Writing Rules
Rules are TypeScript functions that check your codebase for ADR compliance. They live in companion .rules.ts files next to ADR markdown files and run when you execute archgate check.
.archgate/adrs/ ARCH-001-command-structure.md # The decision ARCH-001-command-structure.rules.ts # The automated checksBasic setup
Section titled “Basic setup”Every rules file exports a default plain object typed with satisfies RuleSet. Each key in the rules object becomes a rule ID, and each rule has a description and an async check function that receives a context object.
/// <reference path="../rules.d.ts" />
export default { rules: { "my-rule-id": { description: "What this rule checks", async check(ctx) { // Your check logic here }, }, },} satisfies RuleSet;A single rules file can define multiple rules:
/// <reference path="../rules.d.ts" />
export default { rules: { "first-rule": { description: "Checks one thing", async check(ctx) { // ... }, }, "second-rule": { description: "Checks another thing", async check(ctx) { // ... }, }, },} satisfies RuleSet;The Context API
Section titled “The Context API”The ctx object passed to every check function provides file reading, searching, and reporting capabilities. Here is a detailed reference with examples.
ctx.scopedFiles
Section titled “ctx.scopedFiles”An array of file paths matching the ADR’s files glob from its frontmatter. If the ADR has no files field, this includes all project files.
for (const file of ctx.scopedFiles) { const content = await ctx.readFile(file); // Check content...}Use ctx.scopedFiles when your rule should only apply to files the ADR governs. For example, a command structure rule scoped to src/commands/**/*.ts will only receive command files.
ctx.changedFiles
Section titled “ctx.changedFiles”An array of file paths that have been modified (git staged or changed). Useful for incremental checking — only validate files that were actually touched.
const filesToCheck = ctx.scopedFiles.filter((f) => ctx.changedFiles.includes(f));for (const file of filesToCheck) { // Only check changed files}ctx.readFile(path)
Section titled “ctx.readFile(path)”Read a file’s content as a string. The path is relative to the project root.
const content = await ctx.readFile("src/cli.ts");ctx.readJSON(path)
Section titled “ctx.readJSON(path)”Read and parse a JSON file. Returns unknown — cast it to the expected shape.
const pkg = (await ctx.readJSON("package.json")) as { dependencies?: Record<string, string>;};ctx.grep(file, pattern)
Section titled “ctx.grep(file, pattern)”Search a single file with a regular expression. Returns an array of GrepMatch objects, each with file, line, column, and content properties.
const matches = await ctx.grep(file, /console\.error\(/);for (const match of matches) { ctx.report.violation({ message: "Use logError() instead of console.error()", file: match.file, line: match.line, });}ctx.grepFiles(pattern, fileGlob)
Section titled “ctx.grepFiles(pattern, fileGlob)”Search across multiple files matching a glob pattern. Returns a flat array of GrepMatch objects from all matching files.
const matches = await ctx.grepFiles(/TODO:/, "src/**/*.ts");for (const match of matches) { ctx.report.warning({ message: "TODO comment found", file: match.file, line: match.line, });}ctx.glob(pattern)
Section titled “ctx.glob(pattern)”Find files by glob pattern. Returns an array of file paths relative to the project root.
const testFiles = await ctx.glob("tests/**/*.test.ts");ctx.report
Section titled “ctx.report”The reporting interface with three severity methods:
ctx.report.violation(detail)— error severity (exit code 1, blocks CI)ctx.report.warning(detail)— warning severity (logged but does not block)ctx.report.info(detail)— informational (logged for visibility)
Each method accepts an object with:
| Field | Type | Required | Description |
|---|---|---|---|
message | string | Yes | What the violation is |
file | string | No | Path to the offending file |
line | number | No | Line number of the violation |
fix | string | No | Suggested fix (shown to the developer) |
ctx.report.violation({ message: "Command file must export a register*Command function", file: "src/commands/check.ts", line: 5, fix: "Add: export function registerCheckCommand(program: Command) { ... }",});ctx.projectRoot
Section titled “ctx.projectRoot”The absolute path to the project root directory. Useful when you need to construct absolute paths.
Severity levels
Section titled “Severity levels”Each rule can set a default severity in its configuration. The severity determines how violations are treated:
| Severity | Exit code | Behavior |
|---|---|---|
error | 1 | Blocks CI, must be fixed |
warning | 0 | Logged but does not block |
info | 0 | Informational, logged for visibility |
Set the severity in the rule definition:
export default { rules: { "my-rule": { description: "...", severity: "warning", async check(ctx) { // Violations from this rule are warnings, not errors ctx.report.violation({ message: "..." }); }, }, },} satisfies RuleSet;If severity is omitted, it defaults to error.
You can also report at different severities within the same rule using ctx.report.violation(), ctx.report.warning(), and ctx.report.info() directly.
Rule timeout
Section titled “Rule timeout”Each rule has a 30-second execution timeout. If a rule exceeds this limit, it is treated as an error. This prevents runaway checks from blocking the pipeline.
Keep rules fast by:
- Using
ctx.grepFiles()instead of reading every file manually - Using
Promise.all()to check files in parallel - Scoping rules with the
filesfrontmatter field to limit the number of files processed
The fix field
Section titled “The fix field”The fix field is an optional string shown to the developer alongside the violation message. It describes what action to take to resolve the issue. Fixes are not auto-applied — they are guidance.
ctx.report.violation({ message: `Unapproved dependency: "chalk"`, file: "package.json", fix: "Use styleText() from node:util instead of chalk",});When displayed, the fix appears below the violation message:
ARCH-006/no-unapproved-deps package.json Unapproved dependency: "chalk" Fix: Use styleText() from node:util instead of chalkTips for writing rules
Section titled “Tips for writing rules”-
Use
Promise.all()for parallel file checks. When checking multiple files independently, process them in parallel instead of sequentially.// Good: parallelconst checks = files.map(async (file) => {const content = await ctx.readFile(file);// ...});await Promise.all(checks);// Avoid: sequentialfor (const file of files) {const content = await ctx.readFile(file);// ...} -
Use
ctx.changedFilesfor incremental checking. When runningarchgate check --staged,ctx.changedFilescontains only the git-staged files. Filterctx.scopedFilesagainst it to check only what changed. -
Keep rules focused on one concern. A rule that checks both naming conventions and import patterns should be split into two rules with separate IDs.
-
Use
ctx.grepFiles()over manual iteration. When searching for a pattern across many files,ctx.grepFiles()is more efficient than reading each file and running a regex. -
Provide actionable
fixmessages. A fix like “Don’t do this” is not helpful. Tell the developer exactly what to do instead. -
Filter out non-applicable files early. If your rule only applies to certain files within the scope, filter
ctx.scopedFilesbefore processing:const commandFiles = ctx.scopedFiles.filter((f) => !f.endsWith("index.ts")); -
Handle missing files gracefully. If your rule reads a specific file like
package.json, wrap the read in a try/catch and return early if the file does not exist.
Next steps
Section titled “Next steps”- Common Rule Patterns — Copy-pasteable patterns organized by category: dependency management, import restrictions, file structure, code quality, database schema, and architecture boundaries.
- Rule API Reference — Full reference for all rule API types and functions.
- CI Integration — Wire
archgate checkinto your pipeline to enforce rules on every PR.