github.com/supabase/cli@v1.168.1/internal/utils/templates/initial_schemas/14.sql (about) 1 -- 2 -- PostgreSQL database dump 3 -- 4 5 -- Dumped from database version 14.5 (Debian 14.5-2.pgdg110+2) 6 -- Dumped by pg_dump version 15.3 7 8 SET statement_timeout = 0; 9 SET lock_timeout = 0; 10 SET idle_in_transaction_session_timeout = 0; 11 SET client_encoding = 'UTF8'; 12 SET standard_conforming_strings = on; 13 SELECT pg_catalog.set_config('search_path', '', false); 14 SET check_function_bodies = false; 15 SET xmloption = content; 16 SET client_min_messages = warning; 17 SET row_security = off; 18 19 -- 20 -- Name: _analytics; Type: SCHEMA; Schema: -; Owner: postgres 21 -- 22 23 CREATE SCHEMA IF NOT EXISTS _analytics; 24 25 26 ALTER SCHEMA _analytics OWNER TO postgres; 27 28 -- 29 -- Name: _realtime; Type: SCHEMA; Schema: -; Owner: postgres 30 -- 31 32 CREATE SCHEMA IF NOT EXISTS _realtime; 33 34 35 ALTER SCHEMA _realtime OWNER TO postgres; 36 37 -- 38 -- Name: auth; Type: SCHEMA; Schema: -; Owner: supabase_admin 39 -- 40 41 CREATE SCHEMA IF NOT EXISTS auth; 42 43 44 ALTER SCHEMA auth OWNER TO supabase_admin; 45 46 -- 47 -- Name: extensions; Type: SCHEMA; Schema: -; Owner: postgres 48 -- 49 50 CREATE SCHEMA IF NOT EXISTS extensions; 51 52 53 ALTER SCHEMA extensions OWNER TO postgres; 54 55 -- 56 -- Name: graphql; Type: SCHEMA; Schema: -; Owner: supabase_admin 57 -- 58 59 CREATE SCHEMA IF NOT EXISTS graphql; 60 61 62 ALTER SCHEMA graphql OWNER TO supabase_admin; 63 64 -- 65 -- Name: graphql_public; Type: SCHEMA; Schema: -; Owner: supabase_admin 66 -- 67 68 CREATE SCHEMA IF NOT EXISTS graphql_public; 69 70 71 ALTER SCHEMA graphql_public OWNER TO supabase_admin; 72 73 -- 74 -- Name: pg_net; Type: EXTENSION; Schema: -; Owner: - 75 -- 76 77 CREATE EXTENSION IF NOT EXISTS pg_net WITH SCHEMA extensions; 78 79 80 -- 81 -- Name: EXTENSION pg_net; Type: COMMENT; Schema: -; Owner: 82 -- 83 84 COMMENT ON EXTENSION pg_net IS 'Async HTTP'; 85 86 87 -- 88 -- Name: pgbouncer; Type: SCHEMA; Schema: -; Owner: pgbouncer 89 -- 90 91 CREATE SCHEMA IF NOT EXISTS pgbouncer; 92 93 94 ALTER SCHEMA pgbouncer OWNER TO pgbouncer; 95 96 -- 97 -- Name: pgsodium; Type: SCHEMA; Schema: -; Owner: postgres 98 -- 99 100 CREATE SCHEMA IF NOT EXISTS pgsodium; 101 102 103 ALTER SCHEMA pgsodium OWNER TO postgres; 104 105 -- 106 -- Name: pgsodium; Type: EXTENSION; Schema: -; Owner: - 107 -- 108 109 CREATE EXTENSION IF NOT EXISTS pgsodium WITH SCHEMA pgsodium; 110 111 112 -- 113 -- Name: EXTENSION pgsodium; Type: COMMENT; Schema: -; Owner: 114 -- 115 116 COMMENT ON EXTENSION pgsodium IS 'Pgsodium is a modern cryptography library for Postgres.'; 117 118 119 -- 120 -- Name: public; Type: SCHEMA; Schema: -; Owner: postgres 121 -- 122 123 -- *not* creating schema, since initdb creates it 124 125 126 ALTER SCHEMA public OWNER TO postgres; 127 128 -- 129 -- Name: realtime; Type: SCHEMA; Schema: -; Owner: supabase_admin 130 -- 131 132 CREATE SCHEMA IF NOT EXISTS realtime; 133 134 135 ALTER SCHEMA realtime OWNER TO supabase_admin; 136 137 -- 138 -- Name: storage; Type: SCHEMA; Schema: -; Owner: supabase_admin 139 -- 140 141 CREATE SCHEMA IF NOT EXISTS storage; 142 143 144 ALTER SCHEMA storage OWNER TO supabase_admin; 145 146 -- 147 -- Name: supabase_functions; Type: SCHEMA; Schema: -; Owner: supabase_admin 148 -- 149 150 CREATE SCHEMA IF NOT EXISTS supabase_functions; 151 152 153 ALTER SCHEMA supabase_functions OWNER TO supabase_admin; 154 155 -- 156 -- Name: pg_graphql; Type: EXTENSION; Schema: -; Owner: - 157 -- 158 159 CREATE EXTENSION IF NOT EXISTS pg_graphql WITH SCHEMA graphql; 160 161 162 -- 163 -- Name: EXTENSION pg_graphql; Type: COMMENT; Schema: -; Owner: 164 -- 165 166 COMMENT ON EXTENSION pg_graphql IS 'pg_graphql: GraphQL support'; 167 168 169 -- 170 -- Name: pg_stat_statements; Type: EXTENSION; Schema: -; Owner: - 171 -- 172 173 CREATE EXTENSION IF NOT EXISTS pg_stat_statements WITH SCHEMA extensions; 174 175 176 -- 177 -- Name: EXTENSION pg_stat_statements; Type: COMMENT; Schema: -; Owner: 178 -- 179 180 COMMENT ON EXTENSION pg_stat_statements IS 'track planning and execution statistics of all SQL statements executed'; 181 182 183 -- 184 -- Name: pgcrypto; Type: EXTENSION; Schema: -; Owner: - 185 -- 186 187 CREATE EXTENSION IF NOT EXISTS pgcrypto WITH SCHEMA extensions; 188 189 190 -- 191 -- Name: EXTENSION pgcrypto; Type: COMMENT; Schema: -; Owner: 192 -- 193 194 COMMENT ON EXTENSION pgcrypto IS 'cryptographic functions'; 195 196 197 -- 198 -- Name: pgjwt; Type: EXTENSION; Schema: -; Owner: - 199 -- 200 201 CREATE EXTENSION IF NOT EXISTS pgjwt WITH SCHEMA extensions; 202 203 204 -- 205 -- Name: EXTENSION pgjwt; Type: COMMENT; Schema: -; Owner: 206 -- 207 208 COMMENT ON EXTENSION pgjwt IS 'JSON Web Token API for Postgresql'; 209 210 211 -- 212 -- Name: uuid-ossp; Type: EXTENSION; Schema: -; Owner: - 213 -- 214 215 CREATE EXTENSION IF NOT EXISTS "uuid-ossp" WITH SCHEMA extensions; 216 217 218 -- 219 -- Name: EXTENSION "uuid-ossp"; Type: COMMENT; Schema: -; Owner: 220 -- 221 222 COMMENT ON EXTENSION "uuid-ossp" IS 'generate universally unique identifiers (UUIDs)'; 223 224 225 -- 226 -- Name: aal_level; Type: TYPE; Schema: auth; Owner: supabase_auth_admin 227 -- 228 229 CREATE TYPE auth.aal_level AS ENUM ( 230 'aal1', 231 'aal2', 232 'aal3' 233 ); 234 235 236 ALTER TYPE auth.aal_level OWNER TO supabase_auth_admin; 237 238 -- 239 -- Name: code_challenge_method; Type: TYPE; Schema: auth; Owner: supabase_auth_admin 240 -- 241 242 CREATE TYPE auth.code_challenge_method AS ENUM ( 243 's256', 244 'plain' 245 ); 246 247 248 ALTER TYPE auth.code_challenge_method OWNER TO supabase_auth_admin; 249 250 -- 251 -- Name: factor_status; Type: TYPE; Schema: auth; Owner: supabase_auth_admin 252 -- 253 254 CREATE TYPE auth.factor_status AS ENUM ( 255 'unverified', 256 'verified' 257 ); 258 259 260 ALTER TYPE auth.factor_status OWNER TO supabase_auth_admin; 261 262 -- 263 -- Name: factor_type; Type: TYPE; Schema: auth; Owner: supabase_auth_admin 264 -- 265 266 CREATE TYPE auth.factor_type AS ENUM ( 267 'totp', 268 'webauthn' 269 ); 270 271 272 ALTER TYPE auth.factor_type OWNER TO supabase_auth_admin; 273 274 -- 275 -- Name: email(); Type: FUNCTION; Schema: auth; Owner: supabase_auth_admin 276 -- 277 278 CREATE OR REPLACE FUNCTION auth.email() RETURNS text 279 LANGUAGE sql STABLE 280 AS $$ 281 select 282 coalesce( 283 nullif(current_setting('request.jwt.claim.email', true), ''), 284 (nullif(current_setting('request.jwt.claims', true), '')::jsonb ->> 'email') 285 )::text 286 $$; 287 288 289 ALTER FUNCTION auth.email() OWNER TO supabase_auth_admin; 290 291 -- 292 -- Name: FUNCTION email(); Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 293 -- 294 295 COMMENT ON FUNCTION auth.email() IS 'Deprecated. Use auth.jwt() -> ''email'' instead.'; 296 297 298 -- 299 -- Name: jwt(); Type: FUNCTION; Schema: auth; Owner: supabase_auth_admin 300 -- 301 302 CREATE OR REPLACE FUNCTION auth.jwt() RETURNS jsonb 303 LANGUAGE sql STABLE 304 AS $$ 305 select 306 coalesce( 307 nullif(current_setting('request.jwt.claim', true), ''), 308 nullif(current_setting('request.jwt.claims', true), '') 309 )::jsonb 310 $$; 311 312 313 ALTER FUNCTION auth.jwt() OWNER TO supabase_auth_admin; 314 315 -- 316 -- Name: role(); Type: FUNCTION; Schema: auth; Owner: supabase_auth_admin 317 -- 318 319 CREATE OR REPLACE FUNCTION auth.role() RETURNS text 320 LANGUAGE sql STABLE 321 AS $$ 322 select 323 coalesce( 324 nullif(current_setting('request.jwt.claim.role', true), ''), 325 (nullif(current_setting('request.jwt.claims', true), '')::jsonb ->> 'role') 326 )::text 327 $$; 328 329 330 ALTER FUNCTION auth.role() OWNER TO supabase_auth_admin; 331 332 -- 333 -- Name: FUNCTION role(); Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 334 -- 335 336 COMMENT ON FUNCTION auth.role() IS 'Deprecated. Use auth.jwt() -> ''role'' instead.'; 337 338 339 -- 340 -- Name: uid(); Type: FUNCTION; Schema: auth; Owner: supabase_auth_admin 341 -- 342 343 CREATE OR REPLACE FUNCTION auth.uid() RETURNS uuid 344 LANGUAGE sql STABLE 345 AS $$ 346 select 347 coalesce( 348 nullif(current_setting('request.jwt.claim.sub', true), ''), 349 (nullif(current_setting('request.jwt.claims', true), '')::jsonb ->> 'sub') 350 )::uuid 351 $$; 352 353 354 ALTER FUNCTION auth.uid() OWNER TO supabase_auth_admin; 355 356 -- 357 -- Name: FUNCTION uid(); Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 358 -- 359 360 COMMENT ON FUNCTION auth.uid() IS 'Deprecated. Use auth.jwt() -> ''sub'' instead.'; 361 362 363 -- 364 -- Name: grant_pg_cron_access(); Type: FUNCTION; Schema: extensions; Owner: postgres 365 -- 366 367 CREATE OR REPLACE FUNCTION extensions.grant_pg_cron_access() RETURNS event_trigger 368 LANGUAGE plpgsql 369 AS $$ 370 DECLARE 371 schema_is_cron bool; 372 BEGIN 373 schema_is_cron = ( 374 SELECT n.nspname = 'cron' 375 FROM pg_event_trigger_ddl_commands() AS ev 376 LEFT JOIN pg_catalog.pg_namespace AS n 377 ON ev.objid = n.oid 378 ); 379 380 IF schema_is_cron 381 THEN 382 grant usage on schema cron to postgres with grant option; 383 384 alter default privileges in schema cron grant all on tables to postgres with grant option; 385 alter default privileges in schema cron grant all on functions to postgres with grant option; 386 alter default privileges in schema cron grant all on sequences to postgres with grant option; 387 388 alter default privileges for user supabase_admin in schema cron grant all 389 on sequences to postgres with grant option; 390 alter default privileges for user supabase_admin in schema cron grant all 391 on tables to postgres with grant option; 392 alter default privileges for user supabase_admin in schema cron grant all 393 on functions to postgres with grant option; 394 395 grant all privileges on all tables in schema cron to postgres with grant option; 396 397 END IF; 398 399 END; 400 $$; 401 402 403 ALTER FUNCTION extensions.grant_pg_cron_access() OWNER TO postgres; 404 405 -- 406 -- Name: FUNCTION grant_pg_cron_access(); Type: COMMENT; Schema: extensions; Owner: postgres 407 -- 408 409 COMMENT ON FUNCTION extensions.grant_pg_cron_access() IS 'Grants access to pg_cron'; 410 411 412 -- 413 -- Name: grant_pg_graphql_access(); Type: FUNCTION; Schema: extensions; Owner: supabase_admin 414 -- 415 416 CREATE OR REPLACE FUNCTION extensions.grant_pg_graphql_access() RETURNS event_trigger 417 LANGUAGE plpgsql 418 AS $_$ 419 DECLARE 420 func_is_graphql_resolve bool; 421 BEGIN 422 func_is_graphql_resolve = ( 423 SELECT n.proname = 'resolve' 424 FROM pg_event_trigger_ddl_commands() AS ev 425 LEFT JOIN pg_catalog.pg_proc AS n 426 ON ev.objid = n.oid 427 ); 428 429 IF func_is_graphql_resolve 430 THEN 431 -- Update public wrapper to pass all arguments through to the pg_graphql resolve func 432 DROP FUNCTION IF EXISTS graphql_public.graphql; 433 create or replace function graphql_public.graphql( 434 "operationName" text default null, 435 query text default null, 436 variables jsonb default null, 437 extensions jsonb default null 438 ) 439 returns jsonb 440 language sql 441 as $$ 442 select graphql.resolve( 443 query := query, 444 variables := coalesce(variables, '{}'), 445 "operationName" := "operationName", 446 extensions := extensions 447 ); 448 $$; 449 450 -- This hook executes when `graphql.resolve` is created. That is not necessarily the last 451 -- function in the extension so we need to grant permissions on existing entities AND 452 -- update default permissions to any others that are created after `graphql.resolve` 453 grant usage on schema graphql to postgres, anon, authenticated, service_role; 454 grant select on all tables in schema graphql to postgres, anon, authenticated, service_role; 455 grant execute on all functions in schema graphql to postgres, anon, authenticated, service_role; 456 grant all on all sequences in schema graphql to postgres, anon, authenticated, service_role; 457 alter default privileges in schema graphql grant all on tables to postgres, anon, authenticated, service_role; 458 alter default privileges in schema graphql grant all on functions to postgres, anon, authenticated, service_role; 459 alter default privileges in schema graphql grant all on sequences to postgres, anon, authenticated, service_role; 460 END IF; 461 462 END; 463 $_$; 464 465 466 ALTER FUNCTION extensions.grant_pg_graphql_access() OWNER TO supabase_admin; 467 468 -- 469 -- Name: FUNCTION grant_pg_graphql_access(); Type: COMMENT; Schema: extensions; Owner: supabase_admin 470 -- 471 472 COMMENT ON FUNCTION extensions.grant_pg_graphql_access() IS 'Grants access to pg_graphql'; 473 474 475 -- 476 -- Name: grant_pg_net_access(); Type: FUNCTION; Schema: extensions; Owner: postgres 477 -- 478 479 CREATE OR REPLACE FUNCTION extensions.grant_pg_net_access() RETURNS event_trigger 480 LANGUAGE plpgsql 481 AS $$ 482 BEGIN 483 IF EXISTS ( 484 SELECT 1 485 FROM pg_event_trigger_ddl_commands() AS ev 486 JOIN pg_extension AS ext 487 ON ev.objid = ext.oid 488 WHERE ext.extname = 'pg_net' 489 ) 490 THEN 491 GRANT USAGE ON SCHEMA net TO supabase_functions_admin, postgres, anon, authenticated, service_role; 492 493 ALTER function net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) SECURITY DEFINER; 494 ALTER function net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) SECURITY DEFINER; 495 496 ALTER function net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) SET search_path = net; 497 ALTER function net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) SET search_path = net; 498 499 REVOKE ALL ON FUNCTION net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) FROM PUBLIC; 500 REVOKE ALL ON FUNCTION net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) FROM PUBLIC; 501 502 GRANT EXECUTE ON FUNCTION net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) TO supabase_functions_admin, postgres, anon, authenticated, service_role; 503 GRANT EXECUTE ON FUNCTION net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) TO supabase_functions_admin, postgres, anon, authenticated, service_role; 504 END IF; 505 END; 506 $$; 507 508 509 ALTER FUNCTION extensions.grant_pg_net_access() OWNER TO postgres; 510 511 -- 512 -- Name: FUNCTION grant_pg_net_access(); Type: COMMENT; Schema: extensions; Owner: postgres 513 -- 514 515 COMMENT ON FUNCTION extensions.grant_pg_net_access() IS 'Grants access to pg_net'; 516 517 518 -- 519 -- Name: pgrst_ddl_watch(); Type: FUNCTION; Schema: extensions; Owner: supabase_admin 520 -- 521 522 CREATE OR REPLACE FUNCTION extensions.pgrst_ddl_watch() RETURNS event_trigger 523 LANGUAGE plpgsql 524 AS $$ 525 DECLARE 526 cmd record; 527 BEGIN 528 FOR cmd IN SELECT * FROM pg_event_trigger_ddl_commands() 529 LOOP 530 IF cmd.command_tag IN ( 531 'CREATE SCHEMA', 'ALTER SCHEMA' 532 , 'CREATE TABLE', 'CREATE TABLE AS', 'SELECT INTO', 'ALTER TABLE' 533 , 'CREATE FOREIGN TABLE', 'ALTER FOREIGN TABLE' 534 , 'CREATE VIEW', 'ALTER VIEW' 535 , 'CREATE MATERIALIZED VIEW', 'ALTER MATERIALIZED VIEW' 536 , 'CREATE FUNCTION', 'ALTER FUNCTION' 537 , 'CREATE TRIGGER' 538 , 'CREATE TYPE', 'ALTER TYPE' 539 , 'CREATE RULE' 540 , 'COMMENT' 541 ) 542 -- don't notify in case of CREATE TEMP table or other objects created on pg_temp 543 AND cmd.schema_name is distinct from 'pg_temp' 544 THEN 545 NOTIFY pgrst, 'reload schema'; 546 END IF; 547 END LOOP; 548 END; $$; 549 550 551 ALTER FUNCTION extensions.pgrst_ddl_watch() OWNER TO supabase_admin; 552 553 -- 554 -- Name: pgrst_drop_watch(); Type: FUNCTION; Schema: extensions; Owner: supabase_admin 555 -- 556 557 CREATE OR REPLACE FUNCTION extensions.pgrst_drop_watch() RETURNS event_trigger 558 LANGUAGE plpgsql 559 AS $$ 560 DECLARE 561 obj record; 562 BEGIN 563 FOR obj IN SELECT * FROM pg_event_trigger_dropped_objects() 564 LOOP 565 IF obj.object_type IN ( 566 'schema' 567 , 'table' 568 , 'foreign table' 569 , 'view' 570 , 'materialized view' 571 , 'function' 572 , 'trigger' 573 , 'type' 574 , 'rule' 575 ) 576 AND obj.is_temporary IS false -- no pg_temp objects 577 THEN 578 NOTIFY pgrst, 'reload schema'; 579 END IF; 580 END LOOP; 581 END; $$; 582 583 584 ALTER FUNCTION extensions.pgrst_drop_watch() OWNER TO supabase_admin; 585 586 -- 587 -- Name: set_graphql_placeholder(); Type: FUNCTION; Schema: extensions; Owner: supabase_admin 588 -- 589 590 CREATE OR REPLACE FUNCTION extensions.set_graphql_placeholder() RETURNS event_trigger 591 LANGUAGE plpgsql 592 AS $_$ 593 DECLARE 594 graphql_is_dropped bool; 595 BEGIN 596 graphql_is_dropped = ( 597 SELECT ev.schema_name = 'graphql_public' 598 FROM pg_event_trigger_dropped_objects() AS ev 599 WHERE ev.schema_name = 'graphql_public' 600 ); 601 602 IF graphql_is_dropped 603 THEN 604 create or replace function graphql_public.graphql( 605 "operationName" text default null, 606 query text default null, 607 variables jsonb default null, 608 extensions jsonb default null 609 ) 610 returns jsonb 611 language plpgsql 612 as $$ 613 DECLARE 614 server_version float; 615 BEGIN 616 server_version = (SELECT (SPLIT_PART((select version()), ' ', 2))::float); 617 618 IF server_version >= 14 THEN 619 RETURN jsonb_build_object( 620 'errors', jsonb_build_array( 621 jsonb_build_object( 622 'message', 'pg_graphql extension is not enabled.' 623 ) 624 ) 625 ); 626 ELSE 627 RETURN jsonb_build_object( 628 'errors', jsonb_build_array( 629 jsonb_build_object( 630 'message', 'pg_graphql is only available on projects running Postgres 14 onwards.' 631 ) 632 ) 633 ); 634 END IF; 635 END; 636 $$; 637 END IF; 638 639 END; 640 $_$; 641 642 643 ALTER FUNCTION extensions.set_graphql_placeholder() OWNER TO supabase_admin; 644 645 -- 646 -- Name: FUNCTION set_graphql_placeholder(); Type: COMMENT; Schema: extensions; Owner: supabase_admin 647 -- 648 649 COMMENT ON FUNCTION extensions.set_graphql_placeholder() IS 'Reintroduces placeholder function for graphql_public.graphql'; 650 651 652 -- 653 -- Name: get_auth(text); Type: FUNCTION; Schema: pgbouncer; Owner: postgres 654 -- 655 656 CREATE OR REPLACE FUNCTION pgbouncer.get_auth(p_usename text) RETURNS TABLE(username text, password text) 657 LANGUAGE plpgsql SECURITY DEFINER 658 AS $$ 659 BEGIN 660 RAISE WARNING 'PgBouncer auth request: %', p_usename; 661 662 RETURN QUERY 663 SELECT usename::TEXT, passwd::TEXT FROM pg_catalog.pg_shadow 664 WHERE usename = p_usename; 665 END; 666 $$; 667 668 669 ALTER FUNCTION pgbouncer.get_auth(p_usename text) OWNER TO postgres; 670 671 -- 672 -- Name: can_insert_object(text, text, uuid, jsonb); Type: FUNCTION; Schema: storage; Owner: supabase_storage_admin 673 -- 674 675 CREATE OR REPLACE FUNCTION storage.can_insert_object(bucketid text, name text, owner uuid, metadata jsonb) RETURNS void 676 LANGUAGE plpgsql 677 AS $$ 678 BEGIN 679 INSERT INTO "storage"."objects" ("bucket_id", "name", "owner", "metadata") VALUES (bucketid, name, owner, metadata); 680 -- hack to rollback the successful insert 681 RAISE sqlstate 'PT200' using 682 message = 'ROLLBACK', 683 detail = 'rollback successful insert'; 684 END 685 $$; 686 687 688 ALTER FUNCTION storage.can_insert_object(bucketid text, name text, owner uuid, metadata jsonb) OWNER TO supabase_storage_admin; 689 690 -- 691 -- Name: extension(text); Type: FUNCTION; Schema: storage; Owner: supabase_storage_admin 692 -- 693 694 CREATE OR REPLACE FUNCTION storage.extension(name text) RETURNS text 695 LANGUAGE plpgsql 696 AS $$ 697 DECLARE 698 _parts text[]; 699 _filename text; 700 BEGIN 701 select string_to_array(name, '/') into _parts; 702 select _parts[array_length(_parts,1)] into _filename; 703 -- @todo return the last part instead of 2 704 return split_part(_filename, '.', 2); 705 END 706 $$; 707 708 709 ALTER FUNCTION storage.extension(name text) OWNER TO supabase_storage_admin; 710 711 -- 712 -- Name: filename(text); Type: FUNCTION; Schema: storage; Owner: supabase_storage_admin 713 -- 714 715 CREATE OR REPLACE FUNCTION storage.filename(name text) RETURNS text 716 LANGUAGE plpgsql 717 AS $$ 718 DECLARE 719 _parts text[]; 720 BEGIN 721 select string_to_array(name, '/') into _parts; 722 return _parts[array_length(_parts,1)]; 723 END 724 $$; 725 726 727 ALTER FUNCTION storage.filename(name text) OWNER TO supabase_storage_admin; 728 729 -- 730 -- Name: foldername(text); Type: FUNCTION; Schema: storage; Owner: supabase_storage_admin 731 -- 732 733 CREATE OR REPLACE FUNCTION storage.foldername(name text) RETURNS text[] 734 LANGUAGE plpgsql 735 AS $$ 736 DECLARE 737 _parts text[]; 738 BEGIN 739 select string_to_array(name, '/') into _parts; 740 return _parts[1:array_length(_parts,1)-1]; 741 END 742 $$; 743 744 745 ALTER FUNCTION storage.foldername(name text) OWNER TO supabase_storage_admin; 746 747 -- 748 -- Name: get_size_by_bucket(); Type: FUNCTION; Schema: storage; Owner: supabase_storage_admin 749 -- 750 751 CREATE OR REPLACE FUNCTION storage.get_size_by_bucket() RETURNS TABLE(size bigint, bucket_id text) 752 LANGUAGE plpgsql 753 AS $$ 754 BEGIN 755 return query 756 select sum((metadata->>'size')::int) as size, obj.bucket_id 757 from "storage".objects as obj 758 group by obj.bucket_id; 759 END 760 $$; 761 762 763 ALTER FUNCTION storage.get_size_by_bucket() OWNER TO supabase_storage_admin; 764 765 -- 766 -- Name: search(text, text, integer, integer, integer, text, text, text); Type: FUNCTION; Schema: storage; Owner: supabase_storage_admin 767 -- 768 769 CREATE OR REPLACE FUNCTION storage.search(prefix text, bucketname text, limits integer DEFAULT 100, levels integer DEFAULT 1, offsets integer DEFAULT 0, search text DEFAULT ''::text, sortcolumn text DEFAULT 'name'::text, sortorder text DEFAULT 'asc'::text) RETURNS TABLE(name text, id uuid, updated_at timestamp with time zone, created_at timestamp with time zone, last_accessed_at timestamp with time zone, metadata jsonb) 770 LANGUAGE plpgsql STABLE 771 AS $_$ 772 declare 773 v_order_by text; 774 v_sort_order text; 775 begin 776 case 777 when sortcolumn = 'name' then 778 v_order_by = 'name'; 779 when sortcolumn = 'updated_at' then 780 v_order_by = 'updated_at'; 781 when sortcolumn = 'created_at' then 782 v_order_by = 'created_at'; 783 when sortcolumn = 'last_accessed_at' then 784 v_order_by = 'last_accessed_at'; 785 else 786 v_order_by = 'name'; 787 end case; 788 789 case 790 when sortorder = 'asc' then 791 v_sort_order = 'asc'; 792 when sortorder = 'desc' then 793 v_sort_order = 'desc'; 794 else 795 v_sort_order = 'asc'; 796 end case; 797 798 v_order_by = v_order_by || ' ' || v_sort_order; 799 800 return query execute 801 'with folders as ( 802 select path_tokens[$1] as folder 803 from storage.objects 804 where objects.name ilike $2 || $3 || ''%'' 805 and bucket_id = $4 806 and array_length(regexp_split_to_array(objects.name, ''/''), 1) <> $1 807 group by folder 808 order by folder ' || v_sort_order || ' 809 ) 810 (select folder as "name", 811 null as id, 812 null as updated_at, 813 null as created_at, 814 null as last_accessed_at, 815 null as metadata from folders) 816 union all 817 (select path_tokens[$1] as "name", 818 id, 819 updated_at, 820 created_at, 821 last_accessed_at, 822 metadata 823 from storage.objects 824 where objects.name ilike $2 || $3 || ''%'' 825 and bucket_id = $4 826 and array_length(regexp_split_to_array(objects.name, ''/''), 1) = $1 827 order by ' || v_order_by || ') 828 limit $5 829 offset $6' using levels, prefix, search, bucketname, limits, offsets; 830 end; 831 $_$; 832 833 834 ALTER FUNCTION storage.search(prefix text, bucketname text, limits integer, levels integer, offsets integer, search text, sortcolumn text, sortorder text) OWNER TO supabase_storage_admin; 835 836 -- 837 -- Name: update_updated_at_column(); Type: FUNCTION; Schema: storage; Owner: supabase_storage_admin 838 -- 839 840 CREATE OR REPLACE FUNCTION storage.update_updated_at_column() RETURNS trigger 841 LANGUAGE plpgsql 842 AS $$ 843 BEGIN 844 NEW.updated_at = now(); 845 RETURN NEW; 846 END; 847 $$; 848 849 850 ALTER FUNCTION storage.update_updated_at_column() OWNER TO supabase_storage_admin; 851 852 -- 853 -- Name: http_request(); Type: FUNCTION; Schema: supabase_functions; Owner: supabase_functions_admin 854 -- 855 856 CREATE OR REPLACE FUNCTION supabase_functions.http_request() RETURNS trigger 857 LANGUAGE plpgsql SECURITY DEFINER 858 SET search_path TO 'supabase_functions' 859 AS $$ 860 DECLARE 861 request_id bigint; 862 payload jsonb; 863 url text := TG_ARGV[0]::text; 864 method text := TG_ARGV[1]::text; 865 headers jsonb DEFAULT '{}'::jsonb; 866 params jsonb DEFAULT '{}'::jsonb; 867 timeout_ms integer DEFAULT 1000; 868 BEGIN 869 IF url IS NULL OR url = 'null' THEN 870 RAISE EXCEPTION 'url argument is missing'; 871 END IF; 872 873 IF method IS NULL OR method = 'null' THEN 874 RAISE EXCEPTION 'method argument is missing'; 875 END IF; 876 877 IF TG_ARGV[2] IS NULL OR TG_ARGV[2] = 'null' THEN 878 headers = '{"Content-Type": "application/json"}'::jsonb; 879 ELSE 880 headers = TG_ARGV[2]::jsonb; 881 END IF; 882 883 IF TG_ARGV[3] IS NULL OR TG_ARGV[3] = 'null' THEN 884 params = '{}'::jsonb; 885 ELSE 886 params = TG_ARGV[3]::jsonb; 887 END IF; 888 889 IF TG_ARGV[4] IS NULL OR TG_ARGV[4] = 'null' THEN 890 timeout_ms = 1000; 891 ELSE 892 timeout_ms = TG_ARGV[4]::integer; 893 END IF; 894 895 CASE 896 WHEN method = 'GET' THEN 897 SELECT http_get INTO request_id FROM net.http_get( 898 url, 899 params, 900 headers, 901 timeout_ms 902 ); 903 WHEN method = 'POST' THEN 904 payload = jsonb_build_object( 905 'old_record', OLD, 906 'record', NEW, 907 'type', TG_OP, 908 'table', TG_TABLE_NAME, 909 'schema', TG_TABLE_SCHEMA 910 ); 911 912 SELECT http_post INTO request_id FROM net.http_post( 913 url, 914 payload, 915 params, 916 headers, 917 timeout_ms 918 ); 919 ELSE 920 RAISE EXCEPTION 'method argument % is invalid', method; 921 END CASE; 922 923 INSERT INTO supabase_functions.hooks 924 (hook_table_id, hook_name, request_id) 925 VALUES 926 (TG_RELID, TG_NAME, request_id); 927 928 RETURN NEW; 929 END 930 $$; 931 932 933 ALTER FUNCTION supabase_functions.http_request() OWNER TO supabase_functions_admin; 934 935 SET default_tablespace = ''; 936 937 SET default_table_access_method = heap; 938 939 -- 940 -- Name: extensions; Type: TABLE; Schema: _realtime; Owner: postgres 941 -- 942 943 CREATE TABLE IF NOT EXISTS _realtime.extensions ( 944 id uuid NOT NULL, 945 type text, 946 settings jsonb, 947 tenant_external_id text, 948 inserted_at timestamp(0) without time zone NOT NULL, 949 updated_at timestamp(0) without time zone NOT NULL 950 ); 951 952 953 ALTER TABLE _realtime.extensions OWNER TO postgres; 954 955 -- 956 -- Name: schema_migrations; Type: TABLE; Schema: _realtime; Owner: postgres 957 -- 958 959 CREATE TABLE IF NOT EXISTS _realtime.schema_migrations ( 960 version bigint NOT NULL, 961 inserted_at timestamp(0) without time zone 962 ); 963 964 965 ALTER TABLE _realtime.schema_migrations OWNER TO postgres; 966 967 -- 968 -- Name: tenants; Type: TABLE; Schema: _realtime; Owner: postgres 969 -- 970 971 CREATE TABLE IF NOT EXISTS _realtime.tenants ( 972 id uuid NOT NULL, 973 name text, 974 external_id text, 975 jwt_secret text, 976 max_concurrent_users integer DEFAULT 200 NOT NULL, 977 inserted_at timestamp(0) without time zone NOT NULL, 978 updated_at timestamp(0) without time zone NOT NULL, 979 max_events_per_second integer DEFAULT 100 NOT NULL, 980 postgres_cdc_default text DEFAULT 'postgres_cdc_rls'::text, 981 max_bytes_per_second integer DEFAULT 100000 NOT NULL, 982 max_channels_per_client integer DEFAULT 100 NOT NULL, 983 max_joins_per_second integer DEFAULT 500 NOT NULL, 984 suspend boolean DEFAULT false 985 ); 986 987 988 ALTER TABLE _realtime.tenants OWNER TO postgres; 989 990 -- 991 -- Name: audit_log_entries; Type: TABLE; Schema: auth; Owner: supabase_auth_admin 992 -- 993 994 CREATE TABLE IF NOT EXISTS auth.audit_log_entries ( 995 instance_id uuid, 996 id uuid NOT NULL, 997 payload json, 998 created_at timestamp with time zone, 999 ip_address character varying(64) DEFAULT ''::character varying NOT NULL 1000 ); 1001 1002 1003 ALTER TABLE auth.audit_log_entries OWNER TO supabase_auth_admin; 1004 1005 -- 1006 -- Name: TABLE audit_log_entries; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 1007 -- 1008 1009 COMMENT ON TABLE auth.audit_log_entries IS 'Auth: Audit trail for user actions.'; 1010 1011 1012 -- 1013 -- Name: flow_state; Type: TABLE; Schema: auth; Owner: supabase_auth_admin 1014 -- 1015 1016 CREATE TABLE IF NOT EXISTS auth.flow_state ( 1017 id uuid NOT NULL, 1018 user_id uuid, 1019 auth_code text NOT NULL, 1020 code_challenge_method auth.code_challenge_method NOT NULL, 1021 code_challenge text NOT NULL, 1022 provider_type text NOT NULL, 1023 provider_access_token text, 1024 provider_refresh_token text, 1025 created_at timestamp with time zone, 1026 updated_at timestamp with time zone, 1027 authentication_method text NOT NULL 1028 ); 1029 1030 1031 ALTER TABLE auth.flow_state OWNER TO supabase_auth_admin; 1032 1033 -- 1034 -- Name: TABLE flow_state; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 1035 -- 1036 1037 COMMENT ON TABLE auth.flow_state IS 'stores metadata for pkce logins'; 1038 1039 1040 -- 1041 -- Name: identities; Type: TABLE; Schema: auth; Owner: supabase_auth_admin 1042 -- 1043 1044 CREATE TABLE IF NOT EXISTS auth.identities ( 1045 provider_id text NOT NULL, 1046 user_id uuid NOT NULL, 1047 identity_data jsonb NOT NULL, 1048 provider text NOT NULL, 1049 last_sign_in_at timestamp with time zone, 1050 created_at timestamp with time zone, 1051 updated_at timestamp with time zone, 1052 email text GENERATED ALWAYS AS (lower((identity_data ->> 'email'::text))) STORED, 1053 id uuid DEFAULT gen_random_uuid() NOT NULL 1054 ); 1055 1056 1057 ALTER TABLE auth.identities OWNER TO supabase_auth_admin; 1058 1059 -- 1060 -- Name: TABLE identities; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 1061 -- 1062 1063 COMMENT ON TABLE auth.identities IS 'Auth: Stores identities associated to a user.'; 1064 1065 1066 -- 1067 -- Name: COLUMN identities.email; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 1068 -- 1069 1070 COMMENT ON COLUMN auth.identities.email IS 'Auth: Email is a generated column that references the optional email property in the identity_data'; 1071 1072 1073 -- 1074 -- Name: instances; Type: TABLE; Schema: auth; Owner: supabase_auth_admin 1075 -- 1076 1077 CREATE TABLE IF NOT EXISTS auth.instances ( 1078 id uuid NOT NULL, 1079 uuid uuid, 1080 raw_base_config text, 1081 created_at timestamp with time zone, 1082 updated_at timestamp with time zone 1083 ); 1084 1085 1086 ALTER TABLE auth.instances OWNER TO supabase_auth_admin; 1087 1088 -- 1089 -- Name: TABLE instances; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 1090 -- 1091 1092 COMMENT ON TABLE auth.instances IS 'Auth: Manages users across multiple sites.'; 1093 1094 1095 -- 1096 -- Name: mfa_amr_claims; Type: TABLE; Schema: auth; Owner: supabase_auth_admin 1097 -- 1098 1099 CREATE TABLE IF NOT EXISTS auth.mfa_amr_claims ( 1100 session_id uuid NOT NULL, 1101 created_at timestamp with time zone NOT NULL, 1102 updated_at timestamp with time zone NOT NULL, 1103 authentication_method text NOT NULL, 1104 id uuid NOT NULL 1105 ); 1106 1107 1108 ALTER TABLE auth.mfa_amr_claims OWNER TO supabase_auth_admin; 1109 1110 -- 1111 -- Name: TABLE mfa_amr_claims; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 1112 -- 1113 1114 COMMENT ON TABLE auth.mfa_amr_claims IS 'auth: stores authenticator method reference claims for multi factor authentication'; 1115 1116 1117 -- 1118 -- Name: mfa_challenges; Type: TABLE; Schema: auth; Owner: supabase_auth_admin 1119 -- 1120 1121 CREATE TABLE IF NOT EXISTS auth.mfa_challenges ( 1122 id uuid NOT NULL, 1123 factor_id uuid NOT NULL, 1124 created_at timestamp with time zone NOT NULL, 1125 verified_at timestamp with time zone, 1126 ip_address inet NOT NULL 1127 ); 1128 1129 1130 ALTER TABLE auth.mfa_challenges OWNER TO supabase_auth_admin; 1131 1132 -- 1133 -- Name: TABLE mfa_challenges; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 1134 -- 1135 1136 COMMENT ON TABLE auth.mfa_challenges IS 'auth: stores metadata about challenge requests made'; 1137 1138 1139 -- 1140 -- Name: mfa_factors; Type: TABLE; Schema: auth; Owner: supabase_auth_admin 1141 -- 1142 1143 CREATE TABLE IF NOT EXISTS auth.mfa_factors ( 1144 id uuid NOT NULL, 1145 user_id uuid NOT NULL, 1146 friendly_name text, 1147 factor_type auth.factor_type NOT NULL, 1148 status auth.factor_status NOT NULL, 1149 created_at timestamp with time zone NOT NULL, 1150 updated_at timestamp with time zone NOT NULL, 1151 secret text 1152 ); 1153 1154 1155 ALTER TABLE auth.mfa_factors OWNER TO supabase_auth_admin; 1156 1157 -- 1158 -- Name: TABLE mfa_factors; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 1159 -- 1160 1161 COMMENT ON TABLE auth.mfa_factors IS 'auth: stores metadata about factors'; 1162 1163 1164 -- 1165 -- Name: refresh_tokens; Type: TABLE; Schema: auth; Owner: supabase_auth_admin 1166 -- 1167 1168 CREATE TABLE IF NOT EXISTS auth.refresh_tokens ( 1169 instance_id uuid, 1170 id bigint NOT NULL, 1171 token character varying(255), 1172 user_id character varying(255), 1173 revoked boolean, 1174 created_at timestamp with time zone, 1175 updated_at timestamp with time zone, 1176 parent character varying(255), 1177 session_id uuid 1178 ); 1179 1180 1181 ALTER TABLE auth.refresh_tokens OWNER TO supabase_auth_admin; 1182 1183 -- 1184 -- Name: TABLE refresh_tokens; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 1185 -- 1186 1187 COMMENT ON TABLE auth.refresh_tokens IS 'Auth: Store of tokens used to refresh JWT tokens once they expire.'; 1188 1189 1190 -- 1191 -- Name: refresh_tokens_id_seq; Type: SEQUENCE; Schema: auth; Owner: supabase_auth_admin 1192 -- 1193 1194 CREATE SEQUENCE IF NOT EXISTS auth.refresh_tokens_id_seq 1195 START WITH 1 1196 INCREMENT BY 1 1197 NO MINVALUE 1198 NO MAXVALUE 1199 CACHE 1; 1200 1201 1202 ALTER TABLE auth.refresh_tokens_id_seq OWNER TO supabase_auth_admin; 1203 1204 -- 1205 -- Name: refresh_tokens_id_seq; Type: SEQUENCE OWNED BY; Schema: auth; Owner: supabase_auth_admin 1206 -- 1207 1208 ALTER SEQUENCE auth.refresh_tokens_id_seq OWNED BY auth.refresh_tokens.id; 1209 1210 1211 -- 1212 -- Name: saml_providers; Type: TABLE; Schema: auth; Owner: supabase_auth_admin 1213 -- 1214 1215 CREATE TABLE IF NOT EXISTS auth.saml_providers ( 1216 id uuid NOT NULL, 1217 sso_provider_id uuid NOT NULL, 1218 entity_id text NOT NULL, 1219 metadata_xml text NOT NULL, 1220 metadata_url text, 1221 attribute_mapping jsonb, 1222 created_at timestamp with time zone, 1223 updated_at timestamp with time zone, 1224 CONSTRAINT "entity_id not empty" CHECK ((char_length(entity_id) > 0)), 1225 CONSTRAINT "metadata_url not empty" CHECK (((metadata_url = NULL::text) OR (char_length(metadata_url) > 0))), 1226 CONSTRAINT "metadata_xml not empty" CHECK ((char_length(metadata_xml) > 0)) 1227 ); 1228 1229 1230 ALTER TABLE auth.saml_providers OWNER TO supabase_auth_admin; 1231 1232 -- 1233 -- Name: TABLE saml_providers; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 1234 -- 1235 1236 COMMENT ON TABLE auth.saml_providers IS 'Auth: Manages SAML Identity Provider connections.'; 1237 1238 1239 -- 1240 -- Name: saml_relay_states; Type: TABLE; Schema: auth; Owner: supabase_auth_admin 1241 -- 1242 1243 CREATE TABLE IF NOT EXISTS auth.saml_relay_states ( 1244 id uuid NOT NULL, 1245 sso_provider_id uuid NOT NULL, 1246 request_id text NOT NULL, 1247 for_email text, 1248 redirect_to text, 1249 from_ip_address inet, 1250 created_at timestamp with time zone, 1251 updated_at timestamp with time zone, 1252 flow_state_id uuid, 1253 CONSTRAINT "request_id not empty" CHECK ((char_length(request_id) > 0)) 1254 ); 1255 1256 1257 ALTER TABLE auth.saml_relay_states OWNER TO supabase_auth_admin; 1258 1259 -- 1260 -- Name: TABLE saml_relay_states; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 1261 -- 1262 1263 COMMENT ON TABLE auth.saml_relay_states IS 'Auth: Contains SAML Relay State information for each Service Provider initiated login.'; 1264 1265 1266 -- 1267 -- Name: schema_migrations; Type: TABLE; Schema: auth; Owner: supabase_auth_admin 1268 -- 1269 1270 CREATE TABLE IF NOT EXISTS auth.schema_migrations ( 1271 version character varying(255) NOT NULL 1272 ); 1273 1274 1275 ALTER TABLE auth.schema_migrations OWNER TO supabase_auth_admin; 1276 1277 -- 1278 -- Name: TABLE schema_migrations; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 1279 -- 1280 1281 COMMENT ON TABLE auth.schema_migrations IS 'Auth: Manages updates to the auth system.'; 1282 1283 1284 -- 1285 -- Name: sessions; Type: TABLE; Schema: auth; Owner: supabase_auth_admin 1286 -- 1287 1288 CREATE TABLE IF NOT EXISTS auth.sessions ( 1289 id uuid NOT NULL, 1290 user_id uuid NOT NULL, 1291 created_at timestamp with time zone, 1292 updated_at timestamp with time zone, 1293 factor_id uuid, 1294 aal auth.aal_level, 1295 not_after timestamp with time zone, 1296 refreshed_at timestamp without time zone, 1297 user_agent text, 1298 ip inet, 1299 tag text 1300 ); 1301 1302 1303 ALTER TABLE auth.sessions OWNER TO supabase_auth_admin; 1304 1305 -- 1306 -- Name: TABLE sessions; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 1307 -- 1308 1309 COMMENT ON TABLE auth.sessions IS 'Auth: Stores session data associated to a user.'; 1310 1311 1312 -- 1313 -- Name: COLUMN sessions.not_after; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 1314 -- 1315 1316 COMMENT ON COLUMN auth.sessions.not_after IS 'Auth: Not after is a nullable column that contains a timestamp after which the session should be regarded as expired.'; 1317 1318 1319 -- 1320 -- Name: sso_domains; Type: TABLE; Schema: auth; Owner: supabase_auth_admin 1321 -- 1322 1323 CREATE TABLE IF NOT EXISTS auth.sso_domains ( 1324 id uuid NOT NULL, 1325 sso_provider_id uuid NOT NULL, 1326 domain text NOT NULL, 1327 created_at timestamp with time zone, 1328 updated_at timestamp with time zone, 1329 CONSTRAINT "domain not empty" CHECK ((char_length(domain) > 0)) 1330 ); 1331 1332 1333 ALTER TABLE auth.sso_domains OWNER TO supabase_auth_admin; 1334 1335 -- 1336 -- Name: TABLE sso_domains; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 1337 -- 1338 1339 COMMENT ON TABLE auth.sso_domains IS 'Auth: Manages SSO email address domain mapping to an SSO Identity Provider.'; 1340 1341 1342 -- 1343 -- Name: sso_providers; Type: TABLE; Schema: auth; Owner: supabase_auth_admin 1344 -- 1345 1346 CREATE TABLE IF NOT EXISTS auth.sso_providers ( 1347 id uuid NOT NULL, 1348 resource_id text, 1349 created_at timestamp with time zone, 1350 updated_at timestamp with time zone, 1351 CONSTRAINT "resource_id not empty" CHECK (((resource_id = NULL::text) OR (char_length(resource_id) > 0))) 1352 ); 1353 1354 1355 ALTER TABLE auth.sso_providers OWNER TO supabase_auth_admin; 1356 1357 -- 1358 -- Name: TABLE sso_providers; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 1359 -- 1360 1361 COMMENT ON TABLE auth.sso_providers IS 'Auth: Manages SSO identity provider information; see saml_providers for SAML.'; 1362 1363 1364 -- 1365 -- Name: COLUMN sso_providers.resource_id; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 1366 -- 1367 1368 COMMENT ON COLUMN auth.sso_providers.resource_id IS 'Auth: Uniquely identifies a SSO provider according to a user-chosen resource ID (case insensitive), useful in infrastructure as code.'; 1369 1370 1371 -- 1372 -- Name: users; Type: TABLE; Schema: auth; Owner: supabase_auth_admin 1373 -- 1374 1375 CREATE TABLE IF NOT EXISTS auth.users ( 1376 instance_id uuid, 1377 id uuid NOT NULL, 1378 aud character varying(255), 1379 role character varying(255), 1380 email character varying(255), 1381 encrypted_password character varying(255), 1382 email_confirmed_at timestamp with time zone, 1383 invited_at timestamp with time zone, 1384 confirmation_token character varying(255), 1385 confirmation_sent_at timestamp with time zone, 1386 recovery_token character varying(255), 1387 recovery_sent_at timestamp with time zone, 1388 email_change_token_new character varying(255), 1389 email_change character varying(255), 1390 email_change_sent_at timestamp with time zone, 1391 last_sign_in_at timestamp with time zone, 1392 raw_app_meta_data jsonb, 1393 raw_user_meta_data jsonb, 1394 is_super_admin boolean, 1395 created_at timestamp with time zone, 1396 updated_at timestamp with time zone, 1397 phone text DEFAULT NULL::character varying, 1398 phone_confirmed_at timestamp with time zone, 1399 phone_change text DEFAULT ''::character varying, 1400 phone_change_token character varying(255) DEFAULT ''::character varying, 1401 phone_change_sent_at timestamp with time zone, 1402 confirmed_at timestamp with time zone GENERATED ALWAYS AS (LEAST(email_confirmed_at, phone_confirmed_at)) STORED, 1403 email_change_token_current character varying(255) DEFAULT ''::character varying, 1404 email_change_confirm_status smallint DEFAULT 0, 1405 banned_until timestamp with time zone, 1406 reauthentication_token character varying(255) DEFAULT ''::character varying, 1407 reauthentication_sent_at timestamp with time zone, 1408 is_sso_user boolean DEFAULT false NOT NULL, 1409 deleted_at timestamp with time zone, 1410 CONSTRAINT users_email_change_confirm_status_check CHECK (((email_change_confirm_status >= 0) AND (email_change_confirm_status <= 2))) 1411 ); 1412 1413 1414 ALTER TABLE auth.users OWNER TO supabase_auth_admin; 1415 1416 -- 1417 -- Name: TABLE users; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 1418 -- 1419 1420 COMMENT ON TABLE auth.users IS 'Auth: Stores user login data within a secure schema.'; 1421 1422 1423 -- 1424 -- Name: COLUMN users.is_sso_user; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 1425 -- 1426 1427 COMMENT ON COLUMN auth.users.is_sso_user IS 'Auth: Set this column to true when the account comes from SSO. These accounts can have duplicate emails.'; 1428 1429 1430 -- 1431 -- Name: buckets; Type: TABLE; Schema: storage; Owner: supabase_storage_admin 1432 -- 1433 1434 CREATE TABLE IF NOT EXISTS storage.buckets ( 1435 id text NOT NULL, 1436 name text NOT NULL, 1437 owner uuid, 1438 created_at timestamp with time zone DEFAULT now(), 1439 updated_at timestamp with time zone DEFAULT now(), 1440 public boolean DEFAULT false, 1441 avif_autodetection boolean DEFAULT false, 1442 file_size_limit bigint, 1443 allowed_mime_types text[], 1444 owner_id text 1445 ); 1446 1447 1448 ALTER TABLE storage.buckets OWNER TO supabase_storage_admin; 1449 1450 -- 1451 -- Name: COLUMN buckets.owner; Type: COMMENT; Schema: storage; Owner: supabase_storage_admin 1452 -- 1453 1454 COMMENT ON COLUMN storage.buckets.owner IS 'Field is deprecated, use owner_id instead'; 1455 1456 1457 -- 1458 -- Name: migrations; Type: TABLE; Schema: storage; Owner: supabase_storage_admin 1459 -- 1460 1461 CREATE TABLE IF NOT EXISTS storage.migrations ( 1462 id integer NOT NULL, 1463 name character varying(100) NOT NULL, 1464 hash character varying(40) NOT NULL, 1465 executed_at timestamp without time zone DEFAULT CURRENT_TIMESTAMP 1466 ); 1467 1468 1469 ALTER TABLE storage.migrations OWNER TO supabase_storage_admin; 1470 1471 -- 1472 -- Name: objects; Type: TABLE; Schema: storage; Owner: supabase_storage_admin 1473 -- 1474 1475 CREATE TABLE IF NOT EXISTS storage.objects ( 1476 id uuid DEFAULT extensions.uuid_generate_v4() NOT NULL, 1477 bucket_id text, 1478 name text, 1479 owner uuid, 1480 created_at timestamp with time zone DEFAULT now(), 1481 updated_at timestamp with time zone DEFAULT now(), 1482 last_accessed_at timestamp with time zone DEFAULT now(), 1483 metadata jsonb, 1484 path_tokens text[] GENERATED ALWAYS AS (string_to_array(name, '/'::text)) STORED, 1485 version text, 1486 owner_id text 1487 ); 1488 1489 1490 ALTER TABLE storage.objects OWNER TO supabase_storage_admin; 1491 1492 -- 1493 -- Name: COLUMN objects.owner; Type: COMMENT; Schema: storage; Owner: supabase_storage_admin 1494 -- 1495 1496 COMMENT ON COLUMN storage.objects.owner IS 'Field is deprecated, use owner_id instead'; 1497 1498 1499 -- 1500 -- Name: hooks; Type: TABLE; Schema: supabase_functions; Owner: supabase_functions_admin 1501 -- 1502 1503 CREATE TABLE IF NOT EXISTS supabase_functions.hooks ( 1504 id bigint NOT NULL, 1505 hook_table_id integer NOT NULL, 1506 hook_name text NOT NULL, 1507 created_at timestamp with time zone DEFAULT now() NOT NULL, 1508 request_id bigint 1509 ); 1510 1511 1512 ALTER TABLE supabase_functions.hooks OWNER TO supabase_functions_admin; 1513 1514 -- 1515 -- Name: TABLE hooks; Type: COMMENT; Schema: supabase_functions; Owner: supabase_functions_admin 1516 -- 1517 1518 COMMENT ON TABLE supabase_functions.hooks IS 'Supabase Functions Hooks: Audit trail for triggered hooks.'; 1519 1520 1521 -- 1522 -- Name: hooks_id_seq; Type: SEQUENCE; Schema: supabase_functions; Owner: supabase_functions_admin 1523 -- 1524 1525 CREATE SEQUENCE IF NOT EXISTS supabase_functions.hooks_id_seq 1526 START WITH 1 1527 INCREMENT BY 1 1528 NO MINVALUE 1529 NO MAXVALUE 1530 CACHE 1; 1531 1532 1533 ALTER TABLE supabase_functions.hooks_id_seq OWNER TO supabase_functions_admin; 1534 1535 -- 1536 -- Name: hooks_id_seq; Type: SEQUENCE OWNED BY; Schema: supabase_functions; Owner: supabase_functions_admin 1537 -- 1538 1539 ALTER SEQUENCE supabase_functions.hooks_id_seq OWNED BY supabase_functions.hooks.id; 1540 1541 1542 -- 1543 -- Name: migrations; Type: TABLE; Schema: supabase_functions; Owner: supabase_functions_admin 1544 -- 1545 1546 CREATE TABLE IF NOT EXISTS supabase_functions.migrations ( 1547 version text NOT NULL, 1548 inserted_at timestamp with time zone DEFAULT now() NOT NULL 1549 ); 1550 1551 1552 ALTER TABLE supabase_functions.migrations OWNER TO supabase_functions_admin; 1553 1554 -- 1555 -- Name: refresh_tokens id; Type: DEFAULT; Schema: auth; Owner: supabase_auth_admin 1556 -- 1557 1558 ALTER TABLE ONLY auth.refresh_tokens ALTER COLUMN id SET DEFAULT nextval('auth.refresh_tokens_id_seq'::regclass); 1559 1560 1561 -- 1562 -- Name: hooks id; Type: DEFAULT; Schema: supabase_functions; Owner: supabase_functions_admin 1563 -- 1564 1565 ALTER TABLE ONLY supabase_functions.hooks ALTER COLUMN id SET DEFAULT nextval('supabase_functions.hooks_id_seq'::regclass); 1566 1567 1568 -- 1569 -- Data for Name: extensions; Type: TABLE DATA; Schema: _realtime; Owner: postgres 1570 -- 1571 1572 INSERT INTO _realtime.extensions (id, type, settings, tenant_external_id, inserted_at, updated_at) VALUES ('832b3aeb-9d7f-41aa-ad31-60ea054c294f', 'postgres_cdc_rls', '{"region": "us-east-1", "db_host": "ABK7kBu27y/PVdL10i/b+A==", "db_name": "sWBpZNdjggEPTQVlI52Zfw==", "db_port": "+enMDFi1J/3IrrquHHwUmA==", "db_user": "uxbEq/zz8DXVD53TOI1zmw==", "slot_name": "supabase_realtime_replication_slot", "ip_version": 4, "db_password": "sWBpZNdjggEPTQVlI52Zfw==", "publication": "supabase_realtime", "ssl_enforced": false, "poll_interval_ms": 100, "poll_max_changes": 100, "poll_max_record_bytes": 1048576}', 'realtime-dev', '2023-11-20 22:04:38', '2023-11-20 22:04:38'); 1573 1574 1575 -- 1576 -- Data for Name: schema_migrations; Type: TABLE DATA; Schema: _realtime; Owner: postgres 1577 -- 1578 1579 INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20210706140551, '2023-03-16 02:25:35'); 1580 INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20220329161857, '2023-03-16 02:25:35'); 1581 INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20220410212326, '2023-03-16 02:25:35'); 1582 INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20220506102948, '2023-03-16 02:25:35'); 1583 INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20220527210857, '2023-03-16 02:25:36'); 1584 INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20220815211129, '2023-03-16 02:25:36'); 1585 INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20220815215024, '2023-03-16 02:25:36'); 1586 INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20220818141501, '2023-03-16 02:25:36'); 1587 INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20221018173709, '2023-03-16 02:25:36'); 1588 INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20221102172703, '2023-03-16 02:25:36'); 1589 INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20221223010058, '2023-03-16 02:25:36'); 1590 INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20230110180046, '2023-03-16 02:25:36'); 1591 INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20230810220907, '2023-11-20 21:54:23'); 1592 INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20230810220924, '2023-11-20 21:54:23'); 1593 INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20231024094642, '2023-11-20 21:54:23'); 1594 1595 1596 -- 1597 -- Data for Name: tenants; Type: TABLE DATA; Schema: _realtime; Owner: postgres 1598 -- 1599 1600 INSERT INTO _realtime.tenants (id, name, external_id, jwt_secret, max_concurrent_users, inserted_at, updated_at, max_events_per_second, postgres_cdc_default, max_bytes_per_second, max_channels_per_client, max_joins_per_second, suspend) VALUES ('f418662c-07b5-4160-9338-4db7fbaaabbd', 'realtime-dev', 'realtime-dev', 'iNjicxc4+llvc9wovDvqymwfnj9teWMlyOIbJ8Fh6j2WNU8CIJ2ZgjR6MUIKqSmeDmvpsKLsZ9jgXJmQPpwL8w==', 200, '2023-11-20 22:04:38', '2023-11-20 22:04:38', 100, 'postgres_cdc_rls', 100000, 100, 100, false); 1601 1602 1603 -- 1604 -- Data for Name: audit_log_entries; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin 1605 -- 1606 1607 1608 1609 -- 1610 -- Data for Name: flow_state; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin 1611 -- 1612 1613 1614 1615 -- 1616 -- Data for Name: identities; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin 1617 -- 1618 1619 1620 1621 -- 1622 -- Data for Name: instances; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin 1623 -- 1624 1625 1626 1627 -- 1628 -- Data for Name: mfa_amr_claims; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin 1629 -- 1630 1631 1632 1633 -- 1634 -- Data for Name: mfa_challenges; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin 1635 -- 1636 1637 1638 1639 -- 1640 -- Data for Name: mfa_factors; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin 1641 -- 1642 1643 1644 1645 -- 1646 -- Data for Name: refresh_tokens; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin 1647 -- 1648 1649 1650 1651 -- 1652 -- Data for Name: saml_providers; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin 1653 -- 1654 1655 1656 1657 -- 1658 -- Data for Name: saml_relay_states; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin 1659 -- 1660 1661 1662 1663 -- 1664 -- Data for Name: schema_migrations; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin 1665 -- 1666 1667 INSERT INTO auth.schema_migrations (version) VALUES ('20171026211738'); 1668 INSERT INTO auth.schema_migrations (version) VALUES ('20171026211808'); 1669 INSERT INTO auth.schema_migrations (version) VALUES ('20171026211834'); 1670 INSERT INTO auth.schema_migrations (version) VALUES ('20180103212743'); 1671 INSERT INTO auth.schema_migrations (version) VALUES ('20180108183307'); 1672 INSERT INTO auth.schema_migrations (version) VALUES ('20180119214651'); 1673 INSERT INTO auth.schema_migrations (version) VALUES ('20180125194653'); 1674 INSERT INTO auth.schema_migrations (version) VALUES ('00'); 1675 INSERT INTO auth.schema_migrations (version) VALUES ('20210710035447'); 1676 INSERT INTO auth.schema_migrations (version) VALUES ('20210722035447'); 1677 INSERT INTO auth.schema_migrations (version) VALUES ('20210730183235'); 1678 INSERT INTO auth.schema_migrations (version) VALUES ('20210909172000'); 1679 INSERT INTO auth.schema_migrations (version) VALUES ('20210927181326'); 1680 INSERT INTO auth.schema_migrations (version) VALUES ('20211122151130'); 1681 INSERT INTO auth.schema_migrations (version) VALUES ('20211124214934'); 1682 INSERT INTO auth.schema_migrations (version) VALUES ('20211202183645'); 1683 INSERT INTO auth.schema_migrations (version) VALUES ('20220114185221'); 1684 INSERT INTO auth.schema_migrations (version) VALUES ('20220114185340'); 1685 INSERT INTO auth.schema_migrations (version) VALUES ('20220224000811'); 1686 INSERT INTO auth.schema_migrations (version) VALUES ('20220323170000'); 1687 INSERT INTO auth.schema_migrations (version) VALUES ('20220429102000'); 1688 INSERT INTO auth.schema_migrations (version) VALUES ('20220531120530'); 1689 INSERT INTO auth.schema_migrations (version) VALUES ('20220614074223'); 1690 INSERT INTO auth.schema_migrations (version) VALUES ('20220811173540'); 1691 INSERT INTO auth.schema_migrations (version) VALUES ('20221003041349'); 1692 INSERT INTO auth.schema_migrations (version) VALUES ('20221003041400'); 1693 INSERT INTO auth.schema_migrations (version) VALUES ('20221011041400'); 1694 INSERT INTO auth.schema_migrations (version) VALUES ('20221020193600'); 1695 INSERT INTO auth.schema_migrations (version) VALUES ('20221021073300'); 1696 INSERT INTO auth.schema_migrations (version) VALUES ('20221021082433'); 1697 INSERT INTO auth.schema_migrations (version) VALUES ('20221027105023'); 1698 INSERT INTO auth.schema_migrations (version) VALUES ('20221114143122'); 1699 INSERT INTO auth.schema_migrations (version) VALUES ('20221114143410'); 1700 INSERT INTO auth.schema_migrations (version) VALUES ('20221125140132'); 1701 INSERT INTO auth.schema_migrations (version) VALUES ('20221208132122'); 1702 INSERT INTO auth.schema_migrations (version) VALUES ('20221215195500'); 1703 INSERT INTO auth.schema_migrations (version) VALUES ('20221215195800'); 1704 INSERT INTO auth.schema_migrations (version) VALUES ('20221215195900'); 1705 INSERT INTO auth.schema_migrations (version) VALUES ('20230116124310'); 1706 INSERT INTO auth.schema_migrations (version) VALUES ('20230116124412'); 1707 INSERT INTO auth.schema_migrations (version) VALUES ('20230131181311'); 1708 INSERT INTO auth.schema_migrations (version) VALUES ('20230322519590'); 1709 INSERT INTO auth.schema_migrations (version) VALUES ('20230402418590'); 1710 INSERT INTO auth.schema_migrations (version) VALUES ('20230411005111'); 1711 INSERT INTO auth.schema_migrations (version) VALUES ('20230508135423'); 1712 INSERT INTO auth.schema_migrations (version) VALUES ('20230523124323'); 1713 INSERT INTO auth.schema_migrations (version) VALUES ('20230818113222'); 1714 INSERT INTO auth.schema_migrations (version) VALUES ('20230914180801'); 1715 INSERT INTO auth.schema_migrations (version) VALUES ('20231027141322'); 1716 INSERT INTO auth.schema_migrations (version) VALUES ('20231114161723'); 1717 INSERT INTO auth.schema_migrations (version) VALUES ('20231117164230'); 1718 1719 1720 -- 1721 -- Data for Name: sessions; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin 1722 -- 1723 1724 1725 1726 -- 1727 -- Data for Name: sso_domains; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin 1728 -- 1729 1730 1731 1732 -- 1733 -- Data for Name: sso_providers; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin 1734 -- 1735 1736 1737 1738 -- 1739 -- Data for Name: users; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin 1740 -- 1741 1742 1743 1744 -- 1745 -- Data for Name: buckets; Type: TABLE DATA; Schema: storage; Owner: supabase_storage_admin 1746 -- 1747 1748 1749 1750 -- 1751 -- Data for Name: migrations; Type: TABLE DATA; Schema: storage; Owner: supabase_storage_admin 1752 -- 1753 1754 INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (0, 'create-migrations-table', 'e18db593bcde2aca2a408c4d1100f6abba2195df', '2023-03-16 02:25:37.548482'); 1755 INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (1, 'initialmigration', '6ab16121fbaa08bbd11b712d05f358f9b555d777', '2023-03-16 02:25:37.55595'); 1756 INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (2, 'pathtoken-column', '49756be03be4c17bb85fe70d4a861f27de7e49ad', '2023-03-16 02:25:37.560258'); 1757 INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (3, 'add-migrations-rls', 'bb5d124c53d68635a883e399426c6a5a25fc893d', '2023-03-16 02:25:37.594153'); 1758 INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (4, 'add-size-functions', '6d79007d04f5acd288c9c250c42d2d5fd286c54d', '2023-03-16 02:25:37.599194'); 1759 INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (5, 'change-column-name-in-get-size', 'fd65688505d2ffa9fbdc58a944348dd8604d688c', '2023-03-16 02:25:37.604658'); 1760 INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (6, 'add-rls-to-buckets', '63e2bab75a2040fee8e3fb3f15a0d26f3380e9b6', '2023-03-16 02:25:37.609563'); 1761 INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (7, 'add-public-to-buckets', '82568934f8a4d9e0a85f126f6fb483ad8214c418', '2023-03-16 02:25:37.615929'); 1762 INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (8, 'fix-search-function', '1a43a40eddb525f2e2f26efd709e6c06e58e059c', '2023-03-16 02:25:37.620171'); 1763 INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (9, 'search-files-search-function', '34c096597eb8b9d077fdfdde9878c88501b2fafc', '2023-03-16 02:25:37.624484'); 1764 INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (10, 'add-trigger-to-auto-update-updated_at-column', '37d6bb964a70a822e6d37f22f457b9bca7885928', '2023-03-16 02:25:37.629534'); 1765 INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (11, 'add-automatic-avif-detection-flag', 'bd76c53a9c564c80d98d119c1b3a28e16c8152db', '2023-03-16 02:25:37.634022'); 1766 INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (12, 'add-bucket-custom-limits', 'cbe0a4c32a0e891554a21020433b7a4423c07ee7', '2023-03-16 02:25:37.639132'); 1767 INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (13, 'use-bytes-for-max-size', '7a158ebce8a0c2801c9c65b7e9b2f98f68b3874e', '2023-03-16 02:25:37.643598'); 1768 INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (14, 'add-can-insert-object-function', '273193826bca7e0990b458d1ba72f8aa27c0d825', '2023-04-06 09:18:55.232202'); 1769 INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (15, 'add-version', 'e821a779d26612899b8c2dfe20245f904a327c4f', '2023-04-06 09:18:55.239444'); 1770 INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (16, 'drop-owner-foreign-key', '536b33f8878eed09d0144219777dcac96bdb25da', '2023-11-20 21:54:33.540386'); 1771 INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (17, 'add_owner_id_column_deprecate_owner', '7545f216a39358b5487df75d941d05dbcd75eb46', '2023-11-20 22:04:38.959686'); 1772 1773 1774 -- 1775 -- Data for Name: objects; Type: TABLE DATA; Schema: storage; Owner: supabase_storage_admin 1776 -- 1777 1778 1779 1780 -- 1781 -- Data for Name: hooks; Type: TABLE DATA; Schema: supabase_functions; Owner: supabase_functions_admin 1782 -- 1783 1784 1785 1786 -- 1787 -- Data for Name: migrations; Type: TABLE DATA; Schema: supabase_functions; Owner: supabase_functions_admin 1788 -- 1789 1790 INSERT INTO supabase_functions.migrations (version, inserted_at) VALUES ('initial', '2023-03-16 02:25:30.966697+00'); 1791 INSERT INTO supabase_functions.migrations (version, inserted_at) VALUES ('20210809183423_update_grants', '2023-03-16 02:25:30.966697+00'); 1792 1793 1794 -- 1795 -- Name: refresh_tokens_id_seq; Type: SEQUENCE SET; Schema: auth; Owner: supabase_auth_admin 1796 -- 1797 1798 SELECT pg_catalog.setval('auth.refresh_tokens_id_seq', 1, false); 1799 1800 1801 -- 1802 -- Name: hooks_id_seq; Type: SEQUENCE SET; Schema: supabase_functions; Owner: supabase_functions_admin 1803 -- 1804 1805 SELECT pg_catalog.setval('supabase_functions.hooks_id_seq', 1, false); 1806 1807 1808 -- 1809 -- Name: extensions extensions_pkey; Type: CONSTRAINT; Schema: _realtime; Owner: postgres 1810 -- 1811 1812 ALTER TABLE ONLY _realtime.extensions 1813 ADD CONSTRAINT extensions_pkey PRIMARY KEY (id); 1814 1815 1816 -- 1817 -- Name: schema_migrations schema_migrations_pkey; Type: CONSTRAINT; Schema: _realtime; Owner: postgres 1818 -- 1819 1820 ALTER TABLE ONLY _realtime.schema_migrations 1821 ADD CONSTRAINT schema_migrations_pkey PRIMARY KEY (version); 1822 1823 1824 -- 1825 -- Name: tenants tenants_pkey; Type: CONSTRAINT; Schema: _realtime; Owner: postgres 1826 -- 1827 1828 ALTER TABLE ONLY _realtime.tenants 1829 ADD CONSTRAINT tenants_pkey PRIMARY KEY (id); 1830 1831 1832 -- 1833 -- Name: mfa_amr_claims amr_id_pk; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1834 -- 1835 1836 ALTER TABLE ONLY auth.mfa_amr_claims 1837 ADD CONSTRAINT amr_id_pk PRIMARY KEY (id); 1838 1839 1840 -- 1841 -- Name: audit_log_entries audit_log_entries_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1842 -- 1843 1844 ALTER TABLE ONLY auth.audit_log_entries 1845 ADD CONSTRAINT audit_log_entries_pkey PRIMARY KEY (id); 1846 1847 1848 -- 1849 -- Name: flow_state flow_state_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1850 -- 1851 1852 ALTER TABLE ONLY auth.flow_state 1853 ADD CONSTRAINT flow_state_pkey PRIMARY KEY (id); 1854 1855 1856 -- 1857 -- Name: identities identities_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1858 -- 1859 1860 ALTER TABLE ONLY auth.identities 1861 ADD CONSTRAINT identities_pkey PRIMARY KEY (id); 1862 1863 1864 -- 1865 -- Name: identities identities_provider_id_provider_unique; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1866 -- 1867 1868 ALTER TABLE ONLY auth.identities 1869 ADD CONSTRAINT identities_provider_id_provider_unique UNIQUE (provider_id, provider); 1870 1871 1872 -- 1873 -- Name: instances instances_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1874 -- 1875 1876 ALTER TABLE ONLY auth.instances 1877 ADD CONSTRAINT instances_pkey PRIMARY KEY (id); 1878 1879 1880 -- 1881 -- Name: mfa_amr_claims mfa_amr_claims_session_id_authentication_method_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1882 -- 1883 1884 ALTER TABLE ONLY auth.mfa_amr_claims 1885 ADD CONSTRAINT mfa_amr_claims_session_id_authentication_method_pkey UNIQUE (session_id, authentication_method); 1886 1887 1888 -- 1889 -- Name: mfa_challenges mfa_challenges_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1890 -- 1891 1892 ALTER TABLE ONLY auth.mfa_challenges 1893 ADD CONSTRAINT mfa_challenges_pkey PRIMARY KEY (id); 1894 1895 1896 -- 1897 -- Name: mfa_factors mfa_factors_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1898 -- 1899 1900 ALTER TABLE ONLY auth.mfa_factors 1901 ADD CONSTRAINT mfa_factors_pkey PRIMARY KEY (id); 1902 1903 1904 -- 1905 -- Name: refresh_tokens refresh_tokens_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1906 -- 1907 1908 ALTER TABLE ONLY auth.refresh_tokens 1909 ADD CONSTRAINT refresh_tokens_pkey PRIMARY KEY (id); 1910 1911 1912 -- 1913 -- Name: refresh_tokens refresh_tokens_token_unique; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1914 -- 1915 1916 ALTER TABLE ONLY auth.refresh_tokens 1917 ADD CONSTRAINT refresh_tokens_token_unique UNIQUE (token); 1918 1919 1920 -- 1921 -- Name: saml_providers saml_providers_entity_id_key; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1922 -- 1923 1924 ALTER TABLE ONLY auth.saml_providers 1925 ADD CONSTRAINT saml_providers_entity_id_key UNIQUE (entity_id); 1926 1927 1928 -- 1929 -- Name: saml_providers saml_providers_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1930 -- 1931 1932 ALTER TABLE ONLY auth.saml_providers 1933 ADD CONSTRAINT saml_providers_pkey PRIMARY KEY (id); 1934 1935 1936 -- 1937 -- Name: saml_relay_states saml_relay_states_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1938 -- 1939 1940 ALTER TABLE ONLY auth.saml_relay_states 1941 ADD CONSTRAINT saml_relay_states_pkey PRIMARY KEY (id); 1942 1943 1944 -- 1945 -- Name: schema_migrations schema_migrations_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1946 -- 1947 1948 ALTER TABLE ONLY auth.schema_migrations 1949 ADD CONSTRAINT schema_migrations_pkey PRIMARY KEY (version); 1950 1951 1952 -- 1953 -- Name: sessions sessions_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1954 -- 1955 1956 ALTER TABLE ONLY auth.sessions 1957 ADD CONSTRAINT sessions_pkey PRIMARY KEY (id); 1958 1959 1960 -- 1961 -- Name: sso_domains sso_domains_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1962 -- 1963 1964 ALTER TABLE ONLY auth.sso_domains 1965 ADD CONSTRAINT sso_domains_pkey PRIMARY KEY (id); 1966 1967 1968 -- 1969 -- Name: sso_providers sso_providers_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1970 -- 1971 1972 ALTER TABLE ONLY auth.sso_providers 1973 ADD CONSTRAINT sso_providers_pkey PRIMARY KEY (id); 1974 1975 1976 -- 1977 -- Name: users users_phone_key; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1978 -- 1979 1980 ALTER TABLE ONLY auth.users 1981 ADD CONSTRAINT users_phone_key UNIQUE (phone); 1982 1983 1984 -- 1985 -- Name: users users_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1986 -- 1987 1988 ALTER TABLE ONLY auth.users 1989 ADD CONSTRAINT users_pkey PRIMARY KEY (id); 1990 1991 1992 -- 1993 -- Name: buckets buckets_pkey; Type: CONSTRAINT; Schema: storage; Owner: supabase_storage_admin 1994 -- 1995 1996 ALTER TABLE ONLY storage.buckets 1997 ADD CONSTRAINT buckets_pkey PRIMARY KEY (id); 1998 1999 2000 -- 2001 -- Name: migrations migrations_name_key; Type: CONSTRAINT; Schema: storage; Owner: supabase_storage_admin 2002 -- 2003 2004 ALTER TABLE ONLY storage.migrations 2005 ADD CONSTRAINT migrations_name_key UNIQUE (name); 2006 2007 2008 -- 2009 -- Name: migrations migrations_pkey; Type: CONSTRAINT; Schema: storage; Owner: supabase_storage_admin 2010 -- 2011 2012 ALTER TABLE ONLY storage.migrations 2013 ADD CONSTRAINT migrations_pkey PRIMARY KEY (id); 2014 2015 2016 -- 2017 -- Name: objects objects_pkey; Type: CONSTRAINT; Schema: storage; Owner: supabase_storage_admin 2018 -- 2019 2020 ALTER TABLE ONLY storage.objects 2021 ADD CONSTRAINT objects_pkey PRIMARY KEY (id); 2022 2023 2024 -- 2025 -- Name: hooks hooks_pkey; Type: CONSTRAINT; Schema: supabase_functions; Owner: supabase_functions_admin 2026 -- 2027 2028 ALTER TABLE ONLY supabase_functions.hooks 2029 ADD CONSTRAINT hooks_pkey PRIMARY KEY (id); 2030 2031 2032 -- 2033 -- Name: migrations migrations_pkey; Type: CONSTRAINT; Schema: supabase_functions; Owner: supabase_functions_admin 2034 -- 2035 2036 ALTER TABLE ONLY supabase_functions.migrations 2037 ADD CONSTRAINT migrations_pkey PRIMARY KEY (version); 2038 2039 2040 -- 2041 -- Name: extensions_tenant_external_id_type_index; Type: INDEX; Schema: _realtime; Owner: postgres 2042 -- 2043 2044 CREATE UNIQUE INDEX extensions_tenant_external_id_type_index ON _realtime.extensions USING btree (tenant_external_id, type); 2045 2046 2047 -- 2048 -- Name: tenants_external_id_index; Type: INDEX; Schema: _realtime; Owner: postgres 2049 -- 2050 2051 CREATE UNIQUE INDEX tenants_external_id_index ON _realtime.tenants USING btree (external_id); 2052 2053 2054 -- 2055 -- Name: audit_logs_instance_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 2056 -- 2057 2058 CREATE INDEX audit_logs_instance_id_idx ON auth.audit_log_entries USING btree (instance_id); 2059 2060 2061 -- 2062 -- Name: confirmation_token_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 2063 -- 2064 2065 CREATE UNIQUE INDEX confirmation_token_idx ON auth.users USING btree (confirmation_token) WHERE ((confirmation_token)::text !~ '^[0-9 ]*$'::text); 2066 2067 2068 -- 2069 -- Name: email_change_token_current_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 2070 -- 2071 2072 CREATE UNIQUE INDEX email_change_token_current_idx ON auth.users USING btree (email_change_token_current) WHERE ((email_change_token_current)::text !~ '^[0-9 ]*$'::text); 2073 2074 2075 -- 2076 -- Name: email_change_token_new_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 2077 -- 2078 2079 CREATE UNIQUE INDEX email_change_token_new_idx ON auth.users USING btree (email_change_token_new) WHERE ((email_change_token_new)::text !~ '^[0-9 ]*$'::text); 2080 2081 2082 -- 2083 -- Name: factor_id_created_at_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 2084 -- 2085 2086 CREATE INDEX factor_id_created_at_idx ON auth.mfa_factors USING btree (user_id, created_at); 2087 2088 2089 -- 2090 -- Name: flow_state_created_at_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 2091 -- 2092 2093 CREATE INDEX flow_state_created_at_idx ON auth.flow_state USING btree (created_at DESC); 2094 2095 2096 -- 2097 -- Name: identities_email_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 2098 -- 2099 2100 CREATE INDEX identities_email_idx ON auth.identities USING btree (email text_pattern_ops); 2101 2102 2103 -- 2104 -- Name: INDEX identities_email_idx; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 2105 -- 2106 2107 COMMENT ON INDEX auth.identities_email_idx IS 'Auth: Ensures indexed queries on the email column'; 2108 2109 2110 -- 2111 -- Name: identities_user_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 2112 -- 2113 2114 CREATE INDEX identities_user_id_idx ON auth.identities USING btree (user_id); 2115 2116 2117 -- 2118 -- Name: idx_auth_code; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 2119 -- 2120 2121 CREATE INDEX idx_auth_code ON auth.flow_state USING btree (auth_code); 2122 2123 2124 -- 2125 -- Name: idx_user_id_auth_method; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 2126 -- 2127 2128 CREATE INDEX idx_user_id_auth_method ON auth.flow_state USING btree (user_id, authentication_method); 2129 2130 2131 -- 2132 -- Name: mfa_challenge_created_at_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 2133 -- 2134 2135 CREATE INDEX mfa_challenge_created_at_idx ON auth.mfa_challenges USING btree (created_at DESC); 2136 2137 2138 -- 2139 -- Name: mfa_factors_user_friendly_name_unique; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 2140 -- 2141 2142 CREATE UNIQUE INDEX mfa_factors_user_friendly_name_unique ON auth.mfa_factors USING btree (friendly_name, user_id) WHERE (TRIM(BOTH FROM friendly_name) <> ''::text); 2143 2144 2145 -- 2146 -- Name: mfa_factors_user_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 2147 -- 2148 2149 CREATE INDEX mfa_factors_user_id_idx ON auth.mfa_factors USING btree (user_id); 2150 2151 2152 -- 2153 -- Name: reauthentication_token_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 2154 -- 2155 2156 CREATE UNIQUE INDEX reauthentication_token_idx ON auth.users USING btree (reauthentication_token) WHERE ((reauthentication_token)::text !~ '^[0-9 ]*$'::text); 2157 2158 2159 -- 2160 -- Name: recovery_token_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 2161 -- 2162 2163 CREATE UNIQUE INDEX recovery_token_idx ON auth.users USING btree (recovery_token) WHERE ((recovery_token)::text !~ '^[0-9 ]*$'::text); 2164 2165 2166 -- 2167 -- Name: refresh_tokens_instance_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 2168 -- 2169 2170 CREATE INDEX refresh_tokens_instance_id_idx ON auth.refresh_tokens USING btree (instance_id); 2171 2172 2173 -- 2174 -- Name: refresh_tokens_instance_id_user_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 2175 -- 2176 2177 CREATE INDEX refresh_tokens_instance_id_user_id_idx ON auth.refresh_tokens USING btree (instance_id, user_id); 2178 2179 2180 -- 2181 -- Name: refresh_tokens_parent_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 2182 -- 2183 2184 CREATE INDEX refresh_tokens_parent_idx ON auth.refresh_tokens USING btree (parent); 2185 2186 2187 -- 2188 -- Name: refresh_tokens_session_id_revoked_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 2189 -- 2190 2191 CREATE INDEX refresh_tokens_session_id_revoked_idx ON auth.refresh_tokens USING btree (session_id, revoked); 2192 2193 2194 -- 2195 -- Name: refresh_tokens_updated_at_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 2196 -- 2197 2198 CREATE INDEX refresh_tokens_updated_at_idx ON auth.refresh_tokens USING btree (updated_at DESC); 2199 2200 2201 -- 2202 -- Name: saml_providers_sso_provider_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 2203 -- 2204 2205 CREATE INDEX saml_providers_sso_provider_id_idx ON auth.saml_providers USING btree (sso_provider_id); 2206 2207 2208 -- 2209 -- Name: saml_relay_states_created_at_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 2210 -- 2211 2212 CREATE INDEX saml_relay_states_created_at_idx ON auth.saml_relay_states USING btree (created_at DESC); 2213 2214 2215 -- 2216 -- Name: saml_relay_states_for_email_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 2217 -- 2218 2219 CREATE INDEX saml_relay_states_for_email_idx ON auth.saml_relay_states USING btree (for_email); 2220 2221 2222 -- 2223 -- Name: saml_relay_states_sso_provider_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 2224 -- 2225 2226 CREATE INDEX saml_relay_states_sso_provider_id_idx ON auth.saml_relay_states USING btree (sso_provider_id); 2227 2228 2229 -- 2230 -- Name: sessions_not_after_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 2231 -- 2232 2233 CREATE INDEX sessions_not_after_idx ON auth.sessions USING btree (not_after DESC); 2234 2235 2236 -- 2237 -- Name: sessions_user_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 2238 -- 2239 2240 CREATE INDEX sessions_user_id_idx ON auth.sessions USING btree (user_id); 2241 2242 2243 -- 2244 -- Name: sso_domains_domain_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 2245 -- 2246 2247 CREATE UNIQUE INDEX sso_domains_domain_idx ON auth.sso_domains USING btree (lower(domain)); 2248 2249 2250 -- 2251 -- Name: sso_domains_sso_provider_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 2252 -- 2253 2254 CREATE INDEX sso_domains_sso_provider_id_idx ON auth.sso_domains USING btree (sso_provider_id); 2255 2256 2257 -- 2258 -- Name: sso_providers_resource_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 2259 -- 2260 2261 CREATE UNIQUE INDEX sso_providers_resource_id_idx ON auth.sso_providers USING btree (lower(resource_id)); 2262 2263 2264 -- 2265 -- Name: user_id_created_at_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 2266 -- 2267 2268 CREATE INDEX user_id_created_at_idx ON auth.sessions USING btree (user_id, created_at); 2269 2270 2271 -- 2272 -- Name: users_email_partial_key; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 2273 -- 2274 2275 CREATE UNIQUE INDEX users_email_partial_key ON auth.users USING btree (email) WHERE (is_sso_user = false); 2276 2277 2278 -- 2279 -- Name: INDEX users_email_partial_key; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin 2280 -- 2281 2282 COMMENT ON INDEX auth.users_email_partial_key IS 'Auth: A partial unique index that applies only when is_sso_user is false'; 2283 2284 2285 -- 2286 -- Name: users_instance_id_email_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 2287 -- 2288 2289 CREATE INDEX users_instance_id_email_idx ON auth.users USING btree (instance_id, lower((email)::text)); 2290 2291 2292 -- 2293 -- Name: users_instance_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 2294 -- 2295 2296 CREATE INDEX users_instance_id_idx ON auth.users USING btree (instance_id); 2297 2298 2299 -- 2300 -- Name: bname; Type: INDEX; Schema: storage; Owner: supabase_storage_admin 2301 -- 2302 2303 CREATE UNIQUE INDEX bname ON storage.buckets USING btree (name); 2304 2305 2306 -- 2307 -- Name: bucketid_objname; Type: INDEX; Schema: storage; Owner: supabase_storage_admin 2308 -- 2309 2310 CREATE UNIQUE INDEX bucketid_objname ON storage.objects USING btree (bucket_id, name); 2311 2312 2313 -- 2314 -- Name: name_prefix_search; Type: INDEX; Schema: storage; Owner: supabase_storage_admin 2315 -- 2316 2317 CREATE INDEX name_prefix_search ON storage.objects USING btree (name text_pattern_ops); 2318 2319 2320 -- 2321 -- Name: supabase_functions_hooks_h_table_id_h_name_idx; Type: INDEX; Schema: supabase_functions; Owner: supabase_functions_admin 2322 -- 2323 2324 CREATE INDEX supabase_functions_hooks_h_table_id_h_name_idx ON supabase_functions.hooks USING btree (hook_table_id, hook_name); 2325 2326 2327 -- 2328 -- Name: supabase_functions_hooks_request_id_idx; Type: INDEX; Schema: supabase_functions; Owner: supabase_functions_admin 2329 -- 2330 2331 CREATE INDEX supabase_functions_hooks_request_id_idx ON supabase_functions.hooks USING btree (request_id); 2332 2333 2334 -- 2335 -- Name: objects update_objects_updated_at; Type: TRIGGER; Schema: storage; Owner: supabase_storage_admin 2336 -- 2337 2338 CREATE TRIGGER update_objects_updated_at BEFORE UPDATE ON storage.objects FOR EACH ROW EXECUTE FUNCTION storage.update_updated_at_column(); 2339 2340 2341 -- 2342 -- Name: extensions extensions_tenant_external_id_fkey; Type: FK CONSTRAINT; Schema: _realtime; Owner: postgres 2343 -- 2344 2345 ALTER TABLE ONLY _realtime.extensions 2346 ADD CONSTRAINT extensions_tenant_external_id_fkey FOREIGN KEY (tenant_external_id) REFERENCES _realtime.tenants(external_id) ON DELETE CASCADE; 2347 2348 2349 -- 2350 -- Name: identities identities_user_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 2351 -- 2352 2353 ALTER TABLE ONLY auth.identities 2354 ADD CONSTRAINT identities_user_id_fkey FOREIGN KEY (user_id) REFERENCES auth.users(id) ON DELETE CASCADE; 2355 2356 2357 -- 2358 -- Name: mfa_amr_claims mfa_amr_claims_session_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 2359 -- 2360 2361 ALTER TABLE ONLY auth.mfa_amr_claims 2362 ADD CONSTRAINT mfa_amr_claims_session_id_fkey FOREIGN KEY (session_id) REFERENCES auth.sessions(id) ON DELETE CASCADE; 2363 2364 2365 -- 2366 -- Name: mfa_challenges mfa_challenges_auth_factor_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 2367 -- 2368 2369 ALTER TABLE ONLY auth.mfa_challenges 2370 ADD CONSTRAINT mfa_challenges_auth_factor_id_fkey FOREIGN KEY (factor_id) REFERENCES auth.mfa_factors(id) ON DELETE CASCADE; 2371 2372 2373 -- 2374 -- Name: mfa_factors mfa_factors_user_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 2375 -- 2376 2377 ALTER TABLE ONLY auth.mfa_factors 2378 ADD CONSTRAINT mfa_factors_user_id_fkey FOREIGN KEY (user_id) REFERENCES auth.users(id) ON DELETE CASCADE; 2379 2380 2381 -- 2382 -- Name: refresh_tokens refresh_tokens_session_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 2383 -- 2384 2385 ALTER TABLE ONLY auth.refresh_tokens 2386 ADD CONSTRAINT refresh_tokens_session_id_fkey FOREIGN KEY (session_id) REFERENCES auth.sessions(id) ON DELETE CASCADE; 2387 2388 2389 -- 2390 -- Name: saml_providers saml_providers_sso_provider_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 2391 -- 2392 2393 ALTER TABLE ONLY auth.saml_providers 2394 ADD CONSTRAINT saml_providers_sso_provider_id_fkey FOREIGN KEY (sso_provider_id) REFERENCES auth.sso_providers(id) ON DELETE CASCADE; 2395 2396 2397 -- 2398 -- Name: saml_relay_states saml_relay_states_flow_state_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 2399 -- 2400 2401 ALTER TABLE ONLY auth.saml_relay_states 2402 ADD CONSTRAINT saml_relay_states_flow_state_id_fkey FOREIGN KEY (flow_state_id) REFERENCES auth.flow_state(id) ON DELETE CASCADE; 2403 2404 2405 -- 2406 -- Name: saml_relay_states saml_relay_states_sso_provider_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 2407 -- 2408 2409 ALTER TABLE ONLY auth.saml_relay_states 2410 ADD CONSTRAINT saml_relay_states_sso_provider_id_fkey FOREIGN KEY (sso_provider_id) REFERENCES auth.sso_providers(id) ON DELETE CASCADE; 2411 2412 2413 -- 2414 -- Name: sessions sessions_user_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 2415 -- 2416 2417 ALTER TABLE ONLY auth.sessions 2418 ADD CONSTRAINT sessions_user_id_fkey FOREIGN KEY (user_id) REFERENCES auth.users(id) ON DELETE CASCADE; 2419 2420 2421 -- 2422 -- Name: sso_domains sso_domains_sso_provider_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 2423 -- 2424 2425 ALTER TABLE ONLY auth.sso_domains 2426 ADD CONSTRAINT sso_domains_sso_provider_id_fkey FOREIGN KEY (sso_provider_id) REFERENCES auth.sso_providers(id) ON DELETE CASCADE; 2427 2428 2429 -- 2430 -- Name: objects objects_bucketId_fkey; Type: FK CONSTRAINT; Schema: storage; Owner: supabase_storage_admin 2431 -- 2432 2433 ALTER TABLE ONLY storage.objects 2434 ADD CONSTRAINT "objects_bucketId_fkey" FOREIGN KEY (bucket_id) REFERENCES storage.buckets(id); 2435 2436 2437 -- 2438 -- Name: buckets; Type: ROW SECURITY; Schema: storage; Owner: supabase_storage_admin 2439 -- 2440 2441 ALTER TABLE storage.buckets ENABLE ROW LEVEL SECURITY; 2442 2443 -- 2444 -- Name: migrations; Type: ROW SECURITY; Schema: storage; Owner: supabase_storage_admin 2445 -- 2446 2447 ALTER TABLE storage.migrations ENABLE ROW LEVEL SECURITY; 2448 2449 -- 2450 -- Name: objects; Type: ROW SECURITY; Schema: storage; Owner: supabase_storage_admin 2451 -- 2452 2453 ALTER TABLE storage.objects ENABLE ROW LEVEL SECURITY; 2454 2455 -- 2456 -- Name: supabase_realtime; Type: PUBLICATION; Schema: -; Owner: postgres 2457 -- 2458 2459 CREATE PUBLICATION supabase_realtime WITH (publish = 'insert, update, delete, truncate'); 2460 2461 2462 ALTER PUBLICATION supabase_realtime OWNER TO postgres; 2463 2464 -- 2465 -- Name: SCHEMA auth; Type: ACL; Schema: -; Owner: supabase_admin 2466 -- 2467 2468 GRANT USAGE ON SCHEMA auth TO anon; 2469 GRANT USAGE ON SCHEMA auth TO authenticated; 2470 GRANT USAGE ON SCHEMA auth TO service_role; 2471 GRANT ALL ON SCHEMA auth TO supabase_auth_admin; 2472 GRANT ALL ON SCHEMA auth TO dashboard_user; 2473 GRANT ALL ON SCHEMA auth TO postgres; 2474 2475 2476 -- 2477 -- Name: SCHEMA extensions; Type: ACL; Schema: -; Owner: postgres 2478 -- 2479 2480 GRANT USAGE ON SCHEMA extensions TO anon; 2481 GRANT USAGE ON SCHEMA extensions TO authenticated; 2482 GRANT USAGE ON SCHEMA extensions TO service_role; 2483 GRANT ALL ON SCHEMA extensions TO dashboard_user; 2484 2485 2486 -- 2487 -- Name: SCHEMA graphql_public; Type: ACL; Schema: -; Owner: supabase_admin 2488 -- 2489 2490 GRANT USAGE ON SCHEMA graphql_public TO postgres; 2491 GRANT USAGE ON SCHEMA graphql_public TO anon; 2492 GRANT USAGE ON SCHEMA graphql_public TO authenticated; 2493 GRANT USAGE ON SCHEMA graphql_public TO service_role; 2494 2495 2496 -- 2497 -- Name: SCHEMA net; Type: ACL; Schema: -; Owner: postgres 2498 -- 2499 2500 GRANT USAGE ON SCHEMA net TO supabase_functions_admin; 2501 GRANT USAGE ON SCHEMA net TO anon; 2502 GRANT USAGE ON SCHEMA net TO authenticated; 2503 GRANT USAGE ON SCHEMA net TO service_role; 2504 2505 2506 -- 2507 -- Name: SCHEMA public; Type: ACL; Schema: -; Owner: postgres 2508 -- 2509 2510 REVOKE USAGE ON SCHEMA public FROM PUBLIC; 2511 GRANT ALL ON SCHEMA public TO PUBLIC; 2512 GRANT USAGE ON SCHEMA public TO anon; 2513 GRANT USAGE ON SCHEMA public TO authenticated; 2514 GRANT USAGE ON SCHEMA public TO service_role; 2515 2516 2517 -- 2518 -- Name: SCHEMA realtime; Type: ACL; Schema: -; Owner: supabase_admin 2519 -- 2520 2521 GRANT USAGE ON SCHEMA realtime TO postgres; 2522 2523 2524 -- 2525 -- Name: SCHEMA storage; Type: ACL; Schema: -; Owner: supabase_admin 2526 -- 2527 2528 GRANT ALL ON SCHEMA storage TO postgres; 2529 GRANT USAGE ON SCHEMA storage TO anon; 2530 GRANT USAGE ON SCHEMA storage TO authenticated; 2531 GRANT USAGE ON SCHEMA storage TO service_role; 2532 GRANT ALL ON SCHEMA storage TO supabase_storage_admin; 2533 GRANT ALL ON SCHEMA storage TO dashboard_user; 2534 2535 2536 -- 2537 -- Name: SCHEMA supabase_functions; Type: ACL; Schema: -; Owner: supabase_admin 2538 -- 2539 2540 GRANT USAGE ON SCHEMA supabase_functions TO postgres; 2541 GRANT USAGE ON SCHEMA supabase_functions TO anon; 2542 GRANT USAGE ON SCHEMA supabase_functions TO authenticated; 2543 GRANT USAGE ON SCHEMA supabase_functions TO service_role; 2544 GRANT ALL ON SCHEMA supabase_functions TO supabase_functions_admin; 2545 2546 2547 -- 2548 -- Name: FUNCTION email(); Type: ACL; Schema: auth; Owner: supabase_auth_admin 2549 -- 2550 2551 GRANT ALL ON FUNCTION auth.email() TO dashboard_user; 2552 2553 2554 -- 2555 -- Name: FUNCTION jwt(); Type: ACL; Schema: auth; Owner: supabase_auth_admin 2556 -- 2557 2558 GRANT ALL ON FUNCTION auth.jwt() TO postgres; 2559 GRANT ALL ON FUNCTION auth.jwt() TO dashboard_user; 2560 2561 2562 -- 2563 -- Name: FUNCTION role(); Type: ACL; Schema: auth; Owner: supabase_auth_admin 2564 -- 2565 2566 GRANT ALL ON FUNCTION auth.role() TO dashboard_user; 2567 2568 2569 -- 2570 -- Name: FUNCTION uid(); Type: ACL; Schema: auth; Owner: supabase_auth_admin 2571 -- 2572 2573 GRANT ALL ON FUNCTION auth.uid() TO dashboard_user; 2574 2575 2576 -- 2577 -- Name: FUNCTION algorithm_sign(signables text, secret text, algorithm text); Type: ACL; Schema: extensions; Owner: postgres 2578 -- 2579 2580 GRANT ALL ON FUNCTION extensions.algorithm_sign(signables text, secret text, algorithm text) TO dashboard_user; 2581 2582 2583 -- 2584 -- Name: FUNCTION armor(bytea); Type: ACL; Schema: extensions; Owner: postgres 2585 -- 2586 2587 GRANT ALL ON FUNCTION extensions.armor(bytea) TO dashboard_user; 2588 2589 2590 -- 2591 -- Name: FUNCTION armor(bytea, text[], text[]); Type: ACL; Schema: extensions; Owner: postgres 2592 -- 2593 2594 GRANT ALL ON FUNCTION extensions.armor(bytea, text[], text[]) TO dashboard_user; 2595 2596 2597 -- 2598 -- Name: FUNCTION crypt(text, text); Type: ACL; Schema: extensions; Owner: postgres 2599 -- 2600 2601 GRANT ALL ON FUNCTION extensions.crypt(text, text) TO dashboard_user; 2602 2603 2604 -- 2605 -- Name: FUNCTION dearmor(text); Type: ACL; Schema: extensions; Owner: postgres 2606 -- 2607 2608 GRANT ALL ON FUNCTION extensions.dearmor(text) TO dashboard_user; 2609 2610 2611 -- 2612 -- Name: FUNCTION decrypt(bytea, bytea, text); Type: ACL; Schema: extensions; Owner: postgres 2613 -- 2614 2615 GRANT ALL ON FUNCTION extensions.decrypt(bytea, bytea, text) TO dashboard_user; 2616 2617 2618 -- 2619 -- Name: FUNCTION decrypt_iv(bytea, bytea, bytea, text); Type: ACL; Schema: extensions; Owner: postgres 2620 -- 2621 2622 GRANT ALL ON FUNCTION extensions.decrypt_iv(bytea, bytea, bytea, text) TO dashboard_user; 2623 2624 2625 -- 2626 -- Name: FUNCTION digest(bytea, text); Type: ACL; Schema: extensions; Owner: postgres 2627 -- 2628 2629 GRANT ALL ON FUNCTION extensions.digest(bytea, text) TO dashboard_user; 2630 2631 2632 -- 2633 -- Name: FUNCTION digest(text, text); Type: ACL; Schema: extensions; Owner: postgres 2634 -- 2635 2636 GRANT ALL ON FUNCTION extensions.digest(text, text) TO dashboard_user; 2637 2638 2639 -- 2640 -- Name: FUNCTION encrypt(bytea, bytea, text); Type: ACL; Schema: extensions; Owner: postgres 2641 -- 2642 2643 GRANT ALL ON FUNCTION extensions.encrypt(bytea, bytea, text) TO dashboard_user; 2644 2645 2646 -- 2647 -- Name: FUNCTION encrypt_iv(bytea, bytea, bytea, text); Type: ACL; Schema: extensions; Owner: postgres 2648 -- 2649 2650 GRANT ALL ON FUNCTION extensions.encrypt_iv(bytea, bytea, bytea, text) TO dashboard_user; 2651 2652 2653 -- 2654 -- Name: FUNCTION gen_random_bytes(integer); Type: ACL; Schema: extensions; Owner: postgres 2655 -- 2656 2657 GRANT ALL ON FUNCTION extensions.gen_random_bytes(integer) TO dashboard_user; 2658 2659 2660 -- 2661 -- Name: FUNCTION gen_random_uuid(); Type: ACL; Schema: extensions; Owner: postgres 2662 -- 2663 2664 GRANT ALL ON FUNCTION extensions.gen_random_uuid() TO dashboard_user; 2665 2666 2667 -- 2668 -- Name: FUNCTION gen_salt(text); Type: ACL; Schema: extensions; Owner: postgres 2669 -- 2670 2671 GRANT ALL ON FUNCTION extensions.gen_salt(text) TO dashboard_user; 2672 2673 2674 -- 2675 -- Name: FUNCTION gen_salt(text, integer); Type: ACL; Schema: extensions; Owner: postgres 2676 -- 2677 2678 GRANT ALL ON FUNCTION extensions.gen_salt(text, integer) TO dashboard_user; 2679 2680 2681 -- 2682 -- Name: FUNCTION grant_pg_cron_access(); Type: ACL; Schema: extensions; Owner: postgres 2683 -- 2684 2685 GRANT ALL ON FUNCTION extensions.grant_pg_cron_access() TO dashboard_user; 2686 2687 2688 -- 2689 -- Name: FUNCTION grant_pg_net_access(); Type: ACL; Schema: extensions; Owner: postgres 2690 -- 2691 2692 GRANT ALL ON FUNCTION extensions.grant_pg_net_access() TO dashboard_user; 2693 2694 2695 -- 2696 -- Name: FUNCTION hmac(bytea, bytea, text); Type: ACL; Schema: extensions; Owner: postgres 2697 -- 2698 2699 GRANT ALL ON FUNCTION extensions.hmac(bytea, bytea, text) TO dashboard_user; 2700 2701 2702 -- 2703 -- Name: FUNCTION hmac(text, text, text); Type: ACL; Schema: extensions; Owner: postgres 2704 -- 2705 2706 GRANT ALL ON FUNCTION extensions.hmac(text, text, text) TO dashboard_user; 2707 2708 2709 -- 2710 -- Name: FUNCTION pg_stat_statements(showtext boolean, OUT userid oid, OUT dbid oid, OUT toplevel boolean, OUT queryid bigint, OUT query text, OUT plans bigint, OUT total_plan_time double precision, OUT min_plan_time double precision, OUT max_plan_time double precision, OUT mean_plan_time double precision, OUT stddev_plan_time double precision, OUT calls bigint, OUT total_exec_time double precision, OUT min_exec_time double precision, OUT max_exec_time double precision, OUT mean_exec_time double precision, OUT stddev_exec_time double precision, OUT rows bigint, OUT shared_blks_hit bigint, OUT shared_blks_read bigint, OUT shared_blks_dirtied bigint, OUT shared_blks_written bigint, OUT local_blks_hit bigint, OUT local_blks_read bigint, OUT local_blks_dirtied bigint, OUT local_blks_written bigint, OUT temp_blks_read bigint, OUT temp_blks_written bigint, OUT blk_read_time double precision, OUT blk_write_time double precision, OUT wal_records bigint, OUT wal_fpi bigint, OUT wal_bytes numeric); Type: ACL; Schema: extensions; Owner: postgres 2711 -- 2712 2713 GRANT ALL ON FUNCTION extensions.pg_stat_statements(showtext boolean, OUT userid oid, OUT dbid oid, OUT toplevel boolean, OUT queryid bigint, OUT query text, OUT plans bigint, OUT total_plan_time double precision, OUT min_plan_time double precision, OUT max_plan_time double precision, OUT mean_plan_time double precision, OUT stddev_plan_time double precision, OUT calls bigint, OUT total_exec_time double precision, OUT min_exec_time double precision, OUT max_exec_time double precision, OUT mean_exec_time double precision, OUT stddev_exec_time double precision, OUT rows bigint, OUT shared_blks_hit bigint, OUT shared_blks_read bigint, OUT shared_blks_dirtied bigint, OUT shared_blks_written bigint, OUT local_blks_hit bigint, OUT local_blks_read bigint, OUT local_blks_dirtied bigint, OUT local_blks_written bigint, OUT temp_blks_read bigint, OUT temp_blks_written bigint, OUT blk_read_time double precision, OUT blk_write_time double precision, OUT wal_records bigint, OUT wal_fpi bigint, OUT wal_bytes numeric) TO dashboard_user; 2714 2715 2716 -- 2717 -- Name: FUNCTION pg_stat_statements_info(OUT dealloc bigint, OUT stats_reset timestamp with time zone); Type: ACL; Schema: extensions; Owner: postgres 2718 -- 2719 2720 GRANT ALL ON FUNCTION extensions.pg_stat_statements_info(OUT dealloc bigint, OUT stats_reset timestamp with time zone) TO dashboard_user; 2721 2722 2723 -- 2724 -- Name: FUNCTION pg_stat_statements_reset(userid oid, dbid oid, queryid bigint); Type: ACL; Schema: extensions; Owner: postgres 2725 -- 2726 2727 GRANT ALL ON FUNCTION extensions.pg_stat_statements_reset(userid oid, dbid oid, queryid bigint) TO dashboard_user; 2728 2729 2730 -- 2731 -- Name: FUNCTION pgp_armor_headers(text, OUT key text, OUT value text); Type: ACL; Schema: extensions; Owner: postgres 2732 -- 2733 2734 GRANT ALL ON FUNCTION extensions.pgp_armor_headers(text, OUT key text, OUT value text) TO dashboard_user; 2735 2736 2737 -- 2738 -- Name: FUNCTION pgp_key_id(bytea); Type: ACL; Schema: extensions; Owner: postgres 2739 -- 2740 2741 GRANT ALL ON FUNCTION extensions.pgp_key_id(bytea) TO dashboard_user; 2742 2743 2744 -- 2745 -- Name: FUNCTION pgp_pub_decrypt(bytea, bytea); Type: ACL; Schema: extensions; Owner: postgres 2746 -- 2747 2748 GRANT ALL ON FUNCTION extensions.pgp_pub_decrypt(bytea, bytea) TO dashboard_user; 2749 2750 2751 -- 2752 -- Name: FUNCTION pgp_pub_decrypt(bytea, bytea, text); Type: ACL; Schema: extensions; Owner: postgres 2753 -- 2754 2755 GRANT ALL ON FUNCTION extensions.pgp_pub_decrypt(bytea, bytea, text) TO dashboard_user; 2756 2757 2758 -- 2759 -- Name: FUNCTION pgp_pub_decrypt(bytea, bytea, text, text); Type: ACL; Schema: extensions; Owner: postgres 2760 -- 2761 2762 GRANT ALL ON FUNCTION extensions.pgp_pub_decrypt(bytea, bytea, text, text) TO dashboard_user; 2763 2764 2765 -- 2766 -- Name: FUNCTION pgp_pub_decrypt_bytea(bytea, bytea); Type: ACL; Schema: extensions; Owner: postgres 2767 -- 2768 2769 GRANT ALL ON FUNCTION extensions.pgp_pub_decrypt_bytea(bytea, bytea) TO dashboard_user; 2770 2771 2772 -- 2773 -- Name: FUNCTION pgp_pub_decrypt_bytea(bytea, bytea, text); Type: ACL; Schema: extensions; Owner: postgres 2774 -- 2775 2776 GRANT ALL ON FUNCTION extensions.pgp_pub_decrypt_bytea(bytea, bytea, text) TO dashboard_user; 2777 2778 2779 -- 2780 -- Name: FUNCTION pgp_pub_decrypt_bytea(bytea, bytea, text, text); Type: ACL; Schema: extensions; Owner: postgres 2781 -- 2782 2783 GRANT ALL ON FUNCTION extensions.pgp_pub_decrypt_bytea(bytea, bytea, text, text) TO dashboard_user; 2784 2785 2786 -- 2787 -- Name: FUNCTION pgp_pub_encrypt(text, bytea); Type: ACL; Schema: extensions; Owner: postgres 2788 -- 2789 2790 GRANT ALL ON FUNCTION extensions.pgp_pub_encrypt(text, bytea) TO dashboard_user; 2791 2792 2793 -- 2794 -- Name: FUNCTION pgp_pub_encrypt(text, bytea, text); Type: ACL; Schema: extensions; Owner: postgres 2795 -- 2796 2797 GRANT ALL ON FUNCTION extensions.pgp_pub_encrypt(text, bytea, text) TO dashboard_user; 2798 2799 2800 -- 2801 -- Name: FUNCTION pgp_pub_encrypt_bytea(bytea, bytea); Type: ACL; Schema: extensions; Owner: postgres 2802 -- 2803 2804 GRANT ALL ON FUNCTION extensions.pgp_pub_encrypt_bytea(bytea, bytea) TO dashboard_user; 2805 2806 2807 -- 2808 -- Name: FUNCTION pgp_pub_encrypt_bytea(bytea, bytea, text); Type: ACL; Schema: extensions; Owner: postgres 2809 -- 2810 2811 GRANT ALL ON FUNCTION extensions.pgp_pub_encrypt_bytea(bytea, bytea, text) TO dashboard_user; 2812 2813 2814 -- 2815 -- Name: FUNCTION pgp_sym_decrypt(bytea, text); Type: ACL; Schema: extensions; Owner: postgres 2816 -- 2817 2818 GRANT ALL ON FUNCTION extensions.pgp_sym_decrypt(bytea, text) TO dashboard_user; 2819 2820 2821 -- 2822 -- Name: FUNCTION pgp_sym_decrypt(bytea, text, text); Type: ACL; Schema: extensions; Owner: postgres 2823 -- 2824 2825 GRANT ALL ON FUNCTION extensions.pgp_sym_decrypt(bytea, text, text) TO dashboard_user; 2826 2827 2828 -- 2829 -- Name: FUNCTION pgp_sym_decrypt_bytea(bytea, text); Type: ACL; Schema: extensions; Owner: postgres 2830 -- 2831 2832 GRANT ALL ON FUNCTION extensions.pgp_sym_decrypt_bytea(bytea, text) TO dashboard_user; 2833 2834 2835 -- 2836 -- Name: FUNCTION pgp_sym_decrypt_bytea(bytea, text, text); Type: ACL; Schema: extensions; Owner: postgres 2837 -- 2838 2839 GRANT ALL ON FUNCTION extensions.pgp_sym_decrypt_bytea(bytea, text, text) TO dashboard_user; 2840 2841 2842 -- 2843 -- Name: FUNCTION pgp_sym_encrypt(text, text); Type: ACL; Schema: extensions; Owner: postgres 2844 -- 2845 2846 GRANT ALL ON FUNCTION extensions.pgp_sym_encrypt(text, text) TO dashboard_user; 2847 2848 2849 -- 2850 -- Name: FUNCTION pgp_sym_encrypt(text, text, text); Type: ACL; Schema: extensions; Owner: postgres 2851 -- 2852 2853 GRANT ALL ON FUNCTION extensions.pgp_sym_encrypt(text, text, text) TO dashboard_user; 2854 2855 2856 -- 2857 -- Name: FUNCTION pgp_sym_encrypt_bytea(bytea, text); Type: ACL; Schema: extensions; Owner: postgres 2858 -- 2859 2860 GRANT ALL ON FUNCTION extensions.pgp_sym_encrypt_bytea(bytea, text) TO dashboard_user; 2861 2862 2863 -- 2864 -- Name: FUNCTION pgp_sym_encrypt_bytea(bytea, text, text); Type: ACL; Schema: extensions; Owner: postgres 2865 -- 2866 2867 GRANT ALL ON FUNCTION extensions.pgp_sym_encrypt_bytea(bytea, text, text) TO dashboard_user; 2868 2869 2870 -- 2871 -- Name: FUNCTION sign(payload json, secret text, algorithm text); Type: ACL; Schema: extensions; Owner: postgres 2872 -- 2873 2874 GRANT ALL ON FUNCTION extensions.sign(payload json, secret text, algorithm text) TO dashboard_user; 2875 2876 2877 -- 2878 -- Name: FUNCTION try_cast_double(inp text); Type: ACL; Schema: extensions; Owner: postgres 2879 -- 2880 2881 GRANT ALL ON FUNCTION extensions.try_cast_double(inp text) TO dashboard_user; 2882 2883 2884 -- 2885 -- Name: FUNCTION url_decode(data text); Type: ACL; Schema: extensions; Owner: postgres 2886 -- 2887 2888 GRANT ALL ON FUNCTION extensions.url_decode(data text) TO dashboard_user; 2889 2890 2891 -- 2892 -- Name: FUNCTION url_encode(data bytea); Type: ACL; Schema: extensions; Owner: postgres 2893 -- 2894 2895 GRANT ALL ON FUNCTION extensions.url_encode(data bytea) TO dashboard_user; 2896 2897 2898 -- 2899 -- Name: FUNCTION uuid_generate_v1(); Type: ACL; Schema: extensions; Owner: postgres 2900 -- 2901 2902 GRANT ALL ON FUNCTION extensions.uuid_generate_v1() TO dashboard_user; 2903 2904 2905 -- 2906 -- Name: FUNCTION uuid_generate_v1mc(); Type: ACL; Schema: extensions; Owner: postgres 2907 -- 2908 2909 GRANT ALL ON FUNCTION extensions.uuid_generate_v1mc() TO dashboard_user; 2910 2911 2912 -- 2913 -- Name: FUNCTION uuid_generate_v3(namespace uuid, name text); Type: ACL; Schema: extensions; Owner: postgres 2914 -- 2915 2916 GRANT ALL ON FUNCTION extensions.uuid_generate_v3(namespace uuid, name text) TO dashboard_user; 2917 2918 2919 -- 2920 -- Name: FUNCTION uuid_generate_v4(); Type: ACL; Schema: extensions; Owner: postgres 2921 -- 2922 2923 GRANT ALL ON FUNCTION extensions.uuid_generate_v4() TO dashboard_user; 2924 2925 2926 -- 2927 -- Name: FUNCTION uuid_generate_v5(namespace uuid, name text); Type: ACL; Schema: extensions; Owner: postgres 2928 -- 2929 2930 GRANT ALL ON FUNCTION extensions.uuid_generate_v5(namespace uuid, name text) TO dashboard_user; 2931 2932 2933 -- 2934 -- Name: FUNCTION uuid_nil(); Type: ACL; Schema: extensions; Owner: postgres 2935 -- 2936 2937 GRANT ALL ON FUNCTION extensions.uuid_nil() TO dashboard_user; 2938 2939 2940 -- 2941 -- Name: FUNCTION uuid_ns_dns(); Type: ACL; Schema: extensions; Owner: postgres 2942 -- 2943 2944 GRANT ALL ON FUNCTION extensions.uuid_ns_dns() TO dashboard_user; 2945 2946 2947 -- 2948 -- Name: FUNCTION uuid_ns_oid(); Type: ACL; Schema: extensions; Owner: postgres 2949 -- 2950 2951 GRANT ALL ON FUNCTION extensions.uuid_ns_oid() TO dashboard_user; 2952 2953 2954 -- 2955 -- Name: FUNCTION uuid_ns_url(); Type: ACL; Schema: extensions; Owner: postgres 2956 -- 2957 2958 GRANT ALL ON FUNCTION extensions.uuid_ns_url() TO dashboard_user; 2959 2960 2961 -- 2962 -- Name: FUNCTION uuid_ns_x500(); Type: ACL; Schema: extensions; Owner: postgres 2963 -- 2964 2965 GRANT ALL ON FUNCTION extensions.uuid_ns_x500() TO dashboard_user; 2966 2967 2968 -- 2969 -- Name: FUNCTION verify(token text, secret text, algorithm text); Type: ACL; Schema: extensions; Owner: postgres 2970 -- 2971 2972 GRANT ALL ON FUNCTION extensions.verify(token text, secret text, algorithm text) TO dashboard_user; 2973 2974 2975 -- 2976 -- Name: FUNCTION comment_directive(comment_ text); Type: ACL; Schema: graphql; Owner: supabase_admin 2977 -- 2978 2979 GRANT ALL ON FUNCTION graphql.comment_directive(comment_ text) TO postgres; 2980 GRANT ALL ON FUNCTION graphql.comment_directive(comment_ text) TO anon; 2981 GRANT ALL ON FUNCTION graphql.comment_directive(comment_ text) TO authenticated; 2982 GRANT ALL ON FUNCTION graphql.comment_directive(comment_ text) TO service_role; 2983 2984 2985 -- 2986 -- Name: FUNCTION exception(message text); Type: ACL; Schema: graphql; Owner: supabase_admin 2987 -- 2988 2989 GRANT ALL ON FUNCTION graphql.exception(message text) TO postgres; 2990 GRANT ALL ON FUNCTION graphql.exception(message text) TO anon; 2991 GRANT ALL ON FUNCTION graphql.exception(message text) TO authenticated; 2992 GRANT ALL ON FUNCTION graphql.exception(message text) TO service_role; 2993 2994 2995 -- 2996 -- Name: FUNCTION get_schema_version(); Type: ACL; Schema: graphql; Owner: supabase_admin 2997 -- 2998 2999 GRANT ALL ON FUNCTION graphql.get_schema_version() TO postgres; 3000 GRANT ALL ON FUNCTION graphql.get_schema_version() TO anon; 3001 GRANT ALL ON FUNCTION graphql.get_schema_version() TO authenticated; 3002 GRANT ALL ON FUNCTION graphql.get_schema_version() TO service_role; 3003 3004 3005 -- 3006 -- Name: FUNCTION increment_schema_version(); Type: ACL; Schema: graphql; Owner: supabase_admin 3007 -- 3008 3009 GRANT ALL ON FUNCTION graphql.increment_schema_version() TO postgres; 3010 GRANT ALL ON FUNCTION graphql.increment_schema_version() TO anon; 3011 GRANT ALL ON FUNCTION graphql.increment_schema_version() TO authenticated; 3012 GRANT ALL ON FUNCTION graphql.increment_schema_version() TO service_role; 3013 3014 3015 -- 3016 -- Name: FUNCTION sequential_executor(prepared_statement_names text[]); Type: ACL; Schema: graphql; Owner: supabase_admin 3017 -- 3018 3019 GRANT ALL ON FUNCTION graphql.sequential_executor(prepared_statement_names text[]) TO postgres; 3020 GRANT ALL ON FUNCTION graphql.sequential_executor(prepared_statement_names text[]) TO anon; 3021 GRANT ALL ON FUNCTION graphql.sequential_executor(prepared_statement_names text[]) TO authenticated; 3022 GRANT ALL ON FUNCTION graphql.sequential_executor(prepared_statement_names text[]) TO service_role; 3023 3024 3025 -- 3026 -- Name: FUNCTION graphql("operationName" text, query text, variables jsonb, extensions jsonb); Type: ACL; Schema: graphql_public; Owner: supabase_admin 3027 -- 3028 3029 -- GRANT ALL ON FUNCTION graphql_public.graphql("operationName" text, query text, variables jsonb, extensions jsonb) TO postgres; 3030 -- GRANT ALL ON FUNCTION graphql_public.graphql("operationName" text, query text, variables jsonb, extensions jsonb) TO anon; 3031 -- GRANT ALL ON FUNCTION graphql_public.graphql("operationName" text, query text, variables jsonb, extensions jsonb) TO authenticated; 3032 -- GRANT ALL ON FUNCTION graphql_public.graphql("operationName" text, query text, variables jsonb, extensions jsonb) TO service_role; 3033 3034 3035 -- 3036 -- Name: FUNCTION http_collect_response(request_id bigint, async boolean); Type: ACL; Schema: net; Owner: supabase_admin 3037 -- 3038 3039 REVOKE ALL ON FUNCTION net.http_collect_response(request_id bigint, async boolean) FROM PUBLIC; 3040 GRANT ALL ON FUNCTION net.http_collect_response(request_id bigint, async boolean) TO supabase_functions_admin; 3041 GRANT ALL ON FUNCTION net.http_collect_response(request_id bigint, async boolean) TO postgres; 3042 GRANT ALL ON FUNCTION net.http_collect_response(request_id bigint, async boolean) TO anon; 3043 GRANT ALL ON FUNCTION net.http_collect_response(request_id bigint, async boolean) TO authenticated; 3044 GRANT ALL ON FUNCTION net.http_collect_response(request_id bigint, async boolean) TO service_role; 3045 3046 3047 -- 3048 -- Name: FUNCTION http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer); Type: ACL; Schema: net; Owner: supabase_admin 3049 -- 3050 3051 REVOKE ALL ON FUNCTION net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) FROM PUBLIC; 3052 GRANT ALL ON FUNCTION net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) TO supabase_functions_admin; 3053 GRANT ALL ON FUNCTION net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) TO postgres; 3054 GRANT ALL ON FUNCTION net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) TO anon; 3055 GRANT ALL ON FUNCTION net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) TO authenticated; 3056 GRANT ALL ON FUNCTION net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) TO service_role; 3057 3058 3059 -- 3060 -- Name: FUNCTION http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer); Type: ACL; Schema: net; Owner: supabase_admin 3061 -- 3062 3063 REVOKE ALL ON FUNCTION net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) FROM PUBLIC; 3064 GRANT ALL ON FUNCTION net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) TO supabase_functions_admin; 3065 GRANT ALL ON FUNCTION net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) TO postgres; 3066 GRANT ALL ON FUNCTION net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) TO anon; 3067 GRANT ALL ON FUNCTION net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) TO authenticated; 3068 GRANT ALL ON FUNCTION net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) TO service_role; 3069 3070 3071 -- 3072 -- Name: FUNCTION get_auth(p_usename text); Type: ACL; Schema: pgbouncer; Owner: postgres 3073 -- 3074 3075 REVOKE ALL ON FUNCTION pgbouncer.get_auth(p_usename text) FROM PUBLIC; 3076 GRANT ALL ON FUNCTION pgbouncer.get_auth(p_usename text) TO pgbouncer; 3077 3078 3079 -- 3080 -- Name: SEQUENCE key_key_id_seq; Type: ACL; Schema: pgsodium; Owner: postgres 3081 -- 3082 3083 GRANT ALL ON SEQUENCE pgsodium.key_key_id_seq TO pgsodium_keyiduser; 3084 3085 3086 -- 3087 -- Name: FUNCTION extension(name text); Type: ACL; Schema: storage; Owner: supabase_storage_admin 3088 -- 3089 3090 GRANT ALL ON FUNCTION storage.extension(name text) TO anon; 3091 GRANT ALL ON FUNCTION storage.extension(name text) TO authenticated; 3092 GRANT ALL ON FUNCTION storage.extension(name text) TO service_role; 3093 GRANT ALL ON FUNCTION storage.extension(name text) TO dashboard_user; 3094 GRANT ALL ON FUNCTION storage.extension(name text) TO postgres; 3095 3096 3097 -- 3098 -- Name: FUNCTION filename(name text); Type: ACL; Schema: storage; Owner: supabase_storage_admin 3099 -- 3100 3101 GRANT ALL ON FUNCTION storage.filename(name text) TO anon; 3102 GRANT ALL ON FUNCTION storage.filename(name text) TO authenticated; 3103 GRANT ALL ON FUNCTION storage.filename(name text) TO service_role; 3104 GRANT ALL ON FUNCTION storage.filename(name text) TO dashboard_user; 3105 GRANT ALL ON FUNCTION storage.filename(name text) TO postgres; 3106 3107 3108 -- 3109 -- Name: FUNCTION foldername(name text); Type: ACL; Schema: storage; Owner: supabase_storage_admin 3110 -- 3111 3112 GRANT ALL ON FUNCTION storage.foldername(name text) TO anon; 3113 GRANT ALL ON FUNCTION storage.foldername(name text) TO authenticated; 3114 GRANT ALL ON FUNCTION storage.foldername(name text) TO service_role; 3115 GRANT ALL ON FUNCTION storage.foldername(name text) TO dashboard_user; 3116 GRANT ALL ON FUNCTION storage.foldername(name text) TO postgres; 3117 3118 3119 -- 3120 -- Name: FUNCTION http_request(); Type: ACL; Schema: supabase_functions; Owner: supabase_functions_admin 3121 -- 3122 3123 REVOKE ALL ON FUNCTION supabase_functions.http_request() FROM PUBLIC; 3124 GRANT ALL ON FUNCTION supabase_functions.http_request() TO postgres; 3125 GRANT ALL ON FUNCTION supabase_functions.http_request() TO anon; 3126 GRANT ALL ON FUNCTION supabase_functions.http_request() TO authenticated; 3127 GRANT ALL ON FUNCTION supabase_functions.http_request() TO service_role; 3128 3129 3130 -- 3131 -- Name: TABLE audit_log_entries; Type: ACL; Schema: auth; Owner: supabase_auth_admin 3132 -- 3133 3134 GRANT ALL ON TABLE auth.audit_log_entries TO dashboard_user; 3135 GRANT ALL ON TABLE auth.audit_log_entries TO postgres; 3136 3137 3138 -- 3139 -- Name: TABLE flow_state; Type: ACL; Schema: auth; Owner: supabase_auth_admin 3140 -- 3141 3142 GRANT ALL ON TABLE auth.flow_state TO postgres; 3143 GRANT ALL ON TABLE auth.flow_state TO dashboard_user; 3144 3145 3146 -- 3147 -- Name: TABLE identities; Type: ACL; Schema: auth; Owner: supabase_auth_admin 3148 -- 3149 3150 GRANT ALL ON TABLE auth.identities TO postgres; 3151 GRANT ALL ON TABLE auth.identities TO dashboard_user; 3152 3153 3154 -- 3155 -- Name: TABLE instances; Type: ACL; Schema: auth; Owner: supabase_auth_admin 3156 -- 3157 3158 GRANT ALL ON TABLE auth.instances TO dashboard_user; 3159 GRANT ALL ON TABLE auth.instances TO postgres; 3160 3161 3162 -- 3163 -- Name: TABLE mfa_amr_claims; Type: ACL; Schema: auth; Owner: supabase_auth_admin 3164 -- 3165 3166 GRANT ALL ON TABLE auth.mfa_amr_claims TO postgres; 3167 GRANT ALL ON TABLE auth.mfa_amr_claims TO dashboard_user; 3168 3169 3170 -- 3171 -- Name: TABLE mfa_challenges; Type: ACL; Schema: auth; Owner: supabase_auth_admin 3172 -- 3173 3174 GRANT ALL ON TABLE auth.mfa_challenges TO postgres; 3175 GRANT ALL ON TABLE auth.mfa_challenges TO dashboard_user; 3176 3177 3178 -- 3179 -- Name: TABLE mfa_factors; Type: ACL; Schema: auth; Owner: supabase_auth_admin 3180 -- 3181 3182 GRANT ALL ON TABLE auth.mfa_factors TO postgres; 3183 GRANT ALL ON TABLE auth.mfa_factors TO dashboard_user; 3184 3185 3186 -- 3187 -- Name: TABLE refresh_tokens; Type: ACL; Schema: auth; Owner: supabase_auth_admin 3188 -- 3189 3190 GRANT ALL ON TABLE auth.refresh_tokens TO dashboard_user; 3191 GRANT ALL ON TABLE auth.refresh_tokens TO postgres; 3192 3193 3194 -- 3195 -- Name: SEQUENCE refresh_tokens_id_seq; Type: ACL; Schema: auth; Owner: supabase_auth_admin 3196 -- 3197 3198 GRANT ALL ON SEQUENCE auth.refresh_tokens_id_seq TO dashboard_user; 3199 GRANT ALL ON SEQUENCE auth.refresh_tokens_id_seq TO postgres; 3200 3201 3202 -- 3203 -- Name: TABLE saml_providers; Type: ACL; Schema: auth; Owner: supabase_auth_admin 3204 -- 3205 3206 GRANT ALL ON TABLE auth.saml_providers TO postgres; 3207 GRANT ALL ON TABLE auth.saml_providers TO dashboard_user; 3208 3209 3210 -- 3211 -- Name: TABLE saml_relay_states; Type: ACL; Schema: auth; Owner: supabase_auth_admin 3212 -- 3213 3214 GRANT ALL ON TABLE auth.saml_relay_states TO postgres; 3215 GRANT ALL ON TABLE auth.saml_relay_states TO dashboard_user; 3216 3217 3218 -- 3219 -- Name: TABLE schema_migrations; Type: ACL; Schema: auth; Owner: supabase_auth_admin 3220 -- 3221 3222 GRANT ALL ON TABLE auth.schema_migrations TO dashboard_user; 3223 GRANT ALL ON TABLE auth.schema_migrations TO postgres; 3224 3225 3226 -- 3227 -- Name: TABLE sessions; Type: ACL; Schema: auth; Owner: supabase_auth_admin 3228 -- 3229 3230 GRANT ALL ON TABLE auth.sessions TO postgres; 3231 GRANT ALL ON TABLE auth.sessions TO dashboard_user; 3232 3233 3234 -- 3235 -- Name: TABLE sso_domains; Type: ACL; Schema: auth; Owner: supabase_auth_admin 3236 -- 3237 3238 GRANT ALL ON TABLE auth.sso_domains TO postgres; 3239 GRANT ALL ON TABLE auth.sso_domains TO dashboard_user; 3240 3241 3242 -- 3243 -- Name: TABLE sso_providers; Type: ACL; Schema: auth; Owner: supabase_auth_admin 3244 -- 3245 3246 GRANT ALL ON TABLE auth.sso_providers TO postgres; 3247 GRANT ALL ON TABLE auth.sso_providers TO dashboard_user; 3248 3249 3250 -- 3251 -- Name: TABLE users; Type: ACL; Schema: auth; Owner: supabase_auth_admin 3252 -- 3253 3254 GRANT ALL ON TABLE auth.users TO dashboard_user; 3255 GRANT ALL ON TABLE auth.users TO postgres; 3256 3257 3258 -- 3259 -- Name: TABLE pg_stat_statements; Type: ACL; Schema: extensions; Owner: postgres 3260 -- 3261 3262 GRANT ALL ON TABLE extensions.pg_stat_statements TO dashboard_user; 3263 3264 3265 -- 3266 -- Name: TABLE pg_stat_statements_info; Type: ACL; Schema: extensions; Owner: postgres 3267 -- 3268 3269 GRANT ALL ON TABLE extensions.pg_stat_statements_info TO dashboard_user; 3270 3271 3272 -- 3273 -- Name: SEQUENCE seq_schema_version; Type: ACL; Schema: graphql; Owner: supabase_admin 3274 -- 3275 3276 GRANT ALL ON SEQUENCE graphql.seq_schema_version TO postgres; 3277 GRANT ALL ON SEQUENCE graphql.seq_schema_version TO anon; 3278 GRANT ALL ON SEQUENCE graphql.seq_schema_version TO authenticated; 3279 GRANT ALL ON SEQUENCE graphql.seq_schema_version TO service_role; 3280 3281 3282 -- 3283 -- Name: TABLE valid_key; Type: ACL; Schema: pgsodium; Owner: postgres 3284 -- 3285 3286 GRANT ALL ON TABLE pgsodium.valid_key TO pgsodium_keyiduser; 3287 3288 3289 -- 3290 -- Name: TABLE buckets; Type: ACL; Schema: storage; Owner: supabase_storage_admin 3291 -- 3292 3293 GRANT ALL ON TABLE storage.buckets TO anon; 3294 GRANT ALL ON TABLE storage.buckets TO authenticated; 3295 GRANT ALL ON TABLE storage.buckets TO service_role; 3296 GRANT ALL ON TABLE storage.buckets TO postgres; 3297 3298 3299 -- 3300 -- Name: TABLE migrations; Type: ACL; Schema: storage; Owner: supabase_storage_admin 3301 -- 3302 3303 GRANT ALL ON TABLE storage.migrations TO anon; 3304 GRANT ALL ON TABLE storage.migrations TO authenticated; 3305 GRANT ALL ON TABLE storage.migrations TO service_role; 3306 GRANT ALL ON TABLE storage.migrations TO postgres; 3307 3308 3309 -- 3310 -- Name: TABLE objects; Type: ACL; Schema: storage; Owner: supabase_storage_admin 3311 -- 3312 3313 GRANT ALL ON TABLE storage.objects TO anon; 3314 GRANT ALL ON TABLE storage.objects TO authenticated; 3315 GRANT ALL ON TABLE storage.objects TO service_role; 3316 GRANT ALL ON TABLE storage.objects TO postgres; 3317 3318 3319 -- 3320 -- Name: TABLE hooks; Type: ACL; Schema: supabase_functions; Owner: supabase_functions_admin 3321 -- 3322 3323 GRANT ALL ON TABLE supabase_functions.hooks TO postgres; 3324 GRANT ALL ON TABLE supabase_functions.hooks TO anon; 3325 GRANT ALL ON TABLE supabase_functions.hooks TO authenticated; 3326 GRANT ALL ON TABLE supabase_functions.hooks TO service_role; 3327 3328 3329 -- 3330 -- Name: SEQUENCE hooks_id_seq; Type: ACL; Schema: supabase_functions; Owner: supabase_functions_admin 3331 -- 3332 3333 GRANT ALL ON SEQUENCE supabase_functions.hooks_id_seq TO postgres; 3334 GRANT ALL ON SEQUENCE supabase_functions.hooks_id_seq TO anon; 3335 GRANT ALL ON SEQUENCE supabase_functions.hooks_id_seq TO authenticated; 3336 GRANT ALL ON SEQUENCE supabase_functions.hooks_id_seq TO service_role; 3337 3338 3339 -- 3340 -- Name: TABLE migrations; Type: ACL; Schema: supabase_functions; Owner: supabase_functions_admin 3341 -- 3342 3343 GRANT ALL ON TABLE supabase_functions.migrations TO postgres; 3344 GRANT ALL ON TABLE supabase_functions.migrations TO anon; 3345 GRANT ALL ON TABLE supabase_functions.migrations TO authenticated; 3346 GRANT ALL ON TABLE supabase_functions.migrations TO service_role; 3347 3348 3349 -- 3350 -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: auth; Owner: supabase_auth_admin 3351 -- 3352 3353 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_auth_admin IN SCHEMA auth GRANT ALL ON SEQUENCES TO postgres; 3354 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_auth_admin IN SCHEMA auth GRANT ALL ON SEQUENCES TO dashboard_user; 3355 3356 3357 -- 3358 -- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: auth; Owner: supabase_auth_admin 3359 -- 3360 3361 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_auth_admin IN SCHEMA auth GRANT ALL ON FUNCTIONS TO postgres; 3362 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_auth_admin IN SCHEMA auth GRANT ALL ON FUNCTIONS TO dashboard_user; 3363 3364 3365 -- 3366 -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: auth; Owner: supabase_auth_admin 3367 -- 3368 3369 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_auth_admin IN SCHEMA auth GRANT ALL ON TABLES TO postgres; 3370 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_auth_admin IN SCHEMA auth GRANT ALL ON TABLES TO dashboard_user; 3371 3372 3373 -- 3374 -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: graphql; Owner: supabase_admin 3375 -- 3376 3377 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql GRANT ALL ON SEQUENCES TO postgres; 3378 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql GRANT ALL ON SEQUENCES TO anon; 3379 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql GRANT ALL ON SEQUENCES TO authenticated; 3380 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql GRANT ALL ON SEQUENCES TO service_role; 3381 3382 3383 -- 3384 -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: graphql; Owner: postgres 3385 -- 3386 3387 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA graphql GRANT ALL ON SEQUENCES TO postgres; 3388 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA graphql GRANT ALL ON SEQUENCES TO anon; 3389 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA graphql GRANT ALL ON SEQUENCES TO authenticated; 3390 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA graphql GRANT ALL ON SEQUENCES TO service_role; 3391 3392 3393 -- 3394 -- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: graphql; Owner: supabase_admin 3395 -- 3396 3397 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql GRANT ALL ON FUNCTIONS TO postgres; 3398 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql GRANT ALL ON FUNCTIONS TO anon; 3399 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql GRANT ALL ON FUNCTIONS TO authenticated; 3400 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql GRANT ALL ON FUNCTIONS TO service_role; 3401 3402 3403 -- 3404 -- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: graphql; Owner: postgres 3405 -- 3406 3407 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA graphql GRANT ALL ON FUNCTIONS TO postgres; 3408 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA graphql GRANT ALL ON FUNCTIONS TO anon; 3409 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA graphql GRANT ALL ON FUNCTIONS TO authenticated; 3410 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA graphql GRANT ALL ON FUNCTIONS TO service_role; 3411 3412 3413 -- 3414 -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: graphql; Owner: supabase_admin 3415 -- 3416 3417 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql GRANT ALL ON TABLES TO postgres; 3418 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql GRANT ALL ON TABLES TO anon; 3419 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql GRANT ALL ON TABLES TO authenticated; 3420 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql GRANT ALL ON TABLES TO service_role; 3421 3422 3423 -- 3424 -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: graphql; Owner: postgres 3425 -- 3426 3427 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA graphql GRANT ALL ON TABLES TO postgres; 3428 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA graphql GRANT ALL ON TABLES TO anon; 3429 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA graphql GRANT ALL ON TABLES TO authenticated; 3430 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA graphql GRANT ALL ON TABLES TO service_role; 3431 3432 3433 -- 3434 -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: graphql_public; Owner: supabase_admin 3435 -- 3436 3437 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON SEQUENCES TO postgres; 3438 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON SEQUENCES TO anon; 3439 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON SEQUENCES TO authenticated; 3440 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON SEQUENCES TO service_role; 3441 3442 3443 -- 3444 -- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: graphql_public; Owner: supabase_admin 3445 -- 3446 3447 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON FUNCTIONS TO postgres; 3448 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON FUNCTIONS TO anon; 3449 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON FUNCTIONS TO authenticated; 3450 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON FUNCTIONS TO service_role; 3451 3452 3453 -- 3454 -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: graphql_public; Owner: supabase_admin 3455 -- 3456 3457 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON TABLES TO postgres; 3458 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON TABLES TO anon; 3459 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON TABLES TO authenticated; 3460 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON TABLES TO service_role; 3461 3462 3463 -- 3464 -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: pgsodium; Owner: postgres 3465 -- 3466 3467 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA pgsodium GRANT ALL ON SEQUENCES TO pgsodium_keyiduser; 3468 3469 3470 -- 3471 -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: pgsodium; Owner: postgres 3472 -- 3473 3474 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA pgsodium GRANT ALL ON TABLES TO pgsodium_keyiduser; 3475 3476 3477 -- 3478 -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: public; Owner: postgres 3479 -- 3480 3481 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON SEQUENCES TO postgres; 3482 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON SEQUENCES TO anon; 3483 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON SEQUENCES TO authenticated; 3484 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON SEQUENCES TO service_role; 3485 3486 3487 -- 3488 -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: public; Owner: supabase_admin 3489 -- 3490 3491 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON SEQUENCES TO postgres; 3492 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON SEQUENCES TO anon; 3493 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON SEQUENCES TO authenticated; 3494 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON SEQUENCES TO service_role; 3495 3496 3497 -- 3498 -- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: public; Owner: postgres 3499 -- 3500 3501 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON FUNCTIONS TO postgres; 3502 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON FUNCTIONS TO anon; 3503 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON FUNCTIONS TO authenticated; 3504 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON FUNCTIONS TO service_role; 3505 3506 3507 -- 3508 -- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: public; Owner: supabase_admin 3509 -- 3510 3511 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON FUNCTIONS TO postgres; 3512 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON FUNCTIONS TO anon; 3513 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON FUNCTIONS TO authenticated; 3514 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON FUNCTIONS TO service_role; 3515 3516 3517 -- 3518 -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: public; Owner: postgres 3519 -- 3520 3521 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON TABLES TO postgres; 3522 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON TABLES TO anon; 3523 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON TABLES TO authenticated; 3524 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON TABLES TO service_role; 3525 3526 3527 -- 3528 -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: public; Owner: supabase_admin 3529 -- 3530 3531 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON TABLES TO postgres; 3532 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON TABLES TO anon; 3533 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON TABLES TO authenticated; 3534 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON TABLES TO service_role; 3535 3536 3537 -- 3538 -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: realtime; Owner: supabase_admin 3539 -- 3540 3541 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA realtime GRANT ALL ON SEQUENCES TO postgres; 3542 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA realtime GRANT ALL ON SEQUENCES TO dashboard_user; 3543 3544 3545 -- 3546 -- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: realtime; Owner: supabase_admin 3547 -- 3548 3549 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA realtime GRANT ALL ON FUNCTIONS TO postgres; 3550 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA realtime GRANT ALL ON FUNCTIONS TO dashboard_user; 3551 3552 3553 -- 3554 -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: realtime; Owner: supabase_admin 3555 -- 3556 3557 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA realtime GRANT ALL ON TABLES TO postgres; 3558 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA realtime GRANT ALL ON TABLES TO dashboard_user; 3559 3560 3561 -- 3562 -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: storage; Owner: postgres 3563 -- 3564 3565 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON SEQUENCES TO postgres; 3566 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON SEQUENCES TO anon; 3567 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON SEQUENCES TO authenticated; 3568 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON SEQUENCES TO service_role; 3569 3570 3571 -- 3572 -- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: storage; Owner: postgres 3573 -- 3574 3575 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON FUNCTIONS TO postgres; 3576 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON FUNCTIONS TO anon; 3577 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON FUNCTIONS TO authenticated; 3578 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON FUNCTIONS TO service_role; 3579 3580 3581 -- 3582 -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: storage; Owner: postgres 3583 -- 3584 3585 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON TABLES TO postgres; 3586 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON TABLES TO anon; 3587 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON TABLES TO authenticated; 3588 ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON TABLES TO service_role; 3589 3590 3591 -- 3592 -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: supabase_functions; Owner: supabase_admin 3593 -- 3594 3595 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA supabase_functions GRANT ALL ON SEQUENCES TO postgres; 3596 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA supabase_functions GRANT ALL ON SEQUENCES TO anon; 3597 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA supabase_functions GRANT ALL ON SEQUENCES TO authenticated; 3598 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA supabase_functions GRANT ALL ON SEQUENCES TO service_role; 3599 3600 3601 -- 3602 -- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: supabase_functions; Owner: supabase_admin 3603 -- 3604 3605 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA supabase_functions GRANT ALL ON FUNCTIONS TO postgres; 3606 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA supabase_functions GRANT ALL ON FUNCTIONS TO anon; 3607 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA supabase_functions GRANT ALL ON FUNCTIONS TO authenticated; 3608 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA supabase_functions GRANT ALL ON FUNCTIONS TO service_role; 3609 3610 3611 -- 3612 -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: supabase_functions; Owner: supabase_admin 3613 -- 3614 3615 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA supabase_functions GRANT ALL ON TABLES TO postgres; 3616 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA supabase_functions GRANT ALL ON TABLES TO anon; 3617 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA supabase_functions GRANT ALL ON TABLES TO authenticated; 3618 ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA supabase_functions GRANT ALL ON TABLES TO service_role; 3619 3620 3621 -- 3622 -- Name: issue_graphql_placeholder; Type: EVENT TRIGGER; Schema: -; Owner: supabase_admin 3623 -- 3624 3625 CREATE EVENT TRIGGER issue_graphql_placeholder ON sql_drop 3626 WHEN TAG IN ('DROP EXTENSION') 3627 EXECUTE FUNCTION extensions.set_graphql_placeholder(); 3628 3629 3630 ALTER EVENT TRIGGER issue_graphql_placeholder OWNER TO supabase_admin; 3631 3632 -- 3633 -- Name: issue_pg_cron_access; Type: EVENT TRIGGER; Schema: -; Owner: supabase_admin 3634 -- 3635 3636 CREATE EVENT TRIGGER issue_pg_cron_access ON ddl_command_end 3637 WHEN TAG IN ('CREATE SCHEMA') 3638 EXECUTE FUNCTION extensions.grant_pg_cron_access(); 3639 3640 3641 ALTER EVENT TRIGGER issue_pg_cron_access OWNER TO supabase_admin; 3642 3643 -- 3644 -- Name: issue_pg_graphql_access; Type: EVENT TRIGGER; Schema: -; Owner: supabase_admin 3645 -- 3646 3647 CREATE EVENT TRIGGER issue_pg_graphql_access ON ddl_command_end 3648 WHEN TAG IN ('CREATE FUNCTION') 3649 EXECUTE FUNCTION extensions.grant_pg_graphql_access(); 3650 3651 3652 ALTER EVENT TRIGGER issue_pg_graphql_access OWNER TO supabase_admin; 3653 3654 -- 3655 -- Name: issue_pg_net_access; Type: EVENT TRIGGER; Schema: -; Owner: supabase_admin 3656 -- 3657 3658 CREATE EVENT TRIGGER issue_pg_net_access ON ddl_command_end 3659 WHEN TAG IN ('CREATE EXTENSION') 3660 EXECUTE FUNCTION extensions.grant_pg_net_access(); 3661 3662 3663 ALTER EVENT TRIGGER issue_pg_net_access OWNER TO supabase_admin; 3664 3665 -- 3666 -- Name: pgrst_ddl_watch; Type: EVENT TRIGGER; Schema: -; Owner: supabase_admin 3667 -- 3668 3669 CREATE EVENT TRIGGER pgrst_ddl_watch ON ddl_command_end 3670 EXECUTE FUNCTION extensions.pgrst_ddl_watch(); 3671 3672 3673 ALTER EVENT TRIGGER pgrst_ddl_watch OWNER TO supabase_admin; 3674 3675 -- 3676 -- Name: pgrst_drop_watch; Type: EVENT TRIGGER; Schema: -; Owner: supabase_admin 3677 -- 3678 3679 CREATE EVENT TRIGGER pgrst_drop_watch ON sql_drop 3680 EXECUTE FUNCTION extensions.pgrst_drop_watch(); 3681 3682 3683 ALTER EVENT TRIGGER pgrst_drop_watch OWNER TO supabase_admin; 3684 3685 -- 3686 -- PostgreSQL database dump complete 3687 -- 3688 3689 DROP EXTENSION pg_graphql; CREATE EXTENSION pg_graphql WITH SCHEMA graphql; 3690 RESET ALL;