github.com/supabase/cli@v1.168.1/internal/utils/templates/initial_schemas/14.sql (about)

     1  --
     2  -- PostgreSQL database dump
     3  --
     4  
     5  -- Dumped from database version 14.5 (Debian 14.5-2.pgdg110+2)
     6  -- Dumped by pg_dump version 15.3
     7  
     8  SET statement_timeout = 0;
     9  SET lock_timeout = 0;
    10  SET idle_in_transaction_session_timeout = 0;
    11  SET client_encoding = 'UTF8';
    12  SET standard_conforming_strings = on;
    13  SELECT pg_catalog.set_config('search_path', '', false);
    14  SET check_function_bodies = false;
    15  SET xmloption = content;
    16  SET client_min_messages = warning;
    17  SET row_security = off;
    18  
    19  --
    20  -- Name: _analytics; Type: SCHEMA; Schema: -; Owner: postgres
    21  --
    22  
    23  CREATE SCHEMA IF NOT EXISTS _analytics;
    24  
    25  
    26  ALTER SCHEMA _analytics OWNER TO postgres;
    27  
    28  --
    29  -- Name: _realtime; Type: SCHEMA; Schema: -; Owner: postgres
    30  --
    31  
    32  CREATE SCHEMA IF NOT EXISTS _realtime;
    33  
    34  
    35  ALTER SCHEMA _realtime OWNER TO postgres;
    36  
    37  --
    38  -- Name: auth; Type: SCHEMA; Schema: -; Owner: supabase_admin
    39  --
    40  
    41  CREATE SCHEMA IF NOT EXISTS auth;
    42  
    43  
    44  ALTER SCHEMA auth OWNER TO supabase_admin;
    45  
    46  --
    47  -- Name: extensions; Type: SCHEMA; Schema: -; Owner: postgres
    48  --
    49  
    50  CREATE SCHEMA IF NOT EXISTS extensions;
    51  
    52  
    53  ALTER SCHEMA extensions OWNER TO postgres;
    54  
    55  --
    56  -- Name: graphql; Type: SCHEMA; Schema: -; Owner: supabase_admin
    57  --
    58  
    59  CREATE SCHEMA IF NOT EXISTS graphql;
    60  
    61  
    62  ALTER SCHEMA graphql OWNER TO supabase_admin;
    63  
    64  --
    65  -- Name: graphql_public; Type: SCHEMA; Schema: -; Owner: supabase_admin
    66  --
    67  
    68  CREATE SCHEMA IF NOT EXISTS graphql_public;
    69  
    70  
    71  ALTER SCHEMA graphql_public OWNER TO supabase_admin;
    72  
    73  --
    74  -- Name: pg_net; Type: EXTENSION; Schema: -; Owner: -
    75  --
    76  
    77  CREATE EXTENSION IF NOT EXISTS pg_net WITH SCHEMA extensions;
    78  
    79  
    80  --
    81  -- Name: EXTENSION pg_net; Type: COMMENT; Schema: -; Owner: 
    82  --
    83  
    84  COMMENT ON EXTENSION pg_net IS 'Async HTTP';
    85  
    86  
    87  --
    88  -- Name: pgbouncer; Type: SCHEMA; Schema: -; Owner: pgbouncer
    89  --
    90  
    91  CREATE SCHEMA IF NOT EXISTS pgbouncer;
    92  
    93  
    94  ALTER SCHEMA pgbouncer OWNER TO pgbouncer;
    95  
    96  --
    97  -- Name: pgsodium; Type: SCHEMA; Schema: -; Owner: postgres
    98  --
    99  
   100  CREATE SCHEMA IF NOT EXISTS pgsodium;
   101  
   102  
   103  ALTER SCHEMA pgsodium OWNER TO postgres;
   104  
   105  --
   106  -- Name: pgsodium; Type: EXTENSION; Schema: -; Owner: -
   107  --
   108  
   109  CREATE EXTENSION IF NOT EXISTS pgsodium WITH SCHEMA pgsodium;
   110  
   111  
   112  --
   113  -- Name: EXTENSION pgsodium; Type: COMMENT; Schema: -; Owner: 
   114  --
   115  
   116  COMMENT ON EXTENSION pgsodium IS 'Pgsodium is a modern cryptography library for Postgres.';
   117  
   118  
   119  --
   120  -- Name: public; Type: SCHEMA; Schema: -; Owner: postgres
   121  --
   122  
   123  -- *not* creating schema, since initdb creates it
   124  
   125  
   126  ALTER SCHEMA public OWNER TO postgres;
   127  
   128  --
   129  -- Name: realtime; Type: SCHEMA; Schema: -; Owner: supabase_admin
   130  --
   131  
   132  CREATE SCHEMA IF NOT EXISTS realtime;
   133  
   134  
   135  ALTER SCHEMA realtime OWNER TO supabase_admin;
   136  
   137  --
   138  -- Name: storage; Type: SCHEMA; Schema: -; Owner: supabase_admin
   139  --
   140  
   141  CREATE SCHEMA IF NOT EXISTS storage;
   142  
   143  
   144  ALTER SCHEMA storage OWNER TO supabase_admin;
   145  
   146  --
   147  -- Name: supabase_functions; Type: SCHEMA; Schema: -; Owner: supabase_admin
   148  --
   149  
   150  CREATE SCHEMA IF NOT EXISTS supabase_functions;
   151  
   152  
   153  ALTER SCHEMA supabase_functions OWNER TO supabase_admin;
   154  
   155  --
   156  -- Name: pg_graphql; Type: EXTENSION; Schema: -; Owner: -
   157  --
   158  
   159  CREATE EXTENSION IF NOT EXISTS pg_graphql WITH SCHEMA graphql;
   160  
   161  
   162  --
   163  -- Name: EXTENSION pg_graphql; Type: COMMENT; Schema: -; Owner: 
   164  --
   165  
   166  COMMENT ON EXTENSION pg_graphql IS 'pg_graphql: GraphQL support';
   167  
   168  
   169  --
   170  -- Name: pg_stat_statements; Type: EXTENSION; Schema: -; Owner: -
   171  --
   172  
   173  CREATE EXTENSION IF NOT EXISTS pg_stat_statements WITH SCHEMA extensions;
   174  
   175  
   176  --
   177  -- Name: EXTENSION pg_stat_statements; Type: COMMENT; Schema: -; Owner: 
   178  --
   179  
   180  COMMENT ON EXTENSION pg_stat_statements IS 'track planning and execution statistics of all SQL statements executed';
   181  
   182  
   183  --
   184  -- Name: pgcrypto; Type: EXTENSION; Schema: -; Owner: -
   185  --
   186  
   187  CREATE EXTENSION IF NOT EXISTS pgcrypto WITH SCHEMA extensions;
   188  
   189  
   190  --
   191  -- Name: EXTENSION pgcrypto; Type: COMMENT; Schema: -; Owner: 
   192  --
   193  
   194  COMMENT ON EXTENSION pgcrypto IS 'cryptographic functions';
   195  
   196  
   197  --
   198  -- Name: pgjwt; Type: EXTENSION; Schema: -; Owner: -
   199  --
   200  
   201  CREATE EXTENSION IF NOT EXISTS pgjwt WITH SCHEMA extensions;
   202  
   203  
   204  --
   205  -- Name: EXTENSION pgjwt; Type: COMMENT; Schema: -; Owner: 
   206  --
   207  
   208  COMMENT ON EXTENSION pgjwt IS 'JSON Web Token API for Postgresql';
   209  
   210  
   211  --
   212  -- Name: uuid-ossp; Type: EXTENSION; Schema: -; Owner: -
   213  --
   214  
   215  CREATE EXTENSION IF NOT EXISTS "uuid-ossp" WITH SCHEMA extensions;
   216  
   217  
   218  --
   219  -- Name: EXTENSION "uuid-ossp"; Type: COMMENT; Schema: -; Owner: 
   220  --
   221  
   222  COMMENT ON EXTENSION "uuid-ossp" IS 'generate universally unique identifiers (UUIDs)';
   223  
   224  
   225  --
   226  -- Name: aal_level; Type: TYPE; Schema: auth; Owner: supabase_auth_admin
   227  --
   228  
   229  CREATE TYPE auth.aal_level AS ENUM (
   230      'aal1',
   231      'aal2',
   232      'aal3'
   233  );
   234  
   235  
   236  ALTER TYPE auth.aal_level OWNER TO supabase_auth_admin;
   237  
   238  --
   239  -- Name: code_challenge_method; Type: TYPE; Schema: auth; Owner: supabase_auth_admin
   240  --
   241  
   242  CREATE TYPE auth.code_challenge_method AS ENUM (
   243      's256',
   244      'plain'
   245  );
   246  
   247  
   248  ALTER TYPE auth.code_challenge_method OWNER TO supabase_auth_admin;
   249  
   250  --
   251  -- Name: factor_status; Type: TYPE; Schema: auth; Owner: supabase_auth_admin
   252  --
   253  
   254  CREATE TYPE auth.factor_status AS ENUM (
   255      'unverified',
   256      'verified'
   257  );
   258  
   259  
   260  ALTER TYPE auth.factor_status OWNER TO supabase_auth_admin;
   261  
   262  --
   263  -- Name: factor_type; Type: TYPE; Schema: auth; Owner: supabase_auth_admin
   264  --
   265  
   266  CREATE TYPE auth.factor_type AS ENUM (
   267      'totp',
   268      'webauthn'
   269  );
   270  
   271  
   272  ALTER TYPE auth.factor_type OWNER TO supabase_auth_admin;
   273  
   274  --
   275  -- Name: email(); Type: FUNCTION; Schema: auth; Owner: supabase_auth_admin
   276  --
   277  
   278  CREATE OR REPLACE FUNCTION auth.email() RETURNS text
   279      LANGUAGE sql STABLE
   280      AS $$
   281    select 
   282    coalesce(
   283      nullif(current_setting('request.jwt.claim.email', true), ''),
   284      (nullif(current_setting('request.jwt.claims', true), '')::jsonb ->> 'email')
   285    )::text
   286  $$;
   287  
   288  
   289  ALTER FUNCTION auth.email() OWNER TO supabase_auth_admin;
   290  
   291  --
   292  -- Name: FUNCTION email(); Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
   293  --
   294  
   295  COMMENT ON FUNCTION auth.email() IS 'Deprecated. Use auth.jwt() -> ''email'' instead.';
   296  
   297  
   298  --
   299  -- Name: jwt(); Type: FUNCTION; Schema: auth; Owner: supabase_auth_admin
   300  --
   301  
   302  CREATE OR REPLACE FUNCTION auth.jwt() RETURNS jsonb
   303      LANGUAGE sql STABLE
   304      AS $$
   305    select 
   306      coalesce(
   307          nullif(current_setting('request.jwt.claim', true), ''),
   308          nullif(current_setting('request.jwt.claims', true), '')
   309      )::jsonb
   310  $$;
   311  
   312  
   313  ALTER FUNCTION auth.jwt() OWNER TO supabase_auth_admin;
   314  
   315  --
   316  -- Name: role(); Type: FUNCTION; Schema: auth; Owner: supabase_auth_admin
   317  --
   318  
   319  CREATE OR REPLACE FUNCTION auth.role() RETURNS text
   320      LANGUAGE sql STABLE
   321      AS $$
   322    select 
   323    coalesce(
   324      nullif(current_setting('request.jwt.claim.role', true), ''),
   325      (nullif(current_setting('request.jwt.claims', true), '')::jsonb ->> 'role')
   326    )::text
   327  $$;
   328  
   329  
   330  ALTER FUNCTION auth.role() OWNER TO supabase_auth_admin;
   331  
   332  --
   333  -- Name: FUNCTION role(); Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
   334  --
   335  
   336  COMMENT ON FUNCTION auth.role() IS 'Deprecated. Use auth.jwt() -> ''role'' instead.';
   337  
   338  
   339  --
   340  -- Name: uid(); Type: FUNCTION; Schema: auth; Owner: supabase_auth_admin
   341  --
   342  
   343  CREATE OR REPLACE FUNCTION auth.uid() RETURNS uuid
   344      LANGUAGE sql STABLE
   345      AS $$
   346    select 
   347    coalesce(
   348      nullif(current_setting('request.jwt.claim.sub', true), ''),
   349      (nullif(current_setting('request.jwt.claims', true), '')::jsonb ->> 'sub')
   350    )::uuid
   351  $$;
   352  
   353  
   354  ALTER FUNCTION auth.uid() OWNER TO supabase_auth_admin;
   355  
   356  --
   357  -- Name: FUNCTION uid(); Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
   358  --
   359  
   360  COMMENT ON FUNCTION auth.uid() IS 'Deprecated. Use auth.jwt() -> ''sub'' instead.';
   361  
   362  
   363  --
   364  -- Name: grant_pg_cron_access(); Type: FUNCTION; Schema: extensions; Owner: postgres
   365  --
   366  
   367  CREATE OR REPLACE FUNCTION extensions.grant_pg_cron_access() RETURNS event_trigger
   368      LANGUAGE plpgsql
   369      AS $$
   370  DECLARE
   371    schema_is_cron bool;
   372  BEGIN
   373    schema_is_cron = (
   374      SELECT n.nspname = 'cron'
   375      FROM pg_event_trigger_ddl_commands() AS ev
   376      LEFT JOIN pg_catalog.pg_namespace AS n
   377        ON ev.objid = n.oid
   378    );
   379  
   380    IF schema_is_cron
   381    THEN
   382      grant usage on schema cron to postgres with grant option;
   383  
   384      alter default privileges in schema cron grant all on tables to postgres with grant option;
   385      alter default privileges in schema cron grant all on functions to postgres with grant option;
   386      alter default privileges in schema cron grant all on sequences to postgres with grant option;
   387  
   388      alter default privileges for user supabase_admin in schema cron grant all
   389          on sequences to postgres with grant option;
   390      alter default privileges for user supabase_admin in schema cron grant all
   391          on tables to postgres with grant option;
   392      alter default privileges for user supabase_admin in schema cron grant all
   393          on functions to postgres with grant option;
   394  
   395      grant all privileges on all tables in schema cron to postgres with grant option;
   396  
   397    END IF;
   398  
   399  END;
   400  $$;
   401  
   402  
   403  ALTER FUNCTION extensions.grant_pg_cron_access() OWNER TO postgres;
   404  
   405  --
   406  -- Name: FUNCTION grant_pg_cron_access(); Type: COMMENT; Schema: extensions; Owner: postgres
   407  --
   408  
   409  COMMENT ON FUNCTION extensions.grant_pg_cron_access() IS 'Grants access to pg_cron';
   410  
   411  
   412  --
   413  -- Name: grant_pg_graphql_access(); Type: FUNCTION; Schema: extensions; Owner: supabase_admin
   414  --
   415  
   416  CREATE OR REPLACE FUNCTION extensions.grant_pg_graphql_access() RETURNS event_trigger
   417      LANGUAGE plpgsql
   418      AS $_$
   419  DECLARE
   420      func_is_graphql_resolve bool;
   421  BEGIN
   422      func_is_graphql_resolve = (
   423          SELECT n.proname = 'resolve'
   424          FROM pg_event_trigger_ddl_commands() AS ev
   425          LEFT JOIN pg_catalog.pg_proc AS n
   426          ON ev.objid = n.oid
   427      );
   428  
   429      IF func_is_graphql_resolve
   430      THEN
   431          -- Update public wrapper to pass all arguments through to the pg_graphql resolve func
   432          DROP FUNCTION IF EXISTS graphql_public.graphql;
   433          create or replace function graphql_public.graphql(
   434              "operationName" text default null,
   435              query text default null,
   436              variables jsonb default null,
   437              extensions jsonb default null
   438          )
   439              returns jsonb
   440              language sql
   441          as $$
   442              select graphql.resolve(
   443                  query := query,
   444                  variables := coalesce(variables, '{}'),
   445                  "operationName" := "operationName",
   446                  extensions := extensions
   447              );
   448          $$;
   449  
   450          -- This hook executes when `graphql.resolve` is created. That is not necessarily the last
   451          -- function in the extension so we need to grant permissions on existing entities AND
   452          -- update default permissions to any others that are created after `graphql.resolve`
   453          grant usage on schema graphql to postgres, anon, authenticated, service_role;
   454          grant select on all tables in schema graphql to postgres, anon, authenticated, service_role;
   455          grant execute on all functions in schema graphql to postgres, anon, authenticated, service_role;
   456          grant all on all sequences in schema graphql to postgres, anon, authenticated, service_role;
   457          alter default privileges in schema graphql grant all on tables to postgres, anon, authenticated, service_role;
   458          alter default privileges in schema graphql grant all on functions to postgres, anon, authenticated, service_role;
   459          alter default privileges in schema graphql grant all on sequences to postgres, anon, authenticated, service_role;
   460      END IF;
   461  
   462  END;
   463  $_$;
   464  
   465  
   466  ALTER FUNCTION extensions.grant_pg_graphql_access() OWNER TO supabase_admin;
   467  
   468  --
   469  -- Name: FUNCTION grant_pg_graphql_access(); Type: COMMENT; Schema: extensions; Owner: supabase_admin
   470  --
   471  
   472  COMMENT ON FUNCTION extensions.grant_pg_graphql_access() IS 'Grants access to pg_graphql';
   473  
   474  
   475  --
   476  -- Name: grant_pg_net_access(); Type: FUNCTION; Schema: extensions; Owner: postgres
   477  --
   478  
   479  CREATE OR REPLACE FUNCTION extensions.grant_pg_net_access() RETURNS event_trigger
   480      LANGUAGE plpgsql
   481      AS $$
   482  BEGIN
   483    IF EXISTS (
   484      SELECT 1
   485      FROM pg_event_trigger_ddl_commands() AS ev
   486      JOIN pg_extension AS ext
   487      ON ev.objid = ext.oid
   488      WHERE ext.extname = 'pg_net'
   489    )
   490    THEN
   491      GRANT USAGE ON SCHEMA net TO supabase_functions_admin, postgres, anon, authenticated, service_role;
   492  
   493      ALTER function net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) SECURITY DEFINER;
   494      ALTER function net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) SECURITY DEFINER;
   495  
   496      ALTER function net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) SET search_path = net;
   497      ALTER function net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) SET search_path = net;
   498  
   499      REVOKE ALL ON FUNCTION net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) FROM PUBLIC;
   500      REVOKE ALL ON FUNCTION net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) FROM PUBLIC;
   501  
   502      GRANT EXECUTE ON FUNCTION net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) TO supabase_functions_admin, postgres, anon, authenticated, service_role;
   503      GRANT EXECUTE ON FUNCTION net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) TO supabase_functions_admin, postgres, anon, authenticated, service_role;
   504    END IF;
   505  END;
   506  $$;
   507  
   508  
   509  ALTER FUNCTION extensions.grant_pg_net_access() OWNER TO postgres;
   510  
   511  --
   512  -- Name: FUNCTION grant_pg_net_access(); Type: COMMENT; Schema: extensions; Owner: postgres
   513  --
   514  
   515  COMMENT ON FUNCTION extensions.grant_pg_net_access() IS 'Grants access to pg_net';
   516  
   517  
   518  --
   519  -- Name: pgrst_ddl_watch(); Type: FUNCTION; Schema: extensions; Owner: supabase_admin
   520  --
   521  
   522  CREATE OR REPLACE FUNCTION extensions.pgrst_ddl_watch() RETURNS event_trigger
   523      LANGUAGE plpgsql
   524      AS $$
   525  DECLARE
   526    cmd record;
   527  BEGIN
   528    FOR cmd IN SELECT * FROM pg_event_trigger_ddl_commands()
   529    LOOP
   530      IF cmd.command_tag IN (
   531        'CREATE SCHEMA', 'ALTER SCHEMA'
   532      , 'CREATE TABLE', 'CREATE TABLE AS', 'SELECT INTO', 'ALTER TABLE'
   533      , 'CREATE FOREIGN TABLE', 'ALTER FOREIGN TABLE'
   534      , 'CREATE VIEW', 'ALTER VIEW'
   535      , 'CREATE MATERIALIZED VIEW', 'ALTER MATERIALIZED VIEW'
   536      , 'CREATE FUNCTION', 'ALTER FUNCTION'
   537      , 'CREATE TRIGGER'
   538      , 'CREATE TYPE', 'ALTER TYPE'
   539      , 'CREATE RULE'
   540      , 'COMMENT'
   541      )
   542      -- don't notify in case of CREATE TEMP table or other objects created on pg_temp
   543      AND cmd.schema_name is distinct from 'pg_temp'
   544      THEN
   545        NOTIFY pgrst, 'reload schema';
   546      END IF;
   547    END LOOP;
   548  END; $$;
   549  
   550  
   551  ALTER FUNCTION extensions.pgrst_ddl_watch() OWNER TO supabase_admin;
   552  
   553  --
   554  -- Name: pgrst_drop_watch(); Type: FUNCTION; Schema: extensions; Owner: supabase_admin
   555  --
   556  
   557  CREATE OR REPLACE FUNCTION extensions.pgrst_drop_watch() RETURNS event_trigger
   558      LANGUAGE plpgsql
   559      AS $$
   560  DECLARE
   561    obj record;
   562  BEGIN
   563    FOR obj IN SELECT * FROM pg_event_trigger_dropped_objects()
   564    LOOP
   565      IF obj.object_type IN (
   566        'schema'
   567      , 'table'
   568      , 'foreign table'
   569      , 'view'
   570      , 'materialized view'
   571      , 'function'
   572      , 'trigger'
   573      , 'type'
   574      , 'rule'
   575      )
   576      AND obj.is_temporary IS false -- no pg_temp objects
   577      THEN
   578        NOTIFY pgrst, 'reload schema';
   579      END IF;
   580    END LOOP;
   581  END; $$;
   582  
   583  
   584  ALTER FUNCTION extensions.pgrst_drop_watch() OWNER TO supabase_admin;
   585  
   586  --
   587  -- Name: set_graphql_placeholder(); Type: FUNCTION; Schema: extensions; Owner: supabase_admin
   588  --
   589  
   590  CREATE OR REPLACE FUNCTION extensions.set_graphql_placeholder() RETURNS event_trigger
   591      LANGUAGE plpgsql
   592      AS $_$
   593      DECLARE
   594      graphql_is_dropped bool;
   595      BEGIN
   596      graphql_is_dropped = (
   597          SELECT ev.schema_name = 'graphql_public'
   598          FROM pg_event_trigger_dropped_objects() AS ev
   599          WHERE ev.schema_name = 'graphql_public'
   600      );
   601  
   602      IF graphql_is_dropped
   603      THEN
   604          create or replace function graphql_public.graphql(
   605              "operationName" text default null,
   606              query text default null,
   607              variables jsonb default null,
   608              extensions jsonb default null
   609          )
   610              returns jsonb
   611              language plpgsql
   612          as $$
   613              DECLARE
   614                  server_version float;
   615              BEGIN
   616                  server_version = (SELECT (SPLIT_PART((select version()), ' ', 2))::float);
   617  
   618                  IF server_version >= 14 THEN
   619                      RETURN jsonb_build_object(
   620                          'errors', jsonb_build_array(
   621                              jsonb_build_object(
   622                                  'message', 'pg_graphql extension is not enabled.'
   623                              )
   624                          )
   625                      );
   626                  ELSE
   627                      RETURN jsonb_build_object(
   628                          'errors', jsonb_build_array(
   629                              jsonb_build_object(
   630                                  'message', 'pg_graphql is only available on projects running Postgres 14 onwards.'
   631                              )
   632                          )
   633                      );
   634                  END IF;
   635              END;
   636          $$;
   637      END IF;
   638  
   639      END;
   640  $_$;
   641  
   642  
   643  ALTER FUNCTION extensions.set_graphql_placeholder() OWNER TO supabase_admin;
   644  
   645  --
   646  -- Name: FUNCTION set_graphql_placeholder(); Type: COMMENT; Schema: extensions; Owner: supabase_admin
   647  --
   648  
   649  COMMENT ON FUNCTION extensions.set_graphql_placeholder() IS 'Reintroduces placeholder function for graphql_public.graphql';
   650  
   651  
   652  --
   653  -- Name: get_auth(text); Type: FUNCTION; Schema: pgbouncer; Owner: postgres
   654  --
   655  
   656  CREATE OR REPLACE FUNCTION pgbouncer.get_auth(p_usename text) RETURNS TABLE(username text, password text)
   657      LANGUAGE plpgsql SECURITY DEFINER
   658      AS $$
   659  BEGIN
   660      RAISE WARNING 'PgBouncer auth request: %', p_usename;
   661  
   662      RETURN QUERY
   663      SELECT usename::TEXT, passwd::TEXT FROM pg_catalog.pg_shadow
   664      WHERE usename = p_usename;
   665  END;
   666  $$;
   667  
   668  
   669  ALTER FUNCTION pgbouncer.get_auth(p_usename text) OWNER TO postgres;
   670  
   671  --
   672  -- Name: can_insert_object(text, text, uuid, jsonb); Type: FUNCTION; Schema: storage; Owner: supabase_storage_admin
   673  --
   674  
   675  CREATE OR REPLACE FUNCTION storage.can_insert_object(bucketid text, name text, owner uuid, metadata jsonb) RETURNS void
   676      LANGUAGE plpgsql
   677      AS $$
   678  BEGIN
   679    INSERT INTO "storage"."objects" ("bucket_id", "name", "owner", "metadata") VALUES (bucketid, name, owner, metadata);
   680    -- hack to rollback the successful insert
   681    RAISE sqlstate 'PT200' using
   682    message = 'ROLLBACK',
   683    detail = 'rollback successful insert';
   684  END
   685  $$;
   686  
   687  
   688  ALTER FUNCTION storage.can_insert_object(bucketid text, name text, owner uuid, metadata jsonb) OWNER TO supabase_storage_admin;
   689  
   690  --
   691  -- Name: extension(text); Type: FUNCTION; Schema: storage; Owner: supabase_storage_admin
   692  --
   693  
   694  CREATE OR REPLACE FUNCTION storage.extension(name text) RETURNS text
   695      LANGUAGE plpgsql
   696      AS $$
   697  DECLARE
   698  _parts text[];
   699  _filename text;
   700  BEGIN
   701  	select string_to_array(name, '/') into _parts;
   702  	select _parts[array_length(_parts,1)] into _filename;
   703  	-- @todo return the last part instead of 2
   704  	return split_part(_filename, '.', 2);
   705  END
   706  $$;
   707  
   708  
   709  ALTER FUNCTION storage.extension(name text) OWNER TO supabase_storage_admin;
   710  
   711  --
   712  -- Name: filename(text); Type: FUNCTION; Schema: storage; Owner: supabase_storage_admin
   713  --
   714  
   715  CREATE OR REPLACE FUNCTION storage.filename(name text) RETURNS text
   716      LANGUAGE plpgsql
   717      AS $$
   718  DECLARE
   719  _parts text[];
   720  BEGIN
   721  	select string_to_array(name, '/') into _parts;
   722  	return _parts[array_length(_parts,1)];
   723  END
   724  $$;
   725  
   726  
   727  ALTER FUNCTION storage.filename(name text) OWNER TO supabase_storage_admin;
   728  
   729  --
   730  -- Name: foldername(text); Type: FUNCTION; Schema: storage; Owner: supabase_storage_admin
   731  --
   732  
   733  CREATE OR REPLACE FUNCTION storage.foldername(name text) RETURNS text[]
   734      LANGUAGE plpgsql
   735      AS $$
   736  DECLARE
   737  _parts text[];
   738  BEGIN
   739  	select string_to_array(name, '/') into _parts;
   740  	return _parts[1:array_length(_parts,1)-1];
   741  END
   742  $$;
   743  
   744  
   745  ALTER FUNCTION storage.foldername(name text) OWNER TO supabase_storage_admin;
   746  
   747  --
   748  -- Name: get_size_by_bucket(); Type: FUNCTION; Schema: storage; Owner: supabase_storage_admin
   749  --
   750  
   751  CREATE OR REPLACE FUNCTION storage.get_size_by_bucket() RETURNS TABLE(size bigint, bucket_id text)
   752      LANGUAGE plpgsql
   753      AS $$
   754  BEGIN
   755      return query
   756          select sum((metadata->>'size')::int) as size, obj.bucket_id
   757          from "storage".objects as obj
   758          group by obj.bucket_id;
   759  END
   760  $$;
   761  
   762  
   763  ALTER FUNCTION storage.get_size_by_bucket() OWNER TO supabase_storage_admin;
   764  
   765  --
   766  -- Name: search(text, text, integer, integer, integer, text, text, text); Type: FUNCTION; Schema: storage; Owner: supabase_storage_admin
   767  --
   768  
   769  CREATE OR REPLACE FUNCTION storage.search(prefix text, bucketname text, limits integer DEFAULT 100, levels integer DEFAULT 1, offsets integer DEFAULT 0, search text DEFAULT ''::text, sortcolumn text DEFAULT 'name'::text, sortorder text DEFAULT 'asc'::text) RETURNS TABLE(name text, id uuid, updated_at timestamp with time zone, created_at timestamp with time zone, last_accessed_at timestamp with time zone, metadata jsonb)
   770      LANGUAGE plpgsql STABLE
   771      AS $_$
   772  declare
   773    v_order_by text;
   774    v_sort_order text;
   775  begin
   776    case
   777      when sortcolumn = 'name' then
   778        v_order_by = 'name';
   779      when sortcolumn = 'updated_at' then
   780        v_order_by = 'updated_at';
   781      when sortcolumn = 'created_at' then
   782        v_order_by = 'created_at';
   783      when sortcolumn = 'last_accessed_at' then
   784        v_order_by = 'last_accessed_at';
   785      else
   786        v_order_by = 'name';
   787    end case;
   788  
   789    case
   790      when sortorder = 'asc' then
   791        v_sort_order = 'asc';
   792      when sortorder = 'desc' then
   793        v_sort_order = 'desc';
   794      else
   795        v_sort_order = 'asc';
   796    end case;
   797  
   798    v_order_by = v_order_by || ' ' || v_sort_order;
   799  
   800    return query execute
   801      'with folders as (
   802         select path_tokens[$1] as folder
   803         from storage.objects
   804           where objects.name ilike $2 || $3 || ''%''
   805             and bucket_id = $4
   806             and array_length(regexp_split_to_array(objects.name, ''/''), 1) <> $1
   807         group by folder
   808         order by folder ' || v_sort_order || '
   809       )
   810       (select folder as "name",
   811              null as id,
   812              null as updated_at,
   813              null as created_at,
   814              null as last_accessed_at,
   815              null as metadata from folders)
   816       union all
   817       (select path_tokens[$1] as "name",
   818              id,
   819              updated_at,
   820              created_at,
   821              last_accessed_at,
   822              metadata
   823       from storage.objects
   824       where objects.name ilike $2 || $3 || ''%''
   825         and bucket_id = $4
   826         and array_length(regexp_split_to_array(objects.name, ''/''), 1) = $1
   827       order by ' || v_order_by || ')
   828       limit $5
   829       offset $6' using levels, prefix, search, bucketname, limits, offsets;
   830  end;
   831  $_$;
   832  
   833  
   834  ALTER FUNCTION storage.search(prefix text, bucketname text, limits integer, levels integer, offsets integer, search text, sortcolumn text, sortorder text) OWNER TO supabase_storage_admin;
   835  
   836  --
   837  -- Name: update_updated_at_column(); Type: FUNCTION; Schema: storage; Owner: supabase_storage_admin
   838  --
   839  
   840  CREATE OR REPLACE FUNCTION storage.update_updated_at_column() RETURNS trigger
   841      LANGUAGE plpgsql
   842      AS $$
   843  BEGIN
   844      NEW.updated_at = now();
   845      RETURN NEW; 
   846  END;
   847  $$;
   848  
   849  
   850  ALTER FUNCTION storage.update_updated_at_column() OWNER TO supabase_storage_admin;
   851  
   852  --
   853  -- Name: http_request(); Type: FUNCTION; Schema: supabase_functions; Owner: supabase_functions_admin
   854  --
   855  
   856  CREATE OR REPLACE FUNCTION supabase_functions.http_request() RETURNS trigger
   857      LANGUAGE plpgsql SECURITY DEFINER
   858      SET search_path TO 'supabase_functions'
   859      AS $$
   860    DECLARE
   861      request_id bigint;
   862      payload jsonb;
   863      url text := TG_ARGV[0]::text;
   864      method text := TG_ARGV[1]::text;
   865      headers jsonb DEFAULT '{}'::jsonb;
   866      params jsonb DEFAULT '{}'::jsonb;
   867      timeout_ms integer DEFAULT 1000;
   868    BEGIN
   869      IF url IS NULL OR url = 'null' THEN
   870        RAISE EXCEPTION 'url argument is missing';
   871      END IF;
   872  
   873      IF method IS NULL OR method = 'null' THEN
   874        RAISE EXCEPTION 'method argument is missing';
   875      END IF;
   876  
   877      IF TG_ARGV[2] IS NULL OR TG_ARGV[2] = 'null' THEN
   878        headers = '{"Content-Type": "application/json"}'::jsonb;
   879      ELSE
   880        headers = TG_ARGV[2]::jsonb;
   881      END IF;
   882  
   883      IF TG_ARGV[3] IS NULL OR TG_ARGV[3] = 'null' THEN
   884        params = '{}'::jsonb;
   885      ELSE
   886        params = TG_ARGV[3]::jsonb;
   887      END IF;
   888  
   889      IF TG_ARGV[4] IS NULL OR TG_ARGV[4] = 'null' THEN
   890        timeout_ms = 1000;
   891      ELSE
   892        timeout_ms = TG_ARGV[4]::integer;
   893      END IF;
   894  
   895      CASE
   896        WHEN method = 'GET' THEN
   897          SELECT http_get INTO request_id FROM net.http_get(
   898            url,
   899            params,
   900            headers,
   901            timeout_ms
   902          );
   903        WHEN method = 'POST' THEN
   904          payload = jsonb_build_object(
   905            'old_record', OLD,
   906            'record', NEW,
   907            'type', TG_OP,
   908            'table', TG_TABLE_NAME,
   909            'schema', TG_TABLE_SCHEMA
   910          );
   911  
   912          SELECT http_post INTO request_id FROM net.http_post(
   913            url,
   914            payload,
   915            params,
   916            headers,
   917            timeout_ms
   918          );
   919        ELSE
   920          RAISE EXCEPTION 'method argument % is invalid', method;
   921      END CASE;
   922  
   923      INSERT INTO supabase_functions.hooks
   924        (hook_table_id, hook_name, request_id)
   925      VALUES
   926        (TG_RELID, TG_NAME, request_id);
   927  
   928      RETURN NEW;
   929    END
   930  $$;
   931  
   932  
   933  ALTER FUNCTION supabase_functions.http_request() OWNER TO supabase_functions_admin;
   934  
   935  SET default_tablespace = '';
   936  
   937  SET default_table_access_method = heap;
   938  
   939  --
   940  -- Name: extensions; Type: TABLE; Schema: _realtime; Owner: postgres
   941  --
   942  
   943  CREATE TABLE IF NOT EXISTS _realtime.extensions (
   944      id uuid NOT NULL,
   945      type text,
   946      settings jsonb,
   947      tenant_external_id text,
   948      inserted_at timestamp(0) without time zone NOT NULL,
   949      updated_at timestamp(0) without time zone NOT NULL
   950  );
   951  
   952  
   953  ALTER TABLE _realtime.extensions OWNER TO postgres;
   954  
   955  --
   956  -- Name: schema_migrations; Type: TABLE; Schema: _realtime; Owner: postgres
   957  --
   958  
   959  CREATE TABLE IF NOT EXISTS _realtime.schema_migrations (
   960      version bigint NOT NULL,
   961      inserted_at timestamp(0) without time zone
   962  );
   963  
   964  
   965  ALTER TABLE _realtime.schema_migrations OWNER TO postgres;
   966  
   967  --
   968  -- Name: tenants; Type: TABLE; Schema: _realtime; Owner: postgres
   969  --
   970  
   971  CREATE TABLE IF NOT EXISTS _realtime.tenants (
   972      id uuid NOT NULL,
   973      name text,
   974      external_id text,
   975      jwt_secret text,
   976      max_concurrent_users integer DEFAULT 200 NOT NULL,
   977      inserted_at timestamp(0) without time zone NOT NULL,
   978      updated_at timestamp(0) without time zone NOT NULL,
   979      max_events_per_second integer DEFAULT 100 NOT NULL,
   980      postgres_cdc_default text DEFAULT 'postgres_cdc_rls'::text,
   981      max_bytes_per_second integer DEFAULT 100000 NOT NULL,
   982      max_channels_per_client integer DEFAULT 100 NOT NULL,
   983      max_joins_per_second integer DEFAULT 500 NOT NULL,
   984      suspend boolean DEFAULT false
   985  );
   986  
   987  
   988  ALTER TABLE _realtime.tenants OWNER TO postgres;
   989  
   990  --
   991  -- Name: audit_log_entries; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
   992  --
   993  
   994  CREATE TABLE IF NOT EXISTS auth.audit_log_entries (
   995      instance_id uuid,
   996      id uuid NOT NULL,
   997      payload json,
   998      created_at timestamp with time zone,
   999      ip_address character varying(64) DEFAULT ''::character varying NOT NULL
  1000  );
  1001  
  1002  
  1003  ALTER TABLE auth.audit_log_entries OWNER TO supabase_auth_admin;
  1004  
  1005  --
  1006  -- Name: TABLE audit_log_entries; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
  1007  --
  1008  
  1009  COMMENT ON TABLE auth.audit_log_entries IS 'Auth: Audit trail for user actions.';
  1010  
  1011  
  1012  --
  1013  -- Name: flow_state; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
  1014  --
  1015  
  1016  CREATE TABLE IF NOT EXISTS auth.flow_state (
  1017      id uuid NOT NULL,
  1018      user_id uuid,
  1019      auth_code text NOT NULL,
  1020      code_challenge_method auth.code_challenge_method NOT NULL,
  1021      code_challenge text NOT NULL,
  1022      provider_type text NOT NULL,
  1023      provider_access_token text,
  1024      provider_refresh_token text,
  1025      created_at timestamp with time zone,
  1026      updated_at timestamp with time zone,
  1027      authentication_method text NOT NULL
  1028  );
  1029  
  1030  
  1031  ALTER TABLE auth.flow_state OWNER TO supabase_auth_admin;
  1032  
  1033  --
  1034  -- Name: TABLE flow_state; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
  1035  --
  1036  
  1037  COMMENT ON TABLE auth.flow_state IS 'stores metadata for pkce logins';
  1038  
  1039  
  1040  --
  1041  -- Name: identities; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
  1042  --
  1043  
  1044  CREATE TABLE IF NOT EXISTS auth.identities (
  1045      provider_id text NOT NULL,
  1046      user_id uuid NOT NULL,
  1047      identity_data jsonb NOT NULL,
  1048      provider text NOT NULL,
  1049      last_sign_in_at timestamp with time zone,
  1050      created_at timestamp with time zone,
  1051      updated_at timestamp with time zone,
  1052      email text GENERATED ALWAYS AS (lower((identity_data ->> 'email'::text))) STORED,
  1053      id uuid DEFAULT gen_random_uuid() NOT NULL
  1054  );
  1055  
  1056  
  1057  ALTER TABLE auth.identities OWNER TO supabase_auth_admin;
  1058  
  1059  --
  1060  -- Name: TABLE identities; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
  1061  --
  1062  
  1063  COMMENT ON TABLE auth.identities IS 'Auth: Stores identities associated to a user.';
  1064  
  1065  
  1066  --
  1067  -- Name: COLUMN identities.email; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
  1068  --
  1069  
  1070  COMMENT ON COLUMN auth.identities.email IS 'Auth: Email is a generated column that references the optional email property in the identity_data';
  1071  
  1072  
  1073  --
  1074  -- Name: instances; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
  1075  --
  1076  
  1077  CREATE TABLE IF NOT EXISTS auth.instances (
  1078      id uuid NOT NULL,
  1079      uuid uuid,
  1080      raw_base_config text,
  1081      created_at timestamp with time zone,
  1082      updated_at timestamp with time zone
  1083  );
  1084  
  1085  
  1086  ALTER TABLE auth.instances OWNER TO supabase_auth_admin;
  1087  
  1088  --
  1089  -- Name: TABLE instances; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
  1090  --
  1091  
  1092  COMMENT ON TABLE auth.instances IS 'Auth: Manages users across multiple sites.';
  1093  
  1094  
  1095  --
  1096  -- Name: mfa_amr_claims; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
  1097  --
  1098  
  1099  CREATE TABLE IF NOT EXISTS auth.mfa_amr_claims (
  1100      session_id uuid NOT NULL,
  1101      created_at timestamp with time zone NOT NULL,
  1102      updated_at timestamp with time zone NOT NULL,
  1103      authentication_method text NOT NULL,
  1104      id uuid NOT NULL
  1105  );
  1106  
  1107  
  1108  ALTER TABLE auth.mfa_amr_claims OWNER TO supabase_auth_admin;
  1109  
  1110  --
  1111  -- Name: TABLE mfa_amr_claims; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
  1112  --
  1113  
  1114  COMMENT ON TABLE auth.mfa_amr_claims IS 'auth: stores authenticator method reference claims for multi factor authentication';
  1115  
  1116  
  1117  --
  1118  -- Name: mfa_challenges; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
  1119  --
  1120  
  1121  CREATE TABLE IF NOT EXISTS auth.mfa_challenges (
  1122      id uuid NOT NULL,
  1123      factor_id uuid NOT NULL,
  1124      created_at timestamp with time zone NOT NULL,
  1125      verified_at timestamp with time zone,
  1126      ip_address inet NOT NULL
  1127  );
  1128  
  1129  
  1130  ALTER TABLE auth.mfa_challenges OWNER TO supabase_auth_admin;
  1131  
  1132  --
  1133  -- Name: TABLE mfa_challenges; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
  1134  --
  1135  
  1136  COMMENT ON TABLE auth.mfa_challenges IS 'auth: stores metadata about challenge requests made';
  1137  
  1138  
  1139  --
  1140  -- Name: mfa_factors; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
  1141  --
  1142  
  1143  CREATE TABLE IF NOT EXISTS auth.mfa_factors (
  1144      id uuid NOT NULL,
  1145      user_id uuid NOT NULL,
  1146      friendly_name text,
  1147      factor_type auth.factor_type NOT NULL,
  1148      status auth.factor_status NOT NULL,
  1149      created_at timestamp with time zone NOT NULL,
  1150      updated_at timestamp with time zone NOT NULL,
  1151      secret text
  1152  );
  1153  
  1154  
  1155  ALTER TABLE auth.mfa_factors OWNER TO supabase_auth_admin;
  1156  
  1157  --
  1158  -- Name: TABLE mfa_factors; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
  1159  --
  1160  
  1161  COMMENT ON TABLE auth.mfa_factors IS 'auth: stores metadata about factors';
  1162  
  1163  
  1164  --
  1165  -- Name: refresh_tokens; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
  1166  --
  1167  
  1168  CREATE TABLE IF NOT EXISTS auth.refresh_tokens (
  1169      instance_id uuid,
  1170      id bigint NOT NULL,
  1171      token character varying(255),
  1172      user_id character varying(255),
  1173      revoked boolean,
  1174      created_at timestamp with time zone,
  1175      updated_at timestamp with time zone,
  1176      parent character varying(255),
  1177      session_id uuid
  1178  );
  1179  
  1180  
  1181  ALTER TABLE auth.refresh_tokens OWNER TO supabase_auth_admin;
  1182  
  1183  --
  1184  -- Name: TABLE refresh_tokens; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
  1185  --
  1186  
  1187  COMMENT ON TABLE auth.refresh_tokens IS 'Auth: Store of tokens used to refresh JWT tokens once they expire.';
  1188  
  1189  
  1190  --
  1191  -- Name: refresh_tokens_id_seq; Type: SEQUENCE; Schema: auth; Owner: supabase_auth_admin
  1192  --
  1193  
  1194  CREATE SEQUENCE IF NOT EXISTS auth.refresh_tokens_id_seq
  1195      START WITH 1
  1196      INCREMENT BY 1
  1197      NO MINVALUE
  1198      NO MAXVALUE
  1199      CACHE 1;
  1200  
  1201  
  1202  ALTER TABLE auth.refresh_tokens_id_seq OWNER TO supabase_auth_admin;
  1203  
  1204  --
  1205  -- Name: refresh_tokens_id_seq; Type: SEQUENCE OWNED BY; Schema: auth; Owner: supabase_auth_admin
  1206  --
  1207  
  1208  ALTER SEQUENCE auth.refresh_tokens_id_seq OWNED BY auth.refresh_tokens.id;
  1209  
  1210  
  1211  --
  1212  -- Name: saml_providers; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
  1213  --
  1214  
  1215  CREATE TABLE IF NOT EXISTS auth.saml_providers (
  1216      id uuid NOT NULL,
  1217      sso_provider_id uuid NOT NULL,
  1218      entity_id text NOT NULL,
  1219      metadata_xml text NOT NULL,
  1220      metadata_url text,
  1221      attribute_mapping jsonb,
  1222      created_at timestamp with time zone,
  1223      updated_at timestamp with time zone,
  1224      CONSTRAINT "entity_id not empty" CHECK ((char_length(entity_id) > 0)),
  1225      CONSTRAINT "metadata_url not empty" CHECK (((metadata_url = NULL::text) OR (char_length(metadata_url) > 0))),
  1226      CONSTRAINT "metadata_xml not empty" CHECK ((char_length(metadata_xml) > 0))
  1227  );
  1228  
  1229  
  1230  ALTER TABLE auth.saml_providers OWNER TO supabase_auth_admin;
  1231  
  1232  --
  1233  -- Name: TABLE saml_providers; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
  1234  --
  1235  
  1236  COMMENT ON TABLE auth.saml_providers IS 'Auth: Manages SAML Identity Provider connections.';
  1237  
  1238  
  1239  --
  1240  -- Name: saml_relay_states; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
  1241  --
  1242  
  1243  CREATE TABLE IF NOT EXISTS auth.saml_relay_states (
  1244      id uuid NOT NULL,
  1245      sso_provider_id uuid NOT NULL,
  1246      request_id text NOT NULL,
  1247      for_email text,
  1248      redirect_to text,
  1249      from_ip_address inet,
  1250      created_at timestamp with time zone,
  1251      updated_at timestamp with time zone,
  1252      flow_state_id uuid,
  1253      CONSTRAINT "request_id not empty" CHECK ((char_length(request_id) > 0))
  1254  );
  1255  
  1256  
  1257  ALTER TABLE auth.saml_relay_states OWNER TO supabase_auth_admin;
  1258  
  1259  --
  1260  -- Name: TABLE saml_relay_states; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
  1261  --
  1262  
  1263  COMMENT ON TABLE auth.saml_relay_states IS 'Auth: Contains SAML Relay State information for each Service Provider initiated login.';
  1264  
  1265  
  1266  --
  1267  -- Name: schema_migrations; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
  1268  --
  1269  
  1270  CREATE TABLE IF NOT EXISTS auth.schema_migrations (
  1271      version character varying(255) NOT NULL
  1272  );
  1273  
  1274  
  1275  ALTER TABLE auth.schema_migrations OWNER TO supabase_auth_admin;
  1276  
  1277  --
  1278  -- Name: TABLE schema_migrations; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
  1279  --
  1280  
  1281  COMMENT ON TABLE auth.schema_migrations IS 'Auth: Manages updates to the auth system.';
  1282  
  1283  
  1284  --
  1285  -- Name: sessions; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
  1286  --
  1287  
  1288  CREATE TABLE IF NOT EXISTS auth.sessions (
  1289      id uuid NOT NULL,
  1290      user_id uuid NOT NULL,
  1291      created_at timestamp with time zone,
  1292      updated_at timestamp with time zone,
  1293      factor_id uuid,
  1294      aal auth.aal_level,
  1295      not_after timestamp with time zone,
  1296      refreshed_at timestamp without time zone,
  1297      user_agent text,
  1298      ip inet,
  1299      tag text
  1300  );
  1301  
  1302  
  1303  ALTER TABLE auth.sessions OWNER TO supabase_auth_admin;
  1304  
  1305  --
  1306  -- Name: TABLE sessions; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
  1307  --
  1308  
  1309  COMMENT ON TABLE auth.sessions IS 'Auth: Stores session data associated to a user.';
  1310  
  1311  
  1312  --
  1313  -- Name: COLUMN sessions.not_after; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
  1314  --
  1315  
  1316  COMMENT ON COLUMN auth.sessions.not_after IS 'Auth: Not after is a nullable column that contains a timestamp after which the session should be regarded as expired.';
  1317  
  1318  
  1319  --
  1320  -- Name: sso_domains; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
  1321  --
  1322  
  1323  CREATE TABLE IF NOT EXISTS auth.sso_domains (
  1324      id uuid NOT NULL,
  1325      sso_provider_id uuid NOT NULL,
  1326      domain text NOT NULL,
  1327      created_at timestamp with time zone,
  1328      updated_at timestamp with time zone,
  1329      CONSTRAINT "domain not empty" CHECK ((char_length(domain) > 0))
  1330  );
  1331  
  1332  
  1333  ALTER TABLE auth.sso_domains OWNER TO supabase_auth_admin;
  1334  
  1335  --
  1336  -- Name: TABLE sso_domains; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
  1337  --
  1338  
  1339  COMMENT ON TABLE auth.sso_domains IS 'Auth: Manages SSO email address domain mapping to an SSO Identity Provider.';
  1340  
  1341  
  1342  --
  1343  -- Name: sso_providers; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
  1344  --
  1345  
  1346  CREATE TABLE IF NOT EXISTS auth.sso_providers (
  1347      id uuid NOT NULL,
  1348      resource_id text,
  1349      created_at timestamp with time zone,
  1350      updated_at timestamp with time zone,
  1351      CONSTRAINT "resource_id not empty" CHECK (((resource_id = NULL::text) OR (char_length(resource_id) > 0)))
  1352  );
  1353  
  1354  
  1355  ALTER TABLE auth.sso_providers OWNER TO supabase_auth_admin;
  1356  
  1357  --
  1358  -- Name: TABLE sso_providers; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
  1359  --
  1360  
  1361  COMMENT ON TABLE auth.sso_providers IS 'Auth: Manages SSO identity provider information; see saml_providers for SAML.';
  1362  
  1363  
  1364  --
  1365  -- Name: COLUMN sso_providers.resource_id; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
  1366  --
  1367  
  1368  COMMENT ON COLUMN auth.sso_providers.resource_id IS 'Auth: Uniquely identifies a SSO provider according to a user-chosen resource ID (case insensitive), useful in infrastructure as code.';
  1369  
  1370  
  1371  --
  1372  -- Name: users; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
  1373  --
  1374  
  1375  CREATE TABLE IF NOT EXISTS auth.users (
  1376      instance_id uuid,
  1377      id uuid NOT NULL,
  1378      aud character varying(255),
  1379      role character varying(255),
  1380      email character varying(255),
  1381      encrypted_password character varying(255),
  1382      email_confirmed_at timestamp with time zone,
  1383      invited_at timestamp with time zone,
  1384      confirmation_token character varying(255),
  1385      confirmation_sent_at timestamp with time zone,
  1386      recovery_token character varying(255),
  1387      recovery_sent_at timestamp with time zone,
  1388      email_change_token_new character varying(255),
  1389      email_change character varying(255),
  1390      email_change_sent_at timestamp with time zone,
  1391      last_sign_in_at timestamp with time zone,
  1392      raw_app_meta_data jsonb,
  1393      raw_user_meta_data jsonb,
  1394      is_super_admin boolean,
  1395      created_at timestamp with time zone,
  1396      updated_at timestamp with time zone,
  1397      phone text DEFAULT NULL::character varying,
  1398      phone_confirmed_at timestamp with time zone,
  1399      phone_change text DEFAULT ''::character varying,
  1400      phone_change_token character varying(255) DEFAULT ''::character varying,
  1401      phone_change_sent_at timestamp with time zone,
  1402      confirmed_at timestamp with time zone GENERATED ALWAYS AS (LEAST(email_confirmed_at, phone_confirmed_at)) STORED,
  1403      email_change_token_current character varying(255) DEFAULT ''::character varying,
  1404      email_change_confirm_status smallint DEFAULT 0,
  1405      banned_until timestamp with time zone,
  1406      reauthentication_token character varying(255) DEFAULT ''::character varying,
  1407      reauthentication_sent_at timestamp with time zone,
  1408      is_sso_user boolean DEFAULT false NOT NULL,
  1409      deleted_at timestamp with time zone,
  1410      CONSTRAINT users_email_change_confirm_status_check CHECK (((email_change_confirm_status >= 0) AND (email_change_confirm_status <= 2)))
  1411  );
  1412  
  1413  
  1414  ALTER TABLE auth.users OWNER TO supabase_auth_admin;
  1415  
  1416  --
  1417  -- Name: TABLE users; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
  1418  --
  1419  
  1420  COMMENT ON TABLE auth.users IS 'Auth: Stores user login data within a secure schema.';
  1421  
  1422  
  1423  --
  1424  -- Name: COLUMN users.is_sso_user; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
  1425  --
  1426  
  1427  COMMENT ON COLUMN auth.users.is_sso_user IS 'Auth: Set this column to true when the account comes from SSO. These accounts can have duplicate emails.';
  1428  
  1429  
  1430  --
  1431  -- Name: buckets; Type: TABLE; Schema: storage; Owner: supabase_storage_admin
  1432  --
  1433  
  1434  CREATE TABLE IF NOT EXISTS storage.buckets (
  1435      id text NOT NULL,
  1436      name text NOT NULL,
  1437      owner uuid,
  1438      created_at timestamp with time zone DEFAULT now(),
  1439      updated_at timestamp with time zone DEFAULT now(),
  1440      public boolean DEFAULT false,
  1441      avif_autodetection boolean DEFAULT false,
  1442      file_size_limit bigint,
  1443      allowed_mime_types text[],
  1444      owner_id text
  1445  );
  1446  
  1447  
  1448  ALTER TABLE storage.buckets OWNER TO supabase_storage_admin;
  1449  
  1450  --
  1451  -- Name: COLUMN buckets.owner; Type: COMMENT; Schema: storage; Owner: supabase_storage_admin
  1452  --
  1453  
  1454  COMMENT ON COLUMN storage.buckets.owner IS 'Field is deprecated, use owner_id instead';
  1455  
  1456  
  1457  --
  1458  -- Name: migrations; Type: TABLE; Schema: storage; Owner: supabase_storage_admin
  1459  --
  1460  
  1461  CREATE TABLE IF NOT EXISTS storage.migrations (
  1462      id integer NOT NULL,
  1463      name character varying(100) NOT NULL,
  1464      hash character varying(40) NOT NULL,
  1465      executed_at timestamp without time zone DEFAULT CURRENT_TIMESTAMP
  1466  );
  1467  
  1468  
  1469  ALTER TABLE storage.migrations OWNER TO supabase_storage_admin;
  1470  
  1471  --
  1472  -- Name: objects; Type: TABLE; Schema: storage; Owner: supabase_storage_admin
  1473  --
  1474  
  1475  CREATE TABLE IF NOT EXISTS storage.objects (
  1476      id uuid DEFAULT extensions.uuid_generate_v4() NOT NULL,
  1477      bucket_id text,
  1478      name text,
  1479      owner uuid,
  1480      created_at timestamp with time zone DEFAULT now(),
  1481      updated_at timestamp with time zone DEFAULT now(),
  1482      last_accessed_at timestamp with time zone DEFAULT now(),
  1483      metadata jsonb,
  1484      path_tokens text[] GENERATED ALWAYS AS (string_to_array(name, '/'::text)) STORED,
  1485      version text,
  1486      owner_id text
  1487  );
  1488  
  1489  
  1490  ALTER TABLE storage.objects OWNER TO supabase_storage_admin;
  1491  
  1492  --
  1493  -- Name: COLUMN objects.owner; Type: COMMENT; Schema: storage; Owner: supabase_storage_admin
  1494  --
  1495  
  1496  COMMENT ON COLUMN storage.objects.owner IS 'Field is deprecated, use owner_id instead';
  1497  
  1498  
  1499  --
  1500  -- Name: hooks; Type: TABLE; Schema: supabase_functions; Owner: supabase_functions_admin
  1501  --
  1502  
  1503  CREATE TABLE IF NOT EXISTS supabase_functions.hooks (
  1504      id bigint NOT NULL,
  1505      hook_table_id integer NOT NULL,
  1506      hook_name text NOT NULL,
  1507      created_at timestamp with time zone DEFAULT now() NOT NULL,
  1508      request_id bigint
  1509  );
  1510  
  1511  
  1512  ALTER TABLE supabase_functions.hooks OWNER TO supabase_functions_admin;
  1513  
  1514  --
  1515  -- Name: TABLE hooks; Type: COMMENT; Schema: supabase_functions; Owner: supabase_functions_admin
  1516  --
  1517  
  1518  COMMENT ON TABLE supabase_functions.hooks IS 'Supabase Functions Hooks: Audit trail for triggered hooks.';
  1519  
  1520  
  1521  --
  1522  -- Name: hooks_id_seq; Type: SEQUENCE; Schema: supabase_functions; Owner: supabase_functions_admin
  1523  --
  1524  
  1525  CREATE SEQUENCE IF NOT EXISTS supabase_functions.hooks_id_seq
  1526      START WITH 1
  1527      INCREMENT BY 1
  1528      NO MINVALUE
  1529      NO MAXVALUE
  1530      CACHE 1;
  1531  
  1532  
  1533  ALTER TABLE supabase_functions.hooks_id_seq OWNER TO supabase_functions_admin;
  1534  
  1535  --
  1536  -- Name: hooks_id_seq; Type: SEQUENCE OWNED BY; Schema: supabase_functions; Owner: supabase_functions_admin
  1537  --
  1538  
  1539  ALTER SEQUENCE supabase_functions.hooks_id_seq OWNED BY supabase_functions.hooks.id;
  1540  
  1541  
  1542  --
  1543  -- Name: migrations; Type: TABLE; Schema: supabase_functions; Owner: supabase_functions_admin
  1544  --
  1545  
  1546  CREATE TABLE IF NOT EXISTS supabase_functions.migrations (
  1547      version text NOT NULL,
  1548      inserted_at timestamp with time zone DEFAULT now() NOT NULL
  1549  );
  1550  
  1551  
  1552  ALTER TABLE supabase_functions.migrations OWNER TO supabase_functions_admin;
  1553  
  1554  --
  1555  -- Name: refresh_tokens id; Type: DEFAULT; Schema: auth; Owner: supabase_auth_admin
  1556  --
  1557  
  1558  ALTER TABLE ONLY auth.refresh_tokens ALTER COLUMN id SET DEFAULT nextval('auth.refresh_tokens_id_seq'::regclass);
  1559  
  1560  
  1561  --
  1562  -- Name: hooks id; Type: DEFAULT; Schema: supabase_functions; Owner: supabase_functions_admin
  1563  --
  1564  
  1565  ALTER TABLE ONLY supabase_functions.hooks ALTER COLUMN id SET DEFAULT nextval('supabase_functions.hooks_id_seq'::regclass);
  1566  
  1567  
  1568  --
  1569  -- Data for Name: extensions; Type: TABLE DATA; Schema: _realtime; Owner: postgres
  1570  --
  1571  
  1572  INSERT INTO _realtime.extensions (id, type, settings, tenant_external_id, inserted_at, updated_at) VALUES ('832b3aeb-9d7f-41aa-ad31-60ea054c294f', 'postgres_cdc_rls', '{"region": "us-east-1", "db_host": "ABK7kBu27y/PVdL10i/b+A==", "db_name": "sWBpZNdjggEPTQVlI52Zfw==", "db_port": "+enMDFi1J/3IrrquHHwUmA==", "db_user": "uxbEq/zz8DXVD53TOI1zmw==", "slot_name": "supabase_realtime_replication_slot", "ip_version": 4, "db_password": "sWBpZNdjggEPTQVlI52Zfw==", "publication": "supabase_realtime", "ssl_enforced": false, "poll_interval_ms": 100, "poll_max_changes": 100, "poll_max_record_bytes": 1048576}', 'realtime-dev', '2023-11-20 22:04:38', '2023-11-20 22:04:38');
  1573  
  1574  
  1575  --
  1576  -- Data for Name: schema_migrations; Type: TABLE DATA; Schema: _realtime; Owner: postgres
  1577  --
  1578  
  1579  INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20210706140551, '2023-03-16 02:25:35');
  1580  INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20220329161857, '2023-03-16 02:25:35');
  1581  INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20220410212326, '2023-03-16 02:25:35');
  1582  INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20220506102948, '2023-03-16 02:25:35');
  1583  INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20220527210857, '2023-03-16 02:25:36');
  1584  INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20220815211129, '2023-03-16 02:25:36');
  1585  INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20220815215024, '2023-03-16 02:25:36');
  1586  INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20220818141501, '2023-03-16 02:25:36');
  1587  INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20221018173709, '2023-03-16 02:25:36');
  1588  INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20221102172703, '2023-03-16 02:25:36');
  1589  INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20221223010058, '2023-03-16 02:25:36');
  1590  INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20230110180046, '2023-03-16 02:25:36');
  1591  INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20230810220907, '2023-11-20 21:54:23');
  1592  INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20230810220924, '2023-11-20 21:54:23');
  1593  INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20231024094642, '2023-11-20 21:54:23');
  1594  
  1595  
  1596  --
  1597  -- Data for Name: tenants; Type: TABLE DATA; Schema: _realtime; Owner: postgres
  1598  --
  1599  
  1600  INSERT INTO _realtime.tenants (id, name, external_id, jwt_secret, max_concurrent_users, inserted_at, updated_at, max_events_per_second, postgres_cdc_default, max_bytes_per_second, max_channels_per_client, max_joins_per_second, suspend) VALUES ('f418662c-07b5-4160-9338-4db7fbaaabbd', 'realtime-dev', 'realtime-dev', 'iNjicxc4+llvc9wovDvqymwfnj9teWMlyOIbJ8Fh6j2WNU8CIJ2ZgjR6MUIKqSmeDmvpsKLsZ9jgXJmQPpwL8w==', 200, '2023-11-20 22:04:38', '2023-11-20 22:04:38', 100, 'postgres_cdc_rls', 100000, 100, 100, false);
  1601  
  1602  
  1603  --
  1604  -- Data for Name: audit_log_entries; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
  1605  --
  1606  
  1607  
  1608  
  1609  --
  1610  -- Data for Name: flow_state; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
  1611  --
  1612  
  1613  
  1614  
  1615  --
  1616  -- Data for Name: identities; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
  1617  --
  1618  
  1619  
  1620  
  1621  --
  1622  -- Data for Name: instances; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
  1623  --
  1624  
  1625  
  1626  
  1627  --
  1628  -- Data for Name: mfa_amr_claims; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
  1629  --
  1630  
  1631  
  1632  
  1633  --
  1634  -- Data for Name: mfa_challenges; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
  1635  --
  1636  
  1637  
  1638  
  1639  --
  1640  -- Data for Name: mfa_factors; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
  1641  --
  1642  
  1643  
  1644  
  1645  --
  1646  -- Data for Name: refresh_tokens; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
  1647  --
  1648  
  1649  
  1650  
  1651  --
  1652  -- Data for Name: saml_providers; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
  1653  --
  1654  
  1655  
  1656  
  1657  --
  1658  -- Data for Name: saml_relay_states; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
  1659  --
  1660  
  1661  
  1662  
  1663  --
  1664  -- Data for Name: schema_migrations; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
  1665  --
  1666  
  1667  INSERT INTO auth.schema_migrations (version) VALUES ('20171026211738');
  1668  INSERT INTO auth.schema_migrations (version) VALUES ('20171026211808');
  1669  INSERT INTO auth.schema_migrations (version) VALUES ('20171026211834');
  1670  INSERT INTO auth.schema_migrations (version) VALUES ('20180103212743');
  1671  INSERT INTO auth.schema_migrations (version) VALUES ('20180108183307');
  1672  INSERT INTO auth.schema_migrations (version) VALUES ('20180119214651');
  1673  INSERT INTO auth.schema_migrations (version) VALUES ('20180125194653');
  1674  INSERT INTO auth.schema_migrations (version) VALUES ('00');
  1675  INSERT INTO auth.schema_migrations (version) VALUES ('20210710035447');
  1676  INSERT INTO auth.schema_migrations (version) VALUES ('20210722035447');
  1677  INSERT INTO auth.schema_migrations (version) VALUES ('20210730183235');
  1678  INSERT INTO auth.schema_migrations (version) VALUES ('20210909172000');
  1679  INSERT INTO auth.schema_migrations (version) VALUES ('20210927181326');
  1680  INSERT INTO auth.schema_migrations (version) VALUES ('20211122151130');
  1681  INSERT INTO auth.schema_migrations (version) VALUES ('20211124214934');
  1682  INSERT INTO auth.schema_migrations (version) VALUES ('20211202183645');
  1683  INSERT INTO auth.schema_migrations (version) VALUES ('20220114185221');
  1684  INSERT INTO auth.schema_migrations (version) VALUES ('20220114185340');
  1685  INSERT INTO auth.schema_migrations (version) VALUES ('20220224000811');
  1686  INSERT INTO auth.schema_migrations (version) VALUES ('20220323170000');
  1687  INSERT INTO auth.schema_migrations (version) VALUES ('20220429102000');
  1688  INSERT INTO auth.schema_migrations (version) VALUES ('20220531120530');
  1689  INSERT INTO auth.schema_migrations (version) VALUES ('20220614074223');
  1690  INSERT INTO auth.schema_migrations (version) VALUES ('20220811173540');
  1691  INSERT INTO auth.schema_migrations (version) VALUES ('20221003041349');
  1692  INSERT INTO auth.schema_migrations (version) VALUES ('20221003041400');
  1693  INSERT INTO auth.schema_migrations (version) VALUES ('20221011041400');
  1694  INSERT INTO auth.schema_migrations (version) VALUES ('20221020193600');
  1695  INSERT INTO auth.schema_migrations (version) VALUES ('20221021073300');
  1696  INSERT INTO auth.schema_migrations (version) VALUES ('20221021082433');
  1697  INSERT INTO auth.schema_migrations (version) VALUES ('20221027105023');
  1698  INSERT INTO auth.schema_migrations (version) VALUES ('20221114143122');
  1699  INSERT INTO auth.schema_migrations (version) VALUES ('20221114143410');
  1700  INSERT INTO auth.schema_migrations (version) VALUES ('20221125140132');
  1701  INSERT INTO auth.schema_migrations (version) VALUES ('20221208132122');
  1702  INSERT INTO auth.schema_migrations (version) VALUES ('20221215195500');
  1703  INSERT INTO auth.schema_migrations (version) VALUES ('20221215195800');
  1704  INSERT INTO auth.schema_migrations (version) VALUES ('20221215195900');
  1705  INSERT INTO auth.schema_migrations (version) VALUES ('20230116124310');
  1706  INSERT INTO auth.schema_migrations (version) VALUES ('20230116124412');
  1707  INSERT INTO auth.schema_migrations (version) VALUES ('20230131181311');
  1708  INSERT INTO auth.schema_migrations (version) VALUES ('20230322519590');
  1709  INSERT INTO auth.schema_migrations (version) VALUES ('20230402418590');
  1710  INSERT INTO auth.schema_migrations (version) VALUES ('20230411005111');
  1711  INSERT INTO auth.schema_migrations (version) VALUES ('20230508135423');
  1712  INSERT INTO auth.schema_migrations (version) VALUES ('20230523124323');
  1713  INSERT INTO auth.schema_migrations (version) VALUES ('20230818113222');
  1714  INSERT INTO auth.schema_migrations (version) VALUES ('20230914180801');
  1715  INSERT INTO auth.schema_migrations (version) VALUES ('20231027141322');
  1716  INSERT INTO auth.schema_migrations (version) VALUES ('20231114161723');
  1717  INSERT INTO auth.schema_migrations (version) VALUES ('20231117164230');
  1718  
  1719  
  1720  --
  1721  -- Data for Name: sessions; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
  1722  --
  1723  
  1724  
  1725  
  1726  --
  1727  -- Data for Name: sso_domains; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
  1728  --
  1729  
  1730  
  1731  
  1732  --
  1733  -- Data for Name: sso_providers; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
  1734  --
  1735  
  1736  
  1737  
  1738  --
  1739  -- Data for Name: users; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
  1740  --
  1741  
  1742  
  1743  
  1744  --
  1745  -- Data for Name: buckets; Type: TABLE DATA; Schema: storage; Owner: supabase_storage_admin
  1746  --
  1747  
  1748  
  1749  
  1750  --
  1751  -- Data for Name: migrations; Type: TABLE DATA; Schema: storage; Owner: supabase_storage_admin
  1752  --
  1753  
  1754  INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (0, 'create-migrations-table', 'e18db593bcde2aca2a408c4d1100f6abba2195df', '2023-03-16 02:25:37.548482');
  1755  INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (1, 'initialmigration', '6ab16121fbaa08bbd11b712d05f358f9b555d777', '2023-03-16 02:25:37.55595');
  1756  INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (2, 'pathtoken-column', '49756be03be4c17bb85fe70d4a861f27de7e49ad', '2023-03-16 02:25:37.560258');
  1757  INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (3, 'add-migrations-rls', 'bb5d124c53d68635a883e399426c6a5a25fc893d', '2023-03-16 02:25:37.594153');
  1758  INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (4, 'add-size-functions', '6d79007d04f5acd288c9c250c42d2d5fd286c54d', '2023-03-16 02:25:37.599194');
  1759  INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (5, 'change-column-name-in-get-size', 'fd65688505d2ffa9fbdc58a944348dd8604d688c', '2023-03-16 02:25:37.604658');
  1760  INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (6, 'add-rls-to-buckets', '63e2bab75a2040fee8e3fb3f15a0d26f3380e9b6', '2023-03-16 02:25:37.609563');
  1761  INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (7, 'add-public-to-buckets', '82568934f8a4d9e0a85f126f6fb483ad8214c418', '2023-03-16 02:25:37.615929');
  1762  INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (8, 'fix-search-function', '1a43a40eddb525f2e2f26efd709e6c06e58e059c', '2023-03-16 02:25:37.620171');
  1763  INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (9, 'search-files-search-function', '34c096597eb8b9d077fdfdde9878c88501b2fafc', '2023-03-16 02:25:37.624484');
  1764  INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (10, 'add-trigger-to-auto-update-updated_at-column', '37d6bb964a70a822e6d37f22f457b9bca7885928', '2023-03-16 02:25:37.629534');
  1765  INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (11, 'add-automatic-avif-detection-flag', 'bd76c53a9c564c80d98d119c1b3a28e16c8152db', '2023-03-16 02:25:37.634022');
  1766  INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (12, 'add-bucket-custom-limits', 'cbe0a4c32a0e891554a21020433b7a4423c07ee7', '2023-03-16 02:25:37.639132');
  1767  INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (13, 'use-bytes-for-max-size', '7a158ebce8a0c2801c9c65b7e9b2f98f68b3874e', '2023-03-16 02:25:37.643598');
  1768  INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (14, 'add-can-insert-object-function', '273193826bca7e0990b458d1ba72f8aa27c0d825', '2023-04-06 09:18:55.232202');
  1769  INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (15, 'add-version', 'e821a779d26612899b8c2dfe20245f904a327c4f', '2023-04-06 09:18:55.239444');
  1770  INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (16, 'drop-owner-foreign-key', '536b33f8878eed09d0144219777dcac96bdb25da', '2023-11-20 21:54:33.540386');
  1771  INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (17, 'add_owner_id_column_deprecate_owner', '7545f216a39358b5487df75d941d05dbcd75eb46', '2023-11-20 22:04:38.959686');
  1772  
  1773  
  1774  --
  1775  -- Data for Name: objects; Type: TABLE DATA; Schema: storage; Owner: supabase_storage_admin
  1776  --
  1777  
  1778  
  1779  
  1780  --
  1781  -- Data for Name: hooks; Type: TABLE DATA; Schema: supabase_functions; Owner: supabase_functions_admin
  1782  --
  1783  
  1784  
  1785  
  1786  --
  1787  -- Data for Name: migrations; Type: TABLE DATA; Schema: supabase_functions; Owner: supabase_functions_admin
  1788  --
  1789  
  1790  INSERT INTO supabase_functions.migrations (version, inserted_at) VALUES ('initial', '2023-03-16 02:25:30.966697+00');
  1791  INSERT INTO supabase_functions.migrations (version, inserted_at) VALUES ('20210809183423_update_grants', '2023-03-16 02:25:30.966697+00');
  1792  
  1793  
  1794  --
  1795  -- Name: refresh_tokens_id_seq; Type: SEQUENCE SET; Schema: auth; Owner: supabase_auth_admin
  1796  --
  1797  
  1798  SELECT pg_catalog.setval('auth.refresh_tokens_id_seq', 1, false);
  1799  
  1800  
  1801  --
  1802  -- Name: hooks_id_seq; Type: SEQUENCE SET; Schema: supabase_functions; Owner: supabase_functions_admin
  1803  --
  1804  
  1805  SELECT pg_catalog.setval('supabase_functions.hooks_id_seq', 1, false);
  1806  
  1807  
  1808  --
  1809  -- Name: extensions extensions_pkey; Type: CONSTRAINT; Schema: _realtime; Owner: postgres
  1810  --
  1811  
  1812  ALTER TABLE ONLY _realtime.extensions
  1813      ADD CONSTRAINT extensions_pkey PRIMARY KEY (id);
  1814  
  1815  
  1816  --
  1817  -- Name: schema_migrations schema_migrations_pkey; Type: CONSTRAINT; Schema: _realtime; Owner: postgres
  1818  --
  1819  
  1820  ALTER TABLE ONLY _realtime.schema_migrations
  1821      ADD CONSTRAINT schema_migrations_pkey PRIMARY KEY (version);
  1822  
  1823  
  1824  --
  1825  -- Name: tenants tenants_pkey; Type: CONSTRAINT; Schema: _realtime; Owner: postgres
  1826  --
  1827  
  1828  ALTER TABLE ONLY _realtime.tenants
  1829      ADD CONSTRAINT tenants_pkey PRIMARY KEY (id);
  1830  
  1831  
  1832  --
  1833  -- Name: mfa_amr_claims amr_id_pk; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1834  --
  1835  
  1836  ALTER TABLE ONLY auth.mfa_amr_claims
  1837      ADD CONSTRAINT amr_id_pk PRIMARY KEY (id);
  1838  
  1839  
  1840  --
  1841  -- Name: audit_log_entries audit_log_entries_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1842  --
  1843  
  1844  ALTER TABLE ONLY auth.audit_log_entries
  1845      ADD CONSTRAINT audit_log_entries_pkey PRIMARY KEY (id);
  1846  
  1847  
  1848  --
  1849  -- Name: flow_state flow_state_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1850  --
  1851  
  1852  ALTER TABLE ONLY auth.flow_state
  1853      ADD CONSTRAINT flow_state_pkey PRIMARY KEY (id);
  1854  
  1855  
  1856  --
  1857  -- Name: identities identities_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1858  --
  1859  
  1860  ALTER TABLE ONLY auth.identities
  1861      ADD CONSTRAINT identities_pkey PRIMARY KEY (id);
  1862  
  1863  
  1864  --
  1865  -- Name: identities identities_provider_id_provider_unique; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1866  --
  1867  
  1868  ALTER TABLE ONLY auth.identities
  1869      ADD CONSTRAINT identities_provider_id_provider_unique UNIQUE (provider_id, provider);
  1870  
  1871  
  1872  --
  1873  -- Name: instances instances_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1874  --
  1875  
  1876  ALTER TABLE ONLY auth.instances
  1877      ADD CONSTRAINT instances_pkey PRIMARY KEY (id);
  1878  
  1879  
  1880  --
  1881  -- Name: mfa_amr_claims mfa_amr_claims_session_id_authentication_method_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1882  --
  1883  
  1884  ALTER TABLE ONLY auth.mfa_amr_claims
  1885      ADD CONSTRAINT mfa_amr_claims_session_id_authentication_method_pkey UNIQUE (session_id, authentication_method);
  1886  
  1887  
  1888  --
  1889  -- Name: mfa_challenges mfa_challenges_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1890  --
  1891  
  1892  ALTER TABLE ONLY auth.mfa_challenges
  1893      ADD CONSTRAINT mfa_challenges_pkey PRIMARY KEY (id);
  1894  
  1895  
  1896  --
  1897  -- Name: mfa_factors mfa_factors_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1898  --
  1899  
  1900  ALTER TABLE ONLY auth.mfa_factors
  1901      ADD CONSTRAINT mfa_factors_pkey PRIMARY KEY (id);
  1902  
  1903  
  1904  --
  1905  -- Name: refresh_tokens refresh_tokens_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1906  --
  1907  
  1908  ALTER TABLE ONLY auth.refresh_tokens
  1909      ADD CONSTRAINT refresh_tokens_pkey PRIMARY KEY (id);
  1910  
  1911  
  1912  --
  1913  -- Name: refresh_tokens refresh_tokens_token_unique; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1914  --
  1915  
  1916  ALTER TABLE ONLY auth.refresh_tokens
  1917      ADD CONSTRAINT refresh_tokens_token_unique UNIQUE (token);
  1918  
  1919  
  1920  --
  1921  -- Name: saml_providers saml_providers_entity_id_key; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1922  --
  1923  
  1924  ALTER TABLE ONLY auth.saml_providers
  1925      ADD CONSTRAINT saml_providers_entity_id_key UNIQUE (entity_id);
  1926  
  1927  
  1928  --
  1929  -- Name: saml_providers saml_providers_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1930  --
  1931  
  1932  ALTER TABLE ONLY auth.saml_providers
  1933      ADD CONSTRAINT saml_providers_pkey PRIMARY KEY (id);
  1934  
  1935  
  1936  --
  1937  -- Name: saml_relay_states saml_relay_states_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1938  --
  1939  
  1940  ALTER TABLE ONLY auth.saml_relay_states
  1941      ADD CONSTRAINT saml_relay_states_pkey PRIMARY KEY (id);
  1942  
  1943  
  1944  --
  1945  -- Name: schema_migrations schema_migrations_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1946  --
  1947  
  1948  ALTER TABLE ONLY auth.schema_migrations
  1949      ADD CONSTRAINT schema_migrations_pkey PRIMARY KEY (version);
  1950  
  1951  
  1952  --
  1953  -- Name: sessions sessions_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1954  --
  1955  
  1956  ALTER TABLE ONLY auth.sessions
  1957      ADD CONSTRAINT sessions_pkey PRIMARY KEY (id);
  1958  
  1959  
  1960  --
  1961  -- Name: sso_domains sso_domains_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1962  --
  1963  
  1964  ALTER TABLE ONLY auth.sso_domains
  1965      ADD CONSTRAINT sso_domains_pkey PRIMARY KEY (id);
  1966  
  1967  
  1968  --
  1969  -- Name: sso_providers sso_providers_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1970  --
  1971  
  1972  ALTER TABLE ONLY auth.sso_providers
  1973      ADD CONSTRAINT sso_providers_pkey PRIMARY KEY (id);
  1974  
  1975  
  1976  --
  1977  -- Name: users users_phone_key; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1978  --
  1979  
  1980  ALTER TABLE ONLY auth.users
  1981      ADD CONSTRAINT users_phone_key UNIQUE (phone);
  1982  
  1983  
  1984  --
  1985  -- Name: users users_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  1986  --
  1987  
  1988  ALTER TABLE ONLY auth.users
  1989      ADD CONSTRAINT users_pkey PRIMARY KEY (id);
  1990  
  1991  
  1992  --
  1993  -- Name: buckets buckets_pkey; Type: CONSTRAINT; Schema: storage; Owner: supabase_storage_admin
  1994  --
  1995  
  1996  ALTER TABLE ONLY storage.buckets
  1997      ADD CONSTRAINT buckets_pkey PRIMARY KEY (id);
  1998  
  1999  
  2000  --
  2001  -- Name: migrations migrations_name_key; Type: CONSTRAINT; Schema: storage; Owner: supabase_storage_admin
  2002  --
  2003  
  2004  ALTER TABLE ONLY storage.migrations
  2005      ADD CONSTRAINT migrations_name_key UNIQUE (name);
  2006  
  2007  
  2008  --
  2009  -- Name: migrations migrations_pkey; Type: CONSTRAINT; Schema: storage; Owner: supabase_storage_admin
  2010  --
  2011  
  2012  ALTER TABLE ONLY storage.migrations
  2013      ADD CONSTRAINT migrations_pkey PRIMARY KEY (id);
  2014  
  2015  
  2016  --
  2017  -- Name: objects objects_pkey; Type: CONSTRAINT; Schema: storage; Owner: supabase_storage_admin
  2018  --
  2019  
  2020  ALTER TABLE ONLY storage.objects
  2021      ADD CONSTRAINT objects_pkey PRIMARY KEY (id);
  2022  
  2023  
  2024  --
  2025  -- Name: hooks hooks_pkey; Type: CONSTRAINT; Schema: supabase_functions; Owner: supabase_functions_admin
  2026  --
  2027  
  2028  ALTER TABLE ONLY supabase_functions.hooks
  2029      ADD CONSTRAINT hooks_pkey PRIMARY KEY (id);
  2030  
  2031  
  2032  --
  2033  -- Name: migrations migrations_pkey; Type: CONSTRAINT; Schema: supabase_functions; Owner: supabase_functions_admin
  2034  --
  2035  
  2036  ALTER TABLE ONLY supabase_functions.migrations
  2037      ADD CONSTRAINT migrations_pkey PRIMARY KEY (version);
  2038  
  2039  
  2040  --
  2041  -- Name: extensions_tenant_external_id_type_index; Type: INDEX; Schema: _realtime; Owner: postgres
  2042  --
  2043  
  2044  CREATE UNIQUE INDEX extensions_tenant_external_id_type_index ON _realtime.extensions USING btree (tenant_external_id, type);
  2045  
  2046  
  2047  --
  2048  -- Name: tenants_external_id_index; Type: INDEX; Schema: _realtime; Owner: postgres
  2049  --
  2050  
  2051  CREATE UNIQUE INDEX tenants_external_id_index ON _realtime.tenants USING btree (external_id);
  2052  
  2053  
  2054  --
  2055  -- Name: audit_logs_instance_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  2056  --
  2057  
  2058  CREATE INDEX audit_logs_instance_id_idx ON auth.audit_log_entries USING btree (instance_id);
  2059  
  2060  
  2061  --
  2062  -- Name: confirmation_token_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  2063  --
  2064  
  2065  CREATE UNIQUE INDEX confirmation_token_idx ON auth.users USING btree (confirmation_token) WHERE ((confirmation_token)::text !~ '^[0-9 ]*$'::text);
  2066  
  2067  
  2068  --
  2069  -- Name: email_change_token_current_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  2070  --
  2071  
  2072  CREATE UNIQUE INDEX email_change_token_current_idx ON auth.users USING btree (email_change_token_current) WHERE ((email_change_token_current)::text !~ '^[0-9 ]*$'::text);
  2073  
  2074  
  2075  --
  2076  -- Name: email_change_token_new_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  2077  --
  2078  
  2079  CREATE UNIQUE INDEX email_change_token_new_idx ON auth.users USING btree (email_change_token_new) WHERE ((email_change_token_new)::text !~ '^[0-9 ]*$'::text);
  2080  
  2081  
  2082  --
  2083  -- Name: factor_id_created_at_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  2084  --
  2085  
  2086  CREATE INDEX factor_id_created_at_idx ON auth.mfa_factors USING btree (user_id, created_at);
  2087  
  2088  
  2089  --
  2090  -- Name: flow_state_created_at_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  2091  --
  2092  
  2093  CREATE INDEX flow_state_created_at_idx ON auth.flow_state USING btree (created_at DESC);
  2094  
  2095  
  2096  --
  2097  -- Name: identities_email_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  2098  --
  2099  
  2100  CREATE INDEX identities_email_idx ON auth.identities USING btree (email text_pattern_ops);
  2101  
  2102  
  2103  --
  2104  -- Name: INDEX identities_email_idx; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
  2105  --
  2106  
  2107  COMMENT ON INDEX auth.identities_email_idx IS 'Auth: Ensures indexed queries on the email column';
  2108  
  2109  
  2110  --
  2111  -- Name: identities_user_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  2112  --
  2113  
  2114  CREATE INDEX identities_user_id_idx ON auth.identities USING btree (user_id);
  2115  
  2116  
  2117  --
  2118  -- Name: idx_auth_code; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  2119  --
  2120  
  2121  CREATE INDEX idx_auth_code ON auth.flow_state USING btree (auth_code);
  2122  
  2123  
  2124  --
  2125  -- Name: idx_user_id_auth_method; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  2126  --
  2127  
  2128  CREATE INDEX idx_user_id_auth_method ON auth.flow_state USING btree (user_id, authentication_method);
  2129  
  2130  
  2131  --
  2132  -- Name: mfa_challenge_created_at_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  2133  --
  2134  
  2135  CREATE INDEX mfa_challenge_created_at_idx ON auth.mfa_challenges USING btree (created_at DESC);
  2136  
  2137  
  2138  --
  2139  -- Name: mfa_factors_user_friendly_name_unique; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  2140  --
  2141  
  2142  CREATE UNIQUE INDEX mfa_factors_user_friendly_name_unique ON auth.mfa_factors USING btree (friendly_name, user_id) WHERE (TRIM(BOTH FROM friendly_name) <> ''::text);
  2143  
  2144  
  2145  --
  2146  -- Name: mfa_factors_user_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  2147  --
  2148  
  2149  CREATE INDEX mfa_factors_user_id_idx ON auth.mfa_factors USING btree (user_id);
  2150  
  2151  
  2152  --
  2153  -- Name: reauthentication_token_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  2154  --
  2155  
  2156  CREATE UNIQUE INDEX reauthentication_token_idx ON auth.users USING btree (reauthentication_token) WHERE ((reauthentication_token)::text !~ '^[0-9 ]*$'::text);
  2157  
  2158  
  2159  --
  2160  -- Name: recovery_token_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  2161  --
  2162  
  2163  CREATE UNIQUE INDEX recovery_token_idx ON auth.users USING btree (recovery_token) WHERE ((recovery_token)::text !~ '^[0-9 ]*$'::text);
  2164  
  2165  
  2166  --
  2167  -- Name: refresh_tokens_instance_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  2168  --
  2169  
  2170  CREATE INDEX refresh_tokens_instance_id_idx ON auth.refresh_tokens USING btree (instance_id);
  2171  
  2172  
  2173  --
  2174  -- Name: refresh_tokens_instance_id_user_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  2175  --
  2176  
  2177  CREATE INDEX refresh_tokens_instance_id_user_id_idx ON auth.refresh_tokens USING btree (instance_id, user_id);
  2178  
  2179  
  2180  --
  2181  -- Name: refresh_tokens_parent_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  2182  --
  2183  
  2184  CREATE INDEX refresh_tokens_parent_idx ON auth.refresh_tokens USING btree (parent);
  2185  
  2186  
  2187  --
  2188  -- Name: refresh_tokens_session_id_revoked_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  2189  --
  2190  
  2191  CREATE INDEX refresh_tokens_session_id_revoked_idx ON auth.refresh_tokens USING btree (session_id, revoked);
  2192  
  2193  
  2194  --
  2195  -- Name: refresh_tokens_updated_at_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  2196  --
  2197  
  2198  CREATE INDEX refresh_tokens_updated_at_idx ON auth.refresh_tokens USING btree (updated_at DESC);
  2199  
  2200  
  2201  --
  2202  -- Name: saml_providers_sso_provider_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  2203  --
  2204  
  2205  CREATE INDEX saml_providers_sso_provider_id_idx ON auth.saml_providers USING btree (sso_provider_id);
  2206  
  2207  
  2208  --
  2209  -- Name: saml_relay_states_created_at_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  2210  --
  2211  
  2212  CREATE INDEX saml_relay_states_created_at_idx ON auth.saml_relay_states USING btree (created_at DESC);
  2213  
  2214  
  2215  --
  2216  -- Name: saml_relay_states_for_email_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  2217  --
  2218  
  2219  CREATE INDEX saml_relay_states_for_email_idx ON auth.saml_relay_states USING btree (for_email);
  2220  
  2221  
  2222  --
  2223  -- Name: saml_relay_states_sso_provider_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  2224  --
  2225  
  2226  CREATE INDEX saml_relay_states_sso_provider_id_idx ON auth.saml_relay_states USING btree (sso_provider_id);
  2227  
  2228  
  2229  --
  2230  -- Name: sessions_not_after_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  2231  --
  2232  
  2233  CREATE INDEX sessions_not_after_idx ON auth.sessions USING btree (not_after DESC);
  2234  
  2235  
  2236  --
  2237  -- Name: sessions_user_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  2238  --
  2239  
  2240  CREATE INDEX sessions_user_id_idx ON auth.sessions USING btree (user_id);
  2241  
  2242  
  2243  --
  2244  -- Name: sso_domains_domain_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  2245  --
  2246  
  2247  CREATE UNIQUE INDEX sso_domains_domain_idx ON auth.sso_domains USING btree (lower(domain));
  2248  
  2249  
  2250  --
  2251  -- Name: sso_domains_sso_provider_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  2252  --
  2253  
  2254  CREATE INDEX sso_domains_sso_provider_id_idx ON auth.sso_domains USING btree (sso_provider_id);
  2255  
  2256  
  2257  --
  2258  -- Name: sso_providers_resource_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  2259  --
  2260  
  2261  CREATE UNIQUE INDEX sso_providers_resource_id_idx ON auth.sso_providers USING btree (lower(resource_id));
  2262  
  2263  
  2264  --
  2265  -- Name: user_id_created_at_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  2266  --
  2267  
  2268  CREATE INDEX user_id_created_at_idx ON auth.sessions USING btree (user_id, created_at);
  2269  
  2270  
  2271  --
  2272  -- Name: users_email_partial_key; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  2273  --
  2274  
  2275  CREATE UNIQUE INDEX users_email_partial_key ON auth.users USING btree (email) WHERE (is_sso_user = false);
  2276  
  2277  
  2278  --
  2279  -- Name: INDEX users_email_partial_key; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
  2280  --
  2281  
  2282  COMMENT ON INDEX auth.users_email_partial_key IS 'Auth: A partial unique index that applies only when is_sso_user is false';
  2283  
  2284  
  2285  --
  2286  -- Name: users_instance_id_email_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  2287  --
  2288  
  2289  CREATE INDEX users_instance_id_email_idx ON auth.users USING btree (instance_id, lower((email)::text));
  2290  
  2291  
  2292  --
  2293  -- Name: users_instance_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
  2294  --
  2295  
  2296  CREATE INDEX users_instance_id_idx ON auth.users USING btree (instance_id);
  2297  
  2298  
  2299  --
  2300  -- Name: bname; Type: INDEX; Schema: storage; Owner: supabase_storage_admin
  2301  --
  2302  
  2303  CREATE UNIQUE INDEX bname ON storage.buckets USING btree (name);
  2304  
  2305  
  2306  --
  2307  -- Name: bucketid_objname; Type: INDEX; Schema: storage; Owner: supabase_storage_admin
  2308  --
  2309  
  2310  CREATE UNIQUE INDEX bucketid_objname ON storage.objects USING btree (bucket_id, name);
  2311  
  2312  
  2313  --
  2314  -- Name: name_prefix_search; Type: INDEX; Schema: storage; Owner: supabase_storage_admin
  2315  --
  2316  
  2317  CREATE INDEX name_prefix_search ON storage.objects USING btree (name text_pattern_ops);
  2318  
  2319  
  2320  --
  2321  -- Name: supabase_functions_hooks_h_table_id_h_name_idx; Type: INDEX; Schema: supabase_functions; Owner: supabase_functions_admin
  2322  --
  2323  
  2324  CREATE INDEX supabase_functions_hooks_h_table_id_h_name_idx ON supabase_functions.hooks USING btree (hook_table_id, hook_name);
  2325  
  2326  
  2327  --
  2328  -- Name: supabase_functions_hooks_request_id_idx; Type: INDEX; Schema: supabase_functions; Owner: supabase_functions_admin
  2329  --
  2330  
  2331  CREATE INDEX supabase_functions_hooks_request_id_idx ON supabase_functions.hooks USING btree (request_id);
  2332  
  2333  
  2334  --
  2335  -- Name: objects update_objects_updated_at; Type: TRIGGER; Schema: storage; Owner: supabase_storage_admin
  2336  --
  2337  
  2338  CREATE TRIGGER update_objects_updated_at BEFORE UPDATE ON storage.objects FOR EACH ROW EXECUTE FUNCTION storage.update_updated_at_column();
  2339  
  2340  
  2341  --
  2342  -- Name: extensions extensions_tenant_external_id_fkey; Type: FK CONSTRAINT; Schema: _realtime; Owner: postgres
  2343  --
  2344  
  2345  ALTER TABLE ONLY _realtime.extensions
  2346      ADD CONSTRAINT extensions_tenant_external_id_fkey FOREIGN KEY (tenant_external_id) REFERENCES _realtime.tenants(external_id) ON DELETE CASCADE;
  2347  
  2348  
  2349  --
  2350  -- Name: identities identities_user_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  2351  --
  2352  
  2353  ALTER TABLE ONLY auth.identities
  2354      ADD CONSTRAINT identities_user_id_fkey FOREIGN KEY (user_id) REFERENCES auth.users(id) ON DELETE CASCADE;
  2355  
  2356  
  2357  --
  2358  -- Name: mfa_amr_claims mfa_amr_claims_session_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  2359  --
  2360  
  2361  ALTER TABLE ONLY auth.mfa_amr_claims
  2362      ADD CONSTRAINT mfa_amr_claims_session_id_fkey FOREIGN KEY (session_id) REFERENCES auth.sessions(id) ON DELETE CASCADE;
  2363  
  2364  
  2365  --
  2366  -- Name: mfa_challenges mfa_challenges_auth_factor_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  2367  --
  2368  
  2369  ALTER TABLE ONLY auth.mfa_challenges
  2370      ADD CONSTRAINT mfa_challenges_auth_factor_id_fkey FOREIGN KEY (factor_id) REFERENCES auth.mfa_factors(id) ON DELETE CASCADE;
  2371  
  2372  
  2373  --
  2374  -- Name: mfa_factors mfa_factors_user_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  2375  --
  2376  
  2377  ALTER TABLE ONLY auth.mfa_factors
  2378      ADD CONSTRAINT mfa_factors_user_id_fkey FOREIGN KEY (user_id) REFERENCES auth.users(id) ON DELETE CASCADE;
  2379  
  2380  
  2381  --
  2382  -- Name: refresh_tokens refresh_tokens_session_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  2383  --
  2384  
  2385  ALTER TABLE ONLY auth.refresh_tokens
  2386      ADD CONSTRAINT refresh_tokens_session_id_fkey FOREIGN KEY (session_id) REFERENCES auth.sessions(id) ON DELETE CASCADE;
  2387  
  2388  
  2389  --
  2390  -- Name: saml_providers saml_providers_sso_provider_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  2391  --
  2392  
  2393  ALTER TABLE ONLY auth.saml_providers
  2394      ADD CONSTRAINT saml_providers_sso_provider_id_fkey FOREIGN KEY (sso_provider_id) REFERENCES auth.sso_providers(id) ON DELETE CASCADE;
  2395  
  2396  
  2397  --
  2398  -- Name: saml_relay_states saml_relay_states_flow_state_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  2399  --
  2400  
  2401  ALTER TABLE ONLY auth.saml_relay_states
  2402      ADD CONSTRAINT saml_relay_states_flow_state_id_fkey FOREIGN KEY (flow_state_id) REFERENCES auth.flow_state(id) ON DELETE CASCADE;
  2403  
  2404  
  2405  --
  2406  -- Name: saml_relay_states saml_relay_states_sso_provider_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  2407  --
  2408  
  2409  ALTER TABLE ONLY auth.saml_relay_states
  2410      ADD CONSTRAINT saml_relay_states_sso_provider_id_fkey FOREIGN KEY (sso_provider_id) REFERENCES auth.sso_providers(id) ON DELETE CASCADE;
  2411  
  2412  
  2413  --
  2414  -- Name: sessions sessions_user_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  2415  --
  2416  
  2417  ALTER TABLE ONLY auth.sessions
  2418      ADD CONSTRAINT sessions_user_id_fkey FOREIGN KEY (user_id) REFERENCES auth.users(id) ON DELETE CASCADE;
  2419  
  2420  
  2421  --
  2422  -- Name: sso_domains sso_domains_sso_provider_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
  2423  --
  2424  
  2425  ALTER TABLE ONLY auth.sso_domains
  2426      ADD CONSTRAINT sso_domains_sso_provider_id_fkey FOREIGN KEY (sso_provider_id) REFERENCES auth.sso_providers(id) ON DELETE CASCADE;
  2427  
  2428  
  2429  --
  2430  -- Name: objects objects_bucketId_fkey; Type: FK CONSTRAINT; Schema: storage; Owner: supabase_storage_admin
  2431  --
  2432  
  2433  ALTER TABLE ONLY storage.objects
  2434      ADD CONSTRAINT "objects_bucketId_fkey" FOREIGN KEY (bucket_id) REFERENCES storage.buckets(id);
  2435  
  2436  
  2437  --
  2438  -- Name: buckets; Type: ROW SECURITY; Schema: storage; Owner: supabase_storage_admin
  2439  --
  2440  
  2441  ALTER TABLE storage.buckets ENABLE ROW LEVEL SECURITY;
  2442  
  2443  --
  2444  -- Name: migrations; Type: ROW SECURITY; Schema: storage; Owner: supabase_storage_admin
  2445  --
  2446  
  2447  ALTER TABLE storage.migrations ENABLE ROW LEVEL SECURITY;
  2448  
  2449  --
  2450  -- Name: objects; Type: ROW SECURITY; Schema: storage; Owner: supabase_storage_admin
  2451  --
  2452  
  2453  ALTER TABLE storage.objects ENABLE ROW LEVEL SECURITY;
  2454  
  2455  --
  2456  -- Name: supabase_realtime; Type: PUBLICATION; Schema: -; Owner: postgres
  2457  --
  2458  
  2459  CREATE PUBLICATION supabase_realtime WITH (publish = 'insert, update, delete, truncate');
  2460  
  2461  
  2462  ALTER PUBLICATION supabase_realtime OWNER TO postgres;
  2463  
  2464  --
  2465  -- Name: SCHEMA auth; Type: ACL; Schema: -; Owner: supabase_admin
  2466  --
  2467  
  2468  GRANT USAGE ON SCHEMA auth TO anon;
  2469  GRANT USAGE ON SCHEMA auth TO authenticated;
  2470  GRANT USAGE ON SCHEMA auth TO service_role;
  2471  GRANT ALL ON SCHEMA auth TO supabase_auth_admin;
  2472  GRANT ALL ON SCHEMA auth TO dashboard_user;
  2473  GRANT ALL ON SCHEMA auth TO postgres;
  2474  
  2475  
  2476  --
  2477  -- Name: SCHEMA extensions; Type: ACL; Schema: -; Owner: postgres
  2478  --
  2479  
  2480  GRANT USAGE ON SCHEMA extensions TO anon;
  2481  GRANT USAGE ON SCHEMA extensions TO authenticated;
  2482  GRANT USAGE ON SCHEMA extensions TO service_role;
  2483  GRANT ALL ON SCHEMA extensions TO dashboard_user;
  2484  
  2485  
  2486  --
  2487  -- Name: SCHEMA graphql_public; Type: ACL; Schema: -; Owner: supabase_admin
  2488  --
  2489  
  2490  GRANT USAGE ON SCHEMA graphql_public TO postgres;
  2491  GRANT USAGE ON SCHEMA graphql_public TO anon;
  2492  GRANT USAGE ON SCHEMA graphql_public TO authenticated;
  2493  GRANT USAGE ON SCHEMA graphql_public TO service_role;
  2494  
  2495  
  2496  --
  2497  -- Name: SCHEMA net; Type: ACL; Schema: -; Owner: postgres
  2498  --
  2499  
  2500  GRANT USAGE ON SCHEMA net TO supabase_functions_admin;
  2501  GRANT USAGE ON SCHEMA net TO anon;
  2502  GRANT USAGE ON SCHEMA net TO authenticated;
  2503  GRANT USAGE ON SCHEMA net TO service_role;
  2504  
  2505  
  2506  --
  2507  -- Name: SCHEMA public; Type: ACL; Schema: -; Owner: postgres
  2508  --
  2509  
  2510  REVOKE USAGE ON SCHEMA public FROM PUBLIC;
  2511  GRANT ALL ON SCHEMA public TO PUBLIC;
  2512  GRANT USAGE ON SCHEMA public TO anon;
  2513  GRANT USAGE ON SCHEMA public TO authenticated;
  2514  GRANT USAGE ON SCHEMA public TO service_role;
  2515  
  2516  
  2517  --
  2518  -- Name: SCHEMA realtime; Type: ACL; Schema: -; Owner: supabase_admin
  2519  --
  2520  
  2521  GRANT USAGE ON SCHEMA realtime TO postgres;
  2522  
  2523  
  2524  --
  2525  -- Name: SCHEMA storage; Type: ACL; Schema: -; Owner: supabase_admin
  2526  --
  2527  
  2528  GRANT ALL ON SCHEMA storage TO postgres;
  2529  GRANT USAGE ON SCHEMA storage TO anon;
  2530  GRANT USAGE ON SCHEMA storage TO authenticated;
  2531  GRANT USAGE ON SCHEMA storage TO service_role;
  2532  GRANT ALL ON SCHEMA storage TO supabase_storage_admin;
  2533  GRANT ALL ON SCHEMA storage TO dashboard_user;
  2534  
  2535  
  2536  --
  2537  -- Name: SCHEMA supabase_functions; Type: ACL; Schema: -; Owner: supabase_admin
  2538  --
  2539  
  2540  GRANT USAGE ON SCHEMA supabase_functions TO postgres;
  2541  GRANT USAGE ON SCHEMA supabase_functions TO anon;
  2542  GRANT USAGE ON SCHEMA supabase_functions TO authenticated;
  2543  GRANT USAGE ON SCHEMA supabase_functions TO service_role;
  2544  GRANT ALL ON SCHEMA supabase_functions TO supabase_functions_admin;
  2545  
  2546  
  2547  --
  2548  -- Name: FUNCTION email(); Type: ACL; Schema: auth; Owner: supabase_auth_admin
  2549  --
  2550  
  2551  GRANT ALL ON FUNCTION auth.email() TO dashboard_user;
  2552  
  2553  
  2554  --
  2555  -- Name: FUNCTION jwt(); Type: ACL; Schema: auth; Owner: supabase_auth_admin
  2556  --
  2557  
  2558  GRANT ALL ON FUNCTION auth.jwt() TO postgres;
  2559  GRANT ALL ON FUNCTION auth.jwt() TO dashboard_user;
  2560  
  2561  
  2562  --
  2563  -- Name: FUNCTION role(); Type: ACL; Schema: auth; Owner: supabase_auth_admin
  2564  --
  2565  
  2566  GRANT ALL ON FUNCTION auth.role() TO dashboard_user;
  2567  
  2568  
  2569  --
  2570  -- Name: FUNCTION uid(); Type: ACL; Schema: auth; Owner: supabase_auth_admin
  2571  --
  2572  
  2573  GRANT ALL ON FUNCTION auth.uid() TO dashboard_user;
  2574  
  2575  
  2576  --
  2577  -- Name: FUNCTION algorithm_sign(signables text, secret text, algorithm text); Type: ACL; Schema: extensions; Owner: postgres
  2578  --
  2579  
  2580  GRANT ALL ON FUNCTION extensions.algorithm_sign(signables text, secret text, algorithm text) TO dashboard_user;
  2581  
  2582  
  2583  --
  2584  -- Name: FUNCTION armor(bytea); Type: ACL; Schema: extensions; Owner: postgres
  2585  --
  2586  
  2587  GRANT ALL ON FUNCTION extensions.armor(bytea) TO dashboard_user;
  2588  
  2589  
  2590  --
  2591  -- Name: FUNCTION armor(bytea, text[], text[]); Type: ACL; Schema: extensions; Owner: postgres
  2592  --
  2593  
  2594  GRANT ALL ON FUNCTION extensions.armor(bytea, text[], text[]) TO dashboard_user;
  2595  
  2596  
  2597  --
  2598  -- Name: FUNCTION crypt(text, text); Type: ACL; Schema: extensions; Owner: postgres
  2599  --
  2600  
  2601  GRANT ALL ON FUNCTION extensions.crypt(text, text) TO dashboard_user;
  2602  
  2603  
  2604  --
  2605  -- Name: FUNCTION dearmor(text); Type: ACL; Schema: extensions; Owner: postgres
  2606  --
  2607  
  2608  GRANT ALL ON FUNCTION extensions.dearmor(text) TO dashboard_user;
  2609  
  2610  
  2611  --
  2612  -- Name: FUNCTION decrypt(bytea, bytea, text); Type: ACL; Schema: extensions; Owner: postgres
  2613  --
  2614  
  2615  GRANT ALL ON FUNCTION extensions.decrypt(bytea, bytea, text) TO dashboard_user;
  2616  
  2617  
  2618  --
  2619  -- Name: FUNCTION decrypt_iv(bytea, bytea, bytea, text); Type: ACL; Schema: extensions; Owner: postgres
  2620  --
  2621  
  2622  GRANT ALL ON FUNCTION extensions.decrypt_iv(bytea, bytea, bytea, text) TO dashboard_user;
  2623  
  2624  
  2625  --
  2626  -- Name: FUNCTION digest(bytea, text); Type: ACL; Schema: extensions; Owner: postgres
  2627  --
  2628  
  2629  GRANT ALL ON FUNCTION extensions.digest(bytea, text) TO dashboard_user;
  2630  
  2631  
  2632  --
  2633  -- Name: FUNCTION digest(text, text); Type: ACL; Schema: extensions; Owner: postgres
  2634  --
  2635  
  2636  GRANT ALL ON FUNCTION extensions.digest(text, text) TO dashboard_user;
  2637  
  2638  
  2639  --
  2640  -- Name: FUNCTION encrypt(bytea, bytea, text); Type: ACL; Schema: extensions; Owner: postgres
  2641  --
  2642  
  2643  GRANT ALL ON FUNCTION extensions.encrypt(bytea, bytea, text) TO dashboard_user;
  2644  
  2645  
  2646  --
  2647  -- Name: FUNCTION encrypt_iv(bytea, bytea, bytea, text); Type: ACL; Schema: extensions; Owner: postgres
  2648  --
  2649  
  2650  GRANT ALL ON FUNCTION extensions.encrypt_iv(bytea, bytea, bytea, text) TO dashboard_user;
  2651  
  2652  
  2653  --
  2654  -- Name: FUNCTION gen_random_bytes(integer); Type: ACL; Schema: extensions; Owner: postgres
  2655  --
  2656  
  2657  GRANT ALL ON FUNCTION extensions.gen_random_bytes(integer) TO dashboard_user;
  2658  
  2659  
  2660  --
  2661  -- Name: FUNCTION gen_random_uuid(); Type: ACL; Schema: extensions; Owner: postgres
  2662  --
  2663  
  2664  GRANT ALL ON FUNCTION extensions.gen_random_uuid() TO dashboard_user;
  2665  
  2666  
  2667  --
  2668  -- Name: FUNCTION gen_salt(text); Type: ACL; Schema: extensions; Owner: postgres
  2669  --
  2670  
  2671  GRANT ALL ON FUNCTION extensions.gen_salt(text) TO dashboard_user;
  2672  
  2673  
  2674  --
  2675  -- Name: FUNCTION gen_salt(text, integer); Type: ACL; Schema: extensions; Owner: postgres
  2676  --
  2677  
  2678  GRANT ALL ON FUNCTION extensions.gen_salt(text, integer) TO dashboard_user;
  2679  
  2680  
  2681  --
  2682  -- Name: FUNCTION grant_pg_cron_access(); Type: ACL; Schema: extensions; Owner: postgres
  2683  --
  2684  
  2685  GRANT ALL ON FUNCTION extensions.grant_pg_cron_access() TO dashboard_user;
  2686  
  2687  
  2688  --
  2689  -- Name: FUNCTION grant_pg_net_access(); Type: ACL; Schema: extensions; Owner: postgres
  2690  --
  2691  
  2692  GRANT ALL ON FUNCTION extensions.grant_pg_net_access() TO dashboard_user;
  2693  
  2694  
  2695  --
  2696  -- Name: FUNCTION hmac(bytea, bytea, text); Type: ACL; Schema: extensions; Owner: postgres
  2697  --
  2698  
  2699  GRANT ALL ON FUNCTION extensions.hmac(bytea, bytea, text) TO dashboard_user;
  2700  
  2701  
  2702  --
  2703  -- Name: FUNCTION hmac(text, text, text); Type: ACL; Schema: extensions; Owner: postgres
  2704  --
  2705  
  2706  GRANT ALL ON FUNCTION extensions.hmac(text, text, text) TO dashboard_user;
  2707  
  2708  
  2709  --
  2710  -- Name: FUNCTION pg_stat_statements(showtext boolean, OUT userid oid, OUT dbid oid, OUT toplevel boolean, OUT queryid bigint, OUT query text, OUT plans bigint, OUT total_plan_time double precision, OUT min_plan_time double precision, OUT max_plan_time double precision, OUT mean_plan_time double precision, OUT stddev_plan_time double precision, OUT calls bigint, OUT total_exec_time double precision, OUT min_exec_time double precision, OUT max_exec_time double precision, OUT mean_exec_time double precision, OUT stddev_exec_time double precision, OUT rows bigint, OUT shared_blks_hit bigint, OUT shared_blks_read bigint, OUT shared_blks_dirtied bigint, OUT shared_blks_written bigint, OUT local_blks_hit bigint, OUT local_blks_read bigint, OUT local_blks_dirtied bigint, OUT local_blks_written bigint, OUT temp_blks_read bigint, OUT temp_blks_written bigint, OUT blk_read_time double precision, OUT blk_write_time double precision, OUT wal_records bigint, OUT wal_fpi bigint, OUT wal_bytes numeric); Type: ACL; Schema: extensions; Owner: postgres
  2711  --
  2712  
  2713  GRANT ALL ON FUNCTION extensions.pg_stat_statements(showtext boolean, OUT userid oid, OUT dbid oid, OUT toplevel boolean, OUT queryid bigint, OUT query text, OUT plans bigint, OUT total_plan_time double precision, OUT min_plan_time double precision, OUT max_plan_time double precision, OUT mean_plan_time double precision, OUT stddev_plan_time double precision, OUT calls bigint, OUT total_exec_time double precision, OUT min_exec_time double precision, OUT max_exec_time double precision, OUT mean_exec_time double precision, OUT stddev_exec_time double precision, OUT rows bigint, OUT shared_blks_hit bigint, OUT shared_blks_read bigint, OUT shared_blks_dirtied bigint, OUT shared_blks_written bigint, OUT local_blks_hit bigint, OUT local_blks_read bigint, OUT local_blks_dirtied bigint, OUT local_blks_written bigint, OUT temp_blks_read bigint, OUT temp_blks_written bigint, OUT blk_read_time double precision, OUT blk_write_time double precision, OUT wal_records bigint, OUT wal_fpi bigint, OUT wal_bytes numeric) TO dashboard_user;
  2714  
  2715  
  2716  --
  2717  -- Name: FUNCTION pg_stat_statements_info(OUT dealloc bigint, OUT stats_reset timestamp with time zone); Type: ACL; Schema: extensions; Owner: postgres
  2718  --
  2719  
  2720  GRANT ALL ON FUNCTION extensions.pg_stat_statements_info(OUT dealloc bigint, OUT stats_reset timestamp with time zone) TO dashboard_user;
  2721  
  2722  
  2723  --
  2724  -- Name: FUNCTION pg_stat_statements_reset(userid oid, dbid oid, queryid bigint); Type: ACL; Schema: extensions; Owner: postgres
  2725  --
  2726  
  2727  GRANT ALL ON FUNCTION extensions.pg_stat_statements_reset(userid oid, dbid oid, queryid bigint) TO dashboard_user;
  2728  
  2729  
  2730  --
  2731  -- Name: FUNCTION pgp_armor_headers(text, OUT key text, OUT value text); Type: ACL; Schema: extensions; Owner: postgres
  2732  --
  2733  
  2734  GRANT ALL ON FUNCTION extensions.pgp_armor_headers(text, OUT key text, OUT value text) TO dashboard_user;
  2735  
  2736  
  2737  --
  2738  -- Name: FUNCTION pgp_key_id(bytea); Type: ACL; Schema: extensions; Owner: postgres
  2739  --
  2740  
  2741  GRANT ALL ON FUNCTION extensions.pgp_key_id(bytea) TO dashboard_user;
  2742  
  2743  
  2744  --
  2745  -- Name: FUNCTION pgp_pub_decrypt(bytea, bytea); Type: ACL; Schema: extensions; Owner: postgres
  2746  --
  2747  
  2748  GRANT ALL ON FUNCTION extensions.pgp_pub_decrypt(bytea, bytea) TO dashboard_user;
  2749  
  2750  
  2751  --
  2752  -- Name: FUNCTION pgp_pub_decrypt(bytea, bytea, text); Type: ACL; Schema: extensions; Owner: postgres
  2753  --
  2754  
  2755  GRANT ALL ON FUNCTION extensions.pgp_pub_decrypt(bytea, bytea, text) TO dashboard_user;
  2756  
  2757  
  2758  --
  2759  -- Name: FUNCTION pgp_pub_decrypt(bytea, bytea, text, text); Type: ACL; Schema: extensions; Owner: postgres
  2760  --
  2761  
  2762  GRANT ALL ON FUNCTION extensions.pgp_pub_decrypt(bytea, bytea, text, text) TO dashboard_user;
  2763  
  2764  
  2765  --
  2766  -- Name: FUNCTION pgp_pub_decrypt_bytea(bytea, bytea); Type: ACL; Schema: extensions; Owner: postgres
  2767  --
  2768  
  2769  GRANT ALL ON FUNCTION extensions.pgp_pub_decrypt_bytea(bytea, bytea) TO dashboard_user;
  2770  
  2771  
  2772  --
  2773  -- Name: FUNCTION pgp_pub_decrypt_bytea(bytea, bytea, text); Type: ACL; Schema: extensions; Owner: postgres
  2774  --
  2775  
  2776  GRANT ALL ON FUNCTION extensions.pgp_pub_decrypt_bytea(bytea, bytea, text) TO dashboard_user;
  2777  
  2778  
  2779  --
  2780  -- Name: FUNCTION pgp_pub_decrypt_bytea(bytea, bytea, text, text); Type: ACL; Schema: extensions; Owner: postgres
  2781  --
  2782  
  2783  GRANT ALL ON FUNCTION extensions.pgp_pub_decrypt_bytea(bytea, bytea, text, text) TO dashboard_user;
  2784  
  2785  
  2786  --
  2787  -- Name: FUNCTION pgp_pub_encrypt(text, bytea); Type: ACL; Schema: extensions; Owner: postgres
  2788  --
  2789  
  2790  GRANT ALL ON FUNCTION extensions.pgp_pub_encrypt(text, bytea) TO dashboard_user;
  2791  
  2792  
  2793  --
  2794  -- Name: FUNCTION pgp_pub_encrypt(text, bytea, text); Type: ACL; Schema: extensions; Owner: postgres
  2795  --
  2796  
  2797  GRANT ALL ON FUNCTION extensions.pgp_pub_encrypt(text, bytea, text) TO dashboard_user;
  2798  
  2799  
  2800  --
  2801  -- Name: FUNCTION pgp_pub_encrypt_bytea(bytea, bytea); Type: ACL; Schema: extensions; Owner: postgres
  2802  --
  2803  
  2804  GRANT ALL ON FUNCTION extensions.pgp_pub_encrypt_bytea(bytea, bytea) TO dashboard_user;
  2805  
  2806  
  2807  --
  2808  -- Name: FUNCTION pgp_pub_encrypt_bytea(bytea, bytea, text); Type: ACL; Schema: extensions; Owner: postgres
  2809  --
  2810  
  2811  GRANT ALL ON FUNCTION extensions.pgp_pub_encrypt_bytea(bytea, bytea, text) TO dashboard_user;
  2812  
  2813  
  2814  --
  2815  -- Name: FUNCTION pgp_sym_decrypt(bytea, text); Type: ACL; Schema: extensions; Owner: postgres
  2816  --
  2817  
  2818  GRANT ALL ON FUNCTION extensions.pgp_sym_decrypt(bytea, text) TO dashboard_user;
  2819  
  2820  
  2821  --
  2822  -- Name: FUNCTION pgp_sym_decrypt(bytea, text, text); Type: ACL; Schema: extensions; Owner: postgres
  2823  --
  2824  
  2825  GRANT ALL ON FUNCTION extensions.pgp_sym_decrypt(bytea, text, text) TO dashboard_user;
  2826  
  2827  
  2828  --
  2829  -- Name: FUNCTION pgp_sym_decrypt_bytea(bytea, text); Type: ACL; Schema: extensions; Owner: postgres
  2830  --
  2831  
  2832  GRANT ALL ON FUNCTION extensions.pgp_sym_decrypt_bytea(bytea, text) TO dashboard_user;
  2833  
  2834  
  2835  --
  2836  -- Name: FUNCTION pgp_sym_decrypt_bytea(bytea, text, text); Type: ACL; Schema: extensions; Owner: postgres
  2837  --
  2838  
  2839  GRANT ALL ON FUNCTION extensions.pgp_sym_decrypt_bytea(bytea, text, text) TO dashboard_user;
  2840  
  2841  
  2842  --
  2843  -- Name: FUNCTION pgp_sym_encrypt(text, text); Type: ACL; Schema: extensions; Owner: postgres
  2844  --
  2845  
  2846  GRANT ALL ON FUNCTION extensions.pgp_sym_encrypt(text, text) TO dashboard_user;
  2847  
  2848  
  2849  --
  2850  -- Name: FUNCTION pgp_sym_encrypt(text, text, text); Type: ACL; Schema: extensions; Owner: postgres
  2851  --
  2852  
  2853  GRANT ALL ON FUNCTION extensions.pgp_sym_encrypt(text, text, text) TO dashboard_user;
  2854  
  2855  
  2856  --
  2857  -- Name: FUNCTION pgp_sym_encrypt_bytea(bytea, text); Type: ACL; Schema: extensions; Owner: postgres
  2858  --
  2859  
  2860  GRANT ALL ON FUNCTION extensions.pgp_sym_encrypt_bytea(bytea, text) TO dashboard_user;
  2861  
  2862  
  2863  --
  2864  -- Name: FUNCTION pgp_sym_encrypt_bytea(bytea, text, text); Type: ACL; Schema: extensions; Owner: postgres
  2865  --
  2866  
  2867  GRANT ALL ON FUNCTION extensions.pgp_sym_encrypt_bytea(bytea, text, text) TO dashboard_user;
  2868  
  2869  
  2870  --
  2871  -- Name: FUNCTION sign(payload json, secret text, algorithm text); Type: ACL; Schema: extensions; Owner: postgres
  2872  --
  2873  
  2874  GRANT ALL ON FUNCTION extensions.sign(payload json, secret text, algorithm text) TO dashboard_user;
  2875  
  2876  
  2877  --
  2878  -- Name: FUNCTION try_cast_double(inp text); Type: ACL; Schema: extensions; Owner: postgres
  2879  --
  2880  
  2881  GRANT ALL ON FUNCTION extensions.try_cast_double(inp text) TO dashboard_user;
  2882  
  2883  
  2884  --
  2885  -- Name: FUNCTION url_decode(data text); Type: ACL; Schema: extensions; Owner: postgres
  2886  --
  2887  
  2888  GRANT ALL ON FUNCTION extensions.url_decode(data text) TO dashboard_user;
  2889  
  2890  
  2891  --
  2892  -- Name: FUNCTION url_encode(data bytea); Type: ACL; Schema: extensions; Owner: postgres
  2893  --
  2894  
  2895  GRANT ALL ON FUNCTION extensions.url_encode(data bytea) TO dashboard_user;
  2896  
  2897  
  2898  --
  2899  -- Name: FUNCTION uuid_generate_v1(); Type: ACL; Schema: extensions; Owner: postgres
  2900  --
  2901  
  2902  GRANT ALL ON FUNCTION extensions.uuid_generate_v1() TO dashboard_user;
  2903  
  2904  
  2905  --
  2906  -- Name: FUNCTION uuid_generate_v1mc(); Type: ACL; Schema: extensions; Owner: postgres
  2907  --
  2908  
  2909  GRANT ALL ON FUNCTION extensions.uuid_generate_v1mc() TO dashboard_user;
  2910  
  2911  
  2912  --
  2913  -- Name: FUNCTION uuid_generate_v3(namespace uuid, name text); Type: ACL; Schema: extensions; Owner: postgres
  2914  --
  2915  
  2916  GRANT ALL ON FUNCTION extensions.uuid_generate_v3(namespace uuid, name text) TO dashboard_user;
  2917  
  2918  
  2919  --
  2920  -- Name: FUNCTION uuid_generate_v4(); Type: ACL; Schema: extensions; Owner: postgres
  2921  --
  2922  
  2923  GRANT ALL ON FUNCTION extensions.uuid_generate_v4() TO dashboard_user;
  2924  
  2925  
  2926  --
  2927  -- Name: FUNCTION uuid_generate_v5(namespace uuid, name text); Type: ACL; Schema: extensions; Owner: postgres
  2928  --
  2929  
  2930  GRANT ALL ON FUNCTION extensions.uuid_generate_v5(namespace uuid, name text) TO dashboard_user;
  2931  
  2932  
  2933  --
  2934  -- Name: FUNCTION uuid_nil(); Type: ACL; Schema: extensions; Owner: postgres
  2935  --
  2936  
  2937  GRANT ALL ON FUNCTION extensions.uuid_nil() TO dashboard_user;
  2938  
  2939  
  2940  --
  2941  -- Name: FUNCTION uuid_ns_dns(); Type: ACL; Schema: extensions; Owner: postgres
  2942  --
  2943  
  2944  GRANT ALL ON FUNCTION extensions.uuid_ns_dns() TO dashboard_user;
  2945  
  2946  
  2947  --
  2948  -- Name: FUNCTION uuid_ns_oid(); Type: ACL; Schema: extensions; Owner: postgres
  2949  --
  2950  
  2951  GRANT ALL ON FUNCTION extensions.uuid_ns_oid() TO dashboard_user;
  2952  
  2953  
  2954  --
  2955  -- Name: FUNCTION uuid_ns_url(); Type: ACL; Schema: extensions; Owner: postgres
  2956  --
  2957  
  2958  GRANT ALL ON FUNCTION extensions.uuid_ns_url() TO dashboard_user;
  2959  
  2960  
  2961  --
  2962  -- Name: FUNCTION uuid_ns_x500(); Type: ACL; Schema: extensions; Owner: postgres
  2963  --
  2964  
  2965  GRANT ALL ON FUNCTION extensions.uuid_ns_x500() TO dashboard_user;
  2966  
  2967  
  2968  --
  2969  -- Name: FUNCTION verify(token text, secret text, algorithm text); Type: ACL; Schema: extensions; Owner: postgres
  2970  --
  2971  
  2972  GRANT ALL ON FUNCTION extensions.verify(token text, secret text, algorithm text) TO dashboard_user;
  2973  
  2974  
  2975  --
  2976  -- Name: FUNCTION comment_directive(comment_ text); Type: ACL; Schema: graphql; Owner: supabase_admin
  2977  --
  2978  
  2979  GRANT ALL ON FUNCTION graphql.comment_directive(comment_ text) TO postgres;
  2980  GRANT ALL ON FUNCTION graphql.comment_directive(comment_ text) TO anon;
  2981  GRANT ALL ON FUNCTION graphql.comment_directive(comment_ text) TO authenticated;
  2982  GRANT ALL ON FUNCTION graphql.comment_directive(comment_ text) TO service_role;
  2983  
  2984  
  2985  --
  2986  -- Name: FUNCTION exception(message text); Type: ACL; Schema: graphql; Owner: supabase_admin
  2987  --
  2988  
  2989  GRANT ALL ON FUNCTION graphql.exception(message text) TO postgres;
  2990  GRANT ALL ON FUNCTION graphql.exception(message text) TO anon;
  2991  GRANT ALL ON FUNCTION graphql.exception(message text) TO authenticated;
  2992  GRANT ALL ON FUNCTION graphql.exception(message text) TO service_role;
  2993  
  2994  
  2995  --
  2996  -- Name: FUNCTION get_schema_version(); Type: ACL; Schema: graphql; Owner: supabase_admin
  2997  --
  2998  
  2999  GRANT ALL ON FUNCTION graphql.get_schema_version() TO postgres;
  3000  GRANT ALL ON FUNCTION graphql.get_schema_version() TO anon;
  3001  GRANT ALL ON FUNCTION graphql.get_schema_version() TO authenticated;
  3002  GRANT ALL ON FUNCTION graphql.get_schema_version() TO service_role;
  3003  
  3004  
  3005  --
  3006  -- Name: FUNCTION increment_schema_version(); Type: ACL; Schema: graphql; Owner: supabase_admin
  3007  --
  3008  
  3009  GRANT ALL ON FUNCTION graphql.increment_schema_version() TO postgres;
  3010  GRANT ALL ON FUNCTION graphql.increment_schema_version() TO anon;
  3011  GRANT ALL ON FUNCTION graphql.increment_schema_version() TO authenticated;
  3012  GRANT ALL ON FUNCTION graphql.increment_schema_version() TO service_role;
  3013  
  3014  
  3015  --
  3016  -- Name: FUNCTION sequential_executor(prepared_statement_names text[]); Type: ACL; Schema: graphql; Owner: supabase_admin
  3017  --
  3018  
  3019  GRANT ALL ON FUNCTION graphql.sequential_executor(prepared_statement_names text[]) TO postgres;
  3020  GRANT ALL ON FUNCTION graphql.sequential_executor(prepared_statement_names text[]) TO anon;
  3021  GRANT ALL ON FUNCTION graphql.sequential_executor(prepared_statement_names text[]) TO authenticated;
  3022  GRANT ALL ON FUNCTION graphql.sequential_executor(prepared_statement_names text[]) TO service_role;
  3023  
  3024  
  3025  --
  3026  -- Name: FUNCTION graphql("operationName" text, query text, variables jsonb, extensions jsonb); Type: ACL; Schema: graphql_public; Owner: supabase_admin
  3027  --
  3028  
  3029  -- GRANT ALL ON FUNCTION graphql_public.graphql("operationName" text, query text, variables jsonb, extensions jsonb) TO postgres;
  3030  -- GRANT ALL ON FUNCTION graphql_public.graphql("operationName" text, query text, variables jsonb, extensions jsonb) TO anon;
  3031  -- GRANT ALL ON FUNCTION graphql_public.graphql("operationName" text, query text, variables jsonb, extensions jsonb) TO authenticated;
  3032  -- GRANT ALL ON FUNCTION graphql_public.graphql("operationName" text, query text, variables jsonb, extensions jsonb) TO service_role;
  3033  
  3034  
  3035  --
  3036  -- Name: FUNCTION http_collect_response(request_id bigint, async boolean); Type: ACL; Schema: net; Owner: supabase_admin
  3037  --
  3038  
  3039  REVOKE ALL ON FUNCTION net.http_collect_response(request_id bigint, async boolean) FROM PUBLIC;
  3040  GRANT ALL ON FUNCTION net.http_collect_response(request_id bigint, async boolean) TO supabase_functions_admin;
  3041  GRANT ALL ON FUNCTION net.http_collect_response(request_id bigint, async boolean) TO postgres;
  3042  GRANT ALL ON FUNCTION net.http_collect_response(request_id bigint, async boolean) TO anon;
  3043  GRANT ALL ON FUNCTION net.http_collect_response(request_id bigint, async boolean) TO authenticated;
  3044  GRANT ALL ON FUNCTION net.http_collect_response(request_id bigint, async boolean) TO service_role;
  3045  
  3046  
  3047  --
  3048  -- Name: FUNCTION http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer); Type: ACL; Schema: net; Owner: supabase_admin
  3049  --
  3050  
  3051  REVOKE ALL ON FUNCTION net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) FROM PUBLIC;
  3052  GRANT ALL ON FUNCTION net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) TO supabase_functions_admin;
  3053  GRANT ALL ON FUNCTION net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) TO postgres;
  3054  GRANT ALL ON FUNCTION net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) TO anon;
  3055  GRANT ALL ON FUNCTION net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) TO authenticated;
  3056  GRANT ALL ON FUNCTION net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) TO service_role;
  3057  
  3058  
  3059  --
  3060  -- Name: FUNCTION http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer); Type: ACL; Schema: net; Owner: supabase_admin
  3061  --
  3062  
  3063  REVOKE ALL ON FUNCTION net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) FROM PUBLIC;
  3064  GRANT ALL ON FUNCTION net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) TO supabase_functions_admin;
  3065  GRANT ALL ON FUNCTION net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) TO postgres;
  3066  GRANT ALL ON FUNCTION net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) TO anon;
  3067  GRANT ALL ON FUNCTION net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) TO authenticated;
  3068  GRANT ALL ON FUNCTION net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) TO service_role;
  3069  
  3070  
  3071  --
  3072  -- Name: FUNCTION get_auth(p_usename text); Type: ACL; Schema: pgbouncer; Owner: postgres
  3073  --
  3074  
  3075  REVOKE ALL ON FUNCTION pgbouncer.get_auth(p_usename text) FROM PUBLIC;
  3076  GRANT ALL ON FUNCTION pgbouncer.get_auth(p_usename text) TO pgbouncer;
  3077  
  3078  
  3079  --
  3080  -- Name: SEQUENCE key_key_id_seq; Type: ACL; Schema: pgsodium; Owner: postgres
  3081  --
  3082  
  3083  GRANT ALL ON SEQUENCE pgsodium.key_key_id_seq TO pgsodium_keyiduser;
  3084  
  3085  
  3086  --
  3087  -- Name: FUNCTION extension(name text); Type: ACL; Schema: storage; Owner: supabase_storage_admin
  3088  --
  3089  
  3090  GRANT ALL ON FUNCTION storage.extension(name text) TO anon;
  3091  GRANT ALL ON FUNCTION storage.extension(name text) TO authenticated;
  3092  GRANT ALL ON FUNCTION storage.extension(name text) TO service_role;
  3093  GRANT ALL ON FUNCTION storage.extension(name text) TO dashboard_user;
  3094  GRANT ALL ON FUNCTION storage.extension(name text) TO postgres;
  3095  
  3096  
  3097  --
  3098  -- Name: FUNCTION filename(name text); Type: ACL; Schema: storage; Owner: supabase_storage_admin
  3099  --
  3100  
  3101  GRANT ALL ON FUNCTION storage.filename(name text) TO anon;
  3102  GRANT ALL ON FUNCTION storage.filename(name text) TO authenticated;
  3103  GRANT ALL ON FUNCTION storage.filename(name text) TO service_role;
  3104  GRANT ALL ON FUNCTION storage.filename(name text) TO dashboard_user;
  3105  GRANT ALL ON FUNCTION storage.filename(name text) TO postgres;
  3106  
  3107  
  3108  --
  3109  -- Name: FUNCTION foldername(name text); Type: ACL; Schema: storage; Owner: supabase_storage_admin
  3110  --
  3111  
  3112  GRANT ALL ON FUNCTION storage.foldername(name text) TO anon;
  3113  GRANT ALL ON FUNCTION storage.foldername(name text) TO authenticated;
  3114  GRANT ALL ON FUNCTION storage.foldername(name text) TO service_role;
  3115  GRANT ALL ON FUNCTION storage.foldername(name text) TO dashboard_user;
  3116  GRANT ALL ON FUNCTION storage.foldername(name text) TO postgres;
  3117  
  3118  
  3119  --
  3120  -- Name: FUNCTION http_request(); Type: ACL; Schema: supabase_functions; Owner: supabase_functions_admin
  3121  --
  3122  
  3123  REVOKE ALL ON FUNCTION supabase_functions.http_request() FROM PUBLIC;
  3124  GRANT ALL ON FUNCTION supabase_functions.http_request() TO postgres;
  3125  GRANT ALL ON FUNCTION supabase_functions.http_request() TO anon;
  3126  GRANT ALL ON FUNCTION supabase_functions.http_request() TO authenticated;
  3127  GRANT ALL ON FUNCTION supabase_functions.http_request() TO service_role;
  3128  
  3129  
  3130  --
  3131  -- Name: TABLE audit_log_entries; Type: ACL; Schema: auth; Owner: supabase_auth_admin
  3132  --
  3133  
  3134  GRANT ALL ON TABLE auth.audit_log_entries TO dashboard_user;
  3135  GRANT ALL ON TABLE auth.audit_log_entries TO postgres;
  3136  
  3137  
  3138  --
  3139  -- Name: TABLE flow_state; Type: ACL; Schema: auth; Owner: supabase_auth_admin
  3140  --
  3141  
  3142  GRANT ALL ON TABLE auth.flow_state TO postgres;
  3143  GRANT ALL ON TABLE auth.flow_state TO dashboard_user;
  3144  
  3145  
  3146  --
  3147  -- Name: TABLE identities; Type: ACL; Schema: auth; Owner: supabase_auth_admin
  3148  --
  3149  
  3150  GRANT ALL ON TABLE auth.identities TO postgres;
  3151  GRANT ALL ON TABLE auth.identities TO dashboard_user;
  3152  
  3153  
  3154  --
  3155  -- Name: TABLE instances; Type: ACL; Schema: auth; Owner: supabase_auth_admin
  3156  --
  3157  
  3158  GRANT ALL ON TABLE auth.instances TO dashboard_user;
  3159  GRANT ALL ON TABLE auth.instances TO postgres;
  3160  
  3161  
  3162  --
  3163  -- Name: TABLE mfa_amr_claims; Type: ACL; Schema: auth; Owner: supabase_auth_admin
  3164  --
  3165  
  3166  GRANT ALL ON TABLE auth.mfa_amr_claims TO postgres;
  3167  GRANT ALL ON TABLE auth.mfa_amr_claims TO dashboard_user;
  3168  
  3169  
  3170  --
  3171  -- Name: TABLE mfa_challenges; Type: ACL; Schema: auth; Owner: supabase_auth_admin
  3172  --
  3173  
  3174  GRANT ALL ON TABLE auth.mfa_challenges TO postgres;
  3175  GRANT ALL ON TABLE auth.mfa_challenges TO dashboard_user;
  3176  
  3177  
  3178  --
  3179  -- Name: TABLE mfa_factors; Type: ACL; Schema: auth; Owner: supabase_auth_admin
  3180  --
  3181  
  3182  GRANT ALL ON TABLE auth.mfa_factors TO postgres;
  3183  GRANT ALL ON TABLE auth.mfa_factors TO dashboard_user;
  3184  
  3185  
  3186  --
  3187  -- Name: TABLE refresh_tokens; Type: ACL; Schema: auth; Owner: supabase_auth_admin
  3188  --
  3189  
  3190  GRANT ALL ON TABLE auth.refresh_tokens TO dashboard_user;
  3191  GRANT ALL ON TABLE auth.refresh_tokens TO postgres;
  3192  
  3193  
  3194  --
  3195  -- Name: SEQUENCE refresh_tokens_id_seq; Type: ACL; Schema: auth; Owner: supabase_auth_admin
  3196  --
  3197  
  3198  GRANT ALL ON SEQUENCE auth.refresh_tokens_id_seq TO dashboard_user;
  3199  GRANT ALL ON SEQUENCE auth.refresh_tokens_id_seq TO postgres;
  3200  
  3201  
  3202  --
  3203  -- Name: TABLE saml_providers; Type: ACL; Schema: auth; Owner: supabase_auth_admin
  3204  --
  3205  
  3206  GRANT ALL ON TABLE auth.saml_providers TO postgres;
  3207  GRANT ALL ON TABLE auth.saml_providers TO dashboard_user;
  3208  
  3209  
  3210  --
  3211  -- Name: TABLE saml_relay_states; Type: ACL; Schema: auth; Owner: supabase_auth_admin
  3212  --
  3213  
  3214  GRANT ALL ON TABLE auth.saml_relay_states TO postgres;
  3215  GRANT ALL ON TABLE auth.saml_relay_states TO dashboard_user;
  3216  
  3217  
  3218  --
  3219  -- Name: TABLE schema_migrations; Type: ACL; Schema: auth; Owner: supabase_auth_admin
  3220  --
  3221  
  3222  GRANT ALL ON TABLE auth.schema_migrations TO dashboard_user;
  3223  GRANT ALL ON TABLE auth.schema_migrations TO postgres;
  3224  
  3225  
  3226  --
  3227  -- Name: TABLE sessions; Type: ACL; Schema: auth; Owner: supabase_auth_admin
  3228  --
  3229  
  3230  GRANT ALL ON TABLE auth.sessions TO postgres;
  3231  GRANT ALL ON TABLE auth.sessions TO dashboard_user;
  3232  
  3233  
  3234  --
  3235  -- Name: TABLE sso_domains; Type: ACL; Schema: auth; Owner: supabase_auth_admin
  3236  --
  3237  
  3238  GRANT ALL ON TABLE auth.sso_domains TO postgres;
  3239  GRANT ALL ON TABLE auth.sso_domains TO dashboard_user;
  3240  
  3241  
  3242  --
  3243  -- Name: TABLE sso_providers; Type: ACL; Schema: auth; Owner: supabase_auth_admin
  3244  --
  3245  
  3246  GRANT ALL ON TABLE auth.sso_providers TO postgres;
  3247  GRANT ALL ON TABLE auth.sso_providers TO dashboard_user;
  3248  
  3249  
  3250  --
  3251  -- Name: TABLE users; Type: ACL; Schema: auth; Owner: supabase_auth_admin
  3252  --
  3253  
  3254  GRANT ALL ON TABLE auth.users TO dashboard_user;
  3255  GRANT ALL ON TABLE auth.users TO postgres;
  3256  
  3257  
  3258  --
  3259  -- Name: TABLE pg_stat_statements; Type: ACL; Schema: extensions; Owner: postgres
  3260  --
  3261  
  3262  GRANT ALL ON TABLE extensions.pg_stat_statements TO dashboard_user;
  3263  
  3264  
  3265  --
  3266  -- Name: TABLE pg_stat_statements_info; Type: ACL; Schema: extensions; Owner: postgres
  3267  --
  3268  
  3269  GRANT ALL ON TABLE extensions.pg_stat_statements_info TO dashboard_user;
  3270  
  3271  
  3272  --
  3273  -- Name: SEQUENCE seq_schema_version; Type: ACL; Schema: graphql; Owner: supabase_admin
  3274  --
  3275  
  3276  GRANT ALL ON SEQUENCE graphql.seq_schema_version TO postgres;
  3277  GRANT ALL ON SEQUENCE graphql.seq_schema_version TO anon;
  3278  GRANT ALL ON SEQUENCE graphql.seq_schema_version TO authenticated;
  3279  GRANT ALL ON SEQUENCE graphql.seq_schema_version TO service_role;
  3280  
  3281  
  3282  --
  3283  -- Name: TABLE valid_key; Type: ACL; Schema: pgsodium; Owner: postgres
  3284  --
  3285  
  3286  GRANT ALL ON TABLE pgsodium.valid_key TO pgsodium_keyiduser;
  3287  
  3288  
  3289  --
  3290  -- Name: TABLE buckets; Type: ACL; Schema: storage; Owner: supabase_storage_admin
  3291  --
  3292  
  3293  GRANT ALL ON TABLE storage.buckets TO anon;
  3294  GRANT ALL ON TABLE storage.buckets TO authenticated;
  3295  GRANT ALL ON TABLE storage.buckets TO service_role;
  3296  GRANT ALL ON TABLE storage.buckets TO postgres;
  3297  
  3298  
  3299  --
  3300  -- Name: TABLE migrations; Type: ACL; Schema: storage; Owner: supabase_storage_admin
  3301  --
  3302  
  3303  GRANT ALL ON TABLE storage.migrations TO anon;
  3304  GRANT ALL ON TABLE storage.migrations TO authenticated;
  3305  GRANT ALL ON TABLE storage.migrations TO service_role;
  3306  GRANT ALL ON TABLE storage.migrations TO postgres;
  3307  
  3308  
  3309  --
  3310  -- Name: TABLE objects; Type: ACL; Schema: storage; Owner: supabase_storage_admin
  3311  --
  3312  
  3313  GRANT ALL ON TABLE storage.objects TO anon;
  3314  GRANT ALL ON TABLE storage.objects TO authenticated;
  3315  GRANT ALL ON TABLE storage.objects TO service_role;
  3316  GRANT ALL ON TABLE storage.objects TO postgres;
  3317  
  3318  
  3319  --
  3320  -- Name: TABLE hooks; Type: ACL; Schema: supabase_functions; Owner: supabase_functions_admin
  3321  --
  3322  
  3323  GRANT ALL ON TABLE supabase_functions.hooks TO postgres;
  3324  GRANT ALL ON TABLE supabase_functions.hooks TO anon;
  3325  GRANT ALL ON TABLE supabase_functions.hooks TO authenticated;
  3326  GRANT ALL ON TABLE supabase_functions.hooks TO service_role;
  3327  
  3328  
  3329  --
  3330  -- Name: SEQUENCE hooks_id_seq; Type: ACL; Schema: supabase_functions; Owner: supabase_functions_admin
  3331  --
  3332  
  3333  GRANT ALL ON SEQUENCE supabase_functions.hooks_id_seq TO postgres;
  3334  GRANT ALL ON SEQUENCE supabase_functions.hooks_id_seq TO anon;
  3335  GRANT ALL ON SEQUENCE supabase_functions.hooks_id_seq TO authenticated;
  3336  GRANT ALL ON SEQUENCE supabase_functions.hooks_id_seq TO service_role;
  3337  
  3338  
  3339  --
  3340  -- Name: TABLE migrations; Type: ACL; Schema: supabase_functions; Owner: supabase_functions_admin
  3341  --
  3342  
  3343  GRANT ALL ON TABLE supabase_functions.migrations TO postgres;
  3344  GRANT ALL ON TABLE supabase_functions.migrations TO anon;
  3345  GRANT ALL ON TABLE supabase_functions.migrations TO authenticated;
  3346  GRANT ALL ON TABLE supabase_functions.migrations TO service_role;
  3347  
  3348  
  3349  --
  3350  -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: auth; Owner: supabase_auth_admin
  3351  --
  3352  
  3353  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_auth_admin IN SCHEMA auth GRANT ALL ON SEQUENCES  TO postgres;
  3354  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_auth_admin IN SCHEMA auth GRANT ALL ON SEQUENCES  TO dashboard_user;
  3355  
  3356  
  3357  --
  3358  -- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: auth; Owner: supabase_auth_admin
  3359  --
  3360  
  3361  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_auth_admin IN SCHEMA auth GRANT ALL ON FUNCTIONS  TO postgres;
  3362  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_auth_admin IN SCHEMA auth GRANT ALL ON FUNCTIONS  TO dashboard_user;
  3363  
  3364  
  3365  --
  3366  -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: auth; Owner: supabase_auth_admin
  3367  --
  3368  
  3369  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_auth_admin IN SCHEMA auth GRANT ALL ON TABLES  TO postgres;
  3370  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_auth_admin IN SCHEMA auth GRANT ALL ON TABLES  TO dashboard_user;
  3371  
  3372  
  3373  --
  3374  -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: graphql; Owner: supabase_admin
  3375  --
  3376  
  3377  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql GRANT ALL ON SEQUENCES  TO postgres;
  3378  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql GRANT ALL ON SEQUENCES  TO anon;
  3379  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql GRANT ALL ON SEQUENCES  TO authenticated;
  3380  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql GRANT ALL ON SEQUENCES  TO service_role;
  3381  
  3382  
  3383  --
  3384  -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: graphql; Owner: postgres
  3385  --
  3386  
  3387  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA graphql GRANT ALL ON SEQUENCES  TO postgres;
  3388  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA graphql GRANT ALL ON SEQUENCES  TO anon;
  3389  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA graphql GRANT ALL ON SEQUENCES  TO authenticated;
  3390  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA graphql GRANT ALL ON SEQUENCES  TO service_role;
  3391  
  3392  
  3393  --
  3394  -- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: graphql; Owner: supabase_admin
  3395  --
  3396  
  3397  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql GRANT ALL ON FUNCTIONS  TO postgres;
  3398  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql GRANT ALL ON FUNCTIONS  TO anon;
  3399  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql GRANT ALL ON FUNCTIONS  TO authenticated;
  3400  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql GRANT ALL ON FUNCTIONS  TO service_role;
  3401  
  3402  
  3403  --
  3404  -- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: graphql; Owner: postgres
  3405  --
  3406  
  3407  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA graphql GRANT ALL ON FUNCTIONS  TO postgres;
  3408  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA graphql GRANT ALL ON FUNCTIONS  TO anon;
  3409  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA graphql GRANT ALL ON FUNCTIONS  TO authenticated;
  3410  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA graphql GRANT ALL ON FUNCTIONS  TO service_role;
  3411  
  3412  
  3413  --
  3414  -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: graphql; Owner: supabase_admin
  3415  --
  3416  
  3417  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql GRANT ALL ON TABLES  TO postgres;
  3418  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql GRANT ALL ON TABLES  TO anon;
  3419  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql GRANT ALL ON TABLES  TO authenticated;
  3420  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql GRANT ALL ON TABLES  TO service_role;
  3421  
  3422  
  3423  --
  3424  -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: graphql; Owner: postgres
  3425  --
  3426  
  3427  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA graphql GRANT ALL ON TABLES  TO postgres;
  3428  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA graphql GRANT ALL ON TABLES  TO anon;
  3429  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA graphql GRANT ALL ON TABLES  TO authenticated;
  3430  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA graphql GRANT ALL ON TABLES  TO service_role;
  3431  
  3432  
  3433  --
  3434  -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: graphql_public; Owner: supabase_admin
  3435  --
  3436  
  3437  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON SEQUENCES  TO postgres;
  3438  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON SEQUENCES  TO anon;
  3439  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON SEQUENCES  TO authenticated;
  3440  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON SEQUENCES  TO service_role;
  3441  
  3442  
  3443  --
  3444  -- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: graphql_public; Owner: supabase_admin
  3445  --
  3446  
  3447  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON FUNCTIONS  TO postgres;
  3448  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON FUNCTIONS  TO anon;
  3449  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON FUNCTIONS  TO authenticated;
  3450  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON FUNCTIONS  TO service_role;
  3451  
  3452  
  3453  --
  3454  -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: graphql_public; Owner: supabase_admin
  3455  --
  3456  
  3457  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON TABLES  TO postgres;
  3458  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON TABLES  TO anon;
  3459  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON TABLES  TO authenticated;
  3460  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON TABLES  TO service_role;
  3461  
  3462  
  3463  --
  3464  -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: pgsodium; Owner: postgres
  3465  --
  3466  
  3467  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA pgsodium GRANT ALL ON SEQUENCES  TO pgsodium_keyiduser;
  3468  
  3469  
  3470  --
  3471  -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: pgsodium; Owner: postgres
  3472  --
  3473  
  3474  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA pgsodium GRANT ALL ON TABLES  TO pgsodium_keyiduser;
  3475  
  3476  
  3477  --
  3478  -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: public; Owner: postgres
  3479  --
  3480  
  3481  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON SEQUENCES  TO postgres;
  3482  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON SEQUENCES  TO anon;
  3483  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON SEQUENCES  TO authenticated;
  3484  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON SEQUENCES  TO service_role;
  3485  
  3486  
  3487  --
  3488  -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: public; Owner: supabase_admin
  3489  --
  3490  
  3491  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON SEQUENCES  TO postgres;
  3492  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON SEQUENCES  TO anon;
  3493  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON SEQUENCES  TO authenticated;
  3494  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON SEQUENCES  TO service_role;
  3495  
  3496  
  3497  --
  3498  -- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: public; Owner: postgres
  3499  --
  3500  
  3501  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON FUNCTIONS  TO postgres;
  3502  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON FUNCTIONS  TO anon;
  3503  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON FUNCTIONS  TO authenticated;
  3504  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON FUNCTIONS  TO service_role;
  3505  
  3506  
  3507  --
  3508  -- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: public; Owner: supabase_admin
  3509  --
  3510  
  3511  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON FUNCTIONS  TO postgres;
  3512  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON FUNCTIONS  TO anon;
  3513  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON FUNCTIONS  TO authenticated;
  3514  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON FUNCTIONS  TO service_role;
  3515  
  3516  
  3517  --
  3518  -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: public; Owner: postgres
  3519  --
  3520  
  3521  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON TABLES  TO postgres;
  3522  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON TABLES  TO anon;
  3523  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON TABLES  TO authenticated;
  3524  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON TABLES  TO service_role;
  3525  
  3526  
  3527  --
  3528  -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: public; Owner: supabase_admin
  3529  --
  3530  
  3531  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON TABLES  TO postgres;
  3532  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON TABLES  TO anon;
  3533  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON TABLES  TO authenticated;
  3534  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON TABLES  TO service_role;
  3535  
  3536  
  3537  --
  3538  -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: realtime; Owner: supabase_admin
  3539  --
  3540  
  3541  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA realtime GRANT ALL ON SEQUENCES  TO postgres;
  3542  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA realtime GRANT ALL ON SEQUENCES  TO dashboard_user;
  3543  
  3544  
  3545  --
  3546  -- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: realtime; Owner: supabase_admin
  3547  --
  3548  
  3549  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA realtime GRANT ALL ON FUNCTIONS  TO postgres;
  3550  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA realtime GRANT ALL ON FUNCTIONS  TO dashboard_user;
  3551  
  3552  
  3553  --
  3554  -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: realtime; Owner: supabase_admin
  3555  --
  3556  
  3557  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA realtime GRANT ALL ON TABLES  TO postgres;
  3558  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA realtime GRANT ALL ON TABLES  TO dashboard_user;
  3559  
  3560  
  3561  --
  3562  -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: storage; Owner: postgres
  3563  --
  3564  
  3565  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON SEQUENCES  TO postgres;
  3566  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON SEQUENCES  TO anon;
  3567  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON SEQUENCES  TO authenticated;
  3568  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON SEQUENCES  TO service_role;
  3569  
  3570  
  3571  --
  3572  -- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: storage; Owner: postgres
  3573  --
  3574  
  3575  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON FUNCTIONS  TO postgres;
  3576  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON FUNCTIONS  TO anon;
  3577  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON FUNCTIONS  TO authenticated;
  3578  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON FUNCTIONS  TO service_role;
  3579  
  3580  
  3581  --
  3582  -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: storage; Owner: postgres
  3583  --
  3584  
  3585  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON TABLES  TO postgres;
  3586  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON TABLES  TO anon;
  3587  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON TABLES  TO authenticated;
  3588  ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON TABLES  TO service_role;
  3589  
  3590  
  3591  --
  3592  -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: supabase_functions; Owner: supabase_admin
  3593  --
  3594  
  3595  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA supabase_functions GRANT ALL ON SEQUENCES  TO postgres;
  3596  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA supabase_functions GRANT ALL ON SEQUENCES  TO anon;
  3597  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA supabase_functions GRANT ALL ON SEQUENCES  TO authenticated;
  3598  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA supabase_functions GRANT ALL ON SEQUENCES  TO service_role;
  3599  
  3600  
  3601  --
  3602  -- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: supabase_functions; Owner: supabase_admin
  3603  --
  3604  
  3605  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA supabase_functions GRANT ALL ON FUNCTIONS  TO postgres;
  3606  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA supabase_functions GRANT ALL ON FUNCTIONS  TO anon;
  3607  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA supabase_functions GRANT ALL ON FUNCTIONS  TO authenticated;
  3608  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA supabase_functions GRANT ALL ON FUNCTIONS  TO service_role;
  3609  
  3610  
  3611  --
  3612  -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: supabase_functions; Owner: supabase_admin
  3613  --
  3614  
  3615  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA supabase_functions GRANT ALL ON TABLES  TO postgres;
  3616  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA supabase_functions GRANT ALL ON TABLES  TO anon;
  3617  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA supabase_functions GRANT ALL ON TABLES  TO authenticated;
  3618  ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA supabase_functions GRANT ALL ON TABLES  TO service_role;
  3619  
  3620  
  3621  --
  3622  -- Name: issue_graphql_placeholder; Type: EVENT TRIGGER; Schema: -; Owner: supabase_admin
  3623  --
  3624  
  3625  CREATE EVENT TRIGGER issue_graphql_placeholder ON sql_drop
  3626           WHEN TAG IN ('DROP EXTENSION')
  3627     EXECUTE FUNCTION extensions.set_graphql_placeholder();
  3628  
  3629  
  3630  ALTER EVENT TRIGGER issue_graphql_placeholder OWNER TO supabase_admin;
  3631  
  3632  --
  3633  -- Name: issue_pg_cron_access; Type: EVENT TRIGGER; Schema: -; Owner: supabase_admin
  3634  --
  3635  
  3636  CREATE EVENT TRIGGER issue_pg_cron_access ON ddl_command_end
  3637           WHEN TAG IN ('CREATE SCHEMA')
  3638     EXECUTE FUNCTION extensions.grant_pg_cron_access();
  3639  
  3640  
  3641  ALTER EVENT TRIGGER issue_pg_cron_access OWNER TO supabase_admin;
  3642  
  3643  --
  3644  -- Name: issue_pg_graphql_access; Type: EVENT TRIGGER; Schema: -; Owner: supabase_admin
  3645  --
  3646  
  3647  CREATE EVENT TRIGGER issue_pg_graphql_access ON ddl_command_end
  3648           WHEN TAG IN ('CREATE FUNCTION')
  3649     EXECUTE FUNCTION extensions.grant_pg_graphql_access();
  3650  
  3651  
  3652  ALTER EVENT TRIGGER issue_pg_graphql_access OWNER TO supabase_admin;
  3653  
  3654  --
  3655  -- Name: issue_pg_net_access; Type: EVENT TRIGGER; Schema: -; Owner: supabase_admin
  3656  --
  3657  
  3658  CREATE EVENT TRIGGER issue_pg_net_access ON ddl_command_end
  3659           WHEN TAG IN ('CREATE EXTENSION')
  3660     EXECUTE FUNCTION extensions.grant_pg_net_access();
  3661  
  3662  
  3663  ALTER EVENT TRIGGER issue_pg_net_access OWNER TO supabase_admin;
  3664  
  3665  --
  3666  -- Name: pgrst_ddl_watch; Type: EVENT TRIGGER; Schema: -; Owner: supabase_admin
  3667  --
  3668  
  3669  CREATE EVENT TRIGGER pgrst_ddl_watch ON ddl_command_end
  3670     EXECUTE FUNCTION extensions.pgrst_ddl_watch();
  3671  
  3672  
  3673  ALTER EVENT TRIGGER pgrst_ddl_watch OWNER TO supabase_admin;
  3674  
  3675  --
  3676  -- Name: pgrst_drop_watch; Type: EVENT TRIGGER; Schema: -; Owner: supabase_admin
  3677  --
  3678  
  3679  CREATE EVENT TRIGGER pgrst_drop_watch ON sql_drop
  3680     EXECUTE FUNCTION extensions.pgrst_drop_watch();
  3681  
  3682  
  3683  ALTER EVENT TRIGGER pgrst_drop_watch OWNER TO supabase_admin;
  3684  
  3685  --
  3686  -- PostgreSQL database dump complete
  3687  --
  3688  
  3689  DROP EXTENSION pg_graphql; CREATE EXTENSION pg_graphql WITH SCHEMA graphql;
  3690  RESET ALL;