github.com/Redstoneguy129/cli@v0.0.0-20230211220159-15dca4e91917/internal/utils/templates/initial_schemas/13.sql (about) 1 -- 2 -- PostgreSQL database dump 3 -- 4 5 -- Dumped from database version 13.3 (Debian 13.3-1.pgdg100+1) 6 -- Dumped by pg_dump version 15.0 7 8 SET statement_timeout = 0; 9 SET lock_timeout = 0; 10 SET idle_in_transaction_session_timeout = 0; 11 SET client_encoding = 'UTF8'; 12 SET standard_conforming_strings = on; 13 SELECT pg_catalog.set_config('search_path', '', false); 14 SET check_function_bodies = false; 15 SET xmloption = content; 16 SET client_min_messages = warning; 17 SET row_security = off; 18 19 -- 20 -- Name: _realtime; Type: SCHEMA; Schema: -; Owner: postgres 21 -- 22 23 CREATE SCHEMA IF NOT EXISTS _realtime; 24 25 26 ALTER SCHEMA _realtime OWNER TO postgres; 27 28 -- 29 -- Name: auth; Type: SCHEMA; Schema: -; Owner: supabase_admin 30 -- 31 32 CREATE SCHEMA IF NOT EXISTS auth; 33 34 35 ALTER SCHEMA auth OWNER TO supabase_admin; 36 37 -- 38 -- Name: extensions; Type: SCHEMA; Schema: -; Owner: postgres 39 -- 40 41 CREATE SCHEMA IF NOT EXISTS extensions; 42 43 44 ALTER SCHEMA extensions OWNER TO postgres; 45 46 -- 47 -- Name: graphql_public; Type: SCHEMA; Schema: -; Owner: supabase_admin 48 -- 49 50 CREATE SCHEMA IF NOT EXISTS graphql_public; 51 52 53 ALTER SCHEMA graphql_public OWNER TO supabase_admin; 54 55 -- 56 -- Name: public; Type: SCHEMA; Schema: -; Owner: postgres 57 -- 58 59 -- *not* creating schema, since initdb creates it 60 61 62 ALTER SCHEMA public OWNER TO postgres; 63 64 -- 65 -- Name: realtime; Type: SCHEMA; Schema: -; Owner: supabase_admin 66 -- 67 68 CREATE SCHEMA IF NOT EXISTS realtime; 69 70 71 ALTER SCHEMA realtime OWNER TO supabase_admin; 72 73 -- 74 -- Name: storage; Type: SCHEMA; Schema: -; Owner: supabase_admin 75 -- 76 77 CREATE SCHEMA IF NOT EXISTS storage; 78 79 80 ALTER SCHEMA storage OWNER TO supabase_admin; 81 82 -- 83 -- Name: pgcrypto; Type: EXTENSION; Schema: -; Owner: - 84 -- 85 86 CREATE EXTENSION IF NOT EXISTS pgcrypto WITH SCHEMA extensions; 87 88 89 -- 90 -- Name: EXTENSION pgcrypto; Type: COMMENT; Schema: -; Owner: 91 -- 92 93 COMMENT ON EXTENSION pgcrypto IS 'cryptographic functions'; 94 95 96 -- 97 -- Name: pgjwt; Type: EXTENSION; Schema: -; Owner: - 98 -- 99 100 CREATE EXTENSION IF NOT EXISTS pgjwt WITH SCHEMA extensions; 101 102 103 -- 104 -- Name: EXTENSION pgjwt; Type: COMMENT; Schema: -; Owner: 105 -- 106 107 COMMENT ON EXTENSION pgjwt IS 'JSON Web Token API for Postgresql'; 108 109 110 -- 111 -- Name: uuid-ossp; Type: EXTENSION; Schema: -; Owner: - 112 -- 113 114 CREATE EXTENSION IF NOT EXISTS "uuid-ossp" WITH SCHEMA extensions; 115 116 117 -- 118 -- Name: EXTENSION "uuid-ossp"; Type: COMMENT; Schema: -; Owner: 119 -- 120 121 COMMENT ON EXTENSION "uuid-ossp" IS 'generate universally unique identifiers (UUIDs)'; 122 123 124 -- 125 -- Name: aal_level; Type: TYPE; Schema: auth; Owner: supabase_auth_admin 126 -- 127 128 CREATE TYPE auth.aal_level AS ENUM ( 129 'aal1', 130 'aal2', 131 'aal3' 132 ); 133 134 135 ALTER TYPE auth.aal_level OWNER TO supabase_auth_admin; 136 137 -- 138 -- Name: factor_status; Type: TYPE; Schema: auth; Owner: supabase_auth_admin 139 -- 140 141 CREATE TYPE auth.factor_status AS ENUM ( 142 'unverified', 143 'verified' 144 ); 145 146 147 ALTER TYPE auth.factor_status OWNER TO supabase_auth_admin; 148 149 -- 150 -- Name: factor_type; Type: TYPE; Schema: auth; Owner: supabase_auth_admin 151 -- 152 153 CREATE TYPE auth.factor_type AS ENUM ( 154 'totp', 155 'webauthn' 156 ); 157 158 159 ALTER TYPE auth.factor_type OWNER TO supabase_auth_admin; 160 161 -- 162 -- Name: email(); Type: FUNCTION; Schema: auth; Owner: supabase_auth_admin 163 -- 164 165 CREATE OR REPLACE FUNCTION auth.email() RETURNS text 166 LANGUAGE sql STABLE 167 AS $$ 168 select 169 coalesce( 170 nullif(current_setting('request.jwt.claim.email', true), ''), 171 (nullif(current_setting('request.jwt.claims', true), '')::jsonb ->> 'email') 172 )::text 173 $$; 174 175 176 ALTER FUNCTION auth.email() OWNER TO supabase_auth_admin; 177 178 -- 179 -- Name: FUNCTION email(); Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 180 -- 181 182 COMMENT ON FUNCTION auth.email() IS 'Deprecated. Use auth.jwt() -> ''email'' instead.'; 183 184 185 -- 186 -- Name: jwt(); Type: FUNCTION; Schema: auth; Owner: supabase_auth_admin 187 -- 188 189 CREATE OR REPLACE FUNCTION auth.jwt() RETURNS jsonb 190 LANGUAGE sql STABLE 191 AS $$ 192 select 193 coalesce( 194 nullif(current_setting('request.jwt.claim', true), ''), 195 nullif(current_setting('request.jwt.claims', true), '') 196 )::jsonb 197 $$; 198 199 200 ALTER FUNCTION auth.jwt() OWNER TO supabase_auth_admin; 201 202 -- 203 -- Name: role(); Type: FUNCTION; Schema: auth; Owner: supabase_auth_admin 204 -- 205 206 CREATE OR REPLACE FUNCTION auth.role() RETURNS text 207 LANGUAGE sql STABLE 208 AS $$ 209 select 210 coalesce( 211 nullif(current_setting('request.jwt.claim.role', true), ''), 212 (nullif(current_setting('request.jwt.claims', true), '')::jsonb ->> 'role') 213 )::text 214 $$; 215 216 217 ALTER FUNCTION auth.role() OWNER TO supabase_auth_admin; 218 219 -- 220 -- Name: FUNCTION role(); Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 221 -- 222 223 COMMENT ON FUNCTION auth.role() IS 'Deprecated. Use auth.jwt() -> ''role'' instead.'; 224 225 226 -- 227 -- Name: uid(); Type: FUNCTION; Schema: auth; Owner: supabase_auth_admin 228 -- 229 230 CREATE OR REPLACE FUNCTION auth.uid() RETURNS uuid 231 LANGUAGE sql STABLE 232 AS $$ 233 select 234 coalesce( 235 nullif(current_setting('request.jwt.claim.sub', true), ''), 236 (nullif(current_setting('request.jwt.claims', true), '')::jsonb ->> 'sub') 237 )::uuid 238 $$; 239 240 241 ALTER FUNCTION auth.uid() OWNER TO supabase_auth_admin; 242 243 -- 244 -- Name: FUNCTION uid(); Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 245 -- 246 247 COMMENT ON FUNCTION auth.uid() IS 'Deprecated. Use auth.jwt() -> ''sub'' instead.'; 248 249 250 -- 251 -- Name: grant_pg_cron_access(); Type: FUNCTION; Schema: extensions; Owner: postgres 252 -- 253 254 CREATE OR REPLACE FUNCTION extensions.grant_pg_cron_access() RETURNS event_trigger 255 LANGUAGE plpgsql 256 AS $$ 257 DECLARE 258 schema_is_cron bool; 259 BEGIN 260 schema_is_cron = ( 261 SELECT n.nspname = 'cron' 262 FROM pg_event_trigger_ddl_commands() AS ev 263 LEFT JOIN pg_catalog.pg_namespace AS n 264 ON ev.objid = n.oid 265 ); 266 267 IF schema_is_cron 268 THEN 269 grant usage on schema cron to postgres with grant option; 270 271 alter default privileges in schema cron grant all on tables to postgres with grant option; 272 alter default privileges in schema cron grant all on functions to postgres with grant option; 273 alter default privileges in schema cron grant all on sequences to postgres with grant option; 274 275 alter default privileges for user supabase_admin in schema cron grant all 276 on sequences to postgres with grant option; 277 alter default privileges for user supabase_admin in schema cron grant all 278 on tables to postgres with grant option; 279 alter default privileges for user supabase_admin in schema cron grant all 280 on functions to postgres with grant option; 281 282 grant all privileges on all tables in schema cron to postgres with grant option; 283 284 END IF; 285 286 END; 287 $$; 288 289 290 ALTER FUNCTION extensions.grant_pg_cron_access() OWNER TO postgres; 291 292 -- 293 -- Name: FUNCTION grant_pg_cron_access(); Type: COMMENT; Schema: extensions; Owner: postgres 294 -- 295 296 COMMENT ON FUNCTION extensions.grant_pg_cron_access() IS 'Grants access to pg_cron'; 297 298 299 -- 300 -- Name: grant_pg_graphql_access(); Type: FUNCTION; Schema: extensions; Owner: supabase_admin 301 -- 302 303 CREATE OR REPLACE FUNCTION extensions.grant_pg_graphql_access() RETURNS event_trigger 304 LANGUAGE plpgsql 305 AS $_$ 306 DECLARE 307 func_is_graphql_resolve bool; 308 BEGIN 309 func_is_graphql_resolve = ( 310 SELECT n.proname = 'resolve' 311 FROM pg_event_trigger_ddl_commands() AS ev 312 LEFT JOIN pg_catalog.pg_proc AS n 313 ON ev.objid = n.oid 314 ); 315 316 IF func_is_graphql_resolve 317 THEN 318 319 -- Update public wrapper to pass all arguments through to the pg_graphql resolve func 320 create or replace function graphql_public.graphql( 321 "operationName" text default null, 322 query text default null, 323 variables jsonb default null, 324 extensions jsonb default null 325 ) 326 returns jsonb 327 language sql 328 as $$ 329 select graphql.resolve( 330 query := query, 331 variables := coalesce(variables, '{}'), 332 "operationName" := "operationName", 333 extensions := extensions 334 ); 335 $$; 336 337 -- This hook executes when `graphql.resolve` is created. That is not necessarily the last 338 -- function in the extension so we need to grant permissions on existing entities AND 339 -- update default permissions to any others that are created after `graphql.resolve` 340 grant usage on schema graphql to postgres, anon, authenticated, service_role; 341 grant select on all tables in schema graphql to postgres, anon, authenticated, service_role; 342 grant execute on all functions in schema graphql to postgres, anon, authenticated, service_role; 343 grant all on all sequences in schema graphql to postgres, anon, authenticated, service_role; 344 alter default privileges in schema graphql grant all on tables to postgres, anon, authenticated, service_role; 345 alter default privileges in schema graphql grant all on functions to postgres, anon, authenticated, service_role; 346 alter default privileges in schema graphql grant all on sequences to postgres, anon, authenticated, service_role; 347 END IF; 348 349 END; 350 $_$; 351 352 353 ALTER FUNCTION extensions.grant_pg_graphql_access() OWNER TO supabase_admin; 354 355 -- 356 -- Name: FUNCTION grant_pg_graphql_access(); Type: COMMENT; Schema: extensions; Owner: supabase_admin 357 -- 358 359 COMMENT ON FUNCTION extensions.grant_pg_graphql_access() IS 'Grants access to pg_graphql'; 360 361 362 -- 363 -- Name: grant_pg_net_access(); Type: FUNCTION; Schema: extensions; Owner: postgres 364 -- 365 366 CREATE OR REPLACE FUNCTION extensions.grant_pg_net_access() RETURNS event_trigger 367 LANGUAGE plpgsql 368 AS $$ 369 BEGIN 370 IF EXISTS ( 371 SELECT 1 372 FROM pg_event_trigger_ddl_commands() AS ev 373 JOIN pg_extension AS ext 374 ON ev.objid = ext.oid 375 WHERE ext.extname = 'pg_net' 376 ) 377 THEN 378 IF NOT EXISTS ( 379 SELECT 1 380 FROM pg_roles 381 WHERE rolname = 'supabase_functions_admin' 382 ) 383 THEN 384 CREATE USER supabase_functions_admin NOINHERIT CREATEROLE LOGIN NOREPLICATION; 385 END IF; 386 387 GRANT USAGE ON SCHEMA net TO supabase_functions_admin, postgres, anon, authenticated, service_role; 388 389 ALTER function net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) SECURITY DEFINER; 390 ALTER function net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) SECURITY DEFINER; 391 ALTER function net.http_collect_response(request_id bigint, async boolean) SECURITY DEFINER; 392 393 ALTER function net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) SET search_path = net; 394 ALTER function net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) SET search_path = net; 395 ALTER function net.http_collect_response(request_id bigint, async boolean) SET search_path = net; 396 397 REVOKE ALL ON FUNCTION net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) FROM PUBLIC; 398 REVOKE ALL ON FUNCTION net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) FROM PUBLIC; 399 REVOKE ALL ON FUNCTION net.http_collect_response(request_id bigint, async boolean) FROM PUBLIC; 400 401 GRANT EXECUTE ON FUNCTION net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) TO supabase_functions_admin, postgres, anon, authenticated, service_role; 402 GRANT EXECUTE ON FUNCTION net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) TO supabase_functions_admin, postgres, anon, authenticated, service_role; 403 GRANT EXECUTE ON FUNCTION net.http_collect_response(request_id bigint, async boolean) TO supabase_functions_admin, postgres, anon, authenticated, service_role; 404 END IF; 405 END; 406 $$; 407 408 409 ALTER FUNCTION extensions.grant_pg_net_access() OWNER TO postgres; 410 411 -- 412 -- Name: FUNCTION grant_pg_net_access(); Type: COMMENT; Schema: extensions; Owner: postgres 413 -- 414 415 COMMENT ON FUNCTION extensions.grant_pg_net_access() IS 'Grants access to pg_net'; 416 417 418 -- 419 -- Name: pgrst_ddl_watch(); Type: FUNCTION; Schema: extensions; Owner: supabase_admin 420 -- 421 422 CREATE OR REPLACE FUNCTION extensions.pgrst_ddl_watch() RETURNS event_trigger 423 LANGUAGE plpgsql 424 AS $$ 425 DECLARE 426 cmd record; 427 BEGIN 428 FOR cmd IN SELECT * FROM pg_event_trigger_ddl_commands() 429 LOOP 430 IF cmd.command_tag IN ( 431 'CREATE SCHEMA', 'ALTER SCHEMA' 432 , 'CREATE TABLE', 'CREATE TABLE AS', 'SELECT INTO', 'ALTER TABLE' 433 , 'CREATE FOREIGN TABLE', 'ALTER FOREIGN TABLE' 434 , 'CREATE VIEW', 'ALTER VIEW' 435 , 'CREATE MATERIALIZED VIEW', 'ALTER MATERIALIZED VIEW' 436 , 'CREATE FUNCTION', 'ALTER FUNCTION' 437 , 'CREATE TRIGGER' 438 , 'CREATE TYPE', 'ALTER TYPE' 439 , 'CREATE RULE' 440 , 'COMMENT' 441 ) 442 -- don't notify in case of CREATE TEMP table or other objects created on pg_temp 443 AND cmd.schema_name is distinct from 'pg_temp' 444 THEN 445 NOTIFY pgrst, 'reload schema'; 446 END IF; 447 END LOOP; 448 END; $$; 449 450 451 ALTER FUNCTION extensions.pgrst_ddl_watch() OWNER TO supabase_admin; 452 453 -- 454 -- Name: pgrst_drop_watch(); Type: FUNCTION; Schema: extensions; Owner: supabase_admin 455 -- 456 457 CREATE OR REPLACE FUNCTION extensions.pgrst_drop_watch() RETURNS event_trigger 458 LANGUAGE plpgsql 459 AS $$ 460 DECLARE 461 obj record; 462 BEGIN 463 FOR obj IN SELECT * FROM pg_event_trigger_dropped_objects() 464 LOOP 465 IF obj.object_type IN ( 466 'schema' 467 , 'table' 468 , 'foreign table' 469 , 'view' 470 , 'materialized view' 471 , 'function' 472 , 'trigger' 473 , 'type' 474 , 'rule' 475 ) 476 AND obj.is_temporary IS false -- no pg_temp objects 477 THEN 478 NOTIFY pgrst, 'reload schema'; 479 END IF; 480 END LOOP; 481 END; $$; 482 483 484 ALTER FUNCTION extensions.pgrst_drop_watch() OWNER TO supabase_admin; 485 486 -- 487 -- Name: set_graphql_placeholder(); Type: FUNCTION; Schema: extensions; Owner: supabase_admin 488 -- 489 490 CREATE OR REPLACE FUNCTION extensions.set_graphql_placeholder() RETURNS event_trigger 491 LANGUAGE plpgsql 492 AS $_$ 493 DECLARE 494 graphql_is_dropped bool; 495 BEGIN 496 graphql_is_dropped = ( 497 SELECT ev.schema_name = 'graphql_public' 498 FROM pg_event_trigger_dropped_objects() AS ev 499 WHERE ev.schema_name = 'graphql_public' 500 ); 501 502 IF graphql_is_dropped 503 THEN 504 create or replace function graphql_public.graphql( 505 "operationName" text default null, 506 query text default null, 507 variables jsonb default null, 508 extensions jsonb default null 509 ) 510 returns jsonb 511 language plpgsql 512 as $$ 513 DECLARE 514 server_version float; 515 BEGIN 516 server_version = (SELECT (SPLIT_PART((select version()), ' ', 2))::float); 517 518 IF server_version >= 14 THEN 519 RETURN jsonb_build_object( 520 'errors', jsonb_build_array( 521 jsonb_build_object( 522 'message', 'pg_graphql extension is not enabled.' 523 ) 524 ) 525 ); 526 ELSE 527 RETURN jsonb_build_object( 528 'errors', jsonb_build_array( 529 jsonb_build_object( 530 'message', 'pg_graphql is only available on projects running Postgres 14 onwards.' 531 ) 532 ) 533 ); 534 END IF; 535 END; 536 $$; 537 END IF; 538 539 END; 540 $_$; 541 542 543 ALTER FUNCTION extensions.set_graphql_placeholder() OWNER TO supabase_admin; 544 545 -- 546 -- Name: FUNCTION set_graphql_placeholder(); Type: COMMENT; Schema: extensions; Owner: supabase_admin 547 -- 548 549 COMMENT ON FUNCTION extensions.set_graphql_placeholder() IS 'Reintroduces placeholder function for graphql_public.graphql'; 550 551 552 -- 553 -- Name: graphql(text, text, jsonb, jsonb); Type: FUNCTION; Schema: graphql_public; Owner: supabase_admin 554 -- 555 556 CREATE OR REPLACE FUNCTION graphql_public.graphql("operationName" text DEFAULT NULL::text, query text DEFAULT NULL::text, variables jsonb DEFAULT NULL::jsonb, extensions jsonb DEFAULT NULL::jsonb) RETURNS jsonb 557 LANGUAGE plpgsql 558 AS $$ 559 DECLARE 560 server_version float; 561 BEGIN 562 server_version = (SELECT (SPLIT_PART((select version()), ' ', 2))::float); 563 564 IF server_version >= 14 THEN 565 RETURN jsonb_build_object( 566 'errors', jsonb_build_array( 567 jsonb_build_object( 568 'message', 'pg_graphql extension is not enabled.' 569 ) 570 ) 571 ); 572 ELSE 573 RETURN jsonb_build_object( 574 'errors', jsonb_build_array( 575 jsonb_build_object( 576 'message', 'pg_graphql is only available on projects running Postgres 14 onwards.' 577 ) 578 ) 579 ); 580 END IF; 581 END; 582 $$; 583 584 585 ALTER FUNCTION graphql_public.graphql("operationName" text, query text, variables jsonb, extensions jsonb) OWNER TO supabase_admin; 586 587 -- 588 -- Name: extension(text); Type: FUNCTION; Schema: storage; Owner: supabase_storage_admin 589 -- 590 591 CREATE OR REPLACE FUNCTION storage.extension(name text) RETURNS text 592 LANGUAGE plpgsql 593 AS $$ 594 DECLARE 595 _parts text[]; 596 _filename text; 597 BEGIN 598 select string_to_array(name, '/') into _parts; 599 select _parts[array_length(_parts,1)] into _filename; 600 -- @todo return the last part instead of 2 601 return split_part(_filename, '.', 2); 602 END 603 $$; 604 605 606 ALTER FUNCTION storage.extension(name text) OWNER TO supabase_storage_admin; 607 608 -- 609 -- Name: filename(text); Type: FUNCTION; Schema: storage; Owner: supabase_storage_admin 610 -- 611 612 CREATE OR REPLACE FUNCTION storage.filename(name text) RETURNS text 613 LANGUAGE plpgsql 614 AS $$ 615 DECLARE 616 _parts text[]; 617 BEGIN 618 select string_to_array(name, '/') into _parts; 619 return _parts[array_length(_parts,1)]; 620 END 621 $$; 622 623 624 ALTER FUNCTION storage.filename(name text) OWNER TO supabase_storage_admin; 625 626 -- 627 -- Name: foldername(text); Type: FUNCTION; Schema: storage; Owner: supabase_storage_admin 628 -- 629 630 CREATE OR REPLACE FUNCTION storage.foldername(name text) RETURNS text[] 631 LANGUAGE plpgsql 632 AS $$ 633 DECLARE 634 _parts text[]; 635 BEGIN 636 select string_to_array(name, '/') into _parts; 637 return _parts[1:array_length(_parts,1)-1]; 638 END 639 $$; 640 641 642 ALTER FUNCTION storage.foldername(name text) OWNER TO supabase_storage_admin; 643 644 -- 645 -- Name: get_size_by_bucket(); Type: FUNCTION; Schema: storage; Owner: supabase_storage_admin 646 -- 647 648 CREATE OR REPLACE FUNCTION storage.get_size_by_bucket() RETURNS TABLE(size bigint, bucket_id text) 649 LANGUAGE plpgsql 650 AS $$ 651 BEGIN 652 return query 653 select sum((metadata->>'size')::int) as size, obj.bucket_id 654 from "storage".objects as obj 655 group by obj.bucket_id; 656 END 657 $$; 658 659 660 ALTER FUNCTION storage.get_size_by_bucket() OWNER TO supabase_storage_admin; 661 662 -- 663 -- Name: search(text, text, integer, integer, integer, text, text, text); Type: FUNCTION; Schema: storage; Owner: supabase_storage_admin 664 -- 665 666 CREATE OR REPLACE FUNCTION storage.search(prefix text, bucketname text, limits integer DEFAULT 100, levels integer DEFAULT 1, offsets integer DEFAULT 0, search text DEFAULT ''::text, sortcolumn text DEFAULT 'name'::text, sortorder text DEFAULT 'asc'::text) RETURNS TABLE(name text, id uuid, updated_at timestamp with time zone, created_at timestamp with time zone, last_accessed_at timestamp with time zone, metadata jsonb) 667 LANGUAGE plpgsql STABLE 668 AS $_$ 669 declare 670 v_order_by text; 671 v_sort_order text; 672 begin 673 case 674 when sortcolumn = 'name' then 675 v_order_by = 'name'; 676 when sortcolumn = 'updated_at' then 677 v_order_by = 'updated_at'; 678 when sortcolumn = 'created_at' then 679 v_order_by = 'created_at'; 680 when sortcolumn = 'last_accessed_at' then 681 v_order_by = 'last_accessed_at'; 682 else 683 v_order_by = 'name'; 684 end case; 685 686 case 687 when sortorder = 'asc' then 688 v_sort_order = 'asc'; 689 when sortorder = 'desc' then 690 v_sort_order = 'desc'; 691 else 692 v_sort_order = 'asc'; 693 end case; 694 695 v_order_by = v_order_by || ' ' || v_sort_order; 696 697 return query execute 698 'with folders as ( 699 select path_tokens[$1] as folder 700 from storage.objects 701 where objects.name ilike $2 || $3 || ''%'' 702 and bucket_id = $4 703 and array_length(regexp_split_to_array(objects.name, ''/''), 1) <> $1 704 group by folder 705 order by folder ' || v_sort_order || ' 706 ) 707 (select folder as "name", 708 null as id, 709 null as updated_at, 710 null as created_at, 711 null as last_accessed_at, 712 null as metadata from folders) 713 union all 714 (select path_tokens[$1] as "name", 715 id, 716 updated_at, 717 created_at, 718 last_accessed_at, 719 metadata 720 from storage.objects 721 where objects.name ilike $2 || $3 || ''%'' 722 and bucket_id = $4 723 and array_length(regexp_split_to_array(objects.name, ''/''), 1) = $1 724 order by ' || v_order_by || ') 725 limit $5 726 offset $6' using levels, prefix, search, bucketname, limits, offsets; 727 end; 728 $_$; 729 730 731 ALTER FUNCTION storage.search(prefix text, bucketname text, limits integer, levels integer, offsets integer, search text, sortcolumn text, sortorder text) OWNER TO supabase_storage_admin; 732 733 -- 734 -- Name: update_updated_at_column(); Type: FUNCTION; Schema: storage; Owner: supabase_storage_admin 735 -- 736 737 CREATE OR REPLACE FUNCTION storage.update_updated_at_column() RETURNS trigger 738 LANGUAGE plpgsql 739 AS $$ 740 BEGIN 741 NEW.updated_at = now(); 742 RETURN NEW; 743 END; 744 $$; 745 746 747 ALTER FUNCTION storage.update_updated_at_column() OWNER TO supabase_storage_admin; 748 749 SET default_tablespace = ''; 750 751 SET default_table_access_method = heap; 752 753 -- 754 -- Name: extensions; Type: TABLE; Schema: _realtime; Owner: postgres 755 -- 756 757 CREATE TABLE IF NOT EXISTS _realtime.extensions ( 758 id uuid NOT NULL, 759 type character varying(255), 760 settings jsonb, 761 tenant_external_id character varying(255), 762 inserted_at timestamp(0) without time zone NOT NULL, 763 updated_at timestamp(0) without time zone NOT NULL 764 ); 765 766 767 ALTER TABLE _realtime.extensions OWNER TO postgres; 768 769 -- 770 -- Name: schema_migrations; Type: TABLE; Schema: _realtime; Owner: postgres 771 -- 772 773 CREATE TABLE IF NOT EXISTS _realtime.schema_migrations ( 774 version bigint NOT NULL, 775 inserted_at timestamp(0) without time zone 776 ); 777 778 779 ALTER TABLE _realtime.schema_migrations OWNER TO postgres; 780 781 -- 782 -- Name: tenants; Type: TABLE; Schema: _realtime; Owner: postgres 783 -- 784 785 CREATE TABLE IF NOT EXISTS _realtime.tenants ( 786 id uuid NOT NULL, 787 name character varying(255), 788 external_id character varying(255), 789 jwt_secret character varying(500), 790 max_concurrent_users integer DEFAULT 200 NOT NULL, 791 inserted_at timestamp(0) without time zone NOT NULL, 792 updated_at timestamp(0) without time zone NOT NULL, 793 max_events_per_second integer DEFAULT 100 NOT NULL, 794 postgres_cdc_default character varying(255) DEFAULT 'postgres_cdc_rls'::character varying 795 ); 796 797 798 ALTER TABLE _realtime.tenants OWNER TO postgres; 799 800 -- 801 -- Name: audit_log_entries; Type: TABLE; Schema: auth; Owner: supabase_auth_admin 802 -- 803 804 CREATE TABLE IF NOT EXISTS auth.audit_log_entries ( 805 instance_id uuid, 806 id uuid NOT NULL, 807 payload json, 808 created_at timestamp with time zone, 809 ip_address character varying(64) DEFAULT ''::character varying NOT NULL 810 ); 811 812 813 ALTER TABLE auth.audit_log_entries OWNER TO supabase_auth_admin; 814 815 -- 816 -- Name: TABLE audit_log_entries; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 817 -- 818 819 COMMENT ON TABLE auth.audit_log_entries IS 'Auth: Audit trail for user actions.'; 820 821 822 -- 823 -- Name: identities; Type: TABLE; Schema: auth; Owner: supabase_auth_admin 824 -- 825 826 CREATE TABLE IF NOT EXISTS auth.identities ( 827 id text NOT NULL, 828 user_id uuid NOT NULL, 829 identity_data jsonb NOT NULL, 830 provider text NOT NULL, 831 last_sign_in_at timestamp with time zone, 832 created_at timestamp with time zone, 833 updated_at timestamp with time zone, 834 email text GENERATED ALWAYS AS (lower((identity_data ->> 'email'::text))) STORED 835 ); 836 837 838 ALTER TABLE auth.identities OWNER TO supabase_auth_admin; 839 840 -- 841 -- Name: TABLE identities; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 842 -- 843 844 COMMENT ON TABLE auth.identities IS 'Auth: Stores identities associated to a user.'; 845 846 847 -- 848 -- Name: COLUMN identities.email; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 849 -- 850 851 COMMENT ON COLUMN auth.identities.email IS 'Auth: Email is a generated column that references the optional email property in the identity_data'; 852 853 854 -- 855 -- Name: instances; Type: TABLE; Schema: auth; Owner: supabase_auth_admin 856 -- 857 858 CREATE TABLE IF NOT EXISTS auth.instances ( 859 id uuid NOT NULL, 860 uuid uuid, 861 raw_base_config text, 862 created_at timestamp with time zone, 863 updated_at timestamp with time zone 864 ); 865 866 867 ALTER TABLE auth.instances OWNER TO supabase_auth_admin; 868 869 -- 870 -- Name: TABLE instances; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 871 -- 872 873 COMMENT ON TABLE auth.instances IS 'Auth: Manages users across multiple sites.'; 874 875 876 -- 877 -- Name: mfa_amr_claims; Type: TABLE; Schema: auth; Owner: supabase_auth_admin 878 -- 879 880 CREATE TABLE IF NOT EXISTS auth.mfa_amr_claims ( 881 session_id uuid NOT NULL, 882 created_at timestamp with time zone NOT NULL, 883 updated_at timestamp with time zone NOT NULL, 884 authentication_method text NOT NULL, 885 id uuid NOT NULL 886 ); 887 888 889 ALTER TABLE auth.mfa_amr_claims OWNER TO supabase_auth_admin; 890 891 -- 892 -- Name: TABLE mfa_amr_claims; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 893 -- 894 895 COMMENT ON TABLE auth.mfa_amr_claims IS 'auth: stores authenticator method reference claims for multi factor authentication'; 896 897 898 -- 899 -- Name: mfa_challenges; Type: TABLE; Schema: auth; Owner: supabase_auth_admin 900 -- 901 902 CREATE TABLE IF NOT EXISTS auth.mfa_challenges ( 903 id uuid NOT NULL, 904 factor_id uuid NOT NULL, 905 created_at timestamp with time zone NOT NULL, 906 verified_at timestamp with time zone, 907 ip_address inet NOT NULL 908 ); 909 910 911 ALTER TABLE auth.mfa_challenges OWNER TO supabase_auth_admin; 912 913 -- 914 -- Name: TABLE mfa_challenges; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 915 -- 916 917 COMMENT ON TABLE auth.mfa_challenges IS 'auth: stores metadata about challenge requests made'; 918 919 920 -- 921 -- Name: mfa_factors; Type: TABLE; Schema: auth; Owner: supabase_auth_admin 922 -- 923 924 CREATE TABLE IF NOT EXISTS auth.mfa_factors ( 925 id uuid NOT NULL, 926 user_id uuid NOT NULL, 927 friendly_name text, 928 factor_type auth.factor_type NOT NULL, 929 status auth.factor_status NOT NULL, 930 created_at timestamp with time zone NOT NULL, 931 updated_at timestamp with time zone NOT NULL, 932 secret text 933 ); 934 935 936 ALTER TABLE auth.mfa_factors OWNER TO supabase_auth_admin; 937 938 -- 939 -- Name: TABLE mfa_factors; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 940 -- 941 942 COMMENT ON TABLE auth.mfa_factors IS 'auth: stores metadata about factors'; 943 944 945 -- 946 -- Name: refresh_tokens; Type: TABLE; Schema: auth; Owner: supabase_auth_admin 947 -- 948 949 CREATE TABLE IF NOT EXISTS auth.refresh_tokens ( 950 instance_id uuid, 951 id bigint NOT NULL, 952 token character varying(255), 953 user_id character varying(255), 954 revoked boolean, 955 created_at timestamp with time zone, 956 updated_at timestamp with time zone, 957 parent character varying(255), 958 session_id uuid 959 ); 960 961 962 ALTER TABLE auth.refresh_tokens OWNER TO supabase_auth_admin; 963 964 -- 965 -- Name: TABLE refresh_tokens; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 966 -- 967 968 COMMENT ON TABLE auth.refresh_tokens IS 'Auth: Store of tokens used to refresh JWT tokens once they expire.'; 969 970 971 -- 972 -- Name: refresh_tokens_id_seq; Type: SEQUENCE; Schema: auth; Owner: supabase_auth_admin 973 -- 974 975 CREATE SEQUENCE IF NOT EXISTS auth.refresh_tokens_id_seq 976 START WITH 1 977 INCREMENT BY 1 978 NO MINVALUE 979 NO MAXVALUE 980 CACHE 1; 981 982 983 ALTER TABLE auth.refresh_tokens_id_seq OWNER TO supabase_auth_admin; 984 985 -- 986 -- Name: refresh_tokens_id_seq; Type: SEQUENCE OWNED BY; Schema: auth; Owner: supabase_auth_admin 987 -- 988 989 ALTER SEQUENCE auth.refresh_tokens_id_seq OWNED BY auth.refresh_tokens.id; 990 991 992 -- 993 -- Name: saml_providers; Type: TABLE; Schema: auth; Owner: supabase_auth_admin 994 -- 995 996 CREATE TABLE IF NOT EXISTS auth.saml_providers ( 997 id uuid NOT NULL, 998 sso_provider_id uuid NOT NULL, 999 entity_id text NOT NULL, 1000 metadata_xml text NOT NULL, 1001 metadata_url text, 1002 attribute_mapping jsonb, 1003 created_at timestamp with time zone, 1004 updated_at timestamp with time zone, 1005 CONSTRAINT "entity_id not empty" CHECK ((char_length(entity_id) > 0)), 1006 CONSTRAINT "metadata_url not empty" CHECK (((metadata_url = NULL::text) OR (char_length(metadata_url) > 0))), 1007 CONSTRAINT "metadata_xml not empty" CHECK ((char_length(metadata_xml) > 0)) 1008 ); 1009 1010 1011 ALTER TABLE auth.saml_providers OWNER TO supabase_auth_admin; 1012 1013 -- 1014 -- Name: TABLE saml_providers; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 1015 -- 1016 1017 COMMENT ON TABLE auth.saml_providers IS 'Auth: Manages SAML Identity Provider connections.'; 1018 1019 1020 -- 1021 -- Name: saml_relay_states; Type: TABLE; Schema: auth; Owner: supabase_auth_admin 1022 -- 1023 1024 CREATE TABLE IF NOT EXISTS auth.saml_relay_states ( 1025 id uuid NOT NULL, 1026 sso_provider_id uuid NOT NULL, 1027 request_id text NOT NULL, 1028 for_email text, 1029 redirect_to text, 1030 from_ip_address inet, 1031 created_at timestamp with time zone, 1032 updated_at timestamp with time zone, 1033 CONSTRAINT "request_id not empty" CHECK ((char_length(request_id) > 0)) 1034 ); 1035 1036 1037 ALTER TABLE auth.saml_relay_states OWNER TO supabase_auth_admin; 1038 1039 -- 1040 -- Name: TABLE saml_relay_states; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 1041 -- 1042 1043 COMMENT ON TABLE auth.saml_relay_states IS 'Auth: Contains SAML Relay State information for each Service Provider initiated login.'; 1044 1045 1046 -- 1047 -- Name: schema_migrations; Type: TABLE; Schema: auth; Owner: supabase_auth_admin 1048 -- 1049 1050 CREATE TABLE IF NOT EXISTS auth.schema_migrations ( 1051 version character varying(255) NOT NULL 1052 ); 1053 1054 1055 ALTER TABLE auth.schema_migrations OWNER TO supabase_auth_admin; 1056 1057 -- 1058 -- Name: TABLE schema_migrations; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 1059 -- 1060 1061 COMMENT ON TABLE auth.schema_migrations IS 'Auth: Manages updates to the auth system.'; 1062 1063 1064 -- 1065 -- Name: sessions; Type: TABLE; Schema: auth; Owner: supabase_auth_admin 1066 -- 1067 1068 CREATE TABLE IF NOT EXISTS auth.sessions ( 1069 id uuid NOT NULL, 1070 user_id uuid NOT NULL, 1071 created_at timestamp with time zone, 1072 updated_at timestamp with time zone, 1073 factor_id uuid, 1074 aal auth.aal_level, 1075 not_after timestamp with time zone 1076 ); 1077 1078 1079 ALTER TABLE auth.sessions OWNER TO supabase_auth_admin; 1080 1081 -- 1082 -- Name: TABLE sessions; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 1083 -- 1084 1085 COMMENT ON TABLE auth.sessions IS 'Auth: Stores session data associated to a user.'; 1086 1087 1088 -- 1089 -- Name: COLUMN sessions.not_after; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 1090 -- 1091 1092 COMMENT ON COLUMN auth.sessions.not_after IS 'Auth: Not after is a nullable column that contains a timestamp after which the session should be regarded as expired.'; 1093 1094 1095 -- 1096 -- Name: sso_domains; Type: TABLE; Schema: auth; Owner: supabase_auth_admin 1097 -- 1098 1099 CREATE TABLE IF NOT EXISTS auth.sso_domains ( 1100 id uuid NOT NULL, 1101 sso_provider_id uuid NOT NULL, 1102 domain text NOT NULL, 1103 created_at timestamp with time zone, 1104 updated_at timestamp with time zone, 1105 CONSTRAINT "domain not empty" CHECK ((char_length(domain) > 0)) 1106 ); 1107 1108 1109 ALTER TABLE auth.sso_domains OWNER TO supabase_auth_admin; 1110 1111 -- 1112 -- Name: TABLE sso_domains; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 1113 -- 1114 1115 COMMENT ON TABLE auth.sso_domains IS 'Auth: Manages SSO email address domain mapping to an SSO Identity Provider.'; 1116 1117 1118 -- 1119 -- Name: sso_providers; Type: TABLE; Schema: auth; Owner: supabase_auth_admin 1120 -- 1121 1122 CREATE TABLE IF NOT EXISTS auth.sso_providers ( 1123 id uuid NOT NULL, 1124 resource_id text, 1125 created_at timestamp with time zone, 1126 updated_at timestamp with time zone, 1127 CONSTRAINT "resource_id not empty" CHECK (((resource_id = NULL::text) OR (char_length(resource_id) > 0))) 1128 ); 1129 1130 1131 ALTER TABLE auth.sso_providers OWNER TO supabase_auth_admin; 1132 1133 -- 1134 -- Name: TABLE sso_providers; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 1135 -- 1136 1137 COMMENT ON TABLE auth.sso_providers IS 'Auth: Manages SSO identity provider information; see saml_providers for SAML.'; 1138 1139 1140 -- 1141 -- Name: COLUMN sso_providers.resource_id; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 1142 -- 1143 1144 COMMENT ON COLUMN auth.sso_providers.resource_id IS 'Auth: Uniquely identifies a SSO provider according to a user-chosen resource ID (case insensitive), useful in infrastructure as code.'; 1145 1146 1147 -- 1148 -- Name: users; Type: TABLE; Schema: auth; Owner: supabase_auth_admin 1149 -- 1150 1151 CREATE TABLE IF NOT EXISTS auth.users ( 1152 instance_id uuid, 1153 id uuid NOT NULL, 1154 aud character varying(255), 1155 role character varying(255), 1156 email character varying(255), 1157 encrypted_password character varying(255), 1158 email_confirmed_at timestamp with time zone, 1159 invited_at timestamp with time zone, 1160 confirmation_token character varying(255), 1161 confirmation_sent_at timestamp with time zone, 1162 recovery_token character varying(255), 1163 recovery_sent_at timestamp with time zone, 1164 email_change_token_new character varying(255), 1165 email_change character varying(255), 1166 email_change_sent_at timestamp with time zone, 1167 last_sign_in_at timestamp with time zone, 1168 raw_app_meta_data jsonb, 1169 raw_user_meta_data jsonb, 1170 is_super_admin boolean, 1171 created_at timestamp with time zone, 1172 updated_at timestamp with time zone, 1173 phone character varying(15) DEFAULT NULL::character varying, 1174 phone_confirmed_at timestamp with time zone, 1175 phone_change character varying(15) DEFAULT ''::character varying, 1176 phone_change_token character varying(255) DEFAULT ''::character varying, 1177 phone_change_sent_at timestamp with time zone, 1178 confirmed_at timestamp with time zone GENERATED ALWAYS AS (LEAST(email_confirmed_at, phone_confirmed_at)) STORED, 1179 email_change_token_current character varying(255) DEFAULT ''::character varying, 1180 email_change_confirm_status smallint DEFAULT 0, 1181 banned_until timestamp with time zone, 1182 reauthentication_token character varying(255) DEFAULT ''::character varying, 1183 reauthentication_sent_at timestamp with time zone, 1184 is_sso_user boolean DEFAULT false NOT NULL, 1185 CONSTRAINT users_email_change_confirm_status_check CHECK (((email_change_confirm_status >= 0) AND (email_change_confirm_status <= 2))) 1186 ); 1187 1188 1189 ALTER TABLE auth.users OWNER TO supabase_auth_admin; 1190 1191 -- 1192 -- Name: TABLE users; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 1193 -- 1194 1195 COMMENT ON TABLE auth.users IS 'Auth: Stores user login data within a secure schema.'; 1196 1197 1198 -- 1199 -- Name: COLUMN users.is_sso_user; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 1200 -- 1201 1202 COMMENT ON COLUMN auth.users.is_sso_user IS 'Auth: Set this column to true when the account comes from SSO. These accounts can have duplicate emails.'; 1203 1204 1205 -- 1206 -- Name: buckets; Type: TABLE; Schema: storage; Owner: supabase_storage_admin 1207 -- 1208 1209 CREATE TABLE IF NOT EXISTS storage.buckets ( 1210 id text NOT NULL, 1211 name text NOT NULL, 1212 owner uuid, 1213 created_at timestamp with time zone DEFAULT now(), 1214 updated_at timestamp with time zone DEFAULT now(), 1215 public boolean DEFAULT false 1216 ); 1217 1218 1219 ALTER TABLE storage.buckets OWNER TO supabase_storage_admin; 1220 1221 -- 1222 -- Name: migrations; Type: TABLE; Schema: storage; Owner: supabase_storage_admin 1223 -- 1224 1225 CREATE TABLE IF NOT EXISTS storage.migrations ( 1226 id integer NOT NULL, 1227 name character varying(100) NOT NULL, 1228 hash character varying(40) NOT NULL, 1229 executed_at timestamp without time zone DEFAULT CURRENT_TIMESTAMP 1230 ); 1231 1232 1233 ALTER TABLE storage.migrations OWNER TO supabase_storage_admin; 1234 1235 -- 1236 -- Name: objects; Type: TABLE; Schema: storage; Owner: supabase_storage_admin 1237 -- 1238 1239 CREATE TABLE IF NOT EXISTS storage.objects ( 1240 id uuid DEFAULT extensions.uuid_generate_v4() NOT NULL, 1241 bucket_id text, 1242 name text, 1243 owner uuid, 1244 created_at timestamp with time zone DEFAULT now(), 1245 updated_at timestamp with time zone DEFAULT now(), 1246 last_accessed_at timestamp with time zone DEFAULT now(), 1247 metadata jsonb, 1248 path_tokens text[] GENERATED ALWAYS AS (string_to_array(name, '/'::text)) STORED 1249 ); 1250 1251 1252 ALTER TABLE storage.objects OWNER TO supabase_storage_admin; 1253 1254 -- 1255 -- Name: refresh_tokens id; Type: DEFAULT; Schema: auth; Owner: supabase_auth_admin 1256 -- 1257 1258 ALTER TABLE ONLY auth.refresh_tokens ALTER COLUMN id SET DEFAULT nextval('auth.refresh_tokens_id_seq'::regclass); 1259 1260 1261 -- 1262 -- Data for Name: extensions; Type: TABLE DATA; Schema: _realtime; Owner: postgres 1263 -- 1264 1265 INSERT INTO _realtime.extensions (id, type, settings, tenant_external_id, inserted_at, updated_at) VALUES ('bb5b2c31-6743-458f-bd31-2e5086879de5', 'postgres_cdc_rls', '{"region": "us-east-1", "db_host": "ABK7kBu27y/PVdL10i/b+A==", "db_name": "sWBpZNdjggEPTQVlI52Zfw==", "db_port": "+enMDFi1J/3IrrquHHwUmA==", "db_user": "sWBpZNdjggEPTQVlI52Zfw==", "slot_name": "supabase_realtime_replication_slot", "ip_version": 4, "db_password": "sWBpZNdjggEPTQVlI52Zfw==", "publication": "supabase_realtime", "poll_interval_ms": 100, "poll_max_changes": 100, "poll_max_record_bytes": 1048576}', 'realtime-dev', '2023-01-09 07:15:15', '2023-01-09 07:15:15'); 1266 1267 1268 -- 1269 -- Data for Name: schema_migrations; Type: TABLE DATA; Schema: _realtime; Owner: postgres 1270 -- 1271 1272 INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20210706140551, '2023-01-09 07:15:13'); 1273 INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20220329161857, '2023-01-09 07:15:13'); 1274 INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20220410212326, '2023-01-09 07:15:13'); 1275 INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20220506102948, '2023-01-09 07:15:13'); 1276 INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20220527210857, '2023-01-09 07:15:13'); 1277 INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20220815211129, '2023-01-09 07:15:13'); 1278 INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20220815215024, '2023-01-09 07:15:13'); 1279 INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20220818141501, '2023-01-09 07:15:13'); 1280 INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20221018173709, '2023-01-09 07:15:13'); 1281 INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20221102172703, '2023-01-09 07:15:13'); 1282 INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20221223010058, '2023-01-09 07:15:13'); 1283 1284 1285 -- 1286 -- Data for Name: tenants; Type: TABLE DATA; Schema: _realtime; Owner: postgres 1287 -- 1288 1289 INSERT INTO _realtime.tenants (id, name, external_id, jwt_secret, max_concurrent_users, inserted_at, updated_at, max_events_per_second, postgres_cdc_default) VALUES ('af55a147-351d-4faf-85a2-278bb6a4e225', 'realtime-dev', 'realtime-dev', 'cor19x6wYudqK/HY8tKJOBoA0KD/zxM/SxxkI1zPOvSCs67x4q75+0yV07SWdm0T', 200, '2023-01-09 07:15:15', '2023-01-09 07:15:15', 100, 'postgres_cdc_rls'); 1290 1291 1292 -- 1293 -- Data for Name: audit_log_entries; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin 1294 -- 1295 1296 1297 1298 -- 1299 -- Data for Name: identities; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin 1300 -- 1301 1302 1303 1304 -- 1305 -- Data for Name: instances; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin 1306 -- 1307 1308 1309 1310 -- 1311 -- Data for Name: mfa_amr_claims; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin 1312 -- 1313 1314 1315 1316 -- 1317 -- Data for Name: mfa_challenges; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin 1318 -- 1319 1320 1321 1322 -- 1323 -- Data for Name: mfa_factors; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin 1324 -- 1325 1326 1327 1328 -- 1329 -- Data for Name: refresh_tokens; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin 1330 -- 1331 1332 1333 1334 -- 1335 -- Data for Name: saml_providers; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin 1336 -- 1337 1338 1339 1340 -- 1341 -- Data for Name: saml_relay_states; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin 1342 -- 1343 1344 1345 1346 -- 1347 -- Data for Name: schema_migrations; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin 1348 -- 1349 1350 INSERT INTO auth.schema_migrations (version) VALUES ('20171026211738'); 1351 INSERT INTO auth.schema_migrations (version) VALUES ('20171026211808'); 1352 INSERT INTO auth.schema_migrations (version) VALUES ('20171026211834'); 1353 INSERT INTO auth.schema_migrations (version) VALUES ('20180103212743'); 1354 INSERT INTO auth.schema_migrations (version) VALUES ('20180108183307'); 1355 INSERT INTO auth.schema_migrations (version) VALUES ('20180119214651'); 1356 INSERT INTO auth.schema_migrations (version) VALUES ('20180125194653'); 1357 INSERT INTO auth.schema_migrations (version) VALUES ('00'); 1358 INSERT INTO auth.schema_migrations (version) VALUES ('20210710035447'); 1359 INSERT INTO auth.schema_migrations (version) VALUES ('20210722035447'); 1360 INSERT INTO auth.schema_migrations (version) VALUES ('20210730183235'); 1361 INSERT INTO auth.schema_migrations (version) VALUES ('20210909172000'); 1362 INSERT INTO auth.schema_migrations (version) VALUES ('20210927181326'); 1363 INSERT INTO auth.schema_migrations (version) VALUES ('20211122151130'); 1364 INSERT INTO auth.schema_migrations (version) VALUES ('20211124214934'); 1365 INSERT INTO auth.schema_migrations (version) VALUES ('20211202183645'); 1366 INSERT INTO auth.schema_migrations (version) VALUES ('20220114185221'); 1367 INSERT INTO auth.schema_migrations (version) VALUES ('20220114185340'); 1368 INSERT INTO auth.schema_migrations (version) VALUES ('20220224000811'); 1369 INSERT INTO auth.schema_migrations (version) VALUES ('20220323170000'); 1370 INSERT INTO auth.schema_migrations (version) VALUES ('20220429102000'); 1371 INSERT INTO auth.schema_migrations (version) VALUES ('20220531120530'); 1372 INSERT INTO auth.schema_migrations (version) VALUES ('20220614074223'); 1373 INSERT INTO auth.schema_migrations (version) VALUES ('20220811173540'); 1374 INSERT INTO auth.schema_migrations (version) VALUES ('20221003041349'); 1375 INSERT INTO auth.schema_migrations (version) VALUES ('20221003041400'); 1376 INSERT INTO auth.schema_migrations (version) VALUES ('20221011041400'); 1377 INSERT INTO auth.schema_migrations (version) VALUES ('20221020193600'); 1378 INSERT INTO auth.schema_migrations (version) VALUES ('20221021073300'); 1379 INSERT INTO auth.schema_migrations (version) VALUES ('20221021082433'); 1380 INSERT INTO auth.schema_migrations (version) VALUES ('20221027105023'); 1381 INSERT INTO auth.schema_migrations (version) VALUES ('20221114143122'); 1382 INSERT INTO auth.schema_migrations (version) VALUES ('20221114143410'); 1383 INSERT INTO auth.schema_migrations (version) VALUES ('20221125140132'); 1384 INSERT INTO auth.schema_migrations (version) VALUES ('20221208132122'); 1385 INSERT INTO auth.schema_migrations (version) VALUES ('20221215195500'); 1386 INSERT INTO auth.schema_migrations (version) VALUES ('20221215195800'); 1387 INSERT INTO auth.schema_migrations (version) VALUES ('20221215195900'); 1388 1389 1390 -- 1391 -- Data for Name: sessions; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin 1392 -- 1393 1394 1395 1396 -- 1397 -- Data for Name: sso_domains; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin 1398 -- 1399 1400 1401 1402 -- 1403 -- Data for Name: sso_providers; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin 1404 -- 1405 1406 1407 1408 -- 1409 -- Data for Name: users; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin 1410 -- 1411 1412 1413 1414 -- 1415 -- Data for Name: buckets; Type: TABLE DATA; Schema: storage; Owner: supabase_storage_admin 1416 -- 1417 1418 1419 1420 -- 1421 -- Data for Name: migrations; Type: TABLE DATA; Schema: storage; Owner: supabase_storage_admin 1422 -- 1423 1424 INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (0, 'create-migrations-table', 'e18db593bcde2aca2a408c4d1100f6abba2195df', '2022-04-14 09:52:39.214681'); 1425 INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (1, 'initialmigration', '6ab16121fbaa08bbd11b712d05f358f9b555d777', '2022-04-14 09:52:39.255149'); 1426 INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (2, 'pathtoken-column', '49756be03be4c17bb85fe70d4a861f27de7e49ad', '2022-04-14 09:52:39.276667'); 1427 INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (3, 'add-migrations-rls', 'bb5d124c53d68635a883e399426c6a5a25fc893d', '2022-04-14 09:52:39.587158'); 1428 INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (4, 'add-size-functions', '6d79007d04f5acd288c9c250c42d2d5fd286c54d', '2022-04-14 09:52:39.621747'); 1429 INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (5, 'change-column-name-in-get-size', 'fd65688505d2ffa9fbdc58a944348dd8604d688c', '2022-04-14 09:52:39.658796'); 1430 INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (6, 'add-rls-to-buckets', '63e2bab75a2040fee8e3fb3f15a0d26f3380e9b6', '2022-04-14 09:52:39.702011'); 1431 INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (7, 'add-public-to-buckets', '82568934f8a4d9e0a85f126f6fb483ad8214c418', '2022-04-14 09:52:39.739731'); 1432 INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (8, 'fix-search-function', '1a43a40eddb525f2e2f26efd709e6c06e58e059c', '2022-04-14 09:52:39.781062'); 1433 INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (9, 'search-files-search-function', '34c096597eb8b9d077fdfdde9878c88501b2fafc', '2022-08-23 04:48:07.728336'); 1434 INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (10, 'add-trigger-to-auto-update-updated_at-column', '37d6bb964a70a822e6d37f22f457b9bca7885928', '2022-08-23 04:48:07.736527'); 1435 1436 1437 -- 1438 -- Data for Name: objects; Type: TABLE DATA; Schema: storage; Owner: supabase_storage_admin 1439 -- 1440 1441 1442 1443 -- 1444 -- Name: refresh_tokens_id_seq; Type: SEQUENCE SET; Schema: auth; Owner: supabase_auth_admin 1445 -- 1446 1447 SELECT pg_catalog.setval('auth.refresh_tokens_id_seq', 1, false); 1448 1449 1450 -- 1451 -- Name: extensions extensions_pkey; Type: CONSTRAINT; Schema: _realtime; Owner: postgres 1452 -- 1453 1454 ALTER TABLE ONLY _realtime.extensions 1455 ADD CONSTRAINT extensions_pkey PRIMARY KEY (id); 1456 1457 1458 -- 1459 -- Name: schema_migrations schema_migrations_pkey; Type: CONSTRAINT; Schema: _realtime; Owner: postgres 1460 -- 1461 1462 ALTER TABLE ONLY _realtime.schema_migrations 1463 ADD CONSTRAINT schema_migrations_pkey PRIMARY KEY (version); 1464 1465 1466 -- 1467 -- Name: tenants tenants_pkey; Type: CONSTRAINT; Schema: _realtime; Owner: postgres 1468 -- 1469 1470 ALTER TABLE ONLY _realtime.tenants 1471 ADD CONSTRAINT tenants_pkey PRIMARY KEY (id); 1472 1473 1474 -- 1475 -- Name: mfa_amr_claims amr_id_pk; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1476 -- 1477 1478 ALTER TABLE ONLY auth.mfa_amr_claims 1479 ADD CONSTRAINT amr_id_pk PRIMARY KEY (id); 1480 1481 1482 -- 1483 -- Name: audit_log_entries audit_log_entries_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1484 -- 1485 1486 ALTER TABLE ONLY auth.audit_log_entries 1487 ADD CONSTRAINT audit_log_entries_pkey PRIMARY KEY (id); 1488 1489 1490 -- 1491 -- Name: identities identities_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1492 -- 1493 1494 ALTER TABLE ONLY auth.identities 1495 ADD CONSTRAINT identities_pkey PRIMARY KEY (provider, id); 1496 1497 1498 -- 1499 -- Name: instances instances_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1500 -- 1501 1502 ALTER TABLE ONLY auth.instances 1503 ADD CONSTRAINT instances_pkey PRIMARY KEY (id); 1504 1505 1506 -- 1507 -- Name: mfa_amr_claims mfa_amr_claims_session_id_authentication_method_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1508 -- 1509 1510 ALTER TABLE ONLY auth.mfa_amr_claims 1511 ADD CONSTRAINT mfa_amr_claims_session_id_authentication_method_pkey UNIQUE (session_id, authentication_method); 1512 1513 1514 -- 1515 -- Name: mfa_challenges mfa_challenges_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1516 -- 1517 1518 ALTER TABLE ONLY auth.mfa_challenges 1519 ADD CONSTRAINT mfa_challenges_pkey PRIMARY KEY (id); 1520 1521 1522 -- 1523 -- Name: mfa_factors mfa_factors_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1524 -- 1525 1526 ALTER TABLE ONLY auth.mfa_factors 1527 ADD CONSTRAINT mfa_factors_pkey PRIMARY KEY (id); 1528 1529 1530 -- 1531 -- Name: refresh_tokens refresh_tokens_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1532 -- 1533 1534 ALTER TABLE ONLY auth.refresh_tokens 1535 ADD CONSTRAINT refresh_tokens_pkey PRIMARY KEY (id); 1536 1537 1538 -- 1539 -- Name: refresh_tokens refresh_tokens_token_unique; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1540 -- 1541 1542 ALTER TABLE ONLY auth.refresh_tokens 1543 ADD CONSTRAINT refresh_tokens_token_unique UNIQUE (token); 1544 1545 1546 -- 1547 -- Name: saml_providers saml_providers_entity_id_key; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1548 -- 1549 1550 ALTER TABLE ONLY auth.saml_providers 1551 ADD CONSTRAINT saml_providers_entity_id_key UNIQUE (entity_id); 1552 1553 1554 -- 1555 -- Name: saml_providers saml_providers_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1556 -- 1557 1558 ALTER TABLE ONLY auth.saml_providers 1559 ADD CONSTRAINT saml_providers_pkey PRIMARY KEY (id); 1560 1561 1562 -- 1563 -- Name: saml_relay_states saml_relay_states_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1564 -- 1565 1566 ALTER TABLE ONLY auth.saml_relay_states 1567 ADD CONSTRAINT saml_relay_states_pkey PRIMARY KEY (id); 1568 1569 1570 -- 1571 -- Name: schema_migrations schema_migrations_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1572 -- 1573 1574 ALTER TABLE ONLY auth.schema_migrations 1575 ADD CONSTRAINT schema_migrations_pkey PRIMARY KEY (version); 1576 1577 1578 -- 1579 -- Name: sessions sessions_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1580 -- 1581 1582 ALTER TABLE ONLY auth.sessions 1583 ADD CONSTRAINT sessions_pkey PRIMARY KEY (id); 1584 1585 1586 -- 1587 -- Name: sso_domains sso_domains_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1588 -- 1589 1590 ALTER TABLE ONLY auth.sso_domains 1591 ADD CONSTRAINT sso_domains_pkey PRIMARY KEY (id); 1592 1593 1594 -- 1595 -- Name: sso_providers sso_providers_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1596 -- 1597 1598 ALTER TABLE ONLY auth.sso_providers 1599 ADD CONSTRAINT sso_providers_pkey PRIMARY KEY (id); 1600 1601 1602 -- 1603 -- Name: users users_phone_key; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1604 -- 1605 1606 ALTER TABLE ONLY auth.users 1607 ADD CONSTRAINT users_phone_key UNIQUE (phone); 1608 1609 1610 -- 1611 -- Name: users users_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1612 -- 1613 1614 ALTER TABLE ONLY auth.users 1615 ADD CONSTRAINT users_pkey PRIMARY KEY (id); 1616 1617 1618 -- 1619 -- Name: buckets buckets_pkey; Type: CONSTRAINT; Schema: storage; Owner: supabase_storage_admin 1620 -- 1621 1622 ALTER TABLE ONLY storage.buckets 1623 ADD CONSTRAINT buckets_pkey PRIMARY KEY (id); 1624 1625 1626 -- 1627 -- Name: migrations migrations_name_key; Type: CONSTRAINT; Schema: storage; Owner: supabase_storage_admin 1628 -- 1629 1630 ALTER TABLE ONLY storage.migrations 1631 ADD CONSTRAINT migrations_name_key UNIQUE (name); 1632 1633 1634 -- 1635 -- Name: migrations migrations_pkey; Type: CONSTRAINT; Schema: storage; Owner: supabase_storage_admin 1636 -- 1637 1638 ALTER TABLE ONLY storage.migrations 1639 ADD CONSTRAINT migrations_pkey PRIMARY KEY (id); 1640 1641 1642 -- 1643 -- Name: objects objects_pkey; Type: CONSTRAINT; Schema: storage; Owner: supabase_storage_admin 1644 -- 1645 1646 ALTER TABLE ONLY storage.objects 1647 ADD CONSTRAINT objects_pkey PRIMARY KEY (id); 1648 1649 1650 -- 1651 -- Name: extensions_tenant_external_id_type_index; Type: INDEX; Schema: _realtime; Owner: postgres 1652 -- 1653 1654 CREATE UNIQUE INDEX extensions_tenant_external_id_type_index ON _realtime.extensions USING btree (tenant_external_id, type); 1655 1656 1657 -- 1658 -- Name: tenants_external_id_index; Type: INDEX; Schema: _realtime; Owner: postgres 1659 -- 1660 1661 CREATE UNIQUE INDEX tenants_external_id_index ON _realtime.tenants USING btree (external_id); 1662 1663 1664 -- 1665 -- Name: audit_logs_instance_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1666 -- 1667 1668 CREATE INDEX audit_logs_instance_id_idx ON auth.audit_log_entries USING btree (instance_id); 1669 1670 1671 -- 1672 -- Name: confirmation_token_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1673 -- 1674 1675 CREATE UNIQUE INDEX confirmation_token_idx ON auth.users USING btree (confirmation_token) WHERE ((confirmation_token)::text !~ '^[0-9 ]*$'::text); 1676 1677 1678 -- 1679 -- Name: email_change_token_current_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1680 -- 1681 1682 CREATE UNIQUE INDEX email_change_token_current_idx ON auth.users USING btree (email_change_token_current) WHERE ((email_change_token_current)::text !~ '^[0-9 ]*$'::text); 1683 1684 1685 -- 1686 -- Name: email_change_token_new_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1687 -- 1688 1689 CREATE UNIQUE INDEX email_change_token_new_idx ON auth.users USING btree (email_change_token_new) WHERE ((email_change_token_new)::text !~ '^[0-9 ]*$'::text); 1690 1691 1692 -- 1693 -- Name: factor_id_created_at_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1694 -- 1695 1696 CREATE INDEX factor_id_created_at_idx ON auth.mfa_factors USING btree (user_id, created_at); 1697 1698 1699 -- 1700 -- Name: identities_email_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1701 -- 1702 1703 CREATE INDEX identities_email_idx ON auth.identities USING btree (email text_pattern_ops); 1704 1705 1706 -- 1707 -- Name: INDEX identities_email_idx; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 1708 -- 1709 1710 COMMENT ON INDEX auth.identities_email_idx IS 'Auth: Ensures indexed queries on the email column'; 1711 1712 1713 -- 1714 -- Name: identities_user_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1715 -- 1716 1717 CREATE INDEX identities_user_id_idx ON auth.identities USING btree (user_id); 1718 1719 1720 -- 1721 -- Name: mfa_factors_user_friendly_name_unique; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1722 -- 1723 1724 CREATE UNIQUE INDEX mfa_factors_user_friendly_name_unique ON auth.mfa_factors USING btree (friendly_name, user_id) WHERE (btrim(friendly_name) <> ''::text); 1725 1726 1727 -- 1728 -- Name: reauthentication_token_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1729 -- 1730 1731 CREATE UNIQUE INDEX reauthentication_token_idx ON auth.users USING btree (reauthentication_token) WHERE ((reauthentication_token)::text !~ '^[0-9 ]*$'::text); 1732 1733 1734 -- 1735 -- Name: recovery_token_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1736 -- 1737 1738 CREATE UNIQUE INDEX recovery_token_idx ON auth.users USING btree (recovery_token) WHERE ((recovery_token)::text !~ '^[0-9 ]*$'::text); 1739 1740 1741 -- 1742 -- Name: refresh_tokens_instance_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1743 -- 1744 1745 CREATE INDEX refresh_tokens_instance_id_idx ON auth.refresh_tokens USING btree (instance_id); 1746 1747 1748 -- 1749 -- Name: refresh_tokens_instance_id_user_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1750 -- 1751 1752 CREATE INDEX refresh_tokens_instance_id_user_id_idx ON auth.refresh_tokens USING btree (instance_id, user_id); 1753 1754 1755 -- 1756 -- Name: refresh_tokens_parent_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1757 -- 1758 1759 CREATE INDEX refresh_tokens_parent_idx ON auth.refresh_tokens USING btree (parent); 1760 1761 1762 -- 1763 -- Name: refresh_tokens_session_id_revoked_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1764 -- 1765 1766 CREATE INDEX refresh_tokens_session_id_revoked_idx ON auth.refresh_tokens USING btree (session_id, revoked); 1767 1768 1769 -- 1770 -- Name: refresh_tokens_token_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1771 -- 1772 1773 CREATE INDEX refresh_tokens_token_idx ON auth.refresh_tokens USING btree (token); 1774 1775 1776 -- 1777 -- Name: saml_providers_sso_provider_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1778 -- 1779 1780 CREATE INDEX saml_providers_sso_provider_id_idx ON auth.saml_providers USING btree (sso_provider_id); 1781 1782 1783 -- 1784 -- Name: saml_relay_states_for_email_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1785 -- 1786 1787 CREATE INDEX saml_relay_states_for_email_idx ON auth.saml_relay_states USING btree (for_email); 1788 1789 1790 -- 1791 -- Name: saml_relay_states_sso_provider_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1792 -- 1793 1794 CREATE INDEX saml_relay_states_sso_provider_id_idx ON auth.saml_relay_states USING btree (sso_provider_id); 1795 1796 1797 -- 1798 -- Name: sessions_user_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1799 -- 1800 1801 CREATE INDEX sessions_user_id_idx ON auth.sessions USING btree (user_id); 1802 1803 1804 -- 1805 -- Name: sso_domains_domain_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1806 -- 1807 1808 CREATE UNIQUE INDEX sso_domains_domain_idx ON auth.sso_domains USING btree (lower(domain)); 1809 1810 1811 -- 1812 -- Name: sso_domains_sso_provider_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1813 -- 1814 1815 CREATE INDEX sso_domains_sso_provider_id_idx ON auth.sso_domains USING btree (sso_provider_id); 1816 1817 1818 -- 1819 -- Name: sso_providers_resource_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1820 -- 1821 1822 CREATE UNIQUE INDEX sso_providers_resource_id_idx ON auth.sso_providers USING btree (lower(resource_id)); 1823 1824 1825 -- 1826 -- Name: user_id_created_at_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1827 -- 1828 1829 CREATE INDEX user_id_created_at_idx ON auth.sessions USING btree (user_id, created_at); 1830 1831 1832 -- 1833 -- Name: users_email_partial_key; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1834 -- 1835 1836 CREATE UNIQUE INDEX users_email_partial_key ON auth.users USING btree (email) WHERE (is_sso_user = false); 1837 1838 1839 -- 1840 -- Name: INDEX users_email_partial_key; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 1841 -- 1842 1843 COMMENT ON INDEX auth.users_email_partial_key IS 'Auth: A partial unique index that applies only when is_sso_user is false'; 1844 1845 1846 -- 1847 -- Name: users_instance_id_email_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1848 -- 1849 1850 CREATE INDEX users_instance_id_email_idx ON auth.users USING btree (instance_id, lower((email)::text)); 1851 1852 1853 -- 1854 -- Name: users_instance_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1855 -- 1856 1857 CREATE INDEX users_instance_id_idx ON auth.users USING btree (instance_id); 1858 1859 1860 -- 1861 -- Name: bname; Type: INDEX; Schema: storage; Owner: supabase_storage_admin 1862 -- 1863 1864 CREATE UNIQUE INDEX bname ON storage.buckets USING btree (name); 1865 1866 1867 -- 1868 -- Name: bucketid_objname; Type: INDEX; Schema: storage; Owner: supabase_storage_admin 1869 -- 1870 1871 CREATE UNIQUE INDEX bucketid_objname ON storage.objects USING btree (bucket_id, name); 1872 1873 1874 -- 1875 -- Name: name_prefix_search; Type: INDEX; Schema: storage; Owner: supabase_storage_admin 1876 -- 1877 1878 CREATE INDEX name_prefix_search ON storage.objects USING btree (name text_pattern_ops); 1879 1880 1881 -- 1882 -- Name: objects update_objects_updated_at; Type: TRIGGER; Schema: storage; Owner: supabase_storage_admin 1883 -- 1884 1885 CREATE TRIGGER update_objects_updated_at BEFORE UPDATE ON storage.objects FOR EACH ROW EXECUTE FUNCTION storage.update_updated_at_column(); 1886 1887 1888 -- 1889 -- Name: extensions extensions_tenant_external_id_fkey; Type: FK CONSTRAINT; Schema: _realtime; Owner: postgres 1890 -- 1891 1892 ALTER TABLE ONLY _realtime.extensions 1893 ADD CONSTRAINT extensions_tenant_external_id_fkey FOREIGN KEY (tenant_external_id) REFERENCES _realtime.tenants(external_id) ON DELETE CASCADE; 1894 1895 1896 -- 1897 -- Name: identities identities_user_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1898 -- 1899 1900 ALTER TABLE ONLY auth.identities 1901 ADD CONSTRAINT identities_user_id_fkey FOREIGN KEY (user_id) REFERENCES auth.users(id) ON DELETE CASCADE; 1902 1903 1904 -- 1905 -- Name: mfa_amr_claims mfa_amr_claims_session_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1906 -- 1907 1908 ALTER TABLE ONLY auth.mfa_amr_claims 1909 ADD CONSTRAINT mfa_amr_claims_session_id_fkey FOREIGN KEY (session_id) REFERENCES auth.sessions(id) ON DELETE CASCADE; 1910 1911 1912 -- 1913 -- Name: mfa_challenges mfa_challenges_auth_factor_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1914 -- 1915 1916 ALTER TABLE ONLY auth.mfa_challenges 1917 ADD CONSTRAINT mfa_challenges_auth_factor_id_fkey FOREIGN KEY (factor_id) REFERENCES auth.mfa_factors(id) ON DELETE CASCADE; 1918 1919 1920 -- 1921 -- Name: mfa_factors mfa_factors_user_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1922 -- 1923 1924 ALTER TABLE ONLY auth.mfa_factors 1925 ADD CONSTRAINT mfa_factors_user_id_fkey FOREIGN KEY (user_id) REFERENCES auth.users(id) ON DELETE CASCADE; 1926 1927 1928 -- 1929 -- Name: refresh_tokens refresh_tokens_session_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1930 -- 1931 1932 ALTER TABLE ONLY auth.refresh_tokens 1933 ADD CONSTRAINT refresh_tokens_session_id_fkey FOREIGN KEY (session_id) REFERENCES auth.sessions(id) ON DELETE CASCADE; 1934 1935 1936 -- 1937 -- Name: saml_providers saml_providers_sso_provider_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1938 -- 1939 1940 ALTER TABLE ONLY auth.saml_providers 1941 ADD CONSTRAINT saml_providers_sso_provider_id_fkey FOREIGN KEY (sso_provider_id) REFERENCES auth.sso_providers(id) ON DELETE CASCADE; 1942 1943 1944 -- 1945 -- Name: saml_relay_states saml_relay_states_sso_provider_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1946 -- 1947 1948 ALTER TABLE ONLY auth.saml_relay_states 1949 ADD CONSTRAINT saml_relay_states_sso_provider_id_fkey FOREIGN KEY (sso_provider_id) REFERENCES auth.sso_providers(id) ON DELETE CASCADE; 1950 1951 1952 -- 1953 -- Name: sessions sessions_user_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1954 -- 1955 1956 ALTER TABLE ONLY auth.sessions 1957 ADD CONSTRAINT sessions_user_id_fkey FOREIGN KEY (user_id) REFERENCES auth.users(id) ON DELETE CASCADE; 1958 1959 1960 -- 1961 -- Name: sso_domains sso_domains_sso_provider_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1962 -- 1963 1964 ALTER TABLE ONLY auth.sso_domains 1965 ADD CONSTRAINT sso_domains_sso_provider_id_fkey FOREIGN KEY (sso_provider_id) REFERENCES auth.sso_providers(id) ON DELETE CASCADE; 1966 1967 1968 -- 1969 -- Name: buckets buckets_owner_fkey; Type: FK CONSTRAINT; Schema: storage; Owner: supabase_storage_admin 1970 -- 1971 1972 ALTER TABLE ONLY storage.buckets 1973 ADD CONSTRAINT buckets_owner_fkey FOREIGN KEY (owner) REFERENCES auth.users(id); 1974 1975 1976 -- 1977 -- Name: objects objects_bucketId_fkey; Type: FK CONSTRAINT; Schema: storage; Owner: supabase_storage_admin 1978 -- 1979 1980 ALTER TABLE ONLY storage.objects 1981 ADD CONSTRAINT "objects_bucketId_fkey" FOREIGN KEY (bucket_id) REFERENCES storage.buckets(id); 1982 1983 1984 -- 1985 -- Name: objects objects_owner_fkey; Type: FK CONSTRAINT; Schema: storage; Owner: supabase_storage_admin 1986 -- 1987 1988 ALTER TABLE ONLY storage.objects 1989 ADD CONSTRAINT objects_owner_fkey FOREIGN KEY (owner) REFERENCES auth.users(id); 1990 1991 1992 -- 1993 -- Name: buckets; Type: ROW SECURITY; Schema: storage; Owner: supabase_storage_admin 1994 -- 1995 1996 ALTER TABLE storage.buckets ENABLE ROW LEVEL SECURITY; 1997 1998 -- 1999 -- Name: migrations; Type: ROW SECURITY; Schema: storage; Owner: supabase_storage_admin 2000 -- 2001 2002 ALTER TABLE storage.migrations ENABLE ROW LEVEL SECURITY; 2003 2004 -- 2005 -- Name: objects; Type: ROW SECURITY; Schema: storage; Owner: supabase_storage_admin 2006 -- 2007 2008 ALTER TABLE storage.objects ENABLE ROW LEVEL SECURITY; 2009 2010 -- 2011 -- Name: supabase_realtime; Type: PUBLICATION; Schema: -; Owner: postgres 2012 -- 2013 2014 CREATE PUBLICATION supabase_realtime WITH (publish = 'insert, update, delete, truncate'); 2015 2016 2017 ALTER PUBLICATION supabase_realtime OWNER TO postgres; 2018 2019 -- 2020 -- Name: SCHEMA auth; Type: ACL; Schema: -; Owner: supabase_admin 2021 -- 2022 2023 GRANT USAGE ON SCHEMA auth TO anon; 2024 GRANT USAGE ON SCHEMA auth TO authenticated; 2025 GRANT USAGE ON SCHEMA auth TO service_role; 2026 GRANT ALL ON SCHEMA auth TO supabase_auth_admin; 2027 GRANT ALL ON SCHEMA auth TO dashboard_user; 2028 GRANT ALL ON SCHEMA auth TO postgres; 2029 2030 2031 -- 2032 -- Name: SCHEMA extensions; Type: ACL; Schema: -; Owner: postgres 2033 -- 2034 2035 GRANT USAGE ON SCHEMA extensions TO anon; 2036 GRANT USAGE ON SCHEMA extensions TO authenticated; 2037 GRANT USAGE ON SCHEMA extensions TO service_role; 2038 GRANT ALL ON SCHEMA extensions TO dashboard_user; 2039 2040 2041 -- 2042 -- Name: SCHEMA graphql_public; Type: ACL; Schema: -; Owner: supabase_admin 2043 -- 2044 2045 GRANT USAGE ON SCHEMA graphql_public TO postgres; 2046 GRANT USAGE ON SCHEMA graphql_public TO anon; 2047 GRANT USAGE ON SCHEMA graphql_public TO authenticated; 2048 GRANT USAGE ON SCHEMA graphql_public TO service_role; 2049 2050 2051 -- 2052 -- Name: SCHEMA public; Type: ACL; Schema: -; Owner: postgres 2053 -- 2054 2055 REVOKE USAGE ON SCHEMA public FROM PUBLIC; 2056 GRANT ALL ON SCHEMA public TO PUBLIC; 2057 GRANT USAGE ON SCHEMA public TO anon; 2058 GRANT USAGE ON SCHEMA public TO authenticated; 2059 GRANT USAGE ON SCHEMA public TO service_role; 2060 2061 2062 -- 2063 -- Name: SCHEMA realtime; Type: ACL; Schema: -; Owner: supabase_admin 2064 -- 2065 2066 GRANT USAGE ON SCHEMA realtime TO postgres; 2067 2068 2069 -- 2070 -- Name: SCHEMA storage; Type: ACL; Schema: -; Owner: supabase_admin 2071 -- 2072 2073 GRANT ALL ON SCHEMA storage TO postgres; 2074 GRANT USAGE ON SCHEMA storage TO anon; 2075 GRANT USAGE ON SCHEMA storage TO authenticated; 2076 GRANT USAGE ON SCHEMA storage TO service_role; 2077 GRANT ALL ON SCHEMA storage TO supabase_storage_admin; 2078 GRANT ALL ON SCHEMA storage TO dashboard_user; 2079 2080 2081 -- 2082 -- Name: FUNCTION email(); Type: ACL; Schema: auth; Owner: supabase_auth_admin 2083 -- 2084 2085 GRANT ALL ON FUNCTION auth.email() TO dashboard_user; 2086 2087 2088 -- 2089 -- Name: FUNCTION jwt(); Type: ACL; Schema: auth; Owner: supabase_auth_admin 2090 -- 2091 2092 GRANT ALL ON FUNCTION auth.jwt() TO postgres; 2093 GRANT ALL ON FUNCTION auth.jwt() TO dashboard_user; 2094 2095 2096 -- 2097 -- Name: FUNCTION role(); Type: ACL; Schema: auth; Owner: supabase_auth_admin 2098 -- 2099 2100 GRANT ALL ON FUNCTION auth.role() TO dashboard_user; 2101 2102 2103 -- 2104 -- Name: FUNCTION uid(); Type: ACL; Schema: auth; Owner: supabase_auth_admin 2105 -- 2106 2107 GRANT ALL ON FUNCTION auth.uid() TO dashboard_user; 2108 2109 2110 -- 2111 -- Name: FUNCTION algorithm_sign(signables text, secret text, algorithm text); Type: ACL; Schema: extensions; Owner: postgres 2112 -- 2113 2114 GRANT ALL ON FUNCTION extensions.algorithm_sign(signables text, secret text, algorithm text) TO dashboard_user; 2115 2116 2117 -- 2118 -- Name: FUNCTION armor(bytea); Type: ACL; Schema: extensions; Owner: postgres 2119 -- 2120 2121 GRANT ALL ON FUNCTION extensions.armor(bytea) TO dashboard_user; 2122 2123 2124 -- 2125 -- Name: FUNCTION armor(bytea, text[], text[]); Type: ACL; Schema: extensions; Owner: postgres 2126 -- 2127 2128 GRANT ALL ON FUNCTION extensions.armor(bytea, text[], text[]) TO dashboard_user; 2129 2130 2131 -- 2132 -- Name: FUNCTION crypt(text, text); Type: ACL; Schema: extensions; Owner: postgres 2133 -- 2134 2135 GRANT ALL ON FUNCTION extensions.crypt(text, text) TO dashboard_user; 2136 2137 2138 -- 2139 -- Name: FUNCTION dearmor(text); Type: ACL; Schema: extensions; Owner: postgres 2140 -- 2141 2142 GRANT ALL ON FUNCTION extensions.dearmor(text) TO dashboard_user; 2143 2144 2145 -- 2146 -- Name: FUNCTION decrypt(bytea, bytea, text); Type: ACL; Schema: extensions; Owner: postgres 2147 -- 2148 2149 GRANT ALL ON FUNCTION extensions.decrypt(bytea, bytea, text) TO dashboard_user; 2150 2151 2152 -- 2153 -- Name: FUNCTION decrypt_iv(bytea, bytea, bytea, text); Type: ACL; Schema: extensions; Owner: postgres 2154 -- 2155 2156 GRANT ALL ON FUNCTION extensions.decrypt_iv(bytea, bytea, bytea, text) TO dashboard_user; 2157 2158 2159 -- 2160 -- Name: FUNCTION digest(bytea, text); Type: ACL; Schema: extensions; Owner: postgres 2161 -- 2162 2163 GRANT ALL ON FUNCTION extensions.digest(bytea, text) TO dashboard_user; 2164 2165 2166 -- 2167 -- Name: FUNCTION digest(text, text); Type: ACL; Schema: extensions; Owner: postgres 2168 -- 2169 2170 GRANT ALL ON FUNCTION extensions.digest(text, text) TO dashboard_user; 2171 2172 2173 -- 2174 -- Name: FUNCTION encrypt(bytea, bytea, text); Type: ACL; Schema: extensions; Owner: postgres 2175 -- 2176 2177 GRANT ALL ON FUNCTION extensions.encrypt(bytea, bytea, text) TO dashboard_user; 2178 2179 2180 -- 2181 -- Name: FUNCTION encrypt_iv(bytea, bytea, bytea, text); Type: ACL; Schema: extensions; Owner: postgres 2182 -- 2183 2184 GRANT ALL ON FUNCTION extensions.encrypt_iv(bytea, bytea, bytea, text) TO dashboard_user; 2185 2186 2187 -- 2188 -- Name: FUNCTION gen_random_bytes(integer); Type: ACL; Schema: extensions; Owner: postgres 2189 -- 2190 2191 GRANT ALL ON FUNCTION extensions.gen_random_bytes(integer) TO dashboard_user; 2192 2193 2194 -- 2195 -- Name: FUNCTION gen_random_uuid(); Type: ACL; Schema: extensions; Owner: postgres 2196 -- 2197 2198 GRANT ALL ON FUNCTION extensions.gen_random_uuid() TO dashboard_user; 2199 2200 2201 -- 2202 -- Name: FUNCTION gen_salt(text); Type: ACL; Schema: extensions; Owner: postgres 2203 -- 2204 2205 GRANT ALL ON FUNCTION extensions.gen_salt(text) TO dashboard_user; 2206 2207 2208 -- 2209 -- Name: FUNCTION gen_salt(text, integer); Type: ACL; Schema: extensions; Owner: postgres 2210 -- 2211 2212 GRANT ALL ON FUNCTION extensions.gen_salt(text, integer) TO dashboard_user; 2213 2214 2215 -- 2216 -- Name: FUNCTION grant_pg_cron_access(); Type: ACL; Schema: extensions; Owner: postgres 2217 -- 2218 2219 GRANT ALL ON FUNCTION extensions.grant_pg_cron_access() TO dashboard_user; 2220 2221 2222 -- 2223 -- Name: FUNCTION grant_pg_net_access(); Type: ACL; Schema: extensions; Owner: postgres 2224 -- 2225 2226 GRANT ALL ON FUNCTION extensions.grant_pg_net_access() TO dashboard_user; 2227 2228 2229 -- 2230 -- Name: FUNCTION hmac(bytea, bytea, text); Type: ACL; Schema: extensions; Owner: postgres 2231 -- 2232 2233 GRANT ALL ON FUNCTION extensions.hmac(bytea, bytea, text) TO dashboard_user; 2234 2235 2236 -- 2237 -- Name: FUNCTION hmac(text, text, text); Type: ACL; Schema: extensions; Owner: postgres 2238 -- 2239 2240 GRANT ALL ON FUNCTION extensions.hmac(text, text, text) TO dashboard_user; 2241 2242 2243 -- 2244 -- Name: FUNCTION pgp_armor_headers(text, OUT key text, OUT value text); Type: ACL; Schema: extensions; Owner: postgres 2245 -- 2246 2247 GRANT ALL ON FUNCTION extensions.pgp_armor_headers(text, OUT key text, OUT value text) TO dashboard_user; 2248 2249 2250 -- 2251 -- Name: FUNCTION pgp_key_id(bytea); Type: ACL; Schema: extensions; Owner: postgres 2252 -- 2253 2254 GRANT ALL ON FUNCTION extensions.pgp_key_id(bytea) TO dashboard_user; 2255 2256 2257 -- 2258 -- Name: FUNCTION pgp_pub_decrypt(bytea, bytea); Type: ACL; Schema: extensions; Owner: postgres 2259 -- 2260 2261 GRANT ALL ON FUNCTION extensions.pgp_pub_decrypt(bytea, bytea) TO dashboard_user; 2262 2263 2264 -- 2265 -- Name: FUNCTION pgp_pub_decrypt(bytea, bytea, text); Type: ACL; Schema: extensions; Owner: postgres 2266 -- 2267 2268 GRANT ALL ON FUNCTION extensions.pgp_pub_decrypt(bytea, bytea, text) TO dashboard_user; 2269 2270 2271 -- 2272 -- Name: FUNCTION pgp_pub_decrypt(bytea, bytea, text, text); Type: ACL; Schema: extensions; Owner: postgres 2273 -- 2274 2275 GRANT ALL ON FUNCTION extensions.pgp_pub_decrypt(bytea, bytea, text, text) TO dashboard_user; 2276 2277 2278 -- 2279 -- Name: FUNCTION pgp_pub_decrypt_bytea(bytea, bytea); Type: ACL; Schema: extensions; Owner: postgres 2280 -- 2281 2282 GRANT ALL ON FUNCTION extensions.pgp_pub_decrypt_bytea(bytea, bytea) TO dashboard_user; 2283 2284 2285 -- 2286 -- Name: FUNCTION pgp_pub_decrypt_bytea(bytea, bytea, text); Type: ACL; Schema: extensions; Owner: postgres 2287 -- 2288 2289 GRANT ALL ON FUNCTION extensions.pgp_pub_decrypt_bytea(bytea, bytea, text) TO dashboard_user; 2290 2291 2292 -- 2293 -- Name: FUNCTION pgp_pub_decrypt_bytea(bytea, bytea, text, text); Type: ACL; Schema: extensions; Owner: postgres 2294 -- 2295 2296 GRANT ALL ON FUNCTION extensions.pgp_pub_decrypt_bytea(bytea, bytea, text, text) TO dashboard_user; 2297 2298 2299 -- 2300 -- Name: FUNCTION pgp_pub_encrypt(text, bytea); Type: ACL; Schema: extensions; Owner: postgres 2301 -- 2302 2303 GRANT ALL ON FUNCTION extensions.pgp_pub_encrypt(text, bytea) TO dashboard_user; 2304 2305 2306 -- 2307 -- Name: FUNCTION pgp_pub_encrypt(text, bytea, text); Type: ACL; Schema: extensions; Owner: postgres 2308 -- 2309 2310 GRANT ALL ON FUNCTION extensions.pgp_pub_encrypt(text, bytea, text) TO dashboard_user; 2311 2312 2313 -- 2314 -- Name: FUNCTION pgp_pub_encrypt_bytea(bytea, bytea); Type: ACL; Schema: extensions; Owner: postgres 2315 -- 2316 2317 GRANT ALL ON FUNCTION extensions.pgp_pub_encrypt_bytea(bytea, bytea) TO dashboard_user; 2318 2319 2320 -- 2321 -- Name: FUNCTION pgp_pub_encrypt_bytea(bytea, bytea, text); Type: ACL; Schema: extensions; Owner: postgres 2322 -- 2323 2324 GRANT ALL ON FUNCTION extensions.pgp_pub_encrypt_bytea(bytea, bytea, text) TO dashboard_user; 2325 2326 2327 -- 2328 -- Name: FUNCTION pgp_sym_decrypt(bytea, text); Type: ACL; Schema: extensions; Owner: postgres 2329 -- 2330 2331 GRANT ALL ON FUNCTION extensions.pgp_sym_decrypt(bytea, text) TO dashboard_user; 2332 2333 2334 -- 2335 -- Name: FUNCTION pgp_sym_decrypt(bytea, text, text); Type: ACL; Schema: extensions; Owner: postgres 2336 -- 2337 2338 GRANT ALL ON FUNCTION extensions.pgp_sym_decrypt(bytea, text, text) TO dashboard_user; 2339 2340 2341 -- 2342 -- Name: FUNCTION pgp_sym_decrypt_bytea(bytea, text); Type: ACL; Schema: extensions; Owner: postgres 2343 -- 2344 2345 GRANT ALL ON FUNCTION extensions.pgp_sym_decrypt_bytea(bytea, text) TO dashboard_user; 2346 2347 2348 -- 2349 -- Name: FUNCTION pgp_sym_decrypt_bytea(bytea, text, text); Type: ACL; Schema: extensions; Owner: postgres 2350 -- 2351 2352 GRANT ALL ON FUNCTION extensions.pgp_sym_decrypt_bytea(bytea, text, text) TO dashboard_user; 2353 2354 2355 -- 2356 -- Name: FUNCTION pgp_sym_encrypt(text, text); Type: ACL; Schema: extensions; Owner: postgres 2357 -- 2358 2359 GRANT ALL ON FUNCTION extensions.pgp_sym_encrypt(text, text) TO dashboard_user; 2360 2361 2362 -- 2363 -- Name: FUNCTION pgp_sym_encrypt(text, text, text); Type: ACL; Schema: extensions; Owner: postgres 2364 -- 2365 2366 GRANT ALL ON FUNCTION extensions.pgp_sym_encrypt(text, text, text) TO dashboard_user; 2367 2368 2369 -- 2370 -- Name: FUNCTION pgp_sym_encrypt_bytea(bytea, text); Type: ACL; Schema: extensions; Owner: postgres 2371 -- 2372 2373 GRANT ALL ON FUNCTION extensions.pgp_sym_encrypt_bytea(bytea, text) TO dashboard_user; 2374 2375 2376 -- 2377 -- Name: FUNCTION pgp_sym_encrypt_bytea(bytea, text, text); Type: ACL; Schema: extensions; Owner: postgres 2378 -- 2379 2380 GRANT ALL ON FUNCTION extensions.pgp_sym_encrypt_bytea(bytea, text, text) TO dashboard_user; 2381 2382 2383 -- 2384 -- Name: FUNCTION sign(payload json, secret text, algorithm text); Type: ACL; Schema: extensions; Owner: postgres 2385 -- 2386 2387 GRANT ALL ON FUNCTION extensions.sign(payload json, secret text, algorithm text) TO dashboard_user; 2388 2389 2390 -- 2391 -- Name: FUNCTION url_decode(data text); Type: ACL; Schema: extensions; Owner: postgres 2392 -- 2393 2394 GRANT ALL ON FUNCTION extensions.url_decode(data text) TO dashboard_user; 2395 2396 2397 -- 2398 -- Name: FUNCTION url_encode(data bytea); Type: ACL; Schema: extensions; Owner: postgres 2399 -- 2400 2401 GRANT ALL ON FUNCTION extensions.url_encode(data bytea) TO dashboard_user; 2402 2403 2404 -- 2405 -- Name: FUNCTION uuid_generate_v1(); Type: ACL; Schema: extensions; Owner: postgres 2406 -- 2407 2408 GRANT ALL ON FUNCTION extensions.uuid_generate_v1() TO dashboard_user; 2409 2410 2411 -- 2412 -- Name: FUNCTION uuid_generate_v1mc(); Type: ACL; Schema: extensions; Owner: postgres 2413 -- 2414 2415 GRANT ALL ON FUNCTION extensions.uuid_generate_v1mc() TO dashboard_user; 2416 2417 2418 -- 2419 -- Name: FUNCTION uuid_generate_v3(namespace uuid, name text); Type: ACL; Schema: extensions; Owner: postgres 2420 -- 2421 2422 GRANT ALL ON FUNCTION extensions.uuid_generate_v3(namespace uuid, name text) TO dashboard_user; 2423 2424 2425 -- 2426 -- Name: FUNCTION uuid_generate_v4(); Type: ACL; Schema: extensions; Owner: postgres 2427 -- 2428 2429 GRANT ALL ON FUNCTION extensions.uuid_generate_v4() TO dashboard_user; 2430 2431 2432 -- 2433 -- Name: FUNCTION uuid_generate_v5(namespace uuid, name text); Type: ACL; Schema: extensions; Owner: postgres 2434 -- 2435 2436 GRANT ALL ON FUNCTION extensions.uuid_generate_v5(namespace uuid, name text) TO dashboard_user; 2437 2438 2439 -- 2440 -- Name: FUNCTION uuid_nil(); Type: ACL; Schema: extensions; Owner: postgres 2441 -- 2442 2443 GRANT ALL ON FUNCTION extensions.uuid_nil() TO dashboard_user; 2444 2445 2446 -- 2447 -- Name: FUNCTION uuid_ns_dns(); Type: ACL; Schema: extensions; Owner: postgres 2448 -- 2449 2450 GRANT ALL ON FUNCTION extensions.uuid_ns_dns() TO dashboard_user; 2451 2452 2453 -- 2454 -- Name: FUNCTION uuid_ns_oid(); Type: ACL; Schema: extensions; Owner: postgres 2455 -- 2456 2457 GRANT ALL ON FUNCTION extensions.uuid_ns_oid() TO dashboard_user; 2458 2459 2460 -- 2461 -- Name: FUNCTION uuid_ns_url(); Type: ACL; Schema: extensions; Owner: postgres 2462 -- 2463 2464 GRANT ALL ON FUNCTION extensions.uuid_ns_url() TO dashboard_user; 2465 2466 2467 -- 2468 -- Name: FUNCTION uuid_ns_x500(); Type: ACL; Schema: extensions; Owner: postgres 2469 -- 2470 2471 GRANT ALL ON FUNCTION extensions.uuid_ns_x500() TO dashboard_user; 2472 2473 2474 -- 2475 -- Name: FUNCTION verify(token text, secret text, algorithm text); Type: ACL; Schema: extensions; Owner: postgres 2476 -- 2477 2478 GRANT ALL ON FUNCTION extensions.verify(token text, secret text, algorithm text) TO dashboard_user; 2479 2480 2481 -- 2482 -- Name: FUNCTION extension(name text); Type: ACL; Schema: storage; Owner: supabase_storage_admin 2483 -- 2484 2485 GRANT ALL ON FUNCTION storage.extension(name text) TO anon; 2486 GRANT ALL ON FUNCTION storage.extension(name text) TO authenticated; 2487 GRANT ALL ON FUNCTION storage.extension(name text) TO service_role; 2488 GRANT ALL ON FUNCTION storage.extension(name text) TO dashboard_user; 2489 GRANT ALL ON FUNCTION storage.extension(name text) TO postgres; 2490 2491 2492 -- 2493 -- Name: FUNCTION filename(name text); Type: ACL; Schema: storage; Owner: supabase_storage_admin 2494 -- 2495 2496 GRANT ALL ON FUNCTION storage.filename(name text) TO anon; 2497 GRANT ALL ON FUNCTION storage.filename(name text) TO authenticated; 2498 GRANT ALL ON FUNCTION storage.filename(name text) TO service_role; 2499 GRANT ALL ON FUNCTION storage.filename(name text) TO dashboard_user; 2500 GRANT ALL ON FUNCTION storage.filename(name text) TO postgres; 2501 2502 2503 -- 2504 -- Name: FUNCTION foldername(name text); Type: ACL; Schema: storage; Owner: supabase_storage_admin 2505 -- 2506 2507 GRANT ALL ON FUNCTION storage.foldername(name text) TO anon; 2508 GRANT ALL ON FUNCTION storage.foldername(name text) TO authenticated; 2509 GRANT ALL ON FUNCTION storage.foldername(name text) TO service_role; 2510 GRANT ALL ON FUNCTION storage.foldername(name text) TO dashboard_user; 2511 GRANT ALL ON FUNCTION storage.foldername(name text) TO postgres; 2512 2513 2514 -- 2515 -- Name: TABLE audit_log_entries; Type: ACL; Schema: auth; Owner: supabase_auth_admin 2516 -- 2517 2518 GRANT ALL ON TABLE auth.audit_log_entries TO dashboard_user; 2519 GRANT ALL ON TABLE auth.audit_log_entries TO postgres; 2520 2521 2522 -- 2523 -- Name: TABLE identities; Type: ACL; Schema: auth; Owner: supabase_auth_admin 2524 -- 2525 2526 GRANT ALL ON TABLE auth.identities TO postgres; 2527 GRANT ALL ON TABLE auth.identities TO dashboard_user; 2528 2529 2530 -- 2531 -- Name: TABLE instances; Type: ACL; Schema: auth; Owner: supabase_auth_admin 2532 -- 2533 2534 GRANT ALL ON TABLE auth.instances TO dashboard_user; 2535 GRANT ALL ON TABLE auth.instances TO postgres; 2536 2537 2538 -- 2539 -- Name: TABLE mfa_amr_claims; Type: ACL; Schema: auth; Owner: supabase_auth_admin 2540 -- 2541 2542 GRANT ALL ON TABLE auth.mfa_amr_claims TO postgres; 2543 GRANT ALL ON TABLE auth.mfa_amr_claims TO dashboard_user; 2544 2545 2546 -- 2547 -- Name: TABLE mfa_challenges; Type: ACL; Schema: auth; Owner: supabase_auth_admin 2548 -- 2549 2550 GRANT ALL ON TABLE auth.mfa_challenges TO postgres; 2551 GRANT ALL ON TABLE auth.mfa_challenges TO dashboard_user; 2552 2553 2554 -- 2555 -- Name: TABLE mfa_factors; Type: ACL; Schema: auth; Owner: supabase_auth_admin 2556 -- 2557 2558 GRANT ALL ON TABLE auth.mfa_factors TO postgres; 2559 GRANT ALL ON TABLE auth.mfa_factors TO dashboard_user; 2560 2561 2562 -- 2563 -- Name: TABLE refresh_tokens; Type: ACL; Schema: auth; Owner: supabase_auth_admin 2564 -- 2565 2566 GRANT ALL ON TABLE auth.refresh_tokens TO dashboard_user; 2567 GRANT ALL ON TABLE auth.refresh_tokens TO postgres; 2568 2569 2570 -- 2571 -- Name: SEQUENCE refresh_tokens_id_seq; Type: ACL; Schema: auth; Owner: supabase_auth_admin 2572 -- 2573 2574 GRANT ALL ON SEQUENCE auth.refresh_tokens_id_seq TO dashboard_user; 2575 GRANT ALL ON SEQUENCE auth.refresh_tokens_id_seq TO postgres; 2576 2577 2578 -- 2579 -- Name: TABLE saml_providers; Type: ACL; Schema: auth; Owner: supabase_auth_admin 2580 -- 2581 2582 GRANT ALL ON TABLE auth.saml_providers TO postgres; 2583 GRANT ALL ON TABLE auth.saml_providers TO dashboard_user; 2584 2585 2586 -- 2587 -- Name: TABLE saml_relay_states; Type: ACL; Schema: auth; Owner: supabase_auth_admin 2588 -- 2589 2590 GRANT ALL ON TABLE auth.saml_relay_states TO postgres; 2591 GRANT ALL ON TABLE auth.saml_relay_states TO dashboard_user; 2592 2593 2594 -- 2595 -- Name: TABLE schema_migrations; Type: ACL; Schema: auth; Owner: supabase_auth_admin 2596 -- 2597 2598 GRANT ALL ON TABLE auth.schema_migrations TO dashboard_user; 2599 GRANT ALL ON TABLE auth.schema_migrations TO postgres; 2600 2601 2602 -- 2603 -- Name: TABLE sessions; Type: ACL; Schema: auth; Owner: supabase_auth_admin 2604 -- 2605 2606 GRANT ALL ON TABLE auth.sessions TO postgres; 2607 GRANT ALL ON TABLE auth.sessions TO dashboard_user; 2608 2609 2610 -- 2611 -- Name: TABLE sso_domains; Type: ACL; Schema: auth; Owner: supabase_auth_admin 2612 -- 2613 2614 GRANT ALL ON TABLE auth.sso_domains TO postgres; 2615 GRANT ALL ON TABLE auth.sso_domains TO dashboard_user; 2616 2617 2618 -- 2619 -- Name: TABLE sso_providers; Type: ACL; Schema: auth; Owner: supabase_auth_admin 2620 -- 2621 2622 GRANT ALL ON TABLE auth.sso_providers TO postgres; 2623 GRANT ALL ON TABLE auth.sso_providers TO dashboard_user; 2624 2625 2626 -- 2627 -- Name: TABLE users; Type: ACL; Schema: auth; Owner: supabase_auth_admin 2628 -- 2629 2630 GRANT ALL ON TABLE auth.users TO dashboard_user; 2631 GRANT ALL ON TABLE auth.users TO postgres; 2632 2633 2634 -- 2635 -- Name: TABLE buckets; Type: ACL; Schema: storage; Owner: supabase_storage_admin 2636 -- 2637 2638 GRANT ALL ON TABLE storage.buckets TO anon; 2639 GRANT ALL ON TABLE storage.buckets TO authenticated; 2640 GRANT ALL ON TABLE storage.buckets TO service_role; 2641 GRANT ALL ON TABLE storage.buckets TO postgres; 2642 2643 2644 -- 2645 -- Name: TABLE migrations; Type: ACL; Schema: storage; Owner: supabase_storage_admin 2646 -- 2647 2648 GRANT ALL ON TABLE storage.migrations TO anon; 2649 GRANT ALL ON TABLE storage.migrations TO authenticated; 2650 GRANT ALL ON TABLE storage.migrations TO service_role; 2651 GRANT ALL ON TABLE storage.migrations TO postgres; 2652 2653 2654 -- 2655 -- Name: TABLE objects; Type: ACL; Schema: storage; Owner: supabase_storage_admin 2656 -- 2657 2658 GRANT ALL ON TABLE storage.objects TO anon; 2659 GRANT ALL ON TABLE storage.objects TO authenticated; 2660 GRANT ALL ON TABLE storage.objects TO service_role; 2661 GRANT ALL ON TABLE storage.objects TO postgres; 2662 2663 2664 -- 2665 -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: auth; Owner: supabase_auth_admin 2666 -- 2667 2668 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_auth_admin IN SCHEMA auth GRANT ALL ON SEQUENCES TO postgres; 2669 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_auth_admin IN SCHEMA auth GRANT ALL ON SEQUENCES TO dashboard_user; 2670 2671 2672 -- 2673 -- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: auth; Owner: supabase_auth_admin 2674 -- 2675 2676 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_auth_admin IN SCHEMA auth GRANT ALL ON FUNCTIONS TO postgres; 2677 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_auth_admin IN SCHEMA auth GRANT ALL ON FUNCTIONS TO dashboard_user; 2678 2679 2680 -- 2681 -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: auth; Owner: supabase_auth_admin 2682 -- 2683 2684 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_auth_admin IN SCHEMA auth GRANT ALL ON TABLES TO postgres; 2685 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_auth_admin IN SCHEMA auth GRANT ALL ON TABLES TO dashboard_user; 2686 2687 2688 -- 2689 -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: graphql_public; Owner: supabase_admin 2690 -- 2691 2692 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON SEQUENCES TO postgres; 2693 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON SEQUENCES TO anon; 2694 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON SEQUENCES TO authenticated; 2695 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON SEQUENCES TO service_role; 2696 2697 2698 -- 2699 -- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: graphql_public; Owner: supabase_admin 2700 -- 2701 2702 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON FUNCTIONS TO postgres; 2703 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON FUNCTIONS TO anon; 2704 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON FUNCTIONS TO authenticated; 2705 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON FUNCTIONS TO service_role; 2706 2707 2708 -- 2709 -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: graphql_public; Owner: supabase_admin 2710 -- 2711 2712 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON TABLES TO postgres; 2713 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON TABLES TO anon; 2714 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON TABLES TO authenticated; 2715 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON TABLES TO service_role; 2716 2717 2718 -- 2719 -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: public; Owner: postgres 2720 -- 2721 2722 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON SEQUENCES TO postgres; 2723 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON SEQUENCES TO anon; 2724 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON SEQUENCES TO authenticated; 2725 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON SEQUENCES TO service_role; 2726 2727 2728 -- 2729 -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: public; Owner: supabase_admin 2730 -- 2731 2732 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON SEQUENCES TO postgres; 2733 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON SEQUENCES TO anon; 2734 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON SEQUENCES TO authenticated; 2735 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON SEQUENCES TO service_role; 2736 2737 2738 -- 2739 -- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: public; Owner: postgres 2740 -- 2741 2742 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON FUNCTIONS TO postgres; 2743 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON FUNCTIONS TO anon; 2744 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON FUNCTIONS TO authenticated; 2745 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON FUNCTIONS TO service_role; 2746 2747 2748 -- 2749 -- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: public; Owner: supabase_admin 2750 -- 2751 2752 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON FUNCTIONS TO postgres; 2753 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON FUNCTIONS TO anon; 2754 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON FUNCTIONS TO authenticated; 2755 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON FUNCTIONS TO service_role; 2756 2757 2758 -- 2759 -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: public; Owner: postgres 2760 -- 2761 2762 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON TABLES TO postgres; 2763 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON TABLES TO anon; 2764 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON TABLES TO authenticated; 2765 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON TABLES TO service_role; 2766 2767 2768 -- 2769 -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: public; Owner: supabase_admin 2770 -- 2771 2772 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON TABLES TO postgres; 2773 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON TABLES TO anon; 2774 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON TABLES TO authenticated; 2775 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON TABLES TO service_role; 2776 2777 2778 -- 2779 -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: realtime; Owner: supabase_admin 2780 -- 2781 2782 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA realtime GRANT ALL ON SEQUENCES TO postgres; 2783 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA realtime GRANT ALL ON SEQUENCES TO dashboard_user; 2784 2785 2786 -- 2787 -- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: realtime; Owner: supabase_admin 2788 -- 2789 2790 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA realtime GRANT ALL ON FUNCTIONS TO postgres; 2791 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA realtime GRANT ALL ON FUNCTIONS TO dashboard_user; 2792 2793 2794 -- 2795 -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: realtime; Owner: supabase_admin 2796 -- 2797 2798 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA realtime GRANT ALL ON TABLES TO postgres; 2799 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA realtime GRANT ALL ON TABLES TO dashboard_user; 2800 2801 2802 -- 2803 -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: storage; Owner: postgres 2804 -- 2805 2806 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON SEQUENCES TO postgres; 2807 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON SEQUENCES TO anon; 2808 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON SEQUENCES TO authenticated; 2809 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON SEQUENCES TO service_role; 2810 2811 2812 -- 2813 -- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: storage; Owner: postgres 2814 -- 2815 2816 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON FUNCTIONS TO postgres; 2817 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON FUNCTIONS TO anon; 2818 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON FUNCTIONS TO authenticated; 2819 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON FUNCTIONS TO service_role; 2820 2821 2822 -- 2823 -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: storage; Owner: postgres 2824 -- 2825 2826 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON TABLES TO postgres; 2827 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON TABLES TO anon; 2828 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON TABLES TO authenticated; 2829 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON TABLES TO service_role; 2830 2831 2832 -- 2833 -- Name: issue_graphql_placeholder; Type: EVENT TRIGGER; Schema: -; Owner: supabase_admin 2834 -- 2835 2836 CREATE EVENT TRIGGER issue_graphql_placeholder ON sql_drop 2837 WHEN TAG IN ('DROP EXTENSION') 2838 EXECUTE FUNCTION extensions.set_graphql_placeholder(); 2839 2840 2841 ALTER EVENT TRIGGER issue_graphql_placeholder OWNER TO supabase_admin; 2842 2843 -- 2844 -- Name: issue_pg_cron_access; Type: EVENT TRIGGER; Schema: -; Owner: postgres 2845 -- 2846 2847 CREATE EVENT TRIGGER issue_pg_cron_access ON ddl_command_end 2848 WHEN TAG IN ('CREATE SCHEMA') 2849 EXECUTE FUNCTION extensions.grant_pg_cron_access(); 2850 2851 2852 ALTER EVENT TRIGGER issue_pg_cron_access OWNER TO postgres; 2853 2854 -- 2855 -- Name: issue_pg_graphql_access; Type: EVENT TRIGGER; Schema: -; Owner: supabase_admin 2856 -- 2857 2858 CREATE EVENT TRIGGER issue_pg_graphql_access ON ddl_command_end 2859 WHEN TAG IN ('CREATE FUNCTION') 2860 EXECUTE FUNCTION extensions.grant_pg_graphql_access(); 2861 2862 2863 ALTER EVENT TRIGGER issue_pg_graphql_access OWNER TO supabase_admin; 2864 2865 -- 2866 -- Name: issue_pg_net_access; Type: EVENT TRIGGER; Schema: -; Owner: postgres 2867 -- 2868 2869 CREATE EVENT TRIGGER issue_pg_net_access ON ddl_command_end 2870 WHEN TAG IN ('CREATE EXTENSION') 2871 EXECUTE FUNCTION extensions.grant_pg_net_access(); 2872 2873 2874 ALTER EVENT TRIGGER issue_pg_net_access OWNER TO postgres; 2875 2876 -- 2877 -- Name: pgrst_ddl_watch; Type: EVENT TRIGGER; Schema: -; Owner: supabase_admin 2878 -- 2879 2880 CREATE EVENT TRIGGER pgrst_ddl_watch ON ddl_command_end 2881 EXECUTE FUNCTION extensions.pgrst_ddl_watch(); 2882 2883 2884 ALTER EVENT TRIGGER pgrst_ddl_watch OWNER TO supabase_admin; 2885 2886 -- 2887 -- Name: pgrst_drop_watch; Type: EVENT TRIGGER; Schema: -; Owner: supabase_admin 2888 -- 2889 2890 CREATE EVENT TRIGGER pgrst_drop_watch ON sql_drop 2891 EXECUTE FUNCTION extensions.pgrst_drop_watch(); 2892 2893 2894 ALTER EVENT TRIGGER pgrst_drop_watch OWNER TO supabase_admin; 2895 2896 -- 2897 -- PostgreSQL database dump complete 2898 -- 2899 2900 RESET ALL;