ProxyRegistrationService: single proxy activity creation flow
epic-bulk-and-proxy-registration-services-task-009 — Wire together permission validation, payload construction, duplicate detection check, and repository persistence into the complete registerProxyActivity(coordinatorId, mentorId, activityData) method. Return a ProxyRegistrationResult that carries either a success confirmation (with the created record ID) or a structured failure (PermissionDenied | DuplicateWarning | PersistenceError). The DuplicateWarning result must be non-blocking — callers decide whether to proceed.
Acceptance Criteria
Technical Requirements
Execution Context
Tier 4 - 323 tasks
Can start after Tier 3 completes
Implementation Notes
Use a freezed sealed class for ProxyRegistrationResult with four variants: success, permissionDenied, duplicateWarning, persistenceError. The duplicateWarning variant should carry both the List
Consider a thin ActivityPayloadBuilder helper to keep payload construction logic out of the service method. For NHF multi-coordinator chapter support, ensure the scope check queries against the chapter's coordinator-mentor assignments table, not a cached list.
Testing Requirements
Unit tests are handled in task-010. This task requires the implementation to be structured for testability: ProxyActivityRepository, ProxyDuplicateDetector, and the scope/permission validator must all be injected as constructor dependencies (not instantiated internally) so mocks can be substituted. Use flutter_test with mockito or mocktail for dependency injection in tests. Verify that the orchestration logic (ordering of calls, correct result mapping) can be tested without a live Supabase connection.
The Proxy Registration Service must verify that the coordinator has a legitimate assignment relationship with the target peer mentor before creating a record. If this check is implemented only in application code and not enforced at the DB/RLS level, a compromised or buggy client could bypass it by calling the Supabase endpoint directly, creating fraudulent proxy records for arbitrary peer mentors.
Mitigation & Contingency
Mitigation: Implement permission validation at two levels: (1) application-layer check in Proxy Registration Service that queries the assignments table before constructing the payload, and (2) RLS policy on the activities table that restricts INSERT to rows where recorded_by_user_id matches the authenticated user AND peer_mentor_id is in the set of peer mentors assigned to that coordinator. The RLS policy is the authoritative guard; the service-layer check provides early user-facing feedback.
Contingency: If RLS policy implementation is blocked by Supabase plan constraints, implement a Supabase Edge Function as a proxy endpoint that enforces the permission check server-side before forwarding to the DB. Disable direct client inserts entirely for proxy activities.
For a bulk session with 30 selected peer mentors, the Proxy Duplicate Detector must query existing activities for each mentor. If implemented as 30 sequential Supabase queries, round-trip latency could make the bulk confirmation screen feel slow (>3s), degrading coordinator experience and potentially causing timeouts.
Mitigation & Contingency
Mitigation: Implement the duplicate check as a single Supabase query using an IN clause on peer_mentor_id combined with the activity_type and date filters, returning all potential duplicates for the entire batch in one network round-trip. Group results client-side by mentor ID to produce the per-mentor warning structure.
Contingency: If the single-query approach returns too much data for very large chapters, add a database index on (peer_mentor_id, activity_type, date) and profile query time. If still insufficient, accept a short loading state on the confirmation screen with a progress indicator rather than pre-loading duplicates before navigation.