Implement OrganizationIntegrationRepository CRUD operations
epic-external-system-integration-configuration-foundation-task-008 — Implement the full Dart repository class for CRUD operations on organization_integrations via Supabase client. Methods: getIntegrationsByOrg(), getIntegrationById(), createIntegration(), updateIntegration(), deleteIntegration(). All methods must handle Supabase exceptions, map to domain errors, and serialize/deserialize JSONB field_mappings correctly.
Acceptance Criteria
Technical Requirements
Execution Context
Tier 3 - 413 tasks
Can start after Tier 2 completes
Handles integration between different epics or system components. Requires coordination across multiple development streams.
Implementation Notes
Define abstract class OrganizationIntegrationRepository with method signatures in lib/domain/integrations/. Place the Supabase implementation in lib/infrastructure/integrations/supabase_organization_integration_repository.dart. Register the repository as a Riverpod provider (Provider
For updateIntegration, use Supabase .update() with .eq('id', id).select() to return the updated row in a single round trip. Avoid exposing raw Supabase response maps outside this file.
Testing Requirements
Write unit and integration tests using flutter_test. Unit tests: mock the Supabase client and test each method's happy path and error paths (PostgrestException → domain exception mapping). Integration tests (optional, if test Supabase project available): test against a real Supabase test instance with known fixture data. Test scenarios: (1) getIntegrationsByOrg returns empty list for org with no integrations; (2) getIntegrationById returns null for non-existent ID; (3) createIntegration returns model with server-generated fields populated; (4) updateIntegration only changes specified mutable fields; (5) deleteIntegration throws IntegrationNotFoundException for unknown ID; (6) PostgrestException with code 42501 (RLS) maps to IntegrationPermissionException.
Supabase Vault API has limited documentation for Dart/Flutter clients; wrapping it correctly for credential rotation and secret reference management may require significant trial and error, delaying the vault component and blocking all downstream credential-dependent work.
Mitigation & Contingency
Mitigation: Spike the Vault integration in the first sprint using a minimal proof-of-concept (store, retrieve, rotate one secret). Document the API surface before building the full vault client. Identify any missing Dart SDK bindings early.
Contingency: If Supabase Vault is too complex, fall back to Supabase's encrypted column approach (pgcrypto) for credential storage as a temporary measure, with a planned migration path to Vault once the API is understood.
Incorrect RLS policy configuration on organization_integrations could allow org admins of one organization to read or modify another organization's integration credentials, creating a serious data breach and compliance violation.
Mitigation & Contingency
Mitigation: Write integration tests that explicitly attempt cross-org data access using different JWT tokens and assert 0 rows returned. Include RLS policy review in PR checklist. Use Supabase's local development stack for policy validation before deployment.
Contingency: If a breach is discovered post-deployment, immediately revoke all integration credentials, rotate vault secrets, notify affected organizations, and apply emergency RLS patches.
JSONB columns for field_mappings and sync_schedule lack database-level schema enforcement; AI-generated or malformed JSON could silently corrupt integration configurations, causing export failures that are hard to diagnose.
Mitigation & Contingency
Mitigation: Define TypeScript/Dart model classes with strict deserialization and validation. Add database check constraints or triggers that validate JSONB structure at write time. Version the JSONB schema to enable forward-compatible migrations.
Contingency: Build a repair script that scans organization_integrations for invalid JSONB and resets corrupted records to a safe default state, alerting the admin of the affected organization.