Integration smoke test and provider wiring validation
epic-quick-activity-registration-data-infrastructure-task-010 — Write an integration-level smoke test that boots the full Riverpod provider graph (with a real SharedPreferences mock and a mocked Supabase client) and validates end-to-end wiring: read a null preference, save an activity type preference and re-read it, perform an optimistic insert via activityRepositoryProvider and assert both stream emissions. Document any Supabase table schema requirements (column names, RLS policy expectations) in a companion SCHEMA_NOTES.md for the database team.
Acceptance Criteria
Technical Requirements
Execution Context
Tier 4 - 323 tasks
Can start after Tier 3 completes
Implementation Notes
Use ProviderContainer (not WidgetTester) for these tests — no widget tree needed. Override activityRepositoryProvider and sharedPreferencesProvider in the container. For the optimistic stream test, use a StreamController> in the mock; emit the optimistic record immediately on insert(), then emit the confirmed record 50ms later using Future.delayed in the stub. For rollback, emit the optimistic record then throw — the repository should catch and re-emit the previous state.
SCHEMA_NOTES.md should be a plain Markdown file, not code — write it as developer-facing documentation with a table of columns, types, nullable flags, and one RLS policy example in SQL. Keep the file under 80 lines. Ensure the mock Supabase client conforms to the SupabaseClient interface so no real HTTP is initiated.
Testing Requirements
Integration tests only (no unit tests needed for this task). Use flutter_test with a ProviderContainer override pattern. Mock SupabaseClient using mocktail; stub the .from('activities').insert() call to return a success response then emit on a stream controller. Use a FakeSharedPreferences (in-memory map) to avoid platform channel calls.
Assert stream emissions using expectLater with emitsInOrder. Test the rollback scenario by having the mock throw a PostgrestException after the optimistic emit. Minimum: 5 test cases covering null-read, write-read, optimistic-success, optimistic-rollback, and full-graph-boot.
The optimistic insert pattern requires reconciling temporary local IDs with server-assigned IDs after the async Supabase write completes. If reconciliation logic is incorrect, the UI may display stale records, duplicate entries may appear, or subsequent operations (edit, delete) may target the wrong record ID, corrupting data integrity.
Mitigation & Contingency
Mitigation: Define a clear contract for temporary ID generation (e.g., UUID prefixed with 'local-') and implement a dedicated reconciliation method in ActivityRepository that atomically swaps the temporary ID. Write integration tests that simulate the full optimistic → confirm cycle.
Contingency: If reconciliation proves too complex, fall back to a simpler non-optimistic insert with a loading spinner for the network round-trip. The UX degrades slightly but correctness is preserved. Re-introduce optimistic behaviour once the pattern is stable.
Supabase row-level security policies on the activities table may not be configured to match the access patterns required by the client. If RLS blocks inserts or selects for the authenticated peer mentor session, all activity registration operations will silently fail or return empty results, which is difficult to diagnose in production.
Mitigation & Contingency
Mitigation: Define and test RLS policies in a dedicated Supabase migration script as part of this epic. Create integration tests that execute against a local Supabase instance with RLS enabled, covering insert, select by peer mentor ID, and denial of cross-mentor access.
Contingency: Maintain a fallback service-role client path (server-side only) that can be activated via a feature flag if client-side RLS is blocking legitimate operations while policies are corrected.
SharedPreferences on Flutter can become corrupted if the app crashes mid-write or if the device runs out of storage. A corrupted last-used activity type preference would cause the defaults manager to return null or an invalid ID, breaking the zero-interaction happy path.
Mitigation & Contingency
Mitigation: Wrap all LocalStorageAdapter reads in try/catch with typed safe defaults. Validate the retrieved activity type ID against the known list before returning it. Use atomic write operations where the platform supports them.
Contingency: If the preference store is corrupted, silently reset to the hardcoded default (first activity type alphabetically or 'general') and log a warning. The user loses their last-used preference but the app remains functional.