Implement HierarchyStructureValidator cycle detection
epic-organizational-hierarchy-management-core-services-task-007 — Implement the cycle-detection validation rule inside HierarchyStructureValidator as a standalone, testable method that accepts a proposed parent assignment and the current adjacency list. Returns a ValidationResult with an explanatory message. This runs as a pre-mutation gate called by HierarchyService before any write.
Acceptance Criteria
Technical Requirements
Execution Context
Tier 1 - 540 tasks
Can start after Tier 0 completes
Implementation Notes
This validator is the authoritative, pure-function implementation of cycle detection logic. The HierarchyService-level check (task-004) is defense-in-depth and should delegate to this validator rather than re-implementing the algorithm. Keep the method signature purely functional: (String, String, Map
Accumulate the traversal path in a List
Testing Requirements
Unit tests (flutter_test) — all tests operate on in-memory adjacency maps with no mocking required: self-parent returns ValidationFailure with CycleDetected code; 2-node cycle (A→B, propose B as parent of A) returns ValidationFailure; 3-node cycle returns ValidationFailure with full path in message; valid reparent across branches returns ValidationSuccess; reparent to existing parent (no change) returns ValidationSuccess; empty adjacency list (new root unit) returns ValidationSuccess; disconnected graph with multiple roots returns correct result. Target 100% branch coverage on validateNoCycle. Fuzz test: generate random DAGs of 100–500 nodes, insert one cycle, assert detector catches it.
Injecting all unit assignment IDs into JWT claims for users assigned to many units (up to 5 for NHF peer mentors, many more for national coordinators) may exceed JWT size limits, causing authentication failures.
Mitigation & Contingency
Mitigation: Store unit IDs in a Supabase session variable or a dedicated Postgres function rather than embedding them directly in the JWT payload. Use set_config('app.unit_ids', ...) within RLS helper functions querying the assignments table at policy evaluation time.
Contingency: Fall back to querying the unit_assignments table directly within RLS policies using the authenticated user ID, accepting a small per-query overhead in exchange for removing the JWT size constraint.
Rendering 1,400+ nodes in a recursive Flutter tree widget may cause jank or memory pressure on lower-end devices used by field peer mentors, degrading the admin experience.
Mitigation & Contingency
Mitigation: Implement lazy tree expansion — only the root level is rendered on initial load. Child nodes are rendered on demand when the parent is expanded. Use const constructors and ListView.builder for all node lists to minimize rebuild scope.
Contingency: Add a search/filter bar that scopes the visible tree to matching nodes, reducing the visible node count. Provide a 'flat list' fallback view for administrators who prefer searching over browsing the tree.
Requirements for what constitutes a valid hierarchy structure may expand during NHF sign-off (e.g., mandatory coordinator assignments per chapter, minimum member counts per region), requiring repeated validator redesign.
Mitigation & Contingency
Mitigation: Design the validator as a pluggable rule engine where each check is a discrete, independently testable function. New rules can be added without changing the core validation orchestration. Surface all rules in a configuration table per organization.
Contingency: Defer non-blocking validation rules to warning-level feedback rather than hard blocks, allowing structural changes to proceed while flagging potential issues for admin review.
Deploying RLS policy migrations to a shared Supabase project used by multiple organizations simultaneously could lock tables or interrupt active sessions, causing downtime during production migration.
Mitigation & Contingency
Mitigation: Write all RLS policies as CREATE POLICY IF NOT EXISTS statements. Schedule migrations during off-peak hours. Use Supabase's migration preview environment to validate policies against production data shapes before applying.
Contingency: Prepare rollback migration scripts for every RLS policy. If a migration causes issues, execute the rollback immediately and re-test the policy logic in staging before reattempting.