This project is not covered by Drupal’s security advisory policy.

NOTE (May 20/2012): Testing infrastructure Issue queue is currently being monitored over at the "Testbot" project page.

A project to manage the infrastructure for test driven development of Drupal core and contributed modules. This project extends work supported by Boris Mann and implemented by Moshe Weitzman.

This project is now live and reporting on automated test results: http://testing.drupal.org/tests

It is based on work funded by the Google summer of code project for test automation. Mentored by Thomas Ilsche and Rok Zlender during 2006, and 2007 respectively. Implementation of automated testing has been led by Rok Zlender, with support from Kieran Lal, and Robin Monks. Robin's work is based on his work with the quality project for Mozilla.

Moshe and Rok's work:
http://drupal.org/project/simpletest
http://drupal.org/project/simpletestauto

Robin's project demo: Drupaltestbed
Components:
freshen.php - Brings drupal source from CSV, runs install of the new drupal checkout.

action/install.php - Simpletest script for running the install script.

mail_process.php - Reads issue queue mail from an external POP3 mailbox, greps out issues with new patches, and sends the new patches via XML-RPC to simpletestauto.

make_followup.php - Logic to respond to the issue with comments, concerns, a new patch is nessasary, and marking as needs work if nessasary. Controls a bot user on drupal.org

Funding for this project has been provided by CivicSpace Labs, NowPublic, and SPAWAR. The server is provided by: IO1. This project aims to help address the number one concern of the Drupal community, to improve the quality of Drupal modules. This project was launched at the DrupalCon Barcelona QA BOF.

Project information

  • caution Minimally maintained
    Maintainers monitor issues, but fast responses are not guaranteed.
  • caution No further development
    No longer developed by its maintainers.
  • Created by Amazon on , updated
  • shield alertThis project is not covered by the security advisory policy.
    Use at your own risk! It may have publicly disclosed vulnerabilities.

Releases