Configuration builder - 7.x-1.0-beta2

Test status
StatusResult
Last receivedTue, 07/17/2012 - 00:18:15
Last requestedTue, 07/17/2012 - 00:19:12
Last testedTue, 07/17/2012 - 00:20:11
Test count2
Environment status
MySQLpass
Code reviewfail
Overall Resultpass
Branch information
Identifier7.x-1.0-beta2
ProjectConfiguration builder
LinkProject information
SummaryPASSED: [[Coder]]: [Code review] 0 minor(s), 4 critical(s), and 1 normal(s); [[SimpleTest]]: [MySQL] 0 pass(es).
Details

MySQL

  1. Setup environment
  2. Detect an invalid patch URL
  3. Detect invalid repository information
  4. Detect invalid patch format
  5. Detect a non-applicable patch
  6. Detect invalid PHP syntax
  7. Detect a Drupal installation failure
  8. Detect a test run failure
  9. Detect a failing test
  10. Complete test suite with all tests passing

Code review

  1. Setup environment
  2. Detect an invalid patch URL
  3. Detect invalid repository information
  4. Detect invalid patch format
  5. Detect a non-applicable patch
  6. Detect invalid PHP syntax
  7. Detect a review run failure
  8. Detect coder flags
    Ensure that your code follows the Drupal standard and passes a coder review.
  9. Complete coder review with all passed
0 minor(s), 4 critical(s), and 1 normal(s)

Non-pass

Test nameMinorCriticalNormal
Expandconfig_builder.module020
MessageGroupFilenameLineFunctionStatus
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfig_builder.module155N/A
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfig_builder.module188N/A
Expandincludes/config_builder.inc001
MessageGroupFilenameLineFunctionStatus
@file block missing (Drupal Docs)Otherconfig_builder.inc-1N/A
Expandincludes/form_builder.inc010
MessageGroupFilenameLineFunctionStatus
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherform_builder.inc18N/A
Expandplugins/export_ui/config_builder_ui.class.php010
MessageGroupFilenameLineFunctionStatus
Potential problem: FAPI elements '#title' and '#description' only accept filtered text, be sure to use check_plain(), filter_xss() or similar to ensure your $variable is fully sanitized.Otherconfig_builder_ui.class.php95N/A

All

Test nameMinorCriticalNormal
Leafconfig_builder.install000
Expandconfig_builder.module020
MessageGroupFilenameLineFunctionStatus
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfig_builder.module155N/A
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherconfig_builder.module188N/A
Expandincludes/config_builder.inc001
MessageGroupFilenameLineFunctionStatus
@file block missing (Drupal Docs)Otherconfig_builder.inc-1N/A
Leafincludes/contextual.inc000
Leafincludes/ctools.inc000
Expandincludes/form_builder.inc010
MessageGroupFilenameLineFunctionStatus
Using eval() or drupal_eval() in your module's code could have a security risk if the PHP input provided to the function contains malicious code. (Drupal Docs)Otherform_builder.inc18N/A
Leafincludes/system.inc000
Leafplugins/export_ui/config_builder.inc000
Expandplugins/export_ui/config_builder_ui.class.php010
MessageGroupFilenameLineFunctionStatus
Potential problem: FAPI elements '#title' and '#description' only accept filtered text, be sure to use check_plain(), filter_xss() or similar to ensure your $variable is fully sanitized.Otherconfig_builder_ui.class.php95N/A