Integrate label key resolution into TextWidget
epic-dynamic-terminology-and-labels-ui-and-accessibility-task-002 — Connect TerminologyAwareTextWidget to the LabelKeyResolver service via the Terminology Riverpod Providers. On each build, watch the active organization's label map, call LabelKeyResolver.resolve(labelKey, map), and pass the resolved string to Flutter's Text widget. Ensure widget rebuilds automatically when the provider state changes.
Acceptance Criteria
Technical Requirements
Execution Context
Tier 1 - 540 tasks
Can start after Tier 0 completes
Implementation Notes
Extend ConsumerWidget (not StatelessWidget) to get access to `ref` in the build method. The pattern is: `final labelMap = ref.watch(organizationLabelMapProvider); final resolved = LabelKeyResolver.resolve(labelKey, labelMap) ?? fallback ?? _humanize(labelKey); return Text(resolved, style: widget.style, ...);`.
Use `ref.watch` — never `ref.read` inside build, as `read` does not subscribe. Keep the widget thin: do not add caching, memoization, or local state. The LabelKeyResolver should handle all caching internally if needed. Pass `style`, `textAlign`, `overflow`, `maxLines`, `softWrap`, and `semanticsLabel` through to the inner Text widget so callers retain full control.
Add a `const` constructor and mark `labelKey` and `fallback` as `final` fields. Avoid importing the resolver directly in the widget — inject it through the provider graph to keep the widget testable.
Testing Requirements
Unit tests using flutter_test: (1) Wrap TerminologyAwareTextWidget in a ProviderScope with a mocked OrganizationLabelsNotifier, assert the rendered Text displays the resolved string for a known labelKey. (2) Override the provider with an updated label map and pump the widget — assert the displayed text updates without hot reload. (3) Test with an empty label map — widget must not throw. (4) Test with a null/missing key in the map — widget must fall back gracefully (see task-003).
Target: 100% branch coverage for the build method. All tests must pass with `flutter test` in CI.
WcagSemanticsLabelResolver's Semantics wrappers may conflict with Semantics nodes already defined by existing accessible widgets (e.g., accessible-bottom-navigation, activity-wizard-semantics), causing duplicate or contradictory screen reader announcements that fail WCAG 2.2 AA criteria.
Mitigation & Contingency
Mitigation: Audit all existing Semantics-annotated widgets in the accessibility feature before implementing WcagSemanticsLabelResolver. Define a clear hierarchy rule: WcagSemanticsLabelResolver always merges with, never replaces, existing Semantics nodes. Use Flutter's debugSemantics output in CI to detect conflicts automatically.
Contingency: If conflicts are discovered in testing, introduce a resolverMode parameter to WcagSemanticsLabelResolver allowing it to operate in 'override' or 'merge' mode per call site; coordinate with the Screen Reader Support feature team to align Semantics strategies.
If TerminologyAwareTextWidget subscribes to the full terminology map provider rather than the per-key labelProvider family, a single label update will trigger a full widget-tree rebuild across all screens simultaneously, causing jank on devices used by older peer mentors.
Mitigation & Contingency
Mitigation: Implement TerminologyAwareTextWidget using ref.watch(labelProvider(key)) on the per-key family provider from TerminologyRiverpodProviders so that only widgets bound to the changed key rebuild. Verify with Flutter DevTools 'rebuild tracking' in widget tests.
Contingency: If full-map subscriptions slip through code review, add a Riverpod lint rule that flags direct organizationLabelsNotifierProvider subscriptions inside widget build methods and enforces the per-key family pattern.
The TerminologyAdminPreviewScreen requires coordinator-level access, but if role checks rely solely on client-side guard logic without matching Supabase RLS policies, a peer mentor could potentially access the admin preview by manipulating navigation state.
Mitigation & Contingency
Mitigation: Protect the admin preview route with a server-validated role guard that re-fetches the user's role from Supabase on screen initialization, not just from local state. Add a Supabase RLS policy that restricts label map read access for the admin preview endpoint to coordinator and admin roles only.
Contingency: If unauthorized access is discovered in testing, immediately add a middleware role assertion that redirects non-coordinators to the no-access screen and logs the unauthorized navigation attempt for audit.