github.com/Redstoneguy129/cli@v0.0.0-20230211220159-15dca4e91917/internal/utils/templates/initial_schemas/13.sql (about)

     1  --
     2  -- PostgreSQL database dump
     3  --
     4  
     5  -- Dumped from database version 13.3 (Debian 13.3-1.pgdg100+1)
     6  -- Dumped by pg_dump version 15.0
     7  
     8  SET statement_timeout = 0;
     9  SET lock_timeout = 0;
    10  SET idle_in_transaction_session_timeout = 0;
    11  SET client_encoding = 'UTF8';
    12  SET standard_conforming_strings = on;
    13  SELECT pg_catalog.set_config('search_path', '', false);
    14  SET check_function_bodies = false;
    15  SET xmloption = content;
    16  SET client_min_messages = warning;
    17  SET row_security = off;
    18  
    19  --
    20  -- Name: _realtime; Type: SCHEMA; Schema: -; Owner: postgres
    21  --
    22  
    23  CREATE SCHEMA IF NOT EXISTS _realtime;
    24  
    25  
    26  ALTER SCHEMA _realtime OWNER TO postgres;
    27  
    28  --
    29  -- Name: auth; Type: SCHEMA; Schema: -; Owner: supabase_admin
    30  --
    31  
    32  CREATE SCHEMA IF NOT EXISTS auth;
    33  
    34  
    35  ALTER SCHEMA auth OWNER TO supabase_admin;
    36  
    37  --
    38  -- Name: extensions; Type: SCHEMA; Schema: -; Owner: postgres
    39  --
    40  
    41  CREATE SCHEMA IF NOT EXISTS extensions;
    42  
    43  
    44  ALTER SCHEMA extensions OWNER TO postgres;
    45  
    46  --
    47  -- Name: graphql_public; Type: SCHEMA; Schema: -; Owner: supabase_admin
    48  --
    49  
    50  CREATE SCHEMA IF NOT EXISTS graphql_public;
    51  
    52  
    53  ALTER SCHEMA graphql_public OWNER TO supabase_admin;
    54  
    55  --
    56  -- Name: public; Type: SCHEMA; Schema: -; Owner: postgres
    57  --
    58  
    59  -- *not* creating schema, since initdb creates it
    60  
    61  
    62  ALTER SCHEMA public OWNER TO postgres;
    63  
    64  --
    65  -- Name: realtime; Type: SCHEMA; Schema: -; Owner: supabase_admin
    66  --
    67  
    68  CREATE SCHEMA IF NOT EXISTS realtime;
    69  
    70  
    71  ALTER SCHEMA realtime OWNER TO supabase_admin;
    72  
    73  --
    74  -- Name: storage; Type: SCHEMA; Schema: -; Owner: supabase_admin
    75  --
    76  
    77  CREATE SCHEMA IF NOT EXISTS storage;
    78  
    79  
    80  ALTER SCHEMA storage OWNER TO supabase_admin;
    81  
    82  --
    83  -- Name: pgcrypto; Type: EXTENSION; Schema: -; Owner: -
    84  --
    85  
    86  CREATE EXTENSION IF NOT EXISTS pgcrypto WITH SCHEMA extensions;
    87  
    88  
    89  --
    90  -- Name: EXTENSION pgcrypto; Type: COMMENT; Schema: -; Owner: 
    91  --
    92  
    93  COMMENT ON EXTENSION pgcrypto IS 'cryptographic functions';
    94  
    95  
    96  --
    97  -- Name: pgjwt; Type: EXTENSION; Schema: -; Owner: -
    98  --
    99  
   100  CREATE EXTENSION IF NOT EXISTS pgjwt WITH SCHEMA extensions;
   101  
   102  
   103  --
   104  -- Name: EXTENSION pgjwt; Type: COMMENT; Schema: -; Owner: 
   105  --
   106  
   107  COMMENT ON EXTENSION pgjwt IS 'JSON Web Token API for Postgresql';
   108  
   109  
   110  --
   111  -- Name: uuid-ossp; Type: EXTENSION; Schema: -; Owner: -
   112  --
   113  
   114  CREATE EXTENSION IF NOT EXISTS "uuid-ossp" WITH SCHEMA extensions;
   115  
   116  
   117  --
   118  -- Name: EXTENSION "uuid-ossp"; Type: COMMENT; Schema: -; Owner: 
   119  --
   120  
   121  COMMENT ON EXTENSION "uuid-ossp" IS 'generate universally unique identifiers (UUIDs)';
   122  
   123  
   124  --
   125  -- Name: aal_level; Type: TYPE; Schema: auth; Owner: supabase_auth_admin
   126  --
   127  
   128  CREATE TYPE auth.aal_level AS ENUM (
   129      'aal1',
   130      'aal2',
   131      'aal3'
   132  );
   133  
   134  
   135  ALTER TYPE auth.aal_level OWNER TO supabase_auth_admin;
   136  
   137  --
   138  -- Name: factor_status; Type: TYPE; Schema: auth; Owner: supabase_auth_admin
   139  --
   140  
   141  CREATE TYPE auth.factor_status AS ENUM (
   142      'unverified',
   143      'verified'
   144  );
   145  
   146  
   147  ALTER TYPE auth.factor_status OWNER TO supabase_auth_admin;
   148  
   149  --
   150  -- Name: factor_type; Type: TYPE; Schema: auth; Owner: supabase_auth_admin
   151  --
   152  
   153  CREATE TYPE auth.factor_type AS ENUM (
   154      'totp',
   155      'webauthn'
   156  );
   157  
   158  
   159  ALTER TYPE auth.factor_type OWNER TO supabase_auth_admin;
   160  
   161  --
   162  -- Name: email(); Type: FUNCTION; Schema: auth; Owner: supabase_auth_admin
   163  --
   164  
   165  CREATE OR REPLACE FUNCTION auth.email() RETURNS text
   166      LANGUAGE sql STABLE
   167      AS $$
   168    select 
   169    	coalesce(
   170  		nullif(current_setting('request.jwt.claim.email', true), ''),
   171  		(nullif(current_setting('request.jwt.claims', true), '')::jsonb ->> 'email')
   172  	)::text
   173  $$;
   174  
   175  
   176  ALTER FUNCTION auth.email() OWNER TO supabase_auth_admin;
   177  
   178  --
   179  -- Name: FUNCTION email(); Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
   180  --
   181  
   182  COMMENT ON FUNCTION auth.email() IS 'Deprecated. Use auth.jwt() -> ''email'' instead.';
   183  
   184  
   185  --
   186  -- Name: jwt(); Type: FUNCTION; Schema: auth; Owner: supabase_auth_admin
   187  --
   188  
   189  CREATE OR REPLACE FUNCTION auth.jwt() RETURNS jsonb
   190      LANGUAGE sql STABLE
   191      AS $$
   192    select 
   193      coalesce(
   194          nullif(current_setting('request.jwt.claim', true), ''),
   195          nullif(current_setting('request.jwt.claims', true), '')
   196      )::jsonb
   197  $$;
   198  
   199  
   200  ALTER FUNCTION auth.jwt() OWNER TO supabase_auth_admin;
   201  
   202  --
   203  -- Name: role(); Type: FUNCTION; Schema: auth; Owner: supabase_auth_admin
   204  --
   205  
   206  CREATE OR REPLACE FUNCTION auth.role() RETURNS text
   207      LANGUAGE sql STABLE
   208      AS $$
   209    select 
   210    	coalesce(
   211  		nullif(current_setting('request.jwt.claim.role', true), ''),
   212  		(nullif(current_setting('request.jwt.claims', true), '')::jsonb ->> 'role')
   213  	)::text
   214  $$;
   215  
   216  
   217  ALTER FUNCTION auth.role() OWNER TO supabase_auth_admin;
   218  
   219  --
   220  -- Name: FUNCTION role(); Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
   221  --
   222  
   223  COMMENT ON FUNCTION auth.role() IS 'Deprecated. Use auth.jwt() -> ''role'' instead.';
   224  
   225  
   226  --
   227  -- Name: uid(); Type: FUNCTION; Schema: auth; Owner: supabase_auth_admin
   228  --
   229  
   230  CREATE OR REPLACE FUNCTION auth.uid() RETURNS uuid
   231      LANGUAGE sql STABLE
   232      AS $$
   233    select 
   234    	coalesce(
   235  		nullif(current_setting('request.jwt.claim.sub', true), ''),
   236  		(nullif(current_setting('request.jwt.claims', true), '')::jsonb ->> 'sub')
   237  	)::uuid
   238  $$;
   239  
   240  
   241  ALTER FUNCTION auth.uid() OWNER TO supabase_auth_admin;
   242  
   243  --
   244  -- Name: FUNCTION uid(); Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
   245  --
   246  
   247  COMMENT ON FUNCTION auth.uid() IS 'Deprecated. Use auth.jwt() -> ''sub'' instead.';
   248  
   249  
   250  --
   251  -- Name: grant_pg_cron_access(); Type: FUNCTION; Schema: extensions; Owner: postgres
   252  --
   253  
   254  CREATE OR REPLACE FUNCTION extensions.grant_pg_cron_access() RETURNS event_trigger
   255      LANGUAGE plpgsql
   256      AS $$
   257  DECLARE
   258    schema_is_cron bool;
   259  BEGIN
   260    schema_is_cron = (
   261      SELECT n.nspname = 'cron'
   262      FROM pg_event_trigger_ddl_commands() AS ev
   263      LEFT JOIN pg_catalog.pg_namespace AS n
   264        ON ev.objid = n.oid
   265    );
   266  
   267    IF schema_is_cron
   268    THEN
   269      grant usage on schema cron to postgres with grant option;
   270  
   271      alter default privileges in schema cron grant all on tables to postgres with grant option;
   272      alter default privileges in schema cron grant all on functions to postgres with grant option;
   273      alter default privileges in schema cron grant all on sequences to postgres with grant option;
   274  
   275      alter default privileges for user supabase_admin in schema cron grant all
   276          on sequences to postgres with grant option;
   277      alter default privileges for user supabase_admin in schema cron grant all
   278          on tables to postgres with grant option;
   279      alter default privileges for user supabase_admin in schema cron grant all
   280          on functions to postgres with grant option;
   281  
   282      grant all privileges on all tables in schema cron to postgres with grant option; 
   283  
   284    END IF;
   285  
   286  END;
   287  $$;
   288  
   289  
   290  ALTER FUNCTION extensions.grant_pg_cron_access() OWNER TO postgres;
   291  
   292  --
   293  -- Name: FUNCTION grant_pg_cron_access(); Type: COMMENT; Schema: extensions; Owner: postgres
   294  --
   295  
   296  COMMENT ON FUNCTION extensions.grant_pg_cron_access() IS 'Grants access to pg_cron';
   297  
   298  
   299  --
   300  -- Name: grant_pg_graphql_access(); Type: FUNCTION; Schema: extensions; Owner: supabase_admin
   301  --
   302  
   303  CREATE OR REPLACE FUNCTION extensions.grant_pg_graphql_access() RETURNS event_trigger
   304      LANGUAGE plpgsql
   305      AS $_$
   306  DECLARE
   307      func_is_graphql_resolve bool;
   308  BEGIN
   309      func_is_graphql_resolve = (
   310          SELECT n.proname = 'resolve'
   311          FROM pg_event_trigger_ddl_commands() AS ev
   312          LEFT JOIN pg_catalog.pg_proc AS n
   313          ON ev.objid = n.oid
   314      );
   315  
   316      IF func_is_graphql_resolve
   317      THEN
   318  
   319          -- Update public wrapper to pass all arguments through to the pg_graphql resolve func
   320          create or replace function graphql_public.graphql(
   321              "operationName" text default null,
   322              query text default null,
   323              variables jsonb default null,
   324              extensions jsonb default null
   325          )
   326              returns jsonb
   327              language sql
   328          as $$
   329              select graphql.resolve(
   330                  query := query,
   331                  variables := coalesce(variables, '{}'),
   332                  "operationName" := "operationName",
   333                  extensions := extensions
   334              );
   335          $$;
   336  
   337  		-- This hook executes when `graphql.resolve` is created. That is not necessarily the last
   338  		-- function in the extension so we need to grant permissions on existing entities AND
   339  		-- update default permissions to any others that are created after `graphql.resolve`
   340          grant usage on schema graphql to postgres, anon, authenticated, service_role;
   341          grant select on all tables in schema graphql to postgres, anon, authenticated, service_role;
   342          grant execute on all functions in schema graphql to postgres, anon, authenticated, service_role;
   343          grant all on all sequences in schema graphql to postgres, anon, authenticated, service_role;
   344  		alter default privileges in schema graphql grant all on tables to postgres, anon, authenticated, service_role;
   345          alter default privileges in schema graphql grant all on functions to postgres, anon, authenticated, service_role;
   346          alter default privileges in schema graphql grant all on sequences to postgres, anon, authenticated, service_role;
   347      END IF;
   348  
   349  END;
   350  $_$;
   351  
   352  
   353  ALTER FUNCTION extensions.grant_pg_graphql_access() OWNER TO supabase_admin;
   354  
   355  --
   356  -- Name: FUNCTION grant_pg_graphql_access(); Type: COMMENT; Schema: extensions; Owner: supabase_admin
   357  --
   358  
   359  COMMENT ON FUNCTION extensions.grant_pg_graphql_access() IS 'Grants access to pg_graphql';
   360  
   361  
   362  --
   363  -- Name: grant_pg_net_access(); Type: FUNCTION; Schema: extensions; Owner: postgres
   364  --
   365  
   366  CREATE OR REPLACE FUNCTION extensions.grant_pg_net_access() RETURNS event_trigger
   367      LANGUAGE plpgsql
   368      AS $$
   369  BEGIN
   370    IF EXISTS (
   371      SELECT 1
   372      FROM pg_event_trigger_ddl_commands() AS ev
   373      JOIN pg_extension AS ext
   374      ON ev.objid = ext.oid
   375      WHERE ext.extname = 'pg_net'
   376    )
   377    THEN
   378      IF NOT EXISTS (
   379        SELECT 1
   380        FROM pg_roles
   381        WHERE rolname = 'supabase_functions_admin'
   382      )
   383      THEN
   384        CREATE USER supabase_functions_admin NOINHERIT CREATEROLE LOGIN NOREPLICATION;
   385      END IF;
   386  
   387      GRANT USAGE ON SCHEMA net TO supabase_functions_admin, postgres, anon, authenticated, service_role;
   388  
   389      ALTER function net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) SECURITY DEFINER;
   390      ALTER function net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) SECURITY DEFINER;
   391      ALTER function net.http_collect_response(request_id bigint, async boolean) SECURITY DEFINER;
   392  
   393      ALTER function net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) SET search_path = net;
   394      ALTER function net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) SET search_path = net;
   395      ALTER function net.http_collect_response(request_id bigint, async boolean) SET search_path = net;
   396  
   397      REVOKE ALL ON FUNCTION net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) FROM PUBLIC;
   398      REVOKE ALL ON FUNCTION net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) FROM PUBLIC;
   399      REVOKE ALL ON FUNCTION net.http_collect_response(request_id bigint, async boolean) FROM PUBLIC;
   400  
   401      GRANT EXECUTE ON FUNCTION net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) TO supabase_functions_admin, postgres, anon, authenticated, service_role;
   402      GRANT EXECUTE ON FUNCTION net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) TO supabase_functions_admin, postgres, anon, authenticated, service_role;
   403      GRANT EXECUTE ON FUNCTION net.http_collect_response(request_id bigint, async boolean) TO supabase_functions_admin, postgres, anon, authenticated, service_role;
   404    END IF;
   405  END;
   406  $$;
   407  
   408  
   409  ALTER FUNCTION extensions.grant_pg_net_access() OWNER TO postgres;
   410  
   411  --
   412  -- Name: FUNCTION grant_pg_net_access(); Type: COMMENT; Schema: extensions; Owner: postgres
   413  --
   414  
   415  COMMENT ON FUNCTION extensions.grant_pg_net_access() IS 'Grants access to pg_net';
   416  
   417  
   418  --
   419  -- Name: pgrst_ddl_watch(); Type: FUNCTION; Schema: extensions; Owner: supabase_admin
   420  --
   421  
   422  CREATE OR REPLACE FUNCTION extensions.pgrst_ddl_watch() RETURNS event_trigger
   423      LANGUAGE plpgsql
   424      AS $$
   425  DECLARE
   426    cmd record;
   427  BEGIN
   428    FOR cmd IN SELECT * FROM pg_event_trigger_ddl_commands()
   429    LOOP
   430      IF cmd.command_tag IN (
   431        'CREATE SCHEMA', 'ALTER SCHEMA'
   432      , 'CREATE TABLE', 'CREATE TABLE AS', 'SELECT INTO', 'ALTER TABLE'
   433      , 'CREATE FOREIGN TABLE', 'ALTER FOREIGN TABLE'
   434      , 'CREATE VIEW', 'ALTER VIEW'
   435      , 'CREATE MATERIALIZED VIEW', 'ALTER MATERIALIZED VIEW'
   436      , 'CREATE FUNCTION', 'ALTER FUNCTION'
   437      , 'CREATE TRIGGER'
   438      , 'CREATE TYPE', 'ALTER TYPE'
   439      , 'CREATE RULE'
   440      , 'COMMENT'
   441      )
   442      -- don't notify in case of CREATE TEMP table or other objects created on pg_temp
   443      AND cmd.schema_name is distinct from 'pg_temp'
   444      THEN
   445        NOTIFY pgrst, 'reload schema';
   446      END IF;
   447    END LOOP;
   448  END; $$;
   449  
   450  
   451  ALTER FUNCTION extensions.pgrst_ddl_watch() OWNER TO supabase_admin;
   452  
   453  --
   454  -- Name: pgrst_drop_watch(); Type: FUNCTION; Schema: extensions; Owner: supabase_admin
   455  --
   456  
   457  CREATE OR REPLACE FUNCTION extensions.pgrst_drop_watch() RETURNS event_trigger
   458      LANGUAGE plpgsql
   459      AS $$
   460  DECLARE
   461    obj record;
   462  BEGIN
   463    FOR obj IN SELECT * FROM pg_event_trigger_dropped_objects()
   464    LOOP
   465      IF obj.object_type IN (
   466        'schema'
   467      , 'table'
   468      , 'foreign table'
   469      , 'view'
   470      , 'materialized view'
   471      , 'function'
   472      , 'trigger'
   473      , 'type'
   474      , 'rule'
   475      )
   476      AND obj.is_temporary IS false -- no pg_temp objects
   477      THEN
   478        NOTIFY pgrst, 'reload schema';
   479      END IF;
   480    END LOOP;
   481  END; $$;
   482  
   483  
   484  ALTER FUNCTION extensions.pgrst_drop_watch() OWNER TO supabase_admin;
   485  
   486  --
   487  -- Name: set_graphql_placeholder(); Type: FUNCTION; Schema: extensions; Owner: supabase_admin
   488  --
   489  
   490  CREATE OR REPLACE FUNCTION extensions.set_graphql_placeholder() RETURNS event_trigger
   491      LANGUAGE plpgsql
   492      AS $_$
   493      DECLARE
   494      graphql_is_dropped bool;
   495      BEGIN
   496      graphql_is_dropped = (
   497          SELECT ev.schema_name = 'graphql_public'
   498          FROM pg_event_trigger_dropped_objects() AS ev
   499          WHERE ev.schema_name = 'graphql_public'
   500      );
   501  
   502      IF graphql_is_dropped
   503      THEN
   504          create or replace function graphql_public.graphql(
   505              "operationName" text default null,
   506              query text default null,
   507              variables jsonb default null,
   508              extensions jsonb default null
   509          )
   510              returns jsonb
   511              language plpgsql
   512          as $$
   513              DECLARE
   514                  server_version float;
   515              BEGIN
   516                  server_version = (SELECT (SPLIT_PART((select version()), ' ', 2))::float);
   517  
   518                  IF server_version >= 14 THEN
   519                      RETURN jsonb_build_object(
   520                          'errors', jsonb_build_array(
   521                              jsonb_build_object(
   522                                  'message', 'pg_graphql extension is not enabled.'
   523                              )
   524                          )
   525                      );
   526                  ELSE
   527                      RETURN jsonb_build_object(
   528                          'errors', jsonb_build_array(
   529                              jsonb_build_object(
   530                                  'message', 'pg_graphql is only available on projects running Postgres 14 onwards.'
   531                              )
   532                          )
   533                      );
   534                  END IF;
   535              END;
   536          $$;
   537      END IF;
   538  
   539      END;
   540  $_$;
   541  
   542  
   543  ALTER FUNCTION extensions.set_graphql_placeholder() OWNER TO supabase_admin;
   544  
   545  --
   546  -- Name: FUNCTION set_graphql_placeholder(); Type: COMMENT; Schema: extensions; Owner: supabase_admin
   547  --
   548  
   549  COMMENT ON FUNCTION extensions.set_graphql_placeholder() IS 'Reintroduces placeholder function for graphql_public.graphql';
   550  
   551  
   552  --
   553  -- Name: graphql(text, text, jsonb, jsonb); Type: FUNCTION; Schema: graphql_public; Owner: supabase_admin
   554  --
   555  
   556  CREATE OR REPLACE FUNCTION graphql_public.graphql("operationName" text DEFAULT NULL::text, query text DEFAULT NULL::text, variables jsonb DEFAULT NULL::jsonb, extensions jsonb DEFAULT NULL::jsonb) RETURNS jsonb
   557      LANGUAGE plpgsql
   558      AS $$
   559      DECLARE
   560          server_version float;
   561      BEGIN
   562          server_version = (SELECT (SPLIT_PART((select version()), ' ', 2))::float);
   563  
   564          IF server_version >= 14 THEN
   565              RETURN jsonb_build_object(
   566                  'errors', jsonb_build_array(
   567                      jsonb_build_object(
   568                          'message', 'pg_graphql extension is not enabled.'
   569                      )
   570                  )
   571              );
   572          ELSE
   573     	        RETURN jsonb_build_object(
   574                  'errors', jsonb_build_array(
   575                      jsonb_build_object(
   576                          'message', 'pg_graphql is only available on projects running Postgres 14 onwards.'
   577                      )
   578                  )
   579              );
   580          END IF;
   581      END;
   582  $$;
   583  
   584  
   585  ALTER FUNCTION graphql_public.graphql("operationName" text, query text, variables jsonb, extensions jsonb) OWNER TO supabase_admin;
   586  
   587  --
   588  -- Name: extension(text); Type: FUNCTION; Schema: storage; Owner: supabase_storage_admin
   589  --
   590  
   591  CREATE OR REPLACE FUNCTION storage.extension(name text) RETURNS text
   592      LANGUAGE plpgsql
   593      AS $$
   594  DECLARE
   595  _parts text[];
   596  _filename text;
   597  BEGIN
   598  	select string_to_array(name, '/') into _parts;
   599  	select _parts[array_length(_parts,1)] into _filename;
   600  	-- @todo return the last part instead of 2
   601  	return split_part(_filename, '.', 2);
   602  END
   603  $$;
   604  
   605  
   606  ALTER FUNCTION storage.extension(name text) OWNER TO supabase_storage_admin;
   607  
   608  --
   609  -- Name: filename(text); Type: FUNCTION; Schema: storage; Owner: supabase_storage_admin
   610  --
   611  
   612  CREATE OR REPLACE FUNCTION storage.filename(name text) RETURNS text
   613      LANGUAGE plpgsql
   614      AS $$
   615  DECLARE
   616  _parts text[];
   617  BEGIN
   618  	select string_to_array(name, '/') into _parts;
   619  	return _parts[array_length(_parts,1)];
   620  END
   621  $$;
   622  
   623  
   624  ALTER FUNCTION storage.filename(name text) OWNER TO supabase_storage_admin;
   625  
   626  --
   627  -- Name: foldername(text); Type: FUNCTION; Schema: storage; Owner: supabase_storage_admin
   628  --
   629  
   630  CREATE OR REPLACE FUNCTION storage.foldername(name text) RETURNS text[]
   631      LANGUAGE plpgsql
   632      AS $$
   633  DECLARE
   634  _parts text[];
   635  BEGIN
   636  	select string_to_array(name, '/') into _parts;
   637  	return _parts[1:array_length(_parts,1)-1];
   638  END
   639  $$;
   640  
   641  
   642  ALTER FUNCTION storage.foldername(name text) OWNER TO supabase_storage_admin;
   643  
   644  --
   645  -- Name: get_size_by_bucket(); Type: FUNCTION; Schema: storage; Owner: supabase_storage_admin
   646  --
   647  
   648  CREATE OR REPLACE FUNCTION storage.get_size_by_bucket() RETURNS TABLE(size bigint, bucket_id text)
   649      LANGUAGE plpgsql
   650      AS $$
   651  BEGIN
   652      return query
   653          select sum((metadata->>'size')::int) as size, obj.bucket_id
   654          from "storage".objects as obj
   655          group by obj.bucket_id;
   656  END
   657  $$;
   658  
   659  
   660  ALTER FUNCTION storage.get_size_by_bucket() OWNER TO supabase_storage_admin;
   661  
   662  --
   663  -- Name: search(text, text, integer, integer, integer, text, text, text); Type: FUNCTION; Schema: storage; Owner: supabase_storage_admin
   664  --
   665  
   666  CREATE OR REPLACE FUNCTION storage.search(prefix text, bucketname text, limits integer DEFAULT 100, levels integer DEFAULT 1, offsets integer DEFAULT 0, search text DEFAULT ''::text, sortcolumn text DEFAULT 'name'::text, sortorder text DEFAULT 'asc'::text) RETURNS TABLE(name text, id uuid, updated_at timestamp with time zone, created_at timestamp with time zone, last_accessed_at timestamp with time zone, metadata jsonb)
   667      LANGUAGE plpgsql STABLE
   668      AS $_$
   669  declare
   670    v_order_by text;
   671    v_sort_order text;
   672  begin
   673    case
   674      when sortcolumn = 'name' then
   675        v_order_by = 'name';
   676      when sortcolumn = 'updated_at' then
   677        v_order_by = 'updated_at';
   678      when sortcolumn = 'created_at' then
   679        v_order_by = 'created_at';
   680      when sortcolumn = 'last_accessed_at' then
   681        v_order_by = 'last_accessed_at';
   682      else
   683        v_order_by = 'name';
   684    end case;
   685  
   686    case
   687      when sortorder = 'asc' then
   688        v_sort_order = 'asc';
   689      when sortorder = 'desc' then
   690        v_sort_order = 'desc';
   691      else
   692        v_sort_order = 'asc';
   693    end case;
   694  
   695    v_order_by = v_order_by || ' ' || v_sort_order;
   696  
   697    return query execute
   698      'with folders as (
   699         select path_tokens[$1] as folder
   700         from storage.objects
   701           where objects.name ilike $2 || $3 || ''%''
   702             and bucket_id = $4
   703             and array_length(regexp_split_to_array(objects.name, ''/''), 1) <> $1
   704         group by folder
   705         order by folder ' || v_sort_order || '
   706       )
   707       (select folder as "name",
   708              null as id,
   709              null as updated_at,
   710              null as created_at,
   711              null as last_accessed_at,
   712              null as metadata from folders)
   713       union all
   714       (select path_tokens[$1] as "name",
   715              id,
   716              updated_at,
   717              created_at,
   718              last_accessed_at,
   719              metadata
   720       from storage.objects
   721       where objects.name ilike $2 || $3 || ''%''
   722         and bucket_id = $4
   723         and array_length(regexp_split_to_array(objects.name, ''/''), 1) = $1
   724       order by ' || v_order_by || ')
   725       limit $5
   726       offset $6' using levels, prefix, search, bucketname, limits, offsets;
   727  end;
   728  $_$;
   729  
   730  
   731  ALTER FUNCTION storage.search(prefix text, bucketname text, limits integer, levels integer, offsets integer, search text, sortcolumn text, sortorder text) OWNER TO supabase_storage_admin;
   732  
   733  --
   734  -- Name: update_updated_at_column(); Type: FUNCTION; Schema: storage; Owner: supabase_storage_admin
   735  --
   736  
   737  CREATE OR REPLACE FUNCTION storage.update_updated_at_column() RETURNS trigger
   738      LANGUAGE plpgsql
   739      AS $$
   740  BEGIN
   741      NEW.updated_at = now();
   742      RETURN NEW; 
   743  END;
   744  $$;
   745  
   746  
   747  ALTER FUNCTION storage.update_updated_at_column() OWNER TO supabase_storage_admin;
   748  
   749  SET default_tablespace = '';
   750  
   751  SET default_table_access_method = heap;
   752  
   753  --
   754  -- Name: extensions; Type: TABLE; Schema: _realtime; Owner: postgres
   755  --
   756  
   757  CREATE TABLE IF NOT EXISTS _realtime.extensions (
   758      id uuid NOT NULL,
   759      type character varying(255),
   760      settings jsonb,
   761      tenant_external_id character varying(255),
   762      inserted_at timestamp(0) without time zone NOT NULL,
   763      updated_at timestamp(0) without time zone NOT NULL
   764  );
   765  
   766  
   767  ALTER TABLE _realtime.extensions OWNER TO postgres;
   768  
   769  --
   770  -- Name: schema_migrations; Type: TABLE; Schema: _realtime; Owner: postgres
   771  --
   772  
   773  CREATE TABLE IF NOT EXISTS _realtime.schema_migrations (
   774      version bigint NOT NULL,
   775      inserted_at timestamp(0) without time zone
   776  );
   777  
   778  
   779  ALTER TABLE _realtime.schema_migrations OWNER TO postgres;
   780  
   781  --
   782  -- Name: tenants; Type: TABLE; Schema: _realtime; Owner: postgres
   783  --
   784  
   785  CREATE TABLE IF NOT EXISTS _realtime.tenants (
   786      id uuid NOT NULL,
   787      name character varying(255),
   788      external_id character varying(255),
   789      jwt_secret character varying(500),
   790      max_concurrent_users integer DEFAULT 200 NOT NULL,
   791      inserted_at timestamp(0) without time zone NOT NULL,
   792      updated_at timestamp(0) without time zone NOT NULL,
   793      max_events_per_second integer DEFAULT 100 NOT NULL,
   794      postgres_cdc_default character varying(255) DEFAULT 'postgres_cdc_rls'::character varying
   795  );
   796  
   797  
   798  ALTER TABLE _realtime.tenants OWNER TO postgres;
   799  
   800  --
   801  -- Name: audit_log_entries; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
   802  --
   803  
   804  CREATE TABLE IF NOT EXISTS auth.audit_log_entries (
   805      instance_id uuid,
   806      id uuid NOT NULL,
   807      payload json,
   808      created_at timestamp with time zone,
   809      ip_address character varying(64) DEFAULT ''::character varying NOT NULL
   810  );
   811  
   812  
   813  ALTER TABLE auth.audit_log_entries OWNER TO supabase_auth_admin;
   814  
   815  --
   816  -- Name: TABLE audit_log_entries; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
   817  --
   818  
   819  COMMENT ON TABLE auth.audit_log_entries IS 'Auth: Audit trail for user actions.';
   820  
   821  
   822  --
   823  -- Name: identities; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
   824  --
   825  
   826  CREATE TABLE IF NOT EXISTS auth.identities (
   827      id text NOT NULL,
   828      user_id uuid NOT NULL,
   829      identity_data jsonb NOT NULL,
   830      provider text NOT NULL,
   831      last_sign_in_at timestamp with time zone,
   832      created_at timestamp with time zone,
   833      updated_at timestamp with time zone,
   834      email text GENERATED ALWAYS AS (lower((identity_data ->> 'email'::text))) STORED
   835  );
   836  
   837  
   838  ALTER TABLE auth.identities OWNER TO supabase_auth_admin;
   839  
   840  --
   841  -- Name: TABLE identities; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
   842  --
   843  
   844  COMMENT ON TABLE auth.identities IS 'Auth: Stores identities associated to a user.';
   845  
   846  
   847  --
   848  -- Name: COLUMN identities.email; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
   849  --
   850  
   851  COMMENT ON COLUMN auth.identities.email IS 'Auth: Email is a generated column that references the optional email property in the identity_data';
   852  
   853  
   854  --
   855  -- Name: instances; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
   856  --
   857  
   858  CREATE TABLE IF NOT EXISTS auth.instances (
   859      id uuid NOT NULL,
   860      uuid uuid,
   861      raw_base_config text,
   862      created_at timestamp with time zone,
   863      updated_at timestamp with time zone
   864  );
   865  
   866  
   867  ALTER TABLE auth.instances OWNER TO supabase_auth_admin;
   868  
   869  --
   870  -- Name: TABLE instances; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
   871  --
   872  
   873  COMMENT ON TABLE auth.instances IS 'Auth: Manages users across multiple sites.';
   874  
   875  
   876  --
   877  -- Name: mfa_amr_claims; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
   878  --
   879  
   880  CREATE TABLE IF NOT EXISTS auth.mfa_amr_claims (
   881      session_id uuid NOT NULL,
   882      created_at timestamp with time zone NOT NULL,
   883      updated_at timestamp with time zone NOT NULL,
   884      authentication_method text NOT NULL,
   885      id uuid NOT NULL
   886  );
   887  
   888  
   889  ALTER TABLE auth.mfa_amr_claims OWNER TO supabase_auth_admin;
   890  
   891  --
   892  -- Name: TABLE mfa_amr_claims; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
   893  --
   894  
   895  COMMENT ON TABLE auth.mfa_amr_claims IS 'auth: stores authenticator method reference claims for multi factor authentication';
   896  
   897  
   898  --
   899  -- Name: mfa_challenges; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
   900  --
   901  
   902  CREATE TABLE IF NOT EXISTS auth.mfa_challenges (
   903      id uuid NOT NULL,
   904      factor_id uuid NOT NULL,
   905      created_at timestamp with time zone NOT NULL,
   906      verified_at timestamp with time zone,
   907      ip_address inet NOT NULL
   908  );
   909  
   910  
   911  ALTER TABLE auth.mfa_challenges OWNER TO supabase_auth_admin;
   912  
   913  --
   914  -- Name: TABLE mfa_challenges; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
   915  --
   916  
   917  COMMENT ON TABLE auth.mfa_challenges IS 'auth: stores metadata about challenge requests made';
   918  
   919  
   920  --
   921  -- Name: mfa_factors; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
   922  --
   923  
   924  CREATE TABLE IF NOT EXISTS auth.mfa_factors (
   925      id uuid NOT NULL,
   926      user_id uuid NOT NULL,
   927      friendly_name text,
   928      factor_type auth.factor_type NOT NULL,
   929      status auth.factor_status NOT NULL,
   930      created_at timestamp with time zone NOT NULL,
   931      updated_at timestamp with time zone NOT NULL,
   932      secret text
   933  );
   934  
   935  
   936  ALTER TABLE auth.mfa_factors OWNER TO supabase_auth_admin;
   937  
   938  --
   939  -- Name: TABLE mfa_factors; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
   940  --
   941  
   942  COMMENT ON TABLE auth.mfa_factors IS 'auth: stores metadata about factors';
   943  
   944  
   945  --
   946  -- Name: refresh_tokens; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
   947  --
   948  
   949  CREATE TABLE IF NOT EXISTS auth.refresh_tokens (
   950      instance_id uuid,
   951      id bigint NOT NULL,
   952      token character varying(255),
   953      user_id character varying(255),
   954      revoked boolean,
   955      created_at timestamp with time zone,
   956      updated_at timestamp with time zone,
   957      parent character varying(255),
   958      session_id uuid
   959  );
   960  
   961  
   962  ALTER TABLE auth.refresh_tokens OWNER TO supabase_auth_admin;
   963  
   964  --
   965  -- Name: TABLE refresh_tokens; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
   966  --
   967  
   968  COMMENT ON TABLE auth.refresh_tokens IS 'Auth: Store of tokens used to refresh JWT tokens once they expire.';
   969  
   970  
   971  --
   972  -- Name: refresh_tokens_id_seq; Type: SEQUENCE; Schema: auth; Owner: supabase_auth_admin
   973  --
   974  
   975  CREATE SEQUENCE IF NOT EXISTS auth.refresh_tokens_id_seq
   976      START WITH 1
   977      INCREMENT BY 1
   978      NO MINVALUE
   979      NO MAXVALUE
   980      CACHE 1;
   981  
   982  
   983  ALTER TABLE auth.refresh_tokens_id_seq OWNER TO supabase_auth_admin;
   984  
   985  --
   986  -- Name: refresh_tokens_id_seq; Type: SEQUENCE OWNED BY; Schema: auth; Owner: supabase_auth_admin
   987  --
   988  
   989  ALTER SEQUENCE auth.refresh_tokens_id_seq OWNED BY auth.refresh_tokens.id;
   990  
   991  
   992  --
   993  -- Name: saml_providers; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
   994  --
   995  
   996  CREATE TABLE IF NOT EXISTS auth.saml_providers (
   997      id uuid NOT NULL,
   998      sso_provider_id uuid NOT NULL,
   999      entity_id text NOT NULL,
  1000      metadata_xml text NOT NULL,
  1001      metadata_url text,
  1002      attribute_mapping jsonb,
  1003      created_at timestamp with time zone,
  1004      updated_at timestamp with time zone,
  1005      CONSTRAINT "entity_id not empty" CHECK ((char_length(entity_id) > 0)),
  1006      CONSTRAINT "metadata_url not empty" CHECK (((metadata_url = NULL::text) OR (char_length(metadata_url) > 0))),
  1007      CONSTRAINT "metadata_xml not empty" CHECK ((char_length(metadata_xml) > 0))
  1008  );
  1009  
  1010  
  1011  ALTER TABLE auth.saml_providers OWNER TO supabase_auth_admin;
  1012  
  1013  --
  1014  -- Name: TABLE saml_providers; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
  1015  --
  1016  
  1017  COMMENT ON TABLE auth.saml_providers IS 'Auth: Manages SAML Identity Provider connections.';
  1018  
  1019  
  1020  --
  1021  -- Name: saml_relay_states; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
  1022  --
  1023  
  1024  CREATE TABLE IF NOT EXISTS auth.saml_relay_states (
  1025      id uuid NOT NULL,
  1026      sso_provider_id uuid NOT NULL,
  1027      request_id text NOT NULL,
  1028      for_email text,
  1029      redirect_to text,
  1030      from_ip_address inet,
  1031      created_at timestamp with time zone,
  1032      updated_at timestamp with time zone,
  1033      CONSTRAINT "request_id not empty" CHECK ((char_length(request_id) > 0))
  1034  );
  1035  
  1036  
  1037  ALTER TABLE auth.saml_relay_states OWNER TO supabase_auth_admin;
  1038  
  1039  --
  1040  -- Name: TABLE saml_relay_states; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
  1041  --
  1042  
  1043  COMMENT ON TABLE auth.saml_relay_states IS 'Auth: Contains SAML Relay State information for each Service Provider initiated login.';
  1044  
  1045  
  1046  --
  1047  -- Name: schema_migrations; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
  1048  --
  1049  
  1050  CREATE TABLE IF NOT EXISTS auth.schema_migrations (
  1051      version character varying(255) NOT NULL
  1052  );
  1053  
  1054  
  1055  ALTER TABLE auth.schema_migrations OWNER TO supabase_auth_admin;
  1056  
  1057  --
  1058  -- Name: TABLE schema_migrations; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
  1059  --
  1060  
  1061  COMMENT ON TABLE auth.schema_migrations IS 'Auth: Manages updates to the auth system.';
  1062  
  1063  
  1064  --
  1065  -- Name: sessions; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
  1066  --
  1067  
  1068  CREATE TABLE IF NOT EXISTS auth.sessions (
  1069      id uuid NOT NULL,
  1070      user_id uuid NOT NULL,
  1071      created_at timestamp with time zone,
  1072      updated_at timestamp with time zone,
  1073      factor_id uuid,
  1074      aal auth.aal_level,
  1075      not_after timestamp with time zone
  1076  );
  1077  
  1078  
  1079  ALTER TABLE auth.sessions OWNER TO supabase_auth_admin;
  1080  
  1081  --
  1082  -- Name: TABLE sessions; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
  1083  --
  1084  
  1085  COMMENT ON TABLE auth.sessions IS 'Auth: Stores session data associated to a user.';
  1086  
  1087  
  1088  --
  1089  -- Name: COLUMN sessions.not_after; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
  1090  --
  1091  
  1092  COMMENT ON COLUMN auth.sessions.not_after IS 'Auth: Not after is a nullable column that contains a timestamp after which the session should be regarded as expired.';
  1093  
  1094  
  1095  --
  1096  -- Name: sso_domains; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
  1097  --
  1098  
  1099  CREATE TABLE IF NOT EXISTS auth.sso_domains (
  1100      id uuid NOT NULL,
  1101      sso_provider_id uuid NOT NULL,
  1102      domain text NOT NULL,
  1103      created_at timestamp with time zone,
  1104      updated_at timestamp with time zone,
  1105      CONSTRAINT "domain not empty" CHECK ((char_length(domain) > 0))
  1106  );
  1107  
  1108  
  1109  ALTER TABLE auth.sso_domains OWNER TO supabase_auth_admin;
  1110  
  1111  --
  1112  -- Name: TABLE sso_domains; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
  1113  --
  1114  
  1115  COMMENT ON TABLE auth.sso_domains IS 'Auth: Manages SSO email address domain mapping to an SSO Identity Provider.';
  1116  
  1117  
  1118  --
  1119  -- Name: sso_providers; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
  1120  --
  1121  
  1122  CREATE TABLE IF NOT EXISTS auth.sso_providers (
  1123      id uuid NOT NULL,
  1124      resource_id text,
  1125      created_at timestamp with time zone,
  1126      updated_at timestamp with time zone,
  1127      CONSTRAINT "resource_id not empty" CHECK (((resource_id = NULL::text) OR (char_length(resource_id) > 0)))
  1128  );
  1129  
  1130  
  1131  ALTER TABLE auth.sso_providers OWNER TO supabase_auth_admin;
  1132  
  1133  --
  1134  -- Name: TABLE sso_providers; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
  1135  --
  1136  
  1137  COMMENT ON TABLE auth.sso_providers IS 'Auth: Manages SSO identity provider information; see saml_providers for SAML.';
  1138  
  1139  
  1140  --
  1141  -- Name: COLUMN sso_providers.resource_id; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
  1142  --
  1143  
  1144  COMMENT ON COLUMN auth.sso_providers.resource_id IS 'Auth: Uniquely identifies a SSO provider according to a user-chosen resource ID (case insensitive), useful in infrastructure as code.';
  1145  
  1146  
  1147  --
  1148  -- Name: users; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
  1149  --
  1150  
  1151  CREATE TABLE IF NOT EXISTS auth.users (
  1152      instance_id uuid,
  1153      id uuid NOT NULL,
  1154      aud character varying(255),
  1155      role character varying(255),
  1156      email character varying(255),
  1157      encrypted_password character varying(255),
  1158      email_confirmed_at timestamp with time zone,
  1159      invited_at timestamp with time zone,
  1160      confirmation_token character varying(255),
  1161      confirmation_sent_at timestamp with time zone,
  1162      recovery_token character varying(255),
  1163      recovery_sent_at timestamp with time zone,
  1164      email_change_token_new character varying(255),
  1165      email_change character varying(255),
  1166      email_change_sent_at timestamp with time zone,
  1167      last_sign_in_at timestamp with time zone,
  1168      raw_app_meta_data jsonb,
  1169      raw_user_meta_data jsonb,
  1170      is_super_admin boolean,
  1171      created_at timestamp with time zone,
  1172      updated_at timestamp with time zone,
  1173      phone character varying(15) DEFAULT NULL::character varying,
  1174      phone_confirmed_at timestamp with time zone,
  1175      phone_change character varying(15) DEFAULT ''::character varying,
  1176      phone_change_token character varying(255) DEFAULT ''::character varying,
  1177      phone_change_sent_at timestamp with time zone,
  1178      confirmed_at timestamp with time zone GENERATED ALWAYS AS (LEAST(email_confirmed_at, phone_confirmed_at)) STORED,
  1179      email_change_token_current character varying(255) DEFAULT ''::character varying,
  1180      email_change_confirm_status smallint DEFAULT 0,
  1181      banned_until timestamp with time zone,
  1182      reauthentication_token character varying(255) DEFAULT ''::character varying,
  1183      reauthentication_sent_at timestamp with time zone,
  1184      is_sso_user boolean DEFAULT false NOT NULL,
  1185      CONSTRAINT users_email_change_confirm_status_check CHECK (((email_change_confirm_status >= 0) AND (email_change_confirm_status <= 2)))
  1186  );
  1187  
  1188  
  1189  ALTER TABLE auth.users OWNER TO supabase_auth_admin;
  1190  
  1191  --
  1192  -- Name: TABLE users; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
  1193  --
  1194  
  1195  COMMENT ON TABLE auth.users IS 'Auth: Stores user login data within a secure schema.';
  1196  
  1197  
  1198  --
  1199  -- Name: COLUMN users.is_sso_user; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
  1200  --
  1201  
  1202  COMMENT ON COLUMN auth.users.is_sso_user IS 'Auth: Set this column to true when the account comes from SSO. These accounts can have duplicate emails.';
  1203  
  1204  
  1205  --
  1206  -- Name: buckets; Type: TABLE; Schema: storage; Owner: supabase_storage_admin
  1207  --
  1208  
  1209  CREATE TABLE IF NOT EXISTS storage.buckets (
  1210      id text NOT NULL,
  1211      name text NOT NULL,
  1212      owner uuid,
  1213      created_at timestamp with time zone DEFAULT now(),
  1214      updated_at timestamp with time zone DEFAULT now(),
  1215      public boolean DEFAULT false
  1216  );
  1217  
  1218  
  1219  ALTER TABLE storage.buckets OWNER TO supabase_storage_admin;
  1220  
  1221  --
  1222  -- Name: migrations; Type: TABLE; Schema: storage; Owner: supabase_storage_admin
  1223  --
  1224  
  1225  CREATE TABLE IF NOT EXISTS storage.migrations (
  1226      id integer NOT NULL,
  1227      name character varying(100) NOT NULL,
  1228      hash character varying(40) NOT NULL,
  1229      executed_at timestamp without time zone DEFAULT CURRENT_TIMESTAMP
  1230  );
  1231  
  1232  
  1233  ALTER TABLE storage.migrations OWNER TO supabase_storage_admin;
  1234  
  1235  --
  1236  -- Name: objects; Type: TABLE; Schema: storage; Owner: supabase_storage_admin
  1237  --
  1238  
  1239  CREATE TABLE IF NOT EXISTS storage.objects (
  1240      id uuid DEFAULT extensions.uuid_generate_v4() NOT NULL,
  1241      bucket_id text,
  1242      name text,
  1243      owner uuid,
  1244      created_at timestamp with time zone DEFAULT now(),
  1245      updated_at timestamp with time zone DEFAULT now(),
  1246      last_accessed_at timestamp with time zone DEFAULT now(),
  1247      metadata jsonb,
  1248      path_tokens text[] GENERATED ALWAYS AS (string_to_array(name, '/'::text)) STORED
  1249  );
  1250  
  1251  
  1252  ALTER TABLE storage.objects OWNER TO supabase_storage_admin;
  1253  
  1254  --
  1255  -- Name: refresh_tokens id; Type: DEFAULT; Schema: auth; Owner: supabase_auth_admin
  1256  --
  1257  
  1258  ALTER TABLE ONLY auth.refresh_tokens ALTER COLUMN id SET DEFAULT nextval('auth.refresh_tokens_id_seq'::regclass);
  1259  
  1260  
  1261  --
  1262  -- Data for Name: extensions; Type: TABLE DATA; Schema: _realtime; Owner: postgres
  1263  --
  1264  
  1265  INSERT INTO _realtime.extensions (id, type, settings, tenant_external_id, inserted_at, updated_at) VALUES ('bb5b2c31-6743-458f-bd31-2e5086879de5', 'postgres_cdc_rls', '{"region": "us-east-1", "db_host": "ABK7kBu27y/PVdL10i/b+A==", "db_name": "sWBpZNdjggEPTQVlI52Zfw==", "db_port": "+enMDFi1J/3IrrquHHwUmA==", "db_user": "sWBpZNdjggEPTQVlI52Zfw==", "slot_name": "supabase_realtime_replication_slot", "ip_version": 4, "db_password": "sWBpZNdjggEPTQVlI52Zfw==", "publication": "supabase_realtime", "poll_interval_ms": 100, "poll_max_changes": 100, "poll_max_record_bytes": 1048576}', 'realtime-dev', '2023-01-09 07:15:15', '2023-01-09 07:15:15');
  1266  
  1267  
  1268  --
  1269  -- Data for Name: schema_migrations; Type: TABLE DATA; Schema: _realtime; Owner: postgres
  1270  --
  1271  
  1272  INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20210706140551, '2023-01-09 07:15:13');
  1273  INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20220329161857, '2023-01-09 07:15:13');
  1274  INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20220410212326, '2023-01-09 07:15:13');
  1275  INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20220506102948, '2023-01-09 07:15:13');
  1276  INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20220527210857, '2023-01-09 07:15:13');
  1277  INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20220815211129, '2023-01-09 07:15:13');
  1278  INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20220815215024, '2023-01-09 07:15:13');
  1279  INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20220818141501, '2023-01-09 07:15:13');
  1280  INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20221018173709, '2023-01-09 07:15:13');
  1281  INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20221102172703, '2023-01-09 07:15:13');
  1282  INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20221223010058, '2023-01-09 07:15:13');
  1283  
  1284  
  1285  --
  1286  -- Data for Name: tenants; Type: TABLE DATA; Schema: _realtime; Owner: postgres
  1287  --
  1288  
  1289  INSERT INTO _realtime.tenants (id, name, external_id, jwt_secret, max_concurrent_users, inserted_at, updated_at, max_events_per_second, postgres_cdc_default) VALUES ('af55a147-351d-4faf-85a2-278bb6a4e225', 'realtime-dev', 'realtime-dev', 'cor19x6wYudqK/HY8tKJOBoA0KD/zxM/SxxkI1zPOvSCs67x4q75+0yV07SWdm0T', 200, '2023-01-09 07:15:15', '2023-01-09 07:15:15', 100, 'postgres_cdc_rls');
  1290  
  1291  
  1292  --
  1293  -- Data for Name: audit_log_entries; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
  1294  --
  1295  
  1296  
  1297  
  1298  --
  1299  -- Data for Name: identities; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
  1300  --
  1301  
  1302  
  1303  
  1304  --
  1305  -- Data for Name: instances; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
  1306  --
  1307  
  1308  
  1309  
  1310  --
  1311  -- Data for Name: mfa_amr_claims; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
  1312  --
  1313  
  1314  
  1315  
  1316  --
  1317  -- Data for Name: mfa_challenges; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
  1318  --
  1319  
  1320  
  1321  
  1322  --
  1323  -- Data for Name: mfa_factors; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
  1324  --
  1325  
  1326  
  1327  
  1328  --
  1329  -- Data for Name: refresh_tokens; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
  1330  --
  1331  
  1332  
  1333  
  1334  --
  1335  -- Data for Name: saml_providers; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
  1336  --
  1337  
  1338  
  1339  
  1340  --
  1341  -- Data for Name: saml_relay_states; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
  1342  --
  1343  
  1344  
  1345  
  1346  --
  1347  -- Data for Name: schema_migrations; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
  1348  --
  1349  
  1350  INSERT INTO auth.schema_migrations (version) VALUES ('20171026211738');
  1351  INSERT INTO auth.schema_migrations (version) VALUES ('20171026211808');
  1352  INSERT INTO auth.schema_migrations (version) VALUES ('20171026211834');
  1353  INSERT INTO auth.schema_migrations (version) VALUES ('20180103212743');
  1354  INSERT INTO auth.schema_migrations (version) VALUES ('20180108183307');
  1355  INSERT INTO auth.schema_migrations (version) VALUES ('20180119214651');
  1356  INSERT INTO auth.schema_migrations (version) VALUES ('20180125194653');
  1357  INSERT INTO auth.schema_migrations (version) VALUES ('00');
  1358  INSERT INTO auth.schema_migrations (version) VALUES ('20210710035447');
  1359  INSERT INTO auth.schema_migrations (version) VALUES ('20210722035447');
  1360  INSERT INTO auth.schema_migrations (version) VALUES ('20210730183235');
  1361  INSERT INTO auth.schema_migrations (version) VALUES ('20210909172000');
  1362  INSERT INTO auth.schema_migrations (version) VALUES ('20210927181326');
  1363  INSERT INTO auth.schema_migrations (version) VALUES ('20211122151130');
  1364  INSERT INTO auth.schema_migrations (version) VALUES ('20211124214934');
  1365  INSERT INTO auth.schema_migrations (version) VALUES ('20211202183645');
  1366  INSERT INTO auth.schema_migrations (version) VALUES ('20220114185221');
  1367  INSERT INTO auth.schema_migrations (version) VALUES ('20220114185340');
  1368  INSERT INTO auth.schema_migrations (version) VALUES ('20220224000811');
  1369  INSERT INTO auth.schema_migrations (version) VALUES ('20220323170000');
  1370  INSERT INTO auth.schema_migrations (version) VALUES ('20220429102000');
  1371  INSERT INTO auth.schema_migrations (version) VALUES ('20220531120530');
  1372  INSERT INTO auth.schema_migrations (version) VALUES ('20220614074223');
  1373  INSERT INTO auth.schema_migrations (version) VALUES ('20220811173540');
  1374  INSERT INTO auth.schema_migrations (version) VALUES ('20221003041349');
  1375  INSERT INTO auth.schema_migrations (version) VALUES ('20221003041400');
  1376  INSERT INTO auth.schema_migrations (version) VALUES ('20221011041400');
  1377  INSERT INTO auth.schema_migrations (version) VALUES ('20221020193600');
  1378  INSERT INTO auth.schema_migrations (version) VALUES ('20221021073300');
  1379  INSERT INTO auth.schema_migrations (version) VALUES ('20221021082433');
  1380  INSERT INTO auth.schema_migrations (version) VALUES ('20221027105023');
  1381  INSERT INTO auth.schema_migrations (version) VALUES ('20221114143122');
  1382  INSERT INTO auth.schema_migrations (version) VALUES ('20221114143410');
  1383  INSERT INTO auth.schema_migrations (version) VALUES ('20221125140132');
  1384  INSERT INTO auth.schema_migrations (version) VALUES ('20221208132122');
  1385  INSERT INTO auth.schema_migrations (version) VALUES ('20221215195500');
  1386  INSERT INTO auth.schema_migrations (version) VALUES ('20221215195800');
  1387  INSERT INTO auth.schema_migrations (version) VALUES ('20221215195900');
  1388  
  1389  
  1390  --
  1391  -- Data for Name: sessions; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
  1392  --
  1393  
  1394  
  1395  
  1396  --
  1397  -- Data for Name: sso_domains; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
  1398  --
  1399  
  1400  
  1401  
  1402  --
  1403  -- Data for Name: sso_providers; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
  1404  --
  1405  
  1406  
  1407  
  1408  --
  1409  -- Data for Name: users; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
  1410  --
  1411  
  1412  
  1413  
  1414  --
  1415  -- Data for Name: buckets; Type: TABLE DATA; Schema: storage; Owner: supabase_storage_admin
  1416  --
  1417  
  1418  
  1419  
  1420  --
  1421  -- Data for Name: migrations; Type: TABLE DATA; Schema: storage; Owner: supabase_storage_admin
  1422  --
  1423  
  1424  INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (0, 'create-migrations-table', 'e18db593bcde2aca2a408c4d1100f6abba2195df', '2022-04-14 09:52:39.214681');
  1425  INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (1, 'initialmigration', '6ab16121fbaa08bbd11b712d05f358f9b555d777', '2022-04-14 09:52:39.255149');
  1426  INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (2, 'pathtoken-column', '49756be03be4c17bb85fe70d4a861f27de7e49ad', '2022-04-14 09:52:39.276667');
  1427  INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (3, 'add-migrations-rls', 'bb5d124c53d68635a883e399426c6a5a25fc893d', '2022-04-14 09:52:39.587158');
  1428  INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (4, 'add-size-functions', '6d79007d04f5acd288c9c250c42d2d5fd286c54d', '2022-04-14 09:52:39.621747');
  1429  INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (5, 'change-column-name-in-get-size', 'fd65688505d2ffa9fbdc58a944348dd8604d688c', '2022-04-14 09:52:39.658796');
  1430  INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (6, 'add-rls-to-buckets', '63e2bab75a2040fee8e3fb3f15a0d26f3380e9b6', '2022-04-14 09:52:39.702011');
  1431  INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (7, 'add-public-to-buckets', '82568934f8a4d9e0a85f126f6fb483ad8214c418', '2022-04-14 09:52:39.739731');
  1432  INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (8, 'fix-search-function', '1a43a40eddb525f2e2f26efd709e6c06e58e059c', '2022-04-14 09:52:39.781062');
  1433  INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (9, 'search-files-search-function', '34c096597eb8b9d077fdfdde9878c88501b2fafc', '2022-08-23 04:48:07.728336');
  1434  INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (10, 'add-trigger-to-auto-update-updated_at-column', '37d6bb964a70a822e6d37f22f457b9bca7885928', '2022-08-23 04:48:07.736527');
  1435  
  1436  
  1437  --
  1438  -- Data for Name: objects; Type: TABLE DATA; Schema: storage; Owner: supabase_storage_admin
  1439  --
  1440  
  1441  
  1442  
  1443  --
  1444  -- Name: refresh_tokens_id_seq; Type: SEQUENCE SET; Schema: auth; Owner: supabase_auth_admin
  1445  --
  1446  
  1447  SELECT pg_catalog.setval('auth.refresh_tokens_id_seq', 1, false);
  1448  
  1449  
  1450  --
  1451  -- Name: extensions extensions_pkey; Type: CONSTRAINT; Schema: _realtime; Owner: postgres
  1452  --
  1453  
  1454  ALTER TABLE ONLY _realtime.extensions
  1455      ADD CONSTRAINT extensions_pkey PRIMARY KEY (id);
  1456  
  1457  
  1458  --
  1459  -- Name: schema_migrations schema_migrations_pkey; Type: CONSTRAINT; Schema: _realtime; Owner: postgres
  1460  --
  1461  
  1462  ALTER TABLE ONLY _realtime.schema_migrations
  1463      ADD CONSTRAINT schema_migrations_pkey PRIMARY KEY (version);
  1464  
  1465  
  1466  --
  1467  -- Name: tenants tenants_pkey; Type: CONSTRAINT; Schema: _realtime; Owner: postgres
  1468  --
  1469  
  1470  ALTER TABLE ONLY _realtime.tenants
  1471      ADD CONSTRAINT tenants_pkey PRIMARY KEY (id);
  1472  
  1473  
  1474  --
  1475  -- Name: mfa_amr_claims amr_id_pk; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1476  --
  1477  
  1478  ALTER TABLE ONLY auth.mfa_amr_claims
  1479      ADD CONSTRAINT amr_id_pk PRIMARY KEY (id);
  1480  
  1481  
  1482  --
  1483  -- Name: audit_log_entries audit_log_entries_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1484  --
  1485  
  1486  ALTER TABLE ONLY auth.audit_log_entries
  1487      ADD CONSTRAINT audit_log_entries_pkey PRIMARY KEY (id);
  1488  
  1489  
  1490  --
  1491  -- Name: identities identities_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1492  --
  1493  
  1494  ALTER TABLE ONLY auth.identities
  1495      ADD CONSTRAINT identities_pkey PRIMARY KEY (provider, id);
  1496  
  1497  
  1498  --
  1499  -- Name: instances instances_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1500  --
  1501  
  1502  ALTER TABLE ONLY auth.instances
  1503      ADD CONSTRAINT instances_pkey PRIMARY KEY (id);
  1504  
  1505  
  1506  --
  1507  -- Name: mfa_amr_claims mfa_amr_claims_session_id_authentication_method_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1508  --
  1509  
  1510  ALTER TABLE ONLY auth.mfa_amr_claims
  1511      ADD CONSTRAINT mfa_amr_claims_session_id_authentication_method_pkey UNIQUE (session_id, authentication_method);
  1512  
  1513  
  1514  --
  1515  -- Name: mfa_challenges mfa_challenges_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1516  --
  1517  
  1518  ALTER TABLE ONLY auth.mfa_challenges
  1519      ADD CONSTRAINT mfa_challenges_pkey PRIMARY KEY (id);
  1520  
  1521  
  1522  --
  1523  -- Name: mfa_factors mfa_factors_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1524  --
  1525  
  1526  ALTER TABLE ONLY auth.mfa_factors
  1527      ADD CONSTRAINT mfa_factors_pkey PRIMARY KEY (id);
  1528  
  1529  
  1530  --
  1531  -- Name: refresh_tokens refresh_tokens_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1532  --
  1533  
  1534  ALTER TABLE ONLY auth.refresh_tokens
  1535      ADD CONSTRAINT refresh_tokens_pkey PRIMARY KEY (id);
  1536  
  1537  
  1538  --
  1539  -- Name: refresh_tokens refresh_tokens_token_unique; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1540  --
  1541  
  1542  ALTER TABLE ONLY auth.refresh_tokens
  1543      ADD CONSTRAINT refresh_tokens_token_unique UNIQUE (token);
  1544  
  1545  
  1546  --
  1547  -- Name: saml_providers saml_providers_entity_id_key; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1548  --
  1549  
  1550  ALTER TABLE ONLY auth.saml_providers
  1551      ADD CONSTRAINT saml_providers_entity_id_key UNIQUE (entity_id);
  1552  
  1553  
  1554  --
  1555  -- Name: saml_providers saml_providers_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1556  --
  1557  
  1558  ALTER TABLE ONLY auth.saml_providers
  1559      ADD CONSTRAINT saml_providers_pkey PRIMARY KEY (id);
  1560  
  1561  
  1562  --
  1563  -- Name: saml_relay_states saml_relay_states_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1564  --
  1565  
  1566  ALTER TABLE ONLY auth.saml_relay_states
  1567      ADD CONSTRAINT saml_relay_states_pkey PRIMARY KEY (id);
  1568  
  1569  
  1570  --
  1571  -- Name: schema_migrations schema_migrations_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1572  --
  1573  
  1574  ALTER TABLE ONLY auth.schema_migrations
  1575      ADD CONSTRAINT schema_migrations_pkey PRIMARY KEY (version);
  1576  
  1577  
  1578  --
  1579  -- Name: sessions sessions_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1580  --
  1581  
  1582  ALTER TABLE ONLY auth.sessions
  1583      ADD CONSTRAINT sessions_pkey PRIMARY KEY (id);
  1584  
  1585  
  1586  --
  1587  -- Name: sso_domains sso_domains_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1588  --
  1589  
  1590  ALTER TABLE ONLY auth.sso_domains
  1591      ADD CONSTRAINT sso_domains_pkey PRIMARY KEY (id);
  1592  
  1593  
  1594  --
  1595  -- Name: sso_providers sso_providers_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1596  --
  1597  
  1598  ALTER TABLE ONLY auth.sso_providers
  1599      ADD CONSTRAINT sso_providers_pkey PRIMARY KEY (id);
  1600  
  1601  
  1602  --
  1603  -- Name: users users_phone_key; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1604  --
  1605  
  1606  ALTER TABLE ONLY auth.users
  1607      ADD CONSTRAINT users_phone_key UNIQUE (phone);
  1608  
  1609  
  1610  --
  1611  -- Name: users users_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1612  --
  1613  
  1614  ALTER TABLE ONLY auth.users
  1615      ADD CONSTRAINT users_pkey PRIMARY KEY (id);
  1616  
  1617  
  1618  --
  1619  -- Name: buckets buckets_pkey; Type: CONSTRAINT; Schema: storage; Owner: supabase_storage_admin
  1620  --
  1621  
  1622  ALTER TABLE ONLY storage.buckets
  1623      ADD CONSTRAINT buckets_pkey PRIMARY KEY (id);
  1624  
  1625  
  1626  --
  1627  -- Name: migrations migrations_name_key; Type: CONSTRAINT; Schema: storage; Owner: supabase_storage_admin
  1628  --
  1629  
  1630  ALTER TABLE ONLY storage.migrations
  1631      ADD CONSTRAINT migrations_name_key UNIQUE (name);
  1632  
  1633  
  1634  --
  1635  -- Name: migrations migrations_pkey; Type: CONSTRAINT; Schema: storage; Owner: supabase_storage_admin
  1636  --
  1637  
  1638  ALTER TABLE ONLY storage.migrations
  1639      ADD CONSTRAINT migrations_pkey PRIMARY KEY (id);
  1640  
  1641  
  1642  --
  1643  -- Name: objects objects_pkey; Type: CONSTRAINT; Schema: storage; Owner: supabase_storage_admin
  1644  --
  1645  
  1646  ALTER TABLE ONLY storage.objects
  1647      ADD CONSTRAINT objects_pkey PRIMARY KEY (id);
  1648  
  1649  
  1650  --
  1651  -- Name: extensions_tenant_external_id_type_index; Type: INDEX; Schema: _realtime; Owner: postgres
  1652  --
  1653  
  1654  CREATE UNIQUE INDEX extensions_tenant_external_id_type_index ON _realtime.extensions USING btree (tenant_external_id, type);
  1655  
  1656  
  1657  --
  1658  -- Name: tenants_external_id_index; Type: INDEX; Schema: _realtime; Owner: postgres
  1659  --
  1660  
  1661  CREATE UNIQUE INDEX tenants_external_id_index ON _realtime.tenants USING btree (external_id);
  1662  
  1663  
  1664  --
  1665  -- Name: audit_logs_instance_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  1666  --
  1667  
  1668  CREATE INDEX audit_logs_instance_id_idx ON auth.audit_log_entries USING btree (instance_id);
  1669  
  1670  
  1671  --
  1672  -- Name: confirmation_token_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  1673  --
  1674  
  1675  CREATE UNIQUE INDEX confirmation_token_idx ON auth.users USING btree (confirmation_token) WHERE ((confirmation_token)::text !~ '^[0-9 ]*$'::text);
  1676  
  1677  
  1678  --
  1679  -- Name: email_change_token_current_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  1680  --
  1681  
  1682  CREATE UNIQUE INDEX email_change_token_current_idx ON auth.users USING btree (email_change_token_current) WHERE ((email_change_token_current)::text !~ '^[0-9 ]*$'::text);
  1683  
  1684  
  1685  --
  1686  -- Name: email_change_token_new_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  1687  --
  1688  
  1689  CREATE UNIQUE INDEX email_change_token_new_idx ON auth.users USING btree (email_change_token_new) WHERE ((email_change_token_new)::text !~ '^[0-9 ]*$'::text);
  1690  
  1691  
  1692  --
  1693  -- Name: factor_id_created_at_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  1694  --
  1695  
  1696  CREATE INDEX factor_id_created_at_idx ON auth.mfa_factors USING btree (user_id, created_at);
  1697  
  1698  
  1699  --
  1700  -- Name: identities_email_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  1701  --
  1702  
  1703  CREATE INDEX identities_email_idx ON auth.identities USING btree (email text_pattern_ops);
  1704  
  1705  
  1706  --
  1707  -- Name: INDEX identities_email_idx; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
  1708  --
  1709  
  1710  COMMENT ON INDEX auth.identities_email_idx IS 'Auth: Ensures indexed queries on the email column';
  1711  
  1712  
  1713  --
  1714  -- Name: identities_user_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  1715  --
  1716  
  1717  CREATE INDEX identities_user_id_idx ON auth.identities USING btree (user_id);
  1718  
  1719  
  1720  --
  1721  -- Name: mfa_factors_user_friendly_name_unique; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  1722  --
  1723  
  1724  CREATE UNIQUE INDEX mfa_factors_user_friendly_name_unique ON auth.mfa_factors USING btree (friendly_name, user_id) WHERE (btrim(friendly_name) <> ''::text);
  1725  
  1726  
  1727  --
  1728  -- Name: reauthentication_token_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  1729  --
  1730  
  1731  CREATE UNIQUE INDEX reauthentication_token_idx ON auth.users USING btree (reauthentication_token) WHERE ((reauthentication_token)::text !~ '^[0-9 ]*$'::text);
  1732  
  1733  
  1734  --
  1735  -- Name: recovery_token_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  1736  --
  1737  
  1738  CREATE UNIQUE INDEX recovery_token_idx ON auth.users USING btree (recovery_token) WHERE ((recovery_token)::text !~ '^[0-9 ]*$'::text);
  1739  
  1740  
  1741  --
  1742  -- Name: refresh_tokens_instance_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  1743  --
  1744  
  1745  CREATE INDEX refresh_tokens_instance_id_idx ON auth.refresh_tokens USING btree (instance_id);
  1746  
  1747  
  1748  --
  1749  -- Name: refresh_tokens_instance_id_user_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  1750  --
  1751  
  1752  CREATE INDEX refresh_tokens_instance_id_user_id_idx ON auth.refresh_tokens USING btree (instance_id, user_id);
  1753  
  1754  
  1755  --
  1756  -- Name: refresh_tokens_parent_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  1757  --
  1758  
  1759  CREATE INDEX refresh_tokens_parent_idx ON auth.refresh_tokens USING btree (parent);
  1760  
  1761  
  1762  --
  1763  -- Name: refresh_tokens_session_id_revoked_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  1764  --
  1765  
  1766  CREATE INDEX refresh_tokens_session_id_revoked_idx ON auth.refresh_tokens USING btree (session_id, revoked);
  1767  
  1768  
  1769  --
  1770  -- Name: refresh_tokens_token_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  1771  --
  1772  
  1773  CREATE INDEX refresh_tokens_token_idx ON auth.refresh_tokens USING btree (token);
  1774  
  1775  
  1776  --
  1777  -- Name: saml_providers_sso_provider_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  1778  --
  1779  
  1780  CREATE INDEX saml_providers_sso_provider_id_idx ON auth.saml_providers USING btree (sso_provider_id);
  1781  
  1782  
  1783  --
  1784  -- Name: saml_relay_states_for_email_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  1785  --
  1786  
  1787  CREATE INDEX saml_relay_states_for_email_idx ON auth.saml_relay_states USING btree (for_email);
  1788  
  1789  
  1790  --
  1791  -- Name: saml_relay_states_sso_provider_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  1792  --
  1793  
  1794  CREATE INDEX saml_relay_states_sso_provider_id_idx ON auth.saml_relay_states USING btree (sso_provider_id);
  1795  
  1796  
  1797  --
  1798  -- Name: sessions_user_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  1799  --
  1800  
  1801  CREATE INDEX sessions_user_id_idx ON auth.sessions USING btree (user_id);
  1802  
  1803  
  1804  --
  1805  -- Name: sso_domains_domain_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  1806  --
  1807  
  1808  CREATE UNIQUE INDEX sso_domains_domain_idx ON auth.sso_domains USING btree (lower(domain));
  1809  
  1810  
  1811  --
  1812  -- Name: sso_domains_sso_provider_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  1813  --
  1814  
  1815  CREATE INDEX sso_domains_sso_provider_id_idx ON auth.sso_domains USING btree (sso_provider_id);
  1816  
  1817  
  1818  --
  1819  -- Name: sso_providers_resource_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  1820  --
  1821  
  1822  CREATE UNIQUE INDEX sso_providers_resource_id_idx ON auth.sso_providers USING btree (lower(resource_id));
  1823  
  1824  
  1825  --
  1826  -- Name: user_id_created_at_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  1827  --
  1828  
  1829  CREATE INDEX user_id_created_at_idx ON auth.sessions USING btree (user_id, created_at);
  1830  
  1831  
  1832  --
  1833  -- Name: users_email_partial_key; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  1834  --
  1835  
  1836  CREATE UNIQUE INDEX users_email_partial_key ON auth.users USING btree (email) WHERE (is_sso_user = false);
  1837  
  1838  
  1839  --
  1840  -- Name: INDEX users_email_partial_key; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
  1841  --
  1842  
  1843  COMMENT ON INDEX auth.users_email_partial_key IS 'Auth: A partial unique index that applies only when is_sso_user is false';
  1844  
  1845  
  1846  --
  1847  -- Name: users_instance_id_email_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  1848  --
  1849  
  1850  CREATE INDEX users_instance_id_email_idx ON auth.users USING btree (instance_id, lower((email)::text));
  1851  
  1852  
  1853  --
  1854  -- Name: users_instance_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  1855  --
  1856  
  1857  CREATE INDEX users_instance_id_idx ON auth.users USING btree (instance_id);
  1858  
  1859  
  1860  --
  1861  -- Name: bname; Type: INDEX; Schema: storage; Owner: supabase_storage_admin
  1862  --
  1863  
  1864  CREATE UNIQUE INDEX bname ON storage.buckets USING btree (name);
  1865  
  1866  
  1867  --
  1868  -- Name: bucketid_objname; Type: INDEX; Schema: storage; Owner: supabase_storage_admin
  1869  --
  1870  
  1871  CREATE UNIQUE INDEX bucketid_objname ON storage.objects USING btree (bucket_id, name);
  1872  
  1873  
  1874  --
  1875  -- Name: name_prefix_search; Type: INDEX; Schema: storage; Owner: supabase_storage_admin
  1876  --
  1877  
  1878  CREATE INDEX name_prefix_search ON storage.objects USING btree (name text_pattern_ops);
  1879  
  1880  
  1881  --
  1882  -- Name: objects update_objects_updated_at; Type: TRIGGER; Schema: storage; Owner: supabase_storage_admin
  1883  --
  1884  
  1885  CREATE TRIGGER update_objects_updated_at BEFORE UPDATE ON storage.objects FOR EACH ROW EXECUTE FUNCTION storage.update_updated_at_column();
  1886  
  1887  
  1888  --
  1889  -- Name: extensions extensions_tenant_external_id_fkey; Type: FK CONSTRAINT; Schema: _realtime; Owner: postgres
  1890  --
  1891  
  1892  ALTER TABLE ONLY _realtime.extensions
  1893      ADD CONSTRAINT extensions_tenant_external_id_fkey FOREIGN KEY (tenant_external_id) REFERENCES _realtime.tenants(external_id) ON DELETE CASCADE;
  1894  
  1895  
  1896  --
  1897  -- Name: identities identities_user_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1898  --
  1899  
  1900  ALTER TABLE ONLY auth.identities
  1901      ADD CONSTRAINT identities_user_id_fkey FOREIGN KEY (user_id) REFERENCES auth.users(id) ON DELETE CASCADE;
  1902  
  1903  
  1904  --
  1905  -- Name: mfa_amr_claims mfa_amr_claims_session_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1906  --
  1907  
  1908  ALTER TABLE ONLY auth.mfa_amr_claims
  1909      ADD CONSTRAINT mfa_amr_claims_session_id_fkey FOREIGN KEY (session_id) REFERENCES auth.sessions(id) ON DELETE CASCADE;
  1910  
  1911  
  1912  --
  1913  -- Name: mfa_challenges mfa_challenges_auth_factor_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1914  --
  1915  
  1916  ALTER TABLE ONLY auth.mfa_challenges
  1917      ADD CONSTRAINT mfa_challenges_auth_factor_id_fkey FOREIGN KEY (factor_id) REFERENCES auth.mfa_factors(id) ON DELETE CASCADE;
  1918  
  1919  
  1920  --
  1921  -- Name: mfa_factors mfa_factors_user_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1922  --
  1923  
  1924  ALTER TABLE ONLY auth.mfa_factors
  1925      ADD CONSTRAINT mfa_factors_user_id_fkey FOREIGN KEY (user_id) REFERENCES auth.users(id) ON DELETE CASCADE;
  1926  
  1927  
  1928  --
  1929  -- Name: refresh_tokens refresh_tokens_session_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1930  --
  1931  
  1932  ALTER TABLE ONLY auth.refresh_tokens
  1933      ADD CONSTRAINT refresh_tokens_session_id_fkey FOREIGN KEY (session_id) REFERENCES auth.sessions(id) ON DELETE CASCADE;
  1934  
  1935  
  1936  --
  1937  -- Name: saml_providers saml_providers_sso_provider_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1938  --
  1939  
  1940  ALTER TABLE ONLY auth.saml_providers
  1941      ADD CONSTRAINT saml_providers_sso_provider_id_fkey FOREIGN KEY (sso_provider_id) REFERENCES auth.sso_providers(id) ON DELETE CASCADE;
  1942  
  1943  
  1944  --
  1945  -- Name: saml_relay_states saml_relay_states_sso_provider_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1946  --
  1947  
  1948  ALTER TABLE ONLY auth.saml_relay_states
  1949      ADD CONSTRAINT saml_relay_states_sso_provider_id_fkey FOREIGN KEY (sso_provider_id) REFERENCES auth.sso_providers(id) ON DELETE CASCADE;
  1950  
  1951  
  1952  --
  1953  -- Name: sessions sessions_user_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1954  --
  1955  
  1956  ALTER TABLE ONLY auth.sessions
  1957      ADD CONSTRAINT sessions_user_id_fkey FOREIGN KEY (user_id) REFERENCES auth.users(id) ON DELETE CASCADE;
  1958  
  1959  
  1960  --
  1961  -- Name: sso_domains sso_domains_sso_provider_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1962  --
  1963  
  1964  ALTER TABLE ONLY auth.sso_domains
  1965      ADD CONSTRAINT sso_domains_sso_provider_id_fkey FOREIGN KEY (sso_provider_id) REFERENCES auth.sso_providers(id) ON DELETE CASCADE;
  1966  
  1967  
  1968  --
  1969  -- Name: buckets buckets_owner_fkey; Type: FK CONSTRAINT; Schema: storage; Owner: supabase_storage_admin
  1970  --
  1971  
  1972  ALTER TABLE ONLY storage.buckets
  1973      ADD CONSTRAINT buckets_owner_fkey FOREIGN KEY (owner) REFERENCES auth.users(id);
  1974  
  1975  
  1976  --
  1977  -- Name: objects objects_bucketId_fkey; Type: FK CONSTRAINT; Schema: storage; Owner: supabase_storage_admin
  1978  --
  1979  
  1980  ALTER TABLE ONLY storage.objects
  1981      ADD CONSTRAINT "objects_bucketId_fkey" FOREIGN KEY (bucket_id) REFERENCES storage.buckets(id);
  1982  
  1983  
  1984  --
  1985  -- Name: objects objects_owner_fkey; Type: FK CONSTRAINT; Schema: storage; Owner: supabase_storage_admin
  1986  --
  1987  
  1988  ALTER TABLE ONLY storage.objects
  1989      ADD CONSTRAINT objects_owner_fkey FOREIGN KEY (owner) REFERENCES auth.users(id);
  1990  
  1991  
  1992  --
  1993  -- Name: buckets; Type: ROW SECURITY; Schema: storage; Owner: supabase_storage_admin
  1994  --
  1995  
  1996  ALTER TABLE storage.buckets ENABLE ROW LEVEL SECURITY;
  1997  
  1998  --
  1999  -- Name: migrations; Type: ROW SECURITY; Schema: storage; Owner: supabase_storage_admin
  2000  --
  2001  
  2002  ALTER TABLE storage.migrations ENABLE ROW LEVEL SECURITY;
  2003  
  2004  --
  2005  -- Name: objects; Type: ROW SECURITY; Schema: storage; Owner: supabase_storage_admin
  2006  --
  2007  
  2008  ALTER TABLE storage.objects ENABLE ROW LEVEL SECURITY;
  2009  
  2010  --
  2011  -- Name: supabase_realtime; Type: PUBLICATION; Schema: -; Owner: postgres
  2012  --
  2013  
  2014  CREATE PUBLICATION supabase_realtime WITH (publish = 'insert, update, delete, truncate');
  2015  
  2016  
  2017  ALTER PUBLICATION supabase_realtime OWNER TO postgres;
  2018  
  2019  --
  2020  -- Name: SCHEMA auth; Type: ACL; Schema: -; Owner: supabase_admin
  2021  --
  2022  
  2023  GRANT USAGE ON SCHEMA auth TO anon;
  2024  GRANT USAGE ON SCHEMA auth TO authenticated;
  2025  GRANT USAGE ON SCHEMA auth TO service_role;
  2026  GRANT ALL ON SCHEMA auth TO supabase_auth_admin;
  2027  GRANT ALL ON SCHEMA auth TO dashboard_user;
  2028  GRANT ALL ON SCHEMA auth TO postgres;
  2029  
  2030  
  2031  --
  2032  -- Name: SCHEMA extensions; Type: ACL; Schema: -; Owner: postgres
  2033  --
  2034  
  2035  GRANT USAGE ON SCHEMA extensions TO anon;
  2036  GRANT USAGE ON SCHEMA extensions TO authenticated;
  2037  GRANT USAGE ON SCHEMA extensions TO service_role;
  2038  GRANT ALL ON SCHEMA extensions TO dashboard_user;
  2039  
  2040  
  2041  --
  2042  -- Name: SCHEMA graphql_public; Type: ACL; Schema: -; Owner: supabase_admin
  2043  --
  2044  
  2045  GRANT USAGE ON SCHEMA graphql_public TO postgres;
  2046  GRANT USAGE ON SCHEMA graphql_public TO anon;
  2047  GRANT USAGE ON SCHEMA graphql_public TO authenticated;
  2048  GRANT USAGE ON SCHEMA graphql_public TO service_role;
  2049  
  2050  
  2051  --
  2052  -- Name: SCHEMA public; Type: ACL; Schema: -; Owner: postgres
  2053  --
  2054  
  2055  REVOKE USAGE ON SCHEMA public FROM PUBLIC;
  2056  GRANT ALL ON SCHEMA public TO PUBLIC;
  2057  GRANT USAGE ON SCHEMA public TO anon;
  2058  GRANT USAGE ON SCHEMA public TO authenticated;
  2059  GRANT USAGE ON SCHEMA public TO service_role;
  2060  
  2061  
  2062  --
  2063  -- Name: SCHEMA realtime; Type: ACL; Schema: -; Owner: supabase_admin
  2064  --
  2065  
  2066  GRANT USAGE ON SCHEMA realtime TO postgres;
  2067  
  2068  
  2069  --
  2070  -- Name: SCHEMA storage; Type: ACL; Schema: -; Owner: supabase_admin
  2071  --
  2072  
  2073  GRANT ALL ON SCHEMA storage TO postgres;
  2074  GRANT USAGE ON SCHEMA storage TO anon;
  2075  GRANT USAGE ON SCHEMA storage TO authenticated;
  2076  GRANT USAGE ON SCHEMA storage TO service_role;
  2077  GRANT ALL ON SCHEMA storage TO supabase_storage_admin;
  2078  GRANT ALL ON SCHEMA storage TO dashboard_user;
  2079  
  2080  
  2081  --
  2082  -- Name: FUNCTION email(); Type: ACL; Schema: auth; Owner: supabase_auth_admin
  2083  --
  2084  
  2085  GRANT ALL ON FUNCTION auth.email() TO dashboard_user;
  2086  
  2087  
  2088  --
  2089  -- Name: FUNCTION jwt(); Type: ACL; Schema: auth; Owner: supabase_auth_admin
  2090  --
  2091  
  2092  GRANT ALL ON FUNCTION auth.jwt() TO postgres;
  2093  GRANT ALL ON FUNCTION auth.jwt() TO dashboard_user;
  2094  
  2095  
  2096  --
  2097  -- Name: FUNCTION role(); Type: ACL; Schema: auth; Owner: supabase_auth_admin
  2098  --
  2099  
  2100  GRANT ALL ON FUNCTION auth.role() TO dashboard_user;
  2101  
  2102  
  2103  --
  2104  -- Name: FUNCTION uid(); Type: ACL; Schema: auth; Owner: supabase_auth_admin
  2105  --
  2106  
  2107  GRANT ALL ON FUNCTION auth.uid() TO dashboard_user;
  2108  
  2109  
  2110  --
  2111  -- Name: FUNCTION algorithm_sign(signables text, secret text, algorithm text); Type: ACL; Schema: extensions; Owner: postgres
  2112  --
  2113  
  2114  GRANT ALL ON FUNCTION extensions.algorithm_sign(signables text, secret text, algorithm text) TO dashboard_user;
  2115  
  2116  
  2117  --
  2118  -- Name: FUNCTION armor(bytea); Type: ACL; Schema: extensions; Owner: postgres
  2119  --
  2120  
  2121  GRANT ALL ON FUNCTION extensions.armor(bytea) TO dashboard_user;
  2122  
  2123  
  2124  --
  2125  -- Name: FUNCTION armor(bytea, text[], text[]); Type: ACL; Schema: extensions; Owner: postgres
  2126  --
  2127  
  2128  GRANT ALL ON FUNCTION extensions.armor(bytea, text[], text[]) TO dashboard_user;
  2129  
  2130  
  2131  --
  2132  -- Name: FUNCTION crypt(text, text); Type: ACL; Schema: extensions; Owner: postgres
  2133  --
  2134  
  2135  GRANT ALL ON FUNCTION extensions.crypt(text, text) TO dashboard_user;
  2136  
  2137  
  2138  --
  2139  -- Name: FUNCTION dearmor(text); Type: ACL; Schema: extensions; Owner: postgres
  2140  --
  2141  
  2142  GRANT ALL ON FUNCTION extensions.dearmor(text) TO dashboard_user;
  2143  
  2144  
  2145  --
  2146  -- Name: FUNCTION decrypt(bytea, bytea, text); Type: ACL; Schema: extensions; Owner: postgres
  2147  --
  2148  
  2149  GRANT ALL ON FUNCTION extensions.decrypt(bytea, bytea, text) TO dashboard_user;
  2150  
  2151  
  2152  --
  2153  -- Name: FUNCTION decrypt_iv(bytea, bytea, bytea, text); Type: ACL; Schema: extensions; Owner: postgres
  2154  --
  2155  
  2156  GRANT ALL ON FUNCTION extensions.decrypt_iv(bytea, bytea, bytea, text) TO dashboard_user;
  2157  
  2158  
  2159  --
  2160  -- Name: FUNCTION digest(bytea, text); Type: ACL; Schema: extensions; Owner: postgres
  2161  --
  2162  
  2163  GRANT ALL ON FUNCTION extensions.digest(bytea, text) TO dashboard_user;
  2164  
  2165  
  2166  --
  2167  -- Name: FUNCTION digest(text, text); Type: ACL; Schema: extensions; Owner: postgres
  2168  --
  2169  
  2170  GRANT ALL ON FUNCTION extensions.digest(text, text) TO dashboard_user;
  2171  
  2172  
  2173  --
  2174  -- Name: FUNCTION encrypt(bytea, bytea, text); Type: ACL; Schema: extensions; Owner: postgres
  2175  --
  2176  
  2177  GRANT ALL ON FUNCTION extensions.encrypt(bytea, bytea, text) TO dashboard_user;
  2178  
  2179  
  2180  --
  2181  -- Name: FUNCTION encrypt_iv(bytea, bytea, bytea, text); Type: ACL; Schema: extensions; Owner: postgres
  2182  --
  2183  
  2184  GRANT ALL ON FUNCTION extensions.encrypt_iv(bytea, bytea, bytea, text) TO dashboard_user;
  2185  
  2186  
  2187  --
  2188  -- Name: FUNCTION gen_random_bytes(integer); Type: ACL; Schema: extensions; Owner: postgres
  2189  --
  2190  
  2191  GRANT ALL ON FUNCTION extensions.gen_random_bytes(integer) TO dashboard_user;
  2192  
  2193  
  2194  --
  2195  -- Name: FUNCTION gen_random_uuid(); Type: ACL; Schema: extensions; Owner: postgres
  2196  --
  2197  
  2198  GRANT ALL ON FUNCTION extensions.gen_random_uuid() TO dashboard_user;
  2199  
  2200  
  2201  --
  2202  -- Name: FUNCTION gen_salt(text); Type: ACL; Schema: extensions; Owner: postgres
  2203  --
  2204  
  2205  GRANT ALL ON FUNCTION extensions.gen_salt(text) TO dashboard_user;
  2206  
  2207  
  2208  --
  2209  -- Name: FUNCTION gen_salt(text, integer); Type: ACL; Schema: extensions; Owner: postgres
  2210  --
  2211  
  2212  GRANT ALL ON FUNCTION extensions.gen_salt(text, integer) TO dashboard_user;
  2213  
  2214  
  2215  --
  2216  -- Name: FUNCTION grant_pg_cron_access(); Type: ACL; Schema: extensions; Owner: postgres
  2217  --
  2218  
  2219  GRANT ALL ON FUNCTION extensions.grant_pg_cron_access() TO dashboard_user;
  2220  
  2221  
  2222  --
  2223  -- Name: FUNCTION grant_pg_net_access(); Type: ACL; Schema: extensions; Owner: postgres
  2224  --
  2225  
  2226  GRANT ALL ON FUNCTION extensions.grant_pg_net_access() TO dashboard_user;
  2227  
  2228  
  2229  --
  2230  -- Name: FUNCTION hmac(bytea, bytea, text); Type: ACL; Schema: extensions; Owner: postgres
  2231  --
  2232  
  2233  GRANT ALL ON FUNCTION extensions.hmac(bytea, bytea, text) TO dashboard_user;
  2234  
  2235  
  2236  --
  2237  -- Name: FUNCTION hmac(text, text, text); Type: ACL; Schema: extensions; Owner: postgres
  2238  --
  2239  
  2240  GRANT ALL ON FUNCTION extensions.hmac(text, text, text) TO dashboard_user;
  2241  
  2242  
  2243  --
  2244  -- Name: FUNCTION pgp_armor_headers(text, OUT key text, OUT value text); Type: ACL; Schema: extensions; Owner: postgres
  2245  --
  2246  
  2247  GRANT ALL ON FUNCTION extensions.pgp_armor_headers(text, OUT key text, OUT value text) TO dashboard_user;
  2248  
  2249  
  2250  --
  2251  -- Name: FUNCTION pgp_key_id(bytea); Type: ACL; Schema: extensions; Owner: postgres
  2252  --
  2253  
  2254  GRANT ALL ON FUNCTION extensions.pgp_key_id(bytea) TO dashboard_user;
  2255  
  2256  
  2257  --
  2258  -- Name: FUNCTION pgp_pub_decrypt(bytea, bytea); Type: ACL; Schema: extensions; Owner: postgres
  2259  --
  2260  
  2261  GRANT ALL ON FUNCTION extensions.pgp_pub_decrypt(bytea, bytea) TO dashboard_user;
  2262  
  2263  
  2264  --
  2265  -- Name: FUNCTION pgp_pub_decrypt(bytea, bytea, text); Type: ACL; Schema: extensions; Owner: postgres
  2266  --
  2267  
  2268  GRANT ALL ON FUNCTION extensions.pgp_pub_decrypt(bytea, bytea, text) TO dashboard_user;
  2269  
  2270  
  2271  --
  2272  -- Name: FUNCTION pgp_pub_decrypt(bytea, bytea, text, text); Type: ACL; Schema: extensions; Owner: postgres
  2273  --
  2274  
  2275  GRANT ALL ON FUNCTION extensions.pgp_pub_decrypt(bytea, bytea, text, text) TO dashboard_user;
  2276  
  2277  
  2278  --
  2279  -- Name: FUNCTION pgp_pub_decrypt_bytea(bytea, bytea); Type: ACL; Schema: extensions; Owner: postgres
  2280  --
  2281  
  2282  GRANT ALL ON FUNCTION extensions.pgp_pub_decrypt_bytea(bytea, bytea) TO dashboard_user;
  2283  
  2284  
  2285  --
  2286  -- Name: FUNCTION pgp_pub_decrypt_bytea(bytea, bytea, text); Type: ACL; Schema: extensions; Owner: postgres
  2287  --
  2288  
  2289  GRANT ALL ON FUNCTION extensions.pgp_pub_decrypt_bytea(bytea, bytea, text) TO dashboard_user;
  2290  
  2291  
  2292  --
  2293  -- Name: FUNCTION pgp_pub_decrypt_bytea(bytea, bytea, text, text); Type: ACL; Schema: extensions; Owner: postgres
  2294  --
  2295  
  2296  GRANT ALL ON FUNCTION extensions.pgp_pub_decrypt_bytea(bytea, bytea, text, text) TO dashboard_user;
  2297  
  2298  
  2299  --
  2300  -- Name: FUNCTION pgp_pub_encrypt(text, bytea); Type: ACL; Schema: extensions; Owner: postgres
  2301  --
  2302  
  2303  GRANT ALL ON FUNCTION extensions.pgp_pub_encrypt(text, bytea) TO dashboard_user;
  2304  
  2305  
  2306  --
  2307  -- Name: FUNCTION pgp_pub_encrypt(text, bytea, text); Type: ACL; Schema: extensions; Owner: postgres
  2308  --
  2309  
  2310  GRANT ALL ON FUNCTION extensions.pgp_pub_encrypt(text, bytea, text) TO dashboard_user;
  2311  
  2312  
  2313  --
  2314  -- Name: FUNCTION pgp_pub_encrypt_bytea(bytea, bytea); Type: ACL; Schema: extensions; Owner: postgres
  2315  --
  2316  
  2317  GRANT ALL ON FUNCTION extensions.pgp_pub_encrypt_bytea(bytea, bytea) TO dashboard_user;
  2318  
  2319  
  2320  --
  2321  -- Name: FUNCTION pgp_pub_encrypt_bytea(bytea, bytea, text); Type: ACL; Schema: extensions; Owner: postgres
  2322  --
  2323  
  2324  GRANT ALL ON FUNCTION extensions.pgp_pub_encrypt_bytea(bytea, bytea, text) TO dashboard_user;
  2325  
  2326  
  2327  --
  2328  -- Name: FUNCTION pgp_sym_decrypt(bytea, text); Type: ACL; Schema: extensions; Owner: postgres
  2329  --
  2330  
  2331  GRANT ALL ON FUNCTION extensions.pgp_sym_decrypt(bytea, text) TO dashboard_user;
  2332  
  2333  
  2334  --
  2335  -- Name: FUNCTION pgp_sym_decrypt(bytea, text, text); Type: ACL; Schema: extensions; Owner: postgres
  2336  --
  2337  
  2338  GRANT ALL ON FUNCTION extensions.pgp_sym_decrypt(bytea, text, text) TO dashboard_user;
  2339  
  2340  
  2341  --
  2342  -- Name: FUNCTION pgp_sym_decrypt_bytea(bytea, text); Type: ACL; Schema: extensions; Owner: postgres
  2343  --
  2344  
  2345  GRANT ALL ON FUNCTION extensions.pgp_sym_decrypt_bytea(bytea, text) TO dashboard_user;
  2346  
  2347  
  2348  --
  2349  -- Name: FUNCTION pgp_sym_decrypt_bytea(bytea, text, text); Type: ACL; Schema: extensions; Owner: postgres
  2350  --
  2351  
  2352  GRANT ALL ON FUNCTION extensions.pgp_sym_decrypt_bytea(bytea, text, text) TO dashboard_user;
  2353  
  2354  
  2355  --
  2356  -- Name: FUNCTION pgp_sym_encrypt(text, text); Type: ACL; Schema: extensions; Owner: postgres
  2357  --
  2358  
  2359  GRANT ALL ON FUNCTION extensions.pgp_sym_encrypt(text, text) TO dashboard_user;
  2360  
  2361  
  2362  --
  2363  -- Name: FUNCTION pgp_sym_encrypt(text, text, text); Type: ACL; Schema: extensions; Owner: postgres
  2364  --
  2365  
  2366  GRANT ALL ON FUNCTION extensions.pgp_sym_encrypt(text, text, text) TO dashboard_user;
  2367  
  2368  
  2369  --
  2370  -- Name: FUNCTION pgp_sym_encrypt_bytea(bytea, text); Type: ACL; Schema: extensions; Owner: postgres
  2371  --
  2372  
  2373  GRANT ALL ON FUNCTION extensions.pgp_sym_encrypt_bytea(bytea, text) TO dashboard_user;
  2374  
  2375  
  2376  --
  2377  -- Name: FUNCTION pgp_sym_encrypt_bytea(bytea, text, text); Type: ACL; Schema: extensions; Owner: postgres
  2378  --
  2379  
  2380  GRANT ALL ON FUNCTION extensions.pgp_sym_encrypt_bytea(bytea, text, text) TO dashboard_user;
  2381  
  2382  
  2383  --
  2384  -- Name: FUNCTION sign(payload json, secret text, algorithm text); Type: ACL; Schema: extensions; Owner: postgres
  2385  --
  2386  
  2387  GRANT ALL ON FUNCTION extensions.sign(payload json, secret text, algorithm text) TO dashboard_user;
  2388  
  2389  
  2390  --
  2391  -- Name: FUNCTION url_decode(data text); Type: ACL; Schema: extensions; Owner: postgres
  2392  --
  2393  
  2394  GRANT ALL ON FUNCTION extensions.url_decode(data text) TO dashboard_user;
  2395  
  2396  
  2397  --
  2398  -- Name: FUNCTION url_encode(data bytea); Type: ACL; Schema: extensions; Owner: postgres
  2399  --
  2400  
  2401  GRANT ALL ON FUNCTION extensions.url_encode(data bytea) TO dashboard_user;
  2402  
  2403  
  2404  --
  2405  -- Name: FUNCTION uuid_generate_v1(); Type: ACL; Schema: extensions; Owner: postgres
  2406  --
  2407  
  2408  GRANT ALL ON FUNCTION extensions.uuid_generate_v1() TO dashboard_user;
  2409  
  2410  
  2411  --
  2412  -- Name: FUNCTION uuid_generate_v1mc(); Type: ACL; Schema: extensions; Owner: postgres
  2413  --
  2414  
  2415  GRANT ALL ON FUNCTION extensions.uuid_generate_v1mc() TO dashboard_user;
  2416  
  2417  
  2418  --
  2419  -- Name: FUNCTION uuid_generate_v3(namespace uuid, name text); Type: ACL; Schema: extensions; Owner: postgres
  2420  --
  2421  
  2422  GRANT ALL ON FUNCTION extensions.uuid_generate_v3(namespace uuid, name text) TO dashboard_user;
  2423  
  2424  
  2425  --
  2426  -- Name: FUNCTION uuid_generate_v4(); Type: ACL; Schema: extensions; Owner: postgres
  2427  --
  2428  
  2429  GRANT ALL ON FUNCTION extensions.uuid_generate_v4() TO dashboard_user;
  2430  
  2431  
  2432  --
  2433  -- Name: FUNCTION uuid_generate_v5(namespace uuid, name text); Type: ACL; Schema: extensions; Owner: postgres
  2434  --
  2435  
  2436  GRANT ALL ON FUNCTION extensions.uuid_generate_v5(namespace uuid, name text) TO dashboard_user;
  2437  
  2438  
  2439  --
  2440  -- Name: FUNCTION uuid_nil(); Type: ACL; Schema: extensions; Owner: postgres
  2441  --
  2442  
  2443  GRANT ALL ON FUNCTION extensions.uuid_nil() TO dashboard_user;
  2444  
  2445  
  2446  --
  2447  -- Name: FUNCTION uuid_ns_dns(); Type: ACL; Schema: extensions; Owner: postgres
  2448  --
  2449  
  2450  GRANT ALL ON FUNCTION extensions.uuid_ns_dns() TO dashboard_user;
  2451  
  2452  
  2453  --
  2454  -- Name: FUNCTION uuid_ns_oid(); Type: ACL; Schema: extensions; Owner: postgres
  2455  --
  2456  
  2457  GRANT ALL ON FUNCTION extensions.uuid_ns_oid() TO dashboard_user;
  2458  
  2459  
  2460  --
  2461  -- Name: FUNCTION uuid_ns_url(); Type: ACL; Schema: extensions; Owner: postgres
  2462  --
  2463  
  2464  GRANT ALL ON FUNCTION extensions.uuid_ns_url() TO dashboard_user;
  2465  
  2466  
  2467  --
  2468  -- Name: FUNCTION uuid_ns_x500(); Type: ACL; Schema: extensions; Owner: postgres
  2469  --
  2470  
  2471  GRANT ALL ON FUNCTION extensions.uuid_ns_x500() TO dashboard_user;
  2472  
  2473  
  2474  --
  2475  -- Name: FUNCTION verify(token text, secret text, algorithm text); Type: ACL; Schema: extensions; Owner: postgres
  2476  --
  2477  
  2478  GRANT ALL ON FUNCTION extensions.verify(token text, secret text, algorithm text) TO dashboard_user;
  2479  
  2480  
  2481  --
  2482  -- Name: FUNCTION extension(name text); Type: ACL; Schema: storage; Owner: supabase_storage_admin
  2483  --
  2484  
  2485  GRANT ALL ON FUNCTION storage.extension(name text) TO anon;
  2486  GRANT ALL ON FUNCTION storage.extension(name text) TO authenticated;
  2487  GRANT ALL ON FUNCTION storage.extension(name text) TO service_role;
  2488  GRANT ALL ON FUNCTION storage.extension(name text) TO dashboard_user;
  2489  GRANT ALL ON FUNCTION storage.extension(name text) TO postgres;
  2490  
  2491  
  2492  --
  2493  -- Name: FUNCTION filename(name text); Type: ACL; Schema: storage; Owner: supabase_storage_admin
  2494  --
  2495  
  2496  GRANT ALL ON FUNCTION storage.filename(name text) TO anon;
  2497  GRANT ALL ON FUNCTION storage.filename(name text) TO authenticated;
  2498  GRANT ALL ON FUNCTION storage.filename(name text) TO service_role;
  2499  GRANT ALL ON FUNCTION storage.filename(name text) TO dashboard_user;
  2500  GRANT ALL ON FUNCTION storage.filename(name text) TO postgres;
  2501  
  2502  
  2503  --
  2504  -- Name: FUNCTION foldername(name text); Type: ACL; Schema: storage; Owner: supabase_storage_admin
  2505  --
  2506  
  2507  GRANT ALL ON FUNCTION storage.foldername(name text) TO anon;
  2508  GRANT ALL ON FUNCTION storage.foldername(name text) TO authenticated;
  2509  GRANT ALL ON FUNCTION storage.foldername(name text) TO service_role;
  2510  GRANT ALL ON FUNCTION storage.foldername(name text) TO dashboard_user;
  2511  GRANT ALL ON FUNCTION storage.foldername(name text) TO postgres;
  2512  
  2513  
  2514  --
  2515  -- Name: TABLE audit_log_entries; Type: ACL; Schema: auth; Owner: supabase_auth_admin
  2516  --
  2517  
  2518  GRANT ALL ON TABLE auth.audit_log_entries TO dashboard_user;
  2519  GRANT ALL ON TABLE auth.audit_log_entries TO postgres;
  2520  
  2521  
  2522  --
  2523  -- Name: TABLE identities; Type: ACL; Schema: auth; Owner: supabase_auth_admin
  2524  --
  2525  
  2526  GRANT ALL ON TABLE auth.identities TO postgres;
  2527  GRANT ALL ON TABLE auth.identities TO dashboard_user;
  2528  
  2529  
  2530  --
  2531  -- Name: TABLE instances; Type: ACL; Schema: auth; Owner: supabase_auth_admin
  2532  --
  2533  
  2534  GRANT ALL ON TABLE auth.instances TO dashboard_user;
  2535  GRANT ALL ON TABLE auth.instances TO postgres;
  2536  
  2537  
  2538  --
  2539  -- Name: TABLE mfa_amr_claims; Type: ACL; Schema: auth; Owner: supabase_auth_admin
  2540  --
  2541  
  2542  GRANT ALL ON TABLE auth.mfa_amr_claims TO postgres;
  2543  GRANT ALL ON TABLE auth.mfa_amr_claims TO dashboard_user;
  2544  
  2545  
  2546  --
  2547  -- Name: TABLE mfa_challenges; Type: ACL; Schema: auth; Owner: supabase_auth_admin
  2548  --
  2549  
  2550  GRANT ALL ON TABLE auth.mfa_challenges TO postgres;
  2551  GRANT ALL ON TABLE auth.mfa_challenges TO dashboard_user;
  2552  
  2553  
  2554  --
  2555  -- Name: TABLE mfa_factors; Type: ACL; Schema: auth; Owner: supabase_auth_admin
  2556  --
  2557  
  2558  GRANT ALL ON TABLE auth.mfa_factors TO postgres;
  2559  GRANT ALL ON TABLE auth.mfa_factors TO dashboard_user;
  2560  
  2561  
  2562  --
  2563  -- Name: TABLE refresh_tokens; Type: ACL; Schema: auth; Owner: supabase_auth_admin
  2564  --
  2565  
  2566  GRANT ALL ON TABLE auth.refresh_tokens TO dashboard_user;
  2567  GRANT ALL ON TABLE auth.refresh_tokens TO postgres;
  2568  
  2569  
  2570  --
  2571  -- Name: SEQUENCE refresh_tokens_id_seq; Type: ACL; Schema: auth; Owner: supabase_auth_admin
  2572  --
  2573  
  2574  GRANT ALL ON SEQUENCE auth.refresh_tokens_id_seq TO dashboard_user;
  2575  GRANT ALL ON SEQUENCE auth.refresh_tokens_id_seq TO postgres;
  2576  
  2577  
  2578  --
  2579  -- Name: TABLE saml_providers; Type: ACL; Schema: auth; Owner: supabase_auth_admin
  2580  --
  2581  
  2582  GRANT ALL ON TABLE auth.saml_providers TO postgres;
  2583  GRANT ALL ON TABLE auth.saml_providers TO dashboard_user;
  2584  
  2585  
  2586  --
  2587  -- Name: TABLE saml_relay_states; Type: ACL; Schema: auth; Owner: supabase_auth_admin
  2588  --
  2589  
  2590  GRANT ALL ON TABLE auth.saml_relay_states TO postgres;
  2591  GRANT ALL ON TABLE auth.saml_relay_states TO dashboard_user;
  2592  
  2593  
  2594  --
  2595  -- Name: TABLE schema_migrations; Type: ACL; Schema: auth; Owner: supabase_auth_admin
  2596  --
  2597  
  2598  GRANT ALL ON TABLE auth.schema_migrations TO dashboard_user;
  2599  GRANT ALL ON TABLE auth.schema_migrations TO postgres;
  2600  
  2601  
  2602  --
  2603  -- Name: TABLE sessions; Type: ACL; Schema: auth; Owner: supabase_auth_admin
  2604  --
  2605  
  2606  GRANT ALL ON TABLE auth.sessions TO postgres;
  2607  GRANT ALL ON TABLE auth.sessions TO dashboard_user;
  2608  
  2609  
  2610  --
  2611  -- Name: TABLE sso_domains; Type: ACL; Schema: auth; Owner: supabase_auth_admin
  2612  --
  2613  
  2614  GRANT ALL ON TABLE auth.sso_domains TO postgres;
  2615  GRANT ALL ON TABLE auth.sso_domains TO dashboard_user;
  2616  
  2617  
  2618  --
  2619  -- Name: TABLE sso_providers; Type: ACL; Schema: auth; Owner: supabase_auth_admin
  2620  --
  2621  
  2622  GRANT ALL ON TABLE auth.sso_providers TO postgres;
  2623  GRANT ALL ON TABLE auth.sso_providers TO dashboard_user;
  2624  
  2625  
  2626  --
  2627  -- Name: TABLE users; Type: ACL; Schema: auth; Owner: supabase_auth_admin
  2628  --
  2629  
  2630  GRANT ALL ON TABLE auth.users TO dashboard_user;
  2631  GRANT ALL ON TABLE auth.users TO postgres;
  2632  
  2633  
  2634  --
  2635  -- Name: TABLE buckets; Type: ACL; Schema: storage; Owner: supabase_storage_admin
  2636  --
  2637  
  2638  GRANT ALL ON TABLE storage.buckets TO anon;
  2639  GRANT ALL ON TABLE storage.buckets TO authenticated;
  2640  GRANT ALL ON TABLE storage.buckets TO service_role;
  2641  GRANT ALL ON TABLE storage.buckets TO postgres;
  2642  
  2643  
  2644  --
  2645  -- Name: TABLE migrations; Type: ACL; Schema: storage; Owner: supabase_storage_admin
  2646  --
  2647  
  2648  GRANT ALL ON TABLE storage.migrations TO anon;
  2649  GRANT ALL ON TABLE storage.migrations TO authenticated;
  2650  GRANT ALL ON TABLE storage.migrations TO service_role;
  2651  GRANT ALL ON TABLE storage.migrations TO postgres;
  2652  
  2653  
  2654  --
  2655  -- Name: TABLE objects; Type: ACL; Schema: storage; Owner: supabase_storage_admin
  2656  --
  2657  
  2658  GRANT ALL ON TABLE storage.objects TO anon;
  2659  GRANT ALL ON TABLE storage.objects TO authenticated;
  2660  GRANT ALL ON TABLE storage.objects TO service_role;
  2661  GRANT ALL ON TABLE storage.objects TO postgres;
  2662  
  2663  
  2664  --
  2665  -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: auth; Owner: supabase_auth_admin
  2666  --
  2667  
  2668  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_auth_admin IN SCHEMA auth GRANT ALL ON SEQUENCES  TO postgres;
  2669  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_auth_admin IN SCHEMA auth GRANT ALL ON SEQUENCES  TO dashboard_user;
  2670  
  2671  
  2672  --
  2673  -- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: auth; Owner: supabase_auth_admin
  2674  --
  2675  
  2676  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_auth_admin IN SCHEMA auth GRANT ALL ON FUNCTIONS  TO postgres;
  2677  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_auth_admin IN SCHEMA auth GRANT ALL ON FUNCTIONS  TO dashboard_user;
  2678  
  2679  
  2680  --
  2681  -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: auth; Owner: supabase_auth_admin
  2682  --
  2683  
  2684  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_auth_admin IN SCHEMA auth GRANT ALL ON TABLES  TO postgres;
  2685  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_auth_admin IN SCHEMA auth GRANT ALL ON TABLES  TO dashboard_user;
  2686  
  2687  
  2688  --
  2689  -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: graphql_public; Owner: supabase_admin
  2690  --
  2691  
  2692  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON SEQUENCES  TO postgres;
  2693  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON SEQUENCES  TO anon;
  2694  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON SEQUENCES  TO authenticated;
  2695  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON SEQUENCES  TO service_role;
  2696  
  2697  
  2698  --
  2699  -- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: graphql_public; Owner: supabase_admin
  2700  --
  2701  
  2702  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON FUNCTIONS  TO postgres;
  2703  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON FUNCTIONS  TO anon;
  2704  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON FUNCTIONS  TO authenticated;
  2705  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON FUNCTIONS  TO service_role;
  2706  
  2707  
  2708  --
  2709  -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: graphql_public; Owner: supabase_admin
  2710  --
  2711  
  2712  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON TABLES  TO postgres;
  2713  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON TABLES  TO anon;
  2714  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON TABLES  TO authenticated;
  2715  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON TABLES  TO service_role;
  2716  
  2717  
  2718  --
  2719  -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: public; Owner: postgres
  2720  --
  2721  
  2722  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON SEQUENCES  TO postgres;
  2723  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON SEQUENCES  TO anon;
  2724  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON SEQUENCES  TO authenticated;
  2725  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON SEQUENCES  TO service_role;
  2726  
  2727  
  2728  --
  2729  -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: public; Owner: supabase_admin
  2730  --
  2731  
  2732  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON SEQUENCES  TO postgres;
  2733  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON SEQUENCES  TO anon;
  2734  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON SEQUENCES  TO authenticated;
  2735  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON SEQUENCES  TO service_role;
  2736  
  2737  
  2738  --
  2739  -- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: public; Owner: postgres
  2740  --
  2741  
  2742  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON FUNCTIONS  TO postgres;
  2743  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON FUNCTIONS  TO anon;
  2744  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON FUNCTIONS  TO authenticated;
  2745  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON FUNCTIONS  TO service_role;
  2746  
  2747  
  2748  --
  2749  -- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: public; Owner: supabase_admin
  2750  --
  2751  
  2752  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON FUNCTIONS  TO postgres;
  2753  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON FUNCTIONS  TO anon;
  2754  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON FUNCTIONS  TO authenticated;
  2755  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON FUNCTIONS  TO service_role;
  2756  
  2757  
  2758  --
  2759  -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: public; Owner: postgres
  2760  --
  2761  
  2762  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON TABLES  TO postgres;
  2763  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON TABLES  TO anon;
  2764  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON TABLES  TO authenticated;
  2765  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON TABLES  TO service_role;
  2766  
  2767  
  2768  --
  2769  -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: public; Owner: supabase_admin
  2770  --
  2771  
  2772  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON TABLES  TO postgres;
  2773  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON TABLES  TO anon;
  2774  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON TABLES  TO authenticated;
  2775  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON TABLES  TO service_role;
  2776  
  2777  
  2778  --
  2779  -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: realtime; Owner: supabase_admin
  2780  --
  2781  
  2782  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA realtime GRANT ALL ON SEQUENCES  TO postgres;
  2783  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA realtime GRANT ALL ON SEQUENCES  TO dashboard_user;
  2784  
  2785  
  2786  --
  2787  -- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: realtime; Owner: supabase_admin
  2788  --
  2789  
  2790  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA realtime GRANT ALL ON FUNCTIONS  TO postgres;
  2791  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA realtime GRANT ALL ON FUNCTIONS  TO dashboard_user;
  2792  
  2793  
  2794  --
  2795  -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: realtime; Owner: supabase_admin
  2796  --
  2797  
  2798  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA realtime GRANT ALL ON TABLES  TO postgres;
  2799  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA realtime GRANT ALL ON TABLES  TO dashboard_user;
  2800  
  2801  
  2802  --
  2803  -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: storage; Owner: postgres
  2804  --
  2805  
  2806  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON SEQUENCES  TO postgres;
  2807  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON SEQUENCES  TO anon;
  2808  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON SEQUENCES  TO authenticated;
  2809  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON SEQUENCES  TO service_role;
  2810  
  2811  
  2812  --
  2813  -- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: storage; Owner: postgres
  2814  --
  2815  
  2816  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON FUNCTIONS  TO postgres;
  2817  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON FUNCTIONS  TO anon;
  2818  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON FUNCTIONS  TO authenticated;
  2819  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON FUNCTIONS  TO service_role;
  2820  
  2821  
  2822  --
  2823  -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: storage; Owner: postgres
  2824  --
  2825  
  2826  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON TABLES  TO postgres;
  2827  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON TABLES  TO anon;
  2828  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON TABLES  TO authenticated;
  2829  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON TABLES  TO service_role;
  2830  
  2831  
  2832  --
  2833  -- Name: issue_graphql_placeholder; Type: EVENT TRIGGER; Schema: -; Owner: supabase_admin
  2834  --
  2835  
  2836  CREATE EVENT TRIGGER issue_graphql_placeholder ON sql_drop
  2837           WHEN TAG IN ('DROP EXTENSION')
  2838     EXECUTE FUNCTION extensions.set_graphql_placeholder();
  2839  
  2840  
  2841  ALTER EVENT TRIGGER issue_graphql_placeholder OWNER TO supabase_admin;
  2842  
  2843  --
  2844  -- Name: issue_pg_cron_access; Type: EVENT TRIGGER; Schema: -; Owner: postgres
  2845  --
  2846  
  2847  CREATE EVENT TRIGGER issue_pg_cron_access ON ddl_command_end
  2848           WHEN TAG IN ('CREATE SCHEMA')
  2849     EXECUTE FUNCTION extensions.grant_pg_cron_access();
  2850  
  2851  
  2852  ALTER EVENT TRIGGER issue_pg_cron_access OWNER TO postgres;
  2853  
  2854  --
  2855  -- Name: issue_pg_graphql_access; Type: EVENT TRIGGER; Schema: -; Owner: supabase_admin
  2856  --
  2857  
  2858  CREATE EVENT TRIGGER issue_pg_graphql_access ON ddl_command_end
  2859           WHEN TAG IN ('CREATE FUNCTION')
  2860     EXECUTE FUNCTION extensions.grant_pg_graphql_access();
  2861  
  2862  
  2863  ALTER EVENT TRIGGER issue_pg_graphql_access OWNER TO supabase_admin;
  2864  
  2865  --
  2866  -- Name: issue_pg_net_access; Type: EVENT TRIGGER; Schema: -; Owner: postgres
  2867  --
  2868  
  2869  CREATE EVENT TRIGGER issue_pg_net_access ON ddl_command_end
  2870           WHEN TAG IN ('CREATE EXTENSION')
  2871     EXECUTE FUNCTION extensions.grant_pg_net_access();
  2872  
  2873  
  2874  ALTER EVENT TRIGGER issue_pg_net_access OWNER TO postgres;
  2875  
  2876  --
  2877  -- Name: pgrst_ddl_watch; Type: EVENT TRIGGER; Schema: -; Owner: supabase_admin
  2878  --
  2879  
  2880  CREATE EVENT TRIGGER pgrst_ddl_watch ON ddl_command_end
  2881     EXECUTE FUNCTION extensions.pgrst_ddl_watch();
  2882  
  2883  
  2884  ALTER EVENT TRIGGER pgrst_ddl_watch OWNER TO supabase_admin;
  2885  
  2886  --
  2887  -- Name: pgrst_drop_watch; Type: EVENT TRIGGER; Schema: -; Owner: supabase_admin
  2888  --
  2889  
  2890  CREATE EVENT TRIGGER pgrst_drop_watch ON sql_drop
  2891     EXECUTE FUNCTION extensions.pgrst_drop_watch();
  2892  
  2893  
  2894  ALTER EVENT TRIGGER pgrst_drop_watch OWNER TO supabase_admin;
  2895  
  2896  --
  2897  -- PostgreSQL database dump complete
  2898  --
  2899  
  2900  RESET ALL;