Engagement - 7.x-1.x

Test status
StatusResult
Last receivedSun, 07/22/2012 - 20:32:15
Last requestedSun, 07/22/2012 - 20:33:02
Last testedSun, 07/22/2012 - 20:33:28
Test count4
Environment status
MySQLpass
Code reviewpass
Overall Resultpass
Branch information
Identifier7.x-1.x
ProjectEngagement
LinkProject information
SummaryPASSED: [[Coder]]: [Code review] 5 minor(s); [[SimpleTest]]: [MySQL] 0 pass(es).
Details

MySQL

  1. Setup environment
  2. Detect an invalid patch URL
  3. Detect invalid repository information
  4. Detect invalid patch format
  5. Detect a non-applicable patch
  6. Detect invalid PHP syntax
  7. Detect a Drupal installation failure
  8. Detect a test run failure
  9. Detect a failing test
  10. Complete test suite with all tests passing

Code review

  1. Setup environment
  2. Detect an invalid patch URL
  3. Detect invalid repository information
  4. Detect invalid patch format
  5. Detect a non-applicable patch
  6. Detect invalid PHP syntax
  7. Detect a review run failure
  8. Detect coder flags
  9. Complete coder review with all passed
5 minor(s), 0 critical(s), and 0 normal(s)
Test nameMinorCriticalNormal
Leafengagement.admin.inc000
Leafengagement.api.php000
Leafengagement.install000
Expandengagement.module500
MessageGroupFilenameLineFunctionStatus
Potential problem: use the Form API to prevent against CSRF attacks. If you need to use $_POST variables, ensure they are fully sanitized if displayed by using check_plain(), filter_xss() or similar. (Drupal Docs)Otherengagement.module114N/A
Potential problem: use the Form API to prevent against CSRF attacks. If you need to use $_POST variables, ensure they are fully sanitized if displayed by using check_plain(), filter_xss() or similar. (Drupal Docs)Otherengagement.module115N/A
Potential problem: use the Form API to prevent against CSRF attacks. If you need to use $_POST variables, ensure they are fully sanitized if displayed by using check_plain(), filter_xss() or similar. (Drupal Docs)Otherengagement.module119N/A
Potential problem: use the Form API to prevent against CSRF attacks. If you need to use $_POST variables, ensure they are fully sanitized if displayed by using check_plain(), filter_xss() or similar. (Drupal Docs)Otherengagement.module123N/A
Potential problem: use the Form API to prevent against CSRF attacks. If you need to use $_POST variables, ensure they are fully sanitized if displayed by using check_plain(), filter_xss() or similar. (Drupal Docs)Otherengagement.module127N/A