Implement Threshold Evaluation Service
epic-expense-approval-workflow-coordinator-ui-task-005 — Develop the ThresholdEvaluationService that applies organization-configured thresholds to determine whether a submitted expense claim qualifies for auto-approval or must enter the coordinator review queue. Read threshold configuration per org (distance limit, amount limit, receipt requirement) and return a structured evaluation result.
Acceptance Criteria
Technical Requirements
Execution Context
Tier 2 - 518 tasks
Can start after Tier 1 completes
Implementation Notes
Separate the pure evaluation logic (ThresholdEvaluator) from the service (ThresholdEvaluationService) that handles config fetching and caching. ThresholdEvaluator should be a class with only synchronous, pure methods — this makes it trivially testable without mocks. The service wraps the evaluator and injects the fetched config. For caching, use a simple Dart record {ApprovalThresholdConfig config, DateTime fetchedAt} stored in the provider state; invalidate when fetchedAt + TTL < now.
Per the workshop notes, HLF specifically requires that km + receipt combinations be technically impossible to combine — represent this as a mutually exclusive rule in the ThresholdRule model. Document the business logic clearly in code comments since the rules come from Norwegian org-specific requirements.
Testing Requirements
Unit tests (pure Dart, no Flutter framework needed): test all boundary conditions for amount threshold, distance threshold, and receipt requirement combinations. Use a factory method to create test ApprovalThresholdConfig instances. Test cache behavior: verify that a second call within TTL does not trigger a Supabase fetch (mock the data source and assert call count = 1). Test fail-safe: when fetchConfig throws, evaluateClaim returns requires_review.
Integration test: fetch real config from a test Supabase project and verify evaluation against a set of fixture claims. Target 95%+ line coverage on the pure evaluation logic (domain layer).
Maintaining multi-select state across paginated list pages is architecturally complex in Flutter with Riverpod/BLoC. If the selection state is stored in the widget tree rather than the state layer, page transitions and list redraws can silently clear selections, causing coordinators to lose their multi-select and re-enter it.
Mitigation & Contingency
Mitigation: Store the selected claim ID set in a dedicated Riverpod StateNotifier outside the paginated list widget tree. The paginated list reads selection state from this provider and does not own it. Selection persists independently of list scroll position or page loads.
Contingency: If cross-page selection proves prohibitively complex, limit bulk selection to the currently visible page (add a clear warning in the UI) and prioritise single-page bulk approval for the initial release.
If a coordinator has the queue open while another coordinator approves claims from the same queue (possible in large organisations with shared chapter coverage), the Realtime update may arrive out of order or be missed during a reconnect, leaving the first coordinator's view stale and allowing them to attempt to approve an already-actioned claim.
Mitigation & Contingency
Mitigation: The ApprovalWorkflowService's optimistic locking (from the foundation epic) will catch the concurrent edit at the database level. The CoordinatorReviewQueueScreen should handle the resulting ConcurrencyException by removing the claim from the local list and showing a brief snackbar: 'This claim was already actioned by another coordinator.'
Contingency: Add a queue staleness indicator (a subtle 'last updated X seconds ago' label) and a manual refresh button as a fallback for coordinators who notice inconsistencies.
The end-to-end test requirement that a peer mentor receives a push notification within 30 seconds of coordinator approval depends on FCM delivery latency, which is outside the application's control and can vary significantly in CI/CD environments.
Mitigation & Contingency
Mitigation: Structure end-to-end tests to verify notification intent (correct FCM payload dispatched, correct Realtime event emitted) rather than actual device delivery timing. Use test doubles for FCM delivery in automated tests and reserve real-device delivery tests for manual pre-release validation.
Contingency: If notification timing requirements must be validated in automation, instrument the ApprovalNotificationService with a test hook that records dispatch timestamps and assert against those rather than actual FCM callbacks.