc_estcard.module166N/A
Use an indent of 2 spaces, with no tabsOtheruc_estcard.module167N/A
Use an indent of 2 spaces, with no tabsOtheruc_estcard.module168N/A
Use an indent of 2 spaces, with no tabsOtheruc_estcard.module169N/A