RuboCop rule development guidelines
Our codebase style is defined and enforced by RuboCop.
You can check for any offenses locally with bundle exec rubocop --parallel
.
On the CI, this is automatically checked by the static-analysis
jobs.
In addition, you can integrate RuboCop into supported IDEs using the Solargraph gem.
For RuboCop rules that we have not taken a decision on, follow the Ruby style guide to write idiomatic Ruby.
Reviewers/maintainers should be tolerant and not too pedantic about style.
Some RuboCop rules are disabled, and for those, reviewers/maintainers must not ask authors to use one style or the other, as both are accepted. This isn't an ideal situation because this leaves space for bike-shedding. Ideally we should enable all RuboCop rules to avoid style-related discussions, nitpicking, or back-and-forth in reviews. The GitLab Ruby style guide includes a non-exhaustive list of styles that commonly come up in reviews and are not enforced.
Additionally, we have dedicated test-specific style guides and best practices.
Disabling rules inline
By default, RuboCop rules should not be disabled inline, because it negates agreed-upon code standards that the rule is attempting to apply to the codebase.
If you must use inline disable provide the reason as a code comment in the same line where the rule is disabled.
More context can go into code comments above this inline disable comment. To reduce verbose code comments link a resource (issue, epic, ...) to provide detailed context.
For temporary inline disables use rubocop:todo
and link the follow-up issue
or epic.
For example:
# bad
module Types
module Domain
# rubocop:disable Graphql/AuthorizeTypes
class SomeType < BaseObject
if condition # rubocop:disable Style/GuardClause
# more logic...
end
object.public_send(action) # rubocop:disable GitlabSecurity/PublicSend
end
# rubocop:enable Graphql/AuthorizeTypes
end
end
# good
module Types
module Domain
# rubocop:disable Graphql/AuthorizeTypes -- already authroized in parent entity
class SomeType < BaseObject
if condition # rubocop:todo Style/GuardClause -- Cleanup via https://gitlab.com/gitlab-org/gitlab/-/issues/1234567890
# more logic...
end
# At this point `action` is safe to be used in `public_send`.
# See https://gitlab.com/gitlab-org/gitlab/-/issues/123457890.
object.public_send(action) # rubocop:disable GitlabSecurity/PublicSend -- User input verified
end
# rubocop:enable Graphql/AuthorizeTypes
end
end
Creating new RuboCop cops
Typically it is better for the linting rules to be enforced programmatically as it reduces the aforementioned bike-shedding.
To that end, we encourage creation of new RuboCop rules in the codebase.
Before adding a new cop to enforce a given style, make sure to discuss it with your team.
We maintain cops across several Ruby code bases, and not all of them are
specific to the GitLab application.
When creating a new cop that could be applied to multiple applications, we encourage you
to add it to our gitlab-styles
gem.
If the cop targets rules that only apply to the main GitLab application,
it should be added to GitLab instead.
Cop grace period
A cop is in a grace period if it is enabled and has Details: grace period
defined in its TODO YAML configuration.
On the default branch, offenses from cops in the grace period do not fail the RuboCop CI job. Instead, the job notifies the #f_rubocop
Slack channel. However, on other branches, the RuboCop job fails.
A grace period can safely be lifted as soon as there are no warnings for 1 week in the #f_rubocop
channel on Slack.
Proposing a new cop or cop change
If you want to make a proposal to enforce a new cop or change existing cop configuration use the
gitlab-styles
merge request template
or the
gitlab
merge request template
depending on where you want to add this rule. Using this template encourages
all maintainers to provide feedback on our preferred style and provides
a structured way of communicating the consequences of the new rule.
Enabling a new cop
- Enable the new cop in
.rubocop.yml
(if not already done viagitlab-styles
). - Generate TODOs for the new cop.
-
Set the new cop to
grace period
. - Create an issue to fix TODOs and encourage community contributions (via ~"quick win" and/or ~"Seeking community contributions"). See some examples.
- Create an issue to remove
grace period
after 1 week of silence in the#f_rubocop
Slack channel. See an example.
Silenced offenses
When offenses are silenced for cops in the grace period,
the #f_rubocop
Slack channel receives a notification message every 2 hours.
To fix this issue:
- Find cops with silenced offenses in the linked CI job.
- Generate TODOs for these cops.
RuboCop node pattern
When creating node patterns to match
Ruby's AST, you can use scripts/rubocop-parse
.
This displays the AST of a Ruby expression to help you create the matcher.
See also !97024.
Resolving RuboCop exceptions
When the number of RuboCop exceptions exceeds the default exclude-limit
of 15,
we may want to resolve exceptions over multiple commits. To minimize confusion,
we should track our progress through the exception list.
The preferred way to generate the initial list or a list for specific RuboCop rules
is to run the Rake task rubocop:todo:generate
:
# Initial list
bundle exec rake rubocop:todo:generate
# List for specific RuboCop rules
bundle exec rake 'rubocop:todo:generate[Gitlab/NamespacedClass,Lint/Syntax]'
This Rake task creates or updates the exception list in .rubocop_todo/
. For
example, the configuration for the RuboCop rule Gitlab/NamespacedClass
is
located in .rubocop_todo/gitlab/namespaced_class.yml
.
Make sure to commit any changes in .rubocop_todo/
after running the Rake task.
Periodically generating RuboCop todo files
Due to code changes, some RuboCop offenses get automatically fixed over time. To avoid reintroducing these offenses,
we periodically regenerate the .rubocop_todo
files.
We use the housekeeper gem for this purpose.
It regenerates the .rubocop_todo
files and creates a merge request.
A reviewer is randomly assigned to review the generated merge request.
To run the keep locally follow these steps
and run bundle exec gitlab-housekeeper -k Keeps::GenerateRubocopTodos
.
Reveal existing RuboCop exceptions
To reveal existing RuboCop exceptions in the code that have been excluded via .rubocop_todo.yml
and
.rubocop_todo/**/*.yml
, set the environment variable REVEAL_RUBOCOP_TODO
to 1
.
This allows you to reveal existing RuboCop exceptions during your daily work cycle and fix them along the way.
NOTE:
Define Include
s and permanent Exclude
s in .rubocop.yml
instead of .rubocop_todo/**/*.yml
.