diff --git a/ee/spec/controllers/analytics/cycle_analytics/stages_controller_spec.rb b/ee/spec/controllers/analytics/cycle_analytics/stages_controller_spec.rb
index 6e4089f438c67d8498770eab2dccba7972e5b547..d473c180bf44c7963bcf0b0752d02225b300aad1 100644
--- a/ee/spec/controllers/analytics/cycle_analytics/stages_controller_spec.rb
+++ b/ee/spec/controllers/analytics/cycle_analytics/stages_controller_spec.rb
@@ -90,6 +90,7 @@
 
   describe 'PUT `update`' do
     let(:stage) { create(:cycle_analytics_group_stage, parent: group, relative_position: 15) }
+
     subject { put :update, params: params.merge(id: stage.id) }
 
     include_examples 'group permission check on the controller level'
diff --git a/ee/spec/controllers/analytics/tasks_by_type_controller_spec.rb b/ee/spec/controllers/analytics/tasks_by_type_controller_spec.rb
index 1f4c41843668b0386b858ad0dea3840c91c5c04d..e85aa8908590529a5ccbaaeb7d92fb6d296a44dc 100644
--- a/ee/spec/controllers/analytics/tasks_by_type_controller_spec.rb
+++ b/ee/spec/controllers/analytics/tasks_by_type_controller_spec.rb
@@ -8,6 +8,7 @@
   let(:label) { create(:group_label, group: group) }
   let(:params) { { group_id: group.full_path, label_ids: [label.id], created_after: 10.days.ago, subject: 'Issue' } }
   let!(:issue) { create(:labeled_issue, created_at: 5.days.ago, project: create(:project, group: group), labels: [label]) }
+
   subject { get :show, params: params }
 
   before do
diff --git a/ee/spec/controllers/concerns/boards_responses_spec.rb b/ee/spec/controllers/concerns/boards_responses_spec.rb
index 5ad5e6e6c6938a673c58c4727023e3ef3fce4170..8a0329bc494aff7cc6c430ba0636178e1fd6dd4c 100644
--- a/ee/spec/controllers/concerns/boards_responses_spec.rb
+++ b/ee/spec/controllers/concerns/boards_responses_spec.rb
@@ -17,6 +17,7 @@
 
   describe '#serialize_as_json' do
     let!(:board) { create(:board, milestone: milestone) }
+
     context 'with milestone' do
       let(:milestone) { create(:milestone) }
 
@@ -33,6 +34,7 @@
 
     context 'without milestone' do
       let(:milestone) { nil }
+
       it 'serialises properly' do
         expected = { id: board.id, name: board.name }.as_json
 
diff --git a/ee/spec/controllers/concerns/internal_redirect_spec.rb b/ee/spec/controllers/concerns/internal_redirect_spec.rb
index 42b486fd8a38e6ec9469718b8eadb0bc9b1f258a..86df0ffb270bd149a6da03cc25e6e459422027b8 100644
--- a/ee/spec/controllers/concerns/internal_redirect_spec.rb
+++ b/ee/spec/controllers/concerns/internal_redirect_spec.rb
@@ -12,6 +12,7 @@ def request
       end
     end
   end
+
   subject(:controller) { controller_class.new }
 
   describe '#host_allowed?' do
diff --git a/ee/spec/controllers/projects/push_rules_controller_spec.rb b/ee/spec/controllers/projects/push_rules_controller_spec.rb
index 95b1248bdd9d6d9f8073a98e2e048df6e35d9685..b0a9bd47556e0da2023e6a7a3490f87f1beb5eb1 100644
--- a/ee/spec/controllers/projects/push_rules_controller_spec.rb
+++ b/ee/spec/controllers/projects/push_rules_controller_spec.rb
@@ -73,6 +73,7 @@ def do_update
       context "Updating #{rule_attr} rule" do
         context 'as an admin' do
           let(:user) { create(:admin) }
+
           it_behaves_like 'a setting with global default', rule_attr, updates: true
         end
 
diff --git a/ee/spec/features/security/group/internal_access_spec.rb b/ee/spec/features/security/group/internal_access_spec.rb
index 8db426434c44ffe5fd22ef5d27d600b3a3479b45..98c80823c4d075596424a6e862d4e688844e8966 100644
--- a/ee/spec/features/security/group/internal_access_spec.rb
+++ b/ee/spec/features/security/group/internal_access_spec.rb
@@ -47,6 +47,7 @@
 
   describe 'GET /groups/:path/merge_requests' do
     let(:project) { create(:project, :internal, :repository, group: group) }
+
     subject { merge_requests_group_path(group) }
 
     it { is_expected.to be_allowed_for(:auditor) }
diff --git a/ee/spec/features/security/group/public_access_spec.rb b/ee/spec/features/security/group/public_access_spec.rb
index 3553234be83ff51f5041092e3768f1322934c603..c49d2a19f40005bf8ba68e2895ad4bc9983cd623 100644
--- a/ee/spec/features/security/group/public_access_spec.rb
+++ b/ee/spec/features/security/group/public_access_spec.rb
@@ -47,6 +47,7 @@
 
   describe 'GET /groups/:path/merge_requests' do
     let(:project) { create(:project, :public, :repository, group: group) }
+
     subject { merge_requests_group_path(group) }
 
     it { is_expected.to be_allowed_for(:auditor) }
diff --git a/ee/spec/features/security/project/internal_access_spec.rb b/ee/spec/features/security/project/internal_access_spec.rb
index d7426837bafb7afd94ca1b90c04086c0a65ecdea..f75b54d0a7654b464b3c799135c3874a89dd5d6b 100644
--- a/ee/spec/features/security/project/internal_access_spec.rb
+++ b/ee/spec/features/security/project/internal_access_spec.rb
@@ -70,6 +70,7 @@
 
   describe "GET /:project_path/blob" do
     let(:commit) { project.repository.commit }
+
     subject { project_blob_path(project, File.join(commit.id, '.gitignore')) }
 
     it { is_expected.to be_allowed_for(:auditor) }
@@ -153,6 +154,7 @@
 
   describe "GET /:project_path/pipelines/:id" do
     let(:pipeline) { create(:ci_pipeline, project: project) }
+
     subject { project_pipeline_path(project, pipeline) }
 
     it { is_expected.to be_allowed_for(:auditor) }
@@ -181,6 +183,7 @@
   describe "GET /:project_path/builds/:id" do
     let(:pipeline) { create(:ci_pipeline, project: project) }
     let(:build) { create(:ci_build, pipeline: pipeline) }
+
     subject { project_job_path(project, build.id) }
 
     context "when allowed for public and internal" do
@@ -208,6 +211,7 @@
 
   describe "GET /:project_path/-/environments/:id" do
     let(:environment) { create(:environment, project: project) }
+
     subject { project_environment_path(project, environment) }
 
     it { is_expected.to be_allowed_for(:auditor) }
diff --git a/ee/spec/features/security/project/private_access_spec.rb b/ee/spec/features/security/project/private_access_spec.rb
index dd17ddd0111179ca6ec035ec86a025960a02dda4..78da1aeb72af6fc16883252fcd533b38a4a4102c 100644
--- a/ee/spec/features/security/project/private_access_spec.rb
+++ b/ee/spec/features/security/project/private_access_spec.rb
@@ -64,6 +64,7 @@
 
   describe "GET /:project_path/blob" do
     let(:commit) { project.repository.commit }
+
     subject { project_blob_path(project, File.join(commit.id, '.gitignore')) }
 
     it { is_expected.to be_allowed_for(:auditor) }
@@ -135,6 +136,7 @@
 
   describe "GET /:project_path/-/environments/:id" do
     let(:environment) { create(:environment, project: project) }
+
     subject { project_environment_path(project, environment) }
 
     it { is_expected.to be_allowed_for(:auditor) }
diff --git a/ee/spec/features/security/project/public_access_spec.rb b/ee/spec/features/security/project/public_access_spec.rb
index 17451ed86aeff84bdfb31371211a2c25e6f0a5a7..85644c330dfdf7dea016101b24f56920e0275377 100644
--- a/ee/spec/features/security/project/public_access_spec.rb
+++ b/ee/spec/features/security/project/public_access_spec.rb
@@ -70,6 +70,7 @@
 
   describe "GET /:project_path/pipelines/:id" do
     let(:pipeline) { create(:ci_pipeline, project: project) }
+
     subject { project_pipeline_path(project, pipeline) }
 
     it { is_expected.to be_allowed_for(:auditor) }
@@ -98,6 +99,7 @@
   describe "GET /:project_path/builds/:id" do
     let(:pipeline) { create(:ci_pipeline, project: project) }
     let(:build) { create(:ci_build, pipeline: pipeline) }
+
     subject { project_job_path(project, build.id) }
 
     context "when allowed for public" do
@@ -125,6 +127,7 @@
 
   describe "GET /:project_path/-/environments/:id" do
     let(:environment) { create(:environment, project: project) }
+
     subject { project_environment_path(project, environment) }
 
     it { is_expected.to be_allowed_for(:auditor) }
diff --git a/ee/spec/finders/issues_finder_spec.rb b/ee/spec/finders/issues_finder_spec.rb
index f19b95712612306937d068f5f547c35b94ac37f1..b0036b62d9d1eb83a66788950b02dea9b33dcd6a 100644
--- a/ee/spec/finders/issues_finder_spec.rb
+++ b/ee/spec/finders/issues_finder_spec.rb
@@ -58,6 +58,7 @@
 
   describe '#with_confidentiality_access_check' do
     let(:guest) { create(:user) }
+
     set(:authorized_user) { create(:user) }
     set(:project) { create(:project, namespace: authorized_user.namespace) }
     set(:public_issue) { create(:issue, project: project) }
diff --git a/ee/spec/finders/licenses_finder_spec.rb b/ee/spec/finders/licenses_finder_spec.rb
index b504f18e8f654ae0e575d6ba591de9bfec0c6a8f..de7fb0e8d3f2e0406f2457cf676fad3df1c65b0d 100644
--- a/ee/spec/finders/licenses_finder_spec.rb
+++ b/ee/spec/finders/licenses_finder_spec.rb
@@ -4,6 +4,7 @@
 
 describe LicensesFinder do
   let(:license) { create(:license) }
+
   set(:user) { create(:admin) }
 
   it 'returns a license by id' do
diff --git a/ee/spec/finders/packages/group_packages_finder_spec.rb b/ee/spec/finders/packages/group_packages_finder_spec.rb
index c98422c57ce589cc947a2f4cf5a3dd0abb8a8e9a..1172f5c9c97c12ecd5dd9dd66b0cb40ab123d48c 100644
--- a/ee/spec/finders/packages/group_packages_finder_spec.rb
+++ b/ee/spec/finders/packages/group_packages_finder_spec.rb
@@ -13,6 +13,7 @@
 
   describe '#execute' do
     let(:params) { { exclude_subgroups: false } }
+
     subject { described_class.new(user, group, params).execute }
 
     shared_examples 'with package type' do |package_type|
diff --git a/ee/spec/graphql/mutations/merge_requests/set_assignees_spec.rb b/ee/spec/graphql/mutations/merge_requests/set_assignees_spec.rb
index 3a9e0477ed60ec5b8cbc44ce0655d1c524a94a01..fc54d596d1f8ca5ff7bbcc24e63b87201b433f84 100644
--- a/ee/spec/graphql/mutations/merge_requests/set_assignees_spec.rb
+++ b/ee/spec/graphql/mutations/merge_requests/set_assignees_spec.rb
@@ -5,12 +5,14 @@
 describe Mutations::MergeRequests::SetAssignees do
   let(:merge_request) { create(:merge_request) }
   let(:user) { create(:user) }
+
   subject(:mutation) { described_class.new(object: nil, context: { current_user: user }) }
 
   describe '#resolve' do
     let(:assignees) { create_list(:user, 3) }
     let(:assignee_usernames) { assignees.map(&:username) }
     let(:mutated_merge_request) { subject[:merge_request] }
+
     subject { mutation.resolve(project_path: merge_request.project.full_path, iid: merge_request.iid, assignee_usernames: assignee_usernames) }
 
     before do
diff --git a/ee/spec/helpers/ee/labels_helper_spec.rb b/ee/spec/helpers/ee/labels_helper_spec.rb
index 73a333fb2170123cdba62b1800b1aed0631cd1bd..fbfcdf11f550eaad00c8abf074bf713ebb36a7a8 100644
--- a/ee/spec/helpers/ee/labels_helper_spec.rb
+++ b/ee/spec/helpers/ee/labels_helper_spec.rb
@@ -52,6 +52,7 @@
     context 'when edit_context is a project' do
       let(:edit_context) { create(:project) }
       let(:label) { create(:label, project: edit_context, title: 'bug') }
+
       before do
         data.merge!({
           project_id: edit_context.id,
diff --git a/ee/spec/helpers/kerberos_spnego_helper_spec.rb b/ee/spec/helpers/kerberos_spnego_helper_spec.rb
index 7db8e5698a2915b7eca955134bf5e88169eef58d..2245d56bbba9e25dbccd08860a1b3a545c8e5d6d 100644
--- a/ee/spec/helpers/kerberos_spnego_helper_spec.rb
+++ b/ee/spec/helpers/kerberos_spnego_helper_spec.rb
@@ -7,6 +7,7 @@
   describe '#spnego_credentials!' do
     let(:gss) { double('GSSAPI::Simple') }
     let(:gss_service_name) { 'gss_service_name' }
+
     subject { Class.new { include KerberosSpnegoHelper }.new }
 
     before do
diff --git a/ee/spec/helpers/license_helper_spec.rb b/ee/spec/helpers/license_helper_spec.rb
index 826da35e80cd9f00c1c855215fca94e8f497a289..668f97496a25b828eb0a4c0e7a2fe7441db493a0 100644
--- a/ee/spec/helpers/license_helper_spec.rb
+++ b/ee/spec/helpers/license_helper_spec.rb
@@ -24,6 +24,7 @@ def stub_default_url_options(host: "localhost", protocol: "http", port: nil, scr
 
       context 'normal user' do
         let(:is_admin) { false }
+
         it 'displays correct error message for normal user' do
           expect(license_message(signed_in: true, is_admin: is_admin)).to be_blank
         end
diff --git a/ee/spec/helpers/search_helper_spec.rb b/ee/spec/helpers/search_helper_spec.rb
index 2d12820737ea16ea39fc9a90411473274ab353b6..f22926656b74a65b1fbf461652868a46bc73dad6 100644
--- a/ee/spec/helpers/search_helper_spec.rb
+++ b/ee/spec/helpers/search_helper_spec.rb
@@ -180,6 +180,7 @@ def es_blob_search
     let(:use_elasticsearch) { true }
     let(:scope) { 'commits' }
     let(:search_service) { instance_double(Search::GlobalService, use_elasticsearch?: use_elasticsearch, scope: scope) }
+
     subject { show_switch_to_basic_search?(search_service) }
 
     before do
diff --git a/ee/spec/helpers/users_helper_spec.rb b/ee/spec/helpers/users_helper_spec.rb
index b0cd8b85317569e99386d349b24830ae67f6ea78..73d08a9923ed2a3126de4f0a7f034ba51d2c48b0 100644
--- a/ee/spec/helpers/users_helper_spec.rb
+++ b/ee/spec/helpers/users_helper_spec.rb
@@ -5,6 +5,7 @@
 describe UsersHelper do
   describe '#current_user_menu_items' do
     let(:user) { create(:user) }
+
     using RSpec::Parameterized::TableSyntax
 
     subject(:items) { helper.current_user_menu_items }
diff --git a/ee/spec/lib/ee/gitlab/auth/ldap/access_levels_spec.rb b/ee/spec/lib/ee/gitlab/auth/ldap/access_levels_spec.rb
index 866f272edfcac91b2a65f4044efb5621e6e56ca7..4d37e6468aaacd090a61d827995618956038453f 100644
--- a/ee/spec/lib/ee/gitlab/auth/ldap/access_levels_spec.rb
+++ b/ee/spec/lib/ee/gitlab/auth/ldap/access_levels_spec.rb
@@ -11,6 +11,7 @@
       uid=janedoe,ou=users,dc=example,dc=com
     )
     end
+
     subject { access_levels }
 
     context 'when access_levels is empty' do
@@ -40,6 +41,7 @@
           uid=janedoe,ou=users,dc=example,dc=com
         }
       end
+
       before do
         access_levels.set(master_dns, to: Gitlab::Access::MAINTAINER)
         access_levels.set(developer_dns, to: Gitlab::Access::DEVELOPER)
diff --git a/ee/spec/lib/ee/gitlab/auth/ldap/sync/group_spec.rb b/ee/spec/lib/ee/gitlab/auth/ldap/sync/group_spec.rb
index 59992a551029b12115cb64e594713f8714d8c11f..0a7001094b238c040f20ff634085290e88ddade2 100644
--- a/ee/spec/lib/ee/gitlab/auth/ldap/sync/group_spec.rb
+++ b/ee/spec/lib/ee/gitlab/auth/ldap/sync/group_spec.rb
@@ -311,6 +311,7 @@ def execute
       context 'when user inherits higher permissions from parent' do
         let(:parent_group) { create(:group) }
         let(:ldap_group1) { ldap_group_entry(user_dn(user.username)) }
+
         before do
           group.update(parent: parent_group)
           parent_group.add_maintainer(user)
@@ -350,6 +351,7 @@ def execute
       context 'when user inherits lower permissions from parent' do
         let(:parent_group) { create(:group) }
         let(:ldap_group1) { ldap_group_entry(user_dn(user.username)) }
+
         before do
           group.update(parent: parent_group)
           parent_group.add_reporter(user)
@@ -390,6 +392,7 @@ def execute
         let(:parent_group) { create(:group) }
         let(:ldap_group1) { ldap_group_entry(user_dn(user.username)) }
         let(:access_requester) { parent_group.request_access(user) }
+
         before do
           group.update(parent: parent_group)
           parent_group.add_owner(create(:user))
@@ -415,6 +418,7 @@ def execute
       context 'when user inherits permissions from parent and user is no longer in LDAP group' do
         let(:parent_group) { create(:group) }
         let(:ldap_group1) { ldap_group_entry(user_dn('other_user')) }
+
         before do
           group.update(parent: parent_group)
           parent_group.add_maintainer(user)
@@ -434,6 +438,7 @@ def execute
         let(:group1) { create(:group) }
         let(:group2) { create(:group) }
         let(:group3) { create(:group) }
+
         before do
           group1.add_reporter(user)
 
diff --git a/ee/spec/lib/ee/gitlab/cleanup/orphan_job_artifact_files_spec.rb b/ee/spec/lib/ee/gitlab/cleanup/orphan_job_artifact_files_spec.rb
index 3d43714820d38cf38ebc080a8fbdaaf4e7ec73fe..be49cdb303a4f2d45d657dc5a0ebdea5997946fd 100644
--- a/ee/spec/lib/ee/gitlab/cleanup/orphan_job_artifact_files_spec.rb
+++ b/ee/spec/lib/ee/gitlab/cleanup/orphan_job_artifact_files_spec.rb
@@ -6,6 +6,7 @@
   include ::EE::GeoHelpers
 
   let(:null_logger) { Logger.new('/dev/null') }
+
   subject(:cleanup) { described_class.new(logger: null_logger) }
 
   before do
diff --git a/ee/spec/lib/gitlab/analytics/cycle_analytics/request_params_spec.rb b/ee/spec/lib/gitlab/analytics/cycle_analytics/request_params_spec.rb
index 3fc9a8ba9bb5f49800b1e843ca5b5ae53a974b59..92c9cd32231211959cf0a41813fc54fe46b1d481 100644
--- a/ee/spec/lib/gitlab/analytics/cycle_analytics/request_params_spec.rb
+++ b/ee/spec/lib/gitlab/analytics/cycle_analytics/request_params_spec.rb
@@ -4,6 +4,7 @@
 
 describe Gitlab::Analytics::CycleAnalytics::RequestParams do
   let(:params) { { created_after: '2018-01-01', created_before: '2019-01-01' } }
+
   subject { described_class.new(params) }
 
   describe 'validations' do
diff --git a/ee/spec/lib/gitlab/auth/auth_finders_spec.rb b/ee/spec/lib/gitlab/auth/auth_finders_spec.rb
index 8a10a6c8a4839d6ab132e041f36dd2ad31d6194a..155015c97601ea1652d01cb35a87b2b0dab5f940 100644
--- a/ee/spec/lib/gitlab/auth/auth_finders_spec.rb
+++ b/ee/spec/lib/gitlab/auth/auth_finders_spec.rb
@@ -70,6 +70,7 @@ def set_param(key, value)
 
   describe '#find_user_from_bearer_token' do
     let(:job) { create(:ci_build, user: user) }
+
     subject { find_user_from_bearer_token }
 
     context 'when the token is passed as an oauth token' do
@@ -107,6 +108,7 @@ def set_token(token)
 
   describe '#find_user_from_job_token' do
     let(:job) { create(:ci_build, user: user) }
+
     subject { find_user_from_job_token }
 
     shared_examples 'job token disabled' do
diff --git a/ee/spec/lib/gitlab/auth/smartcard/ldap_certificate_spec.rb b/ee/spec/lib/gitlab/auth/smartcard/ldap_certificate_spec.rb
index 7224fd01a85f7cdb7ab565191b4d40c07a1a3bd2..8927ff347a6ba99f8954fbe9ddc8031b6fda3d26 100644
--- a/ee/spec/lib/gitlab/auth/smartcard/ldap_certificate_spec.rb
+++ b/ee/spec/lib/gitlab/auth/smartcard/ldap_certificate_spec.rb
@@ -60,6 +60,7 @@
 
     context 'user exists but it is using a new ldap certificate' do
       let(:ldap_person_email) { user.email }
+
       let_it_be(:user) { create(:user) }
 
       it 'finds existing user' do
diff --git a/ee/spec/lib/gitlab/ci/reports/license_scanning/report_spec.rb b/ee/spec/lib/gitlab/ci/reports/license_scanning/report_spec.rb
index 84cbeecd060cfe227ce95c908f00e0db44533196..e1eabf45894b978973db38c5530bd1ee0e523a00 100644
--- a/ee/spec/lib/gitlab/ci/reports/license_scanning/report_spec.rb
+++ b/ee/spec/lib/gitlab/ci/reports/license_scanning/report_spec.rb
@@ -176,6 +176,7 @@ def names_from(licenses)
     context 'when diffing two v1 reports' do
       let(:base_report) { build(:license_scan_report, :version_1) }
       let(:head_report) { build(:license_scan_report, :version_1) }
+
       subject { base_report.diff_with(head_report) }
 
       before do
@@ -196,6 +197,7 @@ def names_from(licenses)
     context 'when diffing two v2 reports' do
       let(:base_report) { build(:license_scan_report, :version_2) }
       let(:head_report) { build(:license_scan_report, :version_2) }
+
       subject { base_report.diff_with(head_report) }
 
       before do
@@ -216,6 +218,7 @@ def names_from(licenses)
     context 'when diffing a v1 report with a v2 report' do
       let(:base_report) { build(:license_scan_report, :version_1) }
       let(:head_report) { build(:license_scan_report, :version_2) }
+
       subject { base_report.diff_with(head_report) }
 
       before do
@@ -236,6 +239,7 @@ def names_from(licenses)
     context 'when diffing a v2 report with a v1 report' do
       let(:base_report) { build(:license_scan_report, :version_2) }
       let(:head_report) { build(:license_scan_report, :version_1) }
+
       subject { base_report.diff_with(head_report) }
 
       before do
diff --git a/ee/spec/lib/gitlab/elastic/project_search_results_spec.rb b/ee/spec/lib/gitlab/elastic/project_search_results_spec.rb
index 5c937f3e38026136e1f0ccee9f10c9b0f3ad807f..9aa9543a7d4a02340814c0b1cbde992c8917a801 100644
--- a/ee/spec/lib/gitlab/elastic/project_search_results_spec.rb
+++ b/ee/spec/lib/gitlab/elastic/project_search_results_spec.rb
@@ -21,6 +21,7 @@
 
   describe 'initialize with ref' do
     let(:ref) { 'refs/heads/test' }
+
     subject(:results) { described_class.new(user, query, project.id, ref) }
 
     it { expect(results.project).to eq(project) }
diff --git a/ee/spec/lib/gitlab/elastic/search_results_spec.rb b/ee/spec/lib/gitlab/elastic/search_results_spec.rb
index ae04c4887d6af6a9bcf21f499dac376b9ef5f073..38557679384a87c0c73d1ae552be08fed970d63b 100644
--- a/ee/spec/lib/gitlab/elastic/search_results_spec.rb
+++ b/ee/spec/lib/gitlab/elastic/search_results_spec.rb
@@ -639,6 +639,7 @@ def search_for(term)
 
   describe 'Wikis' do
     let(:results) { described_class.new(user, 'term', limit_project_ids) }
+
     subject(:wiki_blobs) { results.objects('wiki_blobs') }
 
     before do
diff --git a/ee/spec/lib/gitlab/geo/event_gap_tracking_spec.rb b/ee/spec/lib/gitlab/geo/event_gap_tracking_spec.rb
index 7e84238bcc3bd5edf154b45148dd45c6d17de30b..152de1de3c4b18f4b3cd824a4e739077d1382186 100644
--- a/ee/spec/lib/gitlab/geo/event_gap_tracking_spec.rb
+++ b/ee/spec/lib/gitlab/geo/event_gap_tracking_spec.rb
@@ -6,6 +6,7 @@
   let(:previous_event_id) { 7 }
   let(:gap_id) { previous_event_id + 1 }
   let(:event_id_with_gap) { previous_event_id + 2 }
+
   subject(:gap_tracking) { described_class.new }
 
   before do
diff --git a/ee/spec/lib/gitlab/geo/git_push_http_spec.rb b/ee/spec/lib/gitlab/geo/git_push_http_spec.rb
index e7339eb9ba31275df88e0fefb2477465e30c81bb..eb553d21a151dfc7cda312f6302371f5a403cb5f 100644
--- a/ee/spec/lib/gitlab/geo/git_push_http_spec.rb
+++ b/ee/spec/lib/gitlab/geo/git_push_http_spec.rb
@@ -8,6 +8,7 @@
   let(:gl_id) { 'user-1234' }
   let(:gl_repository) { 'project-77777' }
   let(:cache_key) { "#{described_class::CACHE_KEY_PREFIX}:#{gl_id}:#{gl_repository}" }
+
   set(:secondary) { create(:geo_node) }
   subject { described_class.new(gl_id, gl_repository) }
 
diff --git a/ee/spec/lib/gitlab/geo/replication/job_artifact_retriever_spec.rb b/ee/spec/lib/gitlab/geo/replication/job_artifact_retriever_spec.rb
index 8db6b4e55fdef7c5e94edb983bf84e071a7e738a..8de3695332303f50d2748e1c5c6e432980006532 100644
--- a/ee/spec/lib/gitlab/geo/replication/job_artifact_retriever_spec.rb
+++ b/ee/spec/lib/gitlab/geo/replication/job_artifact_retriever_spec.rb
@@ -5,6 +5,7 @@
 describe Gitlab::Geo::Replication::JobArtifactRetriever, :geo do
   context '#execute' do
     let(:retriever) { described_class.new(job_artifact.id, {}) }
+
     subject { retriever.execute }
 
     context 'when the job artifact exists' do
diff --git a/ee/spec/lib/gitlab/ip_address_state_spec.rb b/ee/spec/lib/gitlab/ip_address_state_spec.rb
index 0f63a4af2ada91f9c052c9a6e0f5c6dc71929551..fe173625ff1e4cfeab71cca7a226f33a1fd2e020 100644
--- a/ee/spec/lib/gitlab/ip_address_state_spec.rb
+++ b/ee/spec/lib/gitlab/ip_address_state_spec.rb
@@ -4,6 +4,7 @@
 
 describe Gitlab::IpAddressState do
   let(:address) { '1.1.1.1' }
+
   describe '.with' do
     it 'saves IP address' do
       described_class.with(address) do
diff --git a/ee/spec/lib/gitlab/prometheus/queries/cluster_query_spec.rb b/ee/spec/lib/gitlab/prometheus/queries/cluster_query_spec.rb
index 041dfebb77e8730fab0c845a50a9eb45c7f3713d..63f7e8bcfd74de65853fa614596abf622ecddd3d 100644
--- a/ee/spec/lib/gitlab/prometheus/queries/cluster_query_spec.rb
+++ b/ee/spec/lib/gitlab/prometheus/queries/cluster_query_spec.rb
@@ -4,6 +4,7 @@
 
 describe Gitlab::Prometheus::Queries::ClusterQuery do
   let(:client) { double('prometheus_client', query_range: nil) }
+
   subject { described_class.new(client) }
 
   around do |example|
diff --git a/ee/spec/lib/gitlab/prometheus/queries/validate_query_spec.rb b/ee/spec/lib/gitlab/prometheus/queries/validate_query_spec.rb
index 6dbc699ef754cac90e179a53955b6a6e1e984ebc..0287c4f6e16b8384fee9a3e2d96feaee4c69b582 100644
--- a/ee/spec/lib/gitlab/prometheus/queries/validate_query_spec.rb
+++ b/ee/spec/lib/gitlab/prometheus/queries/validate_query_spec.rb
@@ -5,6 +5,7 @@
 describe Gitlab::Prometheus::Queries::ValidateQuery do
   let(:client) { double('prometheus_client') }
   let(:query) { 'avg(metric)' }
+
   subject { described_class.new(client) }
 
   context 'valid query' do
@@ -21,6 +22,7 @@
 
   context 'invalid query' do
     let(:message) { 'message' }
+
     before do
       allow(client).to receive(:query).with(query).and_raise(Gitlab::PrometheusClient::QueryError.new(message))
     end
diff --git a/ee/spec/lib/pseudonymizer/dumper_spec.rb b/ee/spec/lib/pseudonymizer/dumper_spec.rb
index 66412b8bfce3cbec27a852959480464afc34d3d3..f75fe58af21547426b64cf04f95f876fb8ecbf23 100644
--- a/ee/spec/lib/pseudonymizer/dumper_spec.rb
+++ b/ee/spec/lib/pseudonymizer/dumper_spec.rb
@@ -10,6 +10,7 @@
       config: YAML.load_file(Gitlab.config.pseudonymizer.manifest)
     )
   end
+
   subject(:pseudo) { described_class.new(options) }
 
   before do
diff --git a/ee/spec/lib/pseudonymizer/pager_spec.rb b/ee/spec/lib/pseudonymizer/pager_spec.rb
index 12fd94b5b95361be4169394fdefd574750e6d5c7..188130438574ba8492ea2221a8bdf061d4191617 100644
--- a/ee/spec/lib/pseudonymizer/pager_spec.rb
+++ b/ee/spec/lib/pseudonymizer/pager_spec.rb
@@ -5,6 +5,7 @@
 describe Pseudonymizer::Pager do
   let(:page_size) { 1 }
   let!(:projects) { create_list(:project, 10) }
+
   subject { described_class.new("projects", whitelisted_columns) }
 
   before do
diff --git a/ee/spec/lib/pseudonymizer/uploader_spec.rb b/ee/spec/lib/pseudonymizer/uploader_spec.rb
index 2f3921fbf072d31f2f008415ed8d33d7b335ae78..9d71e7d9e8f2ca860e5b030e3432bc326c63e017 100644
--- a/ee/spec/lib/pseudonymizer/uploader_spec.rb
+++ b/ee/spec/lib/pseudonymizer/uploader_spec.rb
@@ -10,6 +10,7 @@
     )
   end
   let(:remote_directory) { subject.send(:remote_directory) }
+
   subject { described_class.new(options) }
 
   def mock_file(file_name)
diff --git a/ee/spec/mailers/notify_spec.rb b/ee/spec/mailers/notify_spec.rb
index afd7fda192d756e7edfe8915cd6acfd0e187fc68..4ae3424502425294fd574d095378b7c257a4aef9 100644
--- a/ee/spec/mailers/notify_spec.rb
+++ b/ee/spec/mailers/notify_spec.rb
@@ -122,6 +122,7 @@
 
       describe 'that are approved' do
         let(:last_approver) { create(:user) }
+
         subject { described_class.approved_merge_request_email(recipient.id, merge_request.id, last_approver.id) }
 
         before do
@@ -185,6 +186,7 @@
 
       describe 'that are unapproved' do
         let(:last_unapprover) { create(:user) }
+
         subject { described_class.unapproved_merge_request_email(recipient.id, merge_request.id, last_unapprover.id) }
 
         before do
@@ -239,6 +241,7 @@
     context 'for merge requests without assignee' do
       describe 'that are unapproved' do
         let(:last_unapprover) { create(:user) }
+
         subject { described_class.unapproved_merge_request_email(recipient.id, merge_request_without_assignee.id, last_unapprover.id) }
 
         before do
diff --git a/ee/spec/models/approvable_spec.rb b/ee/spec/models/approvable_spec.rb
index cf0377830148f2490c4f9d76b29ad178706f7f40..207b714c71a651f53ee6723dad0e156b41525220 100644
--- a/ee/spec/models/approvable_spec.rb
+++ b/ee/spec/models/approvable_spec.rb
@@ -11,6 +11,7 @@
   describe '#approval_feature_available?' do
     let(:project) { create(:project) }
     let(:merge_request) { create(:merge_request, source_project: project, target_project: project) }
+
     subject { merge_request.approval_feature_available? }
 
     it 'is false when feature is disabled' do
diff --git a/ee/spec/models/design_management/version_spec.rb b/ee/spec/models/design_management/version_spec.rb
index 38b50b842b87feff56f3e679707fad087c931498..30ce6919eda0eadcaf37f94ca8c24d249bffa599 100644
--- a/ee/spec/models/design_management/version_spec.rb
+++ b/ee/spec/models/design_management/version_spec.rb
@@ -207,6 +207,7 @@ def call_with_mismatched_designs
 
   describe '#author' do
     let(:author) { create(:user) }
+
     subject(:version) { create(:design_version, :committed, author: author) }
 
     it { is_expected.to have_attributes(author: author) }
diff --git a/ee/spec/models/ee/list_spec.rb b/ee/spec/models/ee/list_spec.rb
index 0b83a05e1a8415d59e0d52c2363674dae556416a..7778f5cf74a2c0e3a9bda797a7e9c3e374c67d90 100644
--- a/ee/spec/models/ee/list_spec.rb
+++ b/ee/spec/models/ee/list_spec.rb
@@ -36,6 +36,7 @@
 
   context 'when it is a milestone type' do
     let(:milestone) { build(:milestone, title: 'awesome-release') }
+
     subject { described_class.new(list_type: :milestone, milestone: milestone, board: board) }
 
     it { is_expected.to be_destroyable }
diff --git a/ee/spec/models/gitlab_subscription_spec.rb b/ee/spec/models/gitlab_subscription_spec.rb
index 3c1c0364c8616002179d2b8ce8e6441ffc932cef..a74f815c3c40c2ea0ec37ef54cc2b86e0cfe7e38 100644
--- a/ee/spec/models/gitlab_subscription_spec.rb
+++ b/ee/spec/models/gitlab_subscription_spec.rb
@@ -159,6 +159,7 @@
 
   describe '#expired?' do
     let(:gitlab_subscription) { create(:gitlab_subscription, end_date: end_date) }
+
     subject { gitlab_subscription.expired? }
 
     context 'when end_date is expired' do
diff --git a/ee/spec/models/issue_spec.rb b/ee/spec/models/issue_spec.rb
index 97ce7f540ec25f0ba8b692ad19d6a93967db3c88..eab61db5bf68196c400f4c1c9be6c9acd53d44d5 100644
--- a/ee/spec/models/issue_spec.rb
+++ b/ee/spec/models/issue_spec.rb
@@ -266,6 +266,7 @@
 
   describe '#promoted?' do
     let(:issue) { create(:issue) }
+
     subject { issue.promoted? }
 
     context 'issue not promoted' do
@@ -487,6 +488,7 @@
 
   describe 'current designs' do
     let(:issue) { create(:issue) }
+
     subject { issue.designs.current }
 
     context 'an issue has no designs' do
diff --git a/ee/spec/models/license_spec.rb b/ee/spec/models/license_spec.rb
index 5f221a981af711113616186cc027f9e666c4e3fb..f80fb550dd7665f5b542a016ddfccb463ffd0bac 100644
--- a/ee/spec/models/license_spec.rb
+++ b/ee/spec/models/license_spec.rb
@@ -304,6 +304,7 @@
 
     describe '.plan_includes_feature?' do
       let(:feature) { :deploy_board }
+
       subject { described_class.plan_includes_feature?(plan, feature) }
 
       context 'when addon included' do
@@ -669,6 +670,7 @@ def build_license_with_add_ons(add_ons, plan: nil)
 
       context 'when the license is the very first trial' do
         let(:tomorrow) { Date.tomorrow }
+
         before do
           gl_license.restrictions = { trial: true }
           gl_license.expires_at = tomorrow
@@ -689,6 +691,7 @@ def build_license_with_add_ons(add_ons, plan: nil)
 
       context 'when the license is a repeated trial' do
         let(:yesterday) { Date.yesterday }
+
         before do
           gl_license.restrictions = { trial: true }
           gl_license.expires_at = Date.tomorrow
diff --git a/ee/spec/models/merge_request_spec.rb b/ee/spec/models/merge_request_spec.rb
index acfd9df80e457b6bfe123a03ea20e5941a74830a..15cf92c083e4867d7678d7d139659d0c7d0e0eac 100644
--- a/ee/spec/models/merge_request_spec.rb
+++ b/ee/spec/models/merge_request_spec.rb
@@ -335,6 +335,7 @@
     let(:project) { create(:project, :repository) }
     let(:current_user) { project.users.take }
     let(:merge_request) { create(:merge_request, source_project: project) }
+
     subject { merge_request.calculate_reactive_cache(service_class_name, current_user&.id) }
 
     context 'when given a known service class name' do
@@ -713,6 +714,7 @@ def create_pipeline(status)
 
     context 'when using approvals' do
       let(:user) { create(:user) }
+
       before do
         allow(subject).to receive(:mergeable_state?).and_return(true)
 
diff --git a/ee/spec/models/namespace_spec.rb b/ee/spec/models/namespace_spec.rb
index 53f20531d5cc1a487343cc88f7fb717012002b8c..dc5692cafde5852400dc68e1813143e319ebcfac 100644
--- a/ee/spec/models/namespace_spec.rb
+++ b/ee/spec/models/namespace_spec.rb
@@ -620,6 +620,7 @@
 
   describe '#shared_runners_remaining_minutes_percent' do
     let(:namespace) { build(:namespace) }
+
     subject { namespace.shared_runners_remaining_minutes_percent }
 
     it 'returns the minutes left as a percent of the limit' do
@@ -666,6 +667,7 @@ def stub_minutes_used_and_limit(minutes_used, limit)
 
   describe '#shared_runners_remaining_minutes_below_threshold?' do
     let(:namespace) { build(:namespace, last_ci_minutes_usage_notification_level: 30) }
+
     subject { namespace.shared_runners_remaining_minutes_below_threshold? }
 
     it 'is true when minutes left is below the notification level' do
diff --git a/ee/spec/models/project_services/jenkins_deprecated_service_spec.rb b/ee/spec/models/project_services/jenkins_deprecated_service_spec.rb
index 820ff7ef88d1a30749be90066ffdfa7970191848..134969036540ba2529fdc29da7cbae961582bf82 100644
--- a/ee/spec/models/project_services/jenkins_deprecated_service_spec.rb
+++ b/ee/spec/models/project_services/jenkins_deprecated_service_spec.rb
@@ -23,6 +23,7 @@ def status_body_for_icon(state)
 
     describe '#calculate_reactive_cache' do
       let(:pass_unstable) { '0' }
+
       before do
         @service = JenkinsDeprecatedService.new
         allow(@service).to receive_messages(
@@ -73,6 +74,7 @@ def status_body_for_icon(state)
 
     describe 'multiproject enabled' do
       let!(:project) { create(:project) }
+
       before do
         @service = JenkinsDeprecatedService.new
         allow(@service).to receive_messages(
diff --git a/ee/spec/models/project_spec.rb b/ee/spec/models/project_spec.rb
index c6416bc8cf16dbbc004c6d912f0e5a3492a3648b..2fff009f2582e7605634076dc27e4213c9bcc122 100644
--- a/ee/spec/models/project_spec.rb
+++ b/ee/spec/models/project_spec.rb
@@ -1767,6 +1767,7 @@ def stub_find_remote_root_ref(project, ref:)
 
   describe '#object_pool_missing?' do
     let(:pool) { create(:pool_repository, :ready) }
+
     subject { create(:project, :repository, pool_repository: pool) }
 
     it 'returns true when object pool is missing' do
diff --git a/ee/spec/models/user_spec.rb b/ee/spec/models/user_spec.rb
index b14be6ebcc44f978a7c4b44706f4e9e0cbde0e2b..e30ff352174be5428fce3ff79a70bae107ccb2e0 100644
--- a/ee/spec/models/user_spec.rb
+++ b/ee/spec/models/user_spec.rb
@@ -657,6 +657,7 @@
 
     context 'namespace with input name exists' do
       let(:name) { 'Disney' }
+
       before do
         create(:user, name: 'disney')
       end
@@ -670,6 +671,7 @@
 
     context 'namespace with input name and suffix exists' do
       let(:name) { 'Disney' }
+
       before do
         create(:user, name: 'disney')
         create(:user, name: 'disney1')
diff --git a/ee/spec/policies/clusters/instance_policy_spec.rb b/ee/spec/policies/clusters/instance_policy_spec.rb
index e87f6958cf60bdf5c06e86c062b999654764d060..58e488a84966969fa58480b7853aa8b979886d50 100644
--- a/ee/spec/policies/clusters/instance_policy_spec.rb
+++ b/ee/spec/policies/clusters/instance_policy_spec.rb
@@ -4,6 +4,7 @@
 
 describe Clusters::InstancePolicy do
   let(:user) { create(:admin) }
+
   subject { described_class.new(user, Clusters::Instance.new) }
 
   context 'when cluster deployments is available' do
diff --git a/ee/spec/policies/group_policy_spec.rb b/ee/spec/policies/group_policy_spec.rb
index cf13e1811a7b7ad5179d64e77da157748a3b264a..15a50ea58b25ef6e649c08cb521a1bb312d4ada3 100644
--- a/ee/spec/policies/group_policy_spec.rb
+++ b/ee/spec/policies/group_policy_spec.rb
@@ -138,6 +138,7 @@
 
     context 'with sso enforcement enabled' do
       let(:current_user) { guest }
+
       let_it_be(:saml_provider) { create(:saml_provider, group: group, enforced_sso: true) }
 
       context 'when the session has been set globally' do
diff --git a/ee/spec/requests/api/graphql/mutations/epics/update_spec.rb b/ee/spec/requests/api/graphql/mutations/epics/update_spec.rb
index c18bf942271a140b40440083d6fdc0ce9ec6c663..bed0c5ec64803580600a6f3c093c808293f92218 100644
--- a/ee/spec/requests/api/graphql/mutations/epics/update_spec.rb
+++ b/ee/spec/requests/api/graphql/mutations/epics/update_spec.rb
@@ -105,6 +105,7 @@ def mutation_response
 
       context 'when changing labels of the epic' do
         let(:attributes) { { add_label_ids: [label_1.id, label_3.id], remove_label_ids: label_2.id } }
+
         it 'adds and removes labels correctly' do
           post_graphql_mutation(mutation, current_user: current_user)
 
diff --git a/ee/spec/requests/api/issues_spec.rb b/ee/spec/requests/api/issues_spec.rb
index 0245a1a9b2d2553566c4e8c17cf0e9d8d6f2c8ad..51079fcec7e43e328fe6308372976e13475e1d5d 100644
--- a/ee/spec/requests/api/issues_spec.rb
+++ b/ee/spec/requests/api/issues_spec.rb
@@ -27,6 +27,7 @@
            title: issue_title,
            description: issue_description
   end
+
   set(:milestone) { create(:milestone, title: '1.0.0', project: project) }
 
   before(:all) do
diff --git a/ee/spec/requests/api/project_import_spec.rb b/ee/spec/requests/api/project_import_spec.rb
index f6670960843cb3a225a2a20fd01a41a2e9ef107d..cb5145f1bd0cdef663cfa3b562e2084aa6c34a2a 100644
--- a/ee/spec/requests/api/project_import_spec.rb
+++ b/ee/spec/requests/api/project_import_spec.rb
@@ -9,6 +9,7 @@
   let(:user) { create(:user) }
   let(:file) { File.join('spec', 'features', 'projects', 'import_export', 'test_project_export.tar.gz') }
   let(:namespace) { create(:group) }
+
   before do
     allow_any_instance_of(Gitlab::ImportExport).to receive(:storage_path).and_return(export_path)
 
diff --git a/ee/spec/requests/api/todos_spec.rb b/ee/spec/requests/api/todos_spec.rb
index 6ee100cd54f0d5a48267086d43133bafde0a58c7..9b3d00c4cffd70f74264230b9de4c835257e81ea 100644
--- a/ee/spec/requests/api/todos_spec.rb
+++ b/ee/spec/requests/api/todos_spec.rb
@@ -6,6 +6,7 @@
   set(:group) { create(:group) }
   let(:user) { create(:user) }
   let(:epic) { create(:epic, group: group) }
+
   set(:project) { create(:project, group: group) }
 
   describe 'GET /todos' do
diff --git a/ee/spec/requests/git_http_geo_spec.rb b/ee/spec/requests/git_http_geo_spec.rb
index 7571b523575177b0a18294b526da5b8bb90aa3cf..918a9e5bf4fa47d8885b68bb8d228328b4aefbf6 100644
--- a/ee/spec/requests/git_http_geo_spec.rb
+++ b/ee/spec/requests/git_http_geo_spec.rb
@@ -67,6 +67,7 @@
 
     context 'no Geo JWT token' do
       let(:env) { workhorse_internal_api_request_header }
+
       it { is_expected.to have_gitlab_http_status(:unauthorized) }
     end
 
diff --git a/ee/spec/serializers/epic_note_entity_spec.rb b/ee/spec/serializers/epic_note_entity_spec.rb
index f877138937b0bf38e382f6e33f7b1bf504a3fff7..4f68ebad2b8094b57031aba5c556edb4db3de771 100644
--- a/ee/spec/serializers/epic_note_entity_spec.rb
+++ b/ee/spec/serializers/epic_note_entity_spec.rb
@@ -11,6 +11,7 @@
   let(:epic) { create(:epic, author: user) }
   let(:note) { create(:note, noteable: epic, author: user) }
   let(:user) { create(:user) }
+
   subject { entity.as_json }
 
   it_behaves_like 'note entity'
diff --git a/ee/spec/services/ee/boards/lists/create_service_spec.rb b/ee/spec/services/ee/boards/lists/create_service_spec.rb
index fb0d9130b29501820010e65de39b8fa1d540d070..c4066e9d57882ec136569299159206911c4631cb 100644
--- a/ee/spec/services/ee/boards/lists/create_service_spec.rb
+++ b/ee/spec/services/ee/boards/lists/create_service_spec.rb
@@ -10,6 +10,7 @@
 
     context 'when assignee_id param is sent' do
       let(:other_user) { create(:user) }
+
       subject(:service) { described_class.new(project, user, 'assignee_id' => other_user.id) }
 
       before do
@@ -30,6 +31,7 @@
     context 'when milestone_id param is sent' do
       let(:user) { create(:user) }
       let(:milestone) { create(:milestone, project: project) }
+
       subject(:service) { described_class.new(project, user, 'milestone_id' => milestone.id) }
 
       before do
diff --git a/ee/spec/services/fetch_subscription_plans_service_spec.rb b/ee/spec/services/fetch_subscription_plans_service_spec.rb
index 0d2da790ee6519732a31e0941db86afc04944855..2dc3f5c322d39744d49b1190fb39eaaa63f7af02 100644
--- a/ee/spec/services/fetch_subscription_plans_service_spec.rb
+++ b/ee/spec/services/fetch_subscription_plans_service_spec.rb
@@ -5,6 +5,7 @@
 describe FetchSubscriptionPlansService do
   describe '#execute' do
     let(:endpoint_url) { 'https://customers.gitlab.com/gitlab_plans' }
+
     subject { described_class.new(plan: 'bronze').execute }
 
     context 'when successully fetching plans data' do
diff --git a/ee/spec/services/licenses/destroy_service_spec.rb b/ee/spec/services/licenses/destroy_service_spec.rb
index 0470ab97d150a60b2e6b14b2f3068d738b59e453..fe09d6b62d9f6fdb89a2cd747696082b2f67058a 100644
--- a/ee/spec/services/licenses/destroy_service_spec.rb
+++ b/ee/spec/services/licenses/destroy_service_spec.rb
@@ -3,6 +3,7 @@
 
 describe Licenses::DestroyService do
   let(:license) { create(:license) }
+
   set(:user) { create(:admin) }
 
   def destroy_with(user)
diff --git a/ee/spec/services/merge_requests/approval_service_spec.rb b/ee/spec/services/merge_requests/approval_service_spec.rb
index ceebc3a4f503bc363398016dc5c67722719df148..7087f8318d83d27bb25acbfc89b2510a9760f9e0 100644
--- a/ee/spec/services/merge_requests/approval_service_spec.rb
+++ b/ee/spec/services/merge_requests/approval_service_spec.rb
@@ -106,6 +106,7 @@
         let(:params) do
           { approval_password: 'incorrect' }
         end
+
         it 'raises an error' do
           service_with_params = described_class.new(project, user, params)
           expect { service_with_params.execute(merge_request) }.to raise_error(::MergeRequests::ApprovalService::IncorrectApprovalPasswordError)
@@ -116,6 +117,7 @@
         let(:params) do
           { approval_password: 'password' }
         end
+
         it 'does not raise an error' do
           service_with_params = described_class.new(project, user, params)
           expect { service_with_params.execute(merge_request) }.not_to raise_error(::MergeRequests::ApprovalService::IncorrectApprovalPasswordError)
diff --git a/ee/spec/services/personal_access_tokens/revoke_invalid_tokens_spec.rb b/ee/spec/services/personal_access_tokens/revoke_invalid_tokens_spec.rb
index 82550951b2ea15dc60f4698e8a6dee565a8f2fd9..f4e96b7b8e6915f82158b0e7f17e2284f20af12d 100644
--- a/ee/spec/services/personal_access_tokens/revoke_invalid_tokens_spec.rb
+++ b/ee/spec/services/personal_access_tokens/revoke_invalid_tokens_spec.rb
@@ -7,6 +7,7 @@
 
   describe '#execute' do
     let(:expiration_date) { 10.days.from_now }
+
     let_it_be(:user) { create(:user) }
     let_it_be(:pat) { create(:personal_access_token, expires_at: 5.days.from_now, user: user) }
     let_it_be(:invalid_pat1) { create(:personal_access_token, expires_at: nil, user: user) }
diff --git a/ee/spec/services/quick_actions/interpret_service_spec.rb b/ee/spec/services/quick_actions/interpret_service_spec.rb
index ae262433c4a4b664ce9ea8b01059192812fdafc7..40b7a38786c0d47dee37502f695cff07e3871e31 100644
--- a/ee/spec/services/quick_actions/interpret_service_spec.rb
+++ b/ee/spec/services/quick_actions/interpret_service_spec.rb
@@ -565,6 +565,7 @@
 
           context 'when child and parent epics are in different groups' do
             let(:child_epic) { create(:epic, group: group, parent: epic) }
+
             context 'when child epic is in a parent group of the parent epic' do
               before do
                 epic.update!(group: subgroup)
diff --git a/ee/spec/services/search/group_service_spec.rb b/ee/spec/services/search/group_service_spec.rb
index 8a218ac6558ac9b26db768ff0e271a1acf56c849..fd597f76d8479ec0fa3d6e7fb8702618aa65b826 100644
--- a/ee/spec/services/search/group_service_spec.rb
+++ b/ee/spec/services/search/group_service_spec.rb
@@ -86,6 +86,7 @@
           { project_level: :internal, feature_access_level: :enabled, membership: :guest, expected_count: 1 }
         ]
       end
+
       where(:project_level, :feature_access_level, :membership, :expected_count) do
         permission_table_for_reporter_feature_access
       end
diff --git a/ee/spec/support/prometheus/additional_metrics_shared_examples.rb b/ee/spec/support/prometheus/additional_metrics_shared_examples.rb
index 8be03f26f71197c337521827212177749f27de12..c5ed25e3f1c709bb3ea861e7f96878f01bb0dcfc 100644
--- a/ee/spec/support/prometheus/additional_metrics_shared_examples.rb
+++ b/ee/spec/support/prometheus/additional_metrics_shared_examples.rb
@@ -24,6 +24,7 @@
 
   context 'with custom metrics' do
     let!(:metric) { create(:prometheus_metric, project: project) }
+
     before do
       allow(client).to receive(:query_range).with('avg(metric)', any_args).and_return(query_range_result)
     end
diff --git a/ee/spec/support/shared_examples/packages_shared_examples.rb b/ee/spec/support/shared_examples/packages_shared_examples.rb
index 75f5784e45bb8816086a82539e9b31d584c09577..f77a07390b46ddd901d9a1f0a2ae03732096f27c 100644
--- a/ee/spec/support/shared_examples/packages_shared_examples.rb
+++ b/ee/spec/support/shared_examples/packages_shared_examples.rb
@@ -73,6 +73,7 @@
 
   context 'when viewing the first page' do
     let(:page) { 1 }
+
     it 'returns first 2 packages' do
       get api(url, user), params: { page: page, per_page: per_page }
 
@@ -82,6 +83,7 @@
 
   context 'when viewing the second page' do
     let(:page) { 2 }
+
     it 'returns first 2 packages' do
       get api(url, user), params: { page: page, per_page: per_page }
 
diff --git a/ee/spec/support/shared_examples/serializers/report_status_shared_examples.rb b/ee/spec/support/shared_examples/serializers/report_status_shared_examples.rb
index 8fe27a1c01fda8109687d790c5a59d316d66689e..7ecdac731300b1c4daa6888e82181995d4ade844 100644
--- a/ee/spec/support/shared_examples/serializers/report_status_shared_examples.rb
+++ b/ee/spec/support/shared_examples/serializers/report_status_shared_examples.rb
@@ -7,6 +7,7 @@
     end
 
     let(:request) { double('request') }
+
     set(:project) { create(:project, :repository, :private) }
     set(:developer) { create(:user) }
 
diff --git a/ee/spec/workers/ee/repository_check/batch_worker_spec.rb b/ee/spec/workers/ee/repository_check/batch_worker_spec.rb
index f801d039129e7251e88d4fe2b719d4e8a37e7786..88523e189c714bca2282fa162f39ce16a3a23d52 100644
--- a/ee/spec/workers/ee/repository_check/batch_worker_spec.rb
+++ b/ee/spec/workers/ee/repository_check/batch_worker_spec.rb
@@ -6,6 +6,7 @@
   include ::EE::GeoHelpers
 
   let(:shard_name) { 'default' }
+
   subject(:worker) { RepositoryCheck::BatchWorker.new }
 
   before do