3691 lines
116 KiB
PL/PgSQL
3691 lines
116 KiB
PL/PgSQL
--
|
|
-- PostgreSQL database dump
|
|
--
|
|
|
|
-- Dumped from database version 14.5 (Debian 14.5-2.pgdg110+2)
|
|
-- Dumped by pg_dump version 15.3
|
|
|
|
SET statement_timeout = 0;
|
|
SET lock_timeout = 0;
|
|
SET idle_in_transaction_session_timeout = 0;
|
|
SET client_encoding = 'UTF8';
|
|
SET standard_conforming_strings = on;
|
|
SELECT pg_catalog.set_config('search_path', '', false);
|
|
SET check_function_bodies = false;
|
|
SET xmloption = content;
|
|
SET client_min_messages = warning;
|
|
SET row_security = off;
|
|
|
|
--
|
|
-- Name: _analytics; Type: SCHEMA; Schema: -; Owner: postgres
|
|
--
|
|
|
|
CREATE SCHEMA IF NOT EXISTS _analytics;
|
|
|
|
|
|
ALTER SCHEMA _analytics OWNER TO postgres;
|
|
|
|
--
|
|
-- Name: _realtime; Type: SCHEMA; Schema: -; Owner: postgres
|
|
--
|
|
|
|
CREATE SCHEMA IF NOT EXISTS _realtime;
|
|
|
|
|
|
ALTER SCHEMA _realtime OWNER TO postgres;
|
|
|
|
--
|
|
-- Name: auth; Type: SCHEMA; Schema: -; Owner: supabase_admin
|
|
--
|
|
|
|
CREATE SCHEMA IF NOT EXISTS auth;
|
|
|
|
|
|
ALTER SCHEMA auth OWNER TO supabase_admin;
|
|
|
|
--
|
|
-- Name: extensions; Type: SCHEMA; Schema: -; Owner: postgres
|
|
--
|
|
|
|
CREATE SCHEMA IF NOT EXISTS extensions;
|
|
|
|
|
|
ALTER SCHEMA extensions OWNER TO postgres;
|
|
|
|
--
|
|
-- Name: graphql; Type: SCHEMA; Schema: -; Owner: supabase_admin
|
|
--
|
|
|
|
CREATE SCHEMA IF NOT EXISTS graphql;
|
|
|
|
|
|
ALTER SCHEMA graphql OWNER TO supabase_admin;
|
|
|
|
--
|
|
-- Name: graphql_public; Type: SCHEMA; Schema: -; Owner: supabase_admin
|
|
--
|
|
|
|
CREATE SCHEMA IF NOT EXISTS graphql_public;
|
|
|
|
|
|
ALTER SCHEMA graphql_public OWNER TO supabase_admin;
|
|
|
|
--
|
|
-- Name: pg_net; Type: EXTENSION; Schema: -; Owner: -
|
|
--
|
|
|
|
CREATE EXTENSION IF NOT EXISTS pg_net WITH SCHEMA extensions;
|
|
|
|
|
|
--
|
|
-- Name: EXTENSION pg_net; Type: COMMENT; Schema: -; Owner:
|
|
--
|
|
|
|
COMMENT ON EXTENSION pg_net IS 'Async HTTP';
|
|
|
|
|
|
--
|
|
-- Name: pgbouncer; Type: SCHEMA; Schema: -; Owner: pgbouncer
|
|
--
|
|
|
|
CREATE SCHEMA IF NOT EXISTS pgbouncer;
|
|
|
|
|
|
ALTER SCHEMA pgbouncer OWNER TO pgbouncer;
|
|
|
|
--
|
|
-- Name: pgsodium; Type: SCHEMA; Schema: -; Owner: postgres
|
|
--
|
|
|
|
CREATE SCHEMA IF NOT EXISTS pgsodium;
|
|
|
|
|
|
ALTER SCHEMA pgsodium OWNER TO postgres;
|
|
|
|
--
|
|
-- Name: pgsodium; Type: EXTENSION; Schema: -; Owner: -
|
|
--
|
|
|
|
CREATE EXTENSION IF NOT EXISTS pgsodium WITH SCHEMA pgsodium;
|
|
|
|
|
|
--
|
|
-- Name: EXTENSION pgsodium; Type: COMMENT; Schema: -; Owner:
|
|
--
|
|
|
|
COMMENT ON EXTENSION pgsodium IS 'Pgsodium is a modern cryptography library for Postgres.';
|
|
|
|
|
|
--
|
|
-- Name: public; Type: SCHEMA; Schema: -; Owner: postgres
|
|
--
|
|
|
|
-- *not* creating schema, since initdb creates it
|
|
|
|
|
|
ALTER SCHEMA public OWNER TO postgres;
|
|
|
|
--
|
|
-- Name: realtime; Type: SCHEMA; Schema: -; Owner: supabase_admin
|
|
--
|
|
|
|
CREATE SCHEMA IF NOT EXISTS realtime;
|
|
|
|
|
|
ALTER SCHEMA realtime OWNER TO supabase_admin;
|
|
|
|
--
|
|
-- Name: storage; Type: SCHEMA; Schema: -; Owner: supabase_admin
|
|
--
|
|
|
|
CREATE SCHEMA IF NOT EXISTS storage;
|
|
|
|
|
|
ALTER SCHEMA storage OWNER TO supabase_admin;
|
|
|
|
--
|
|
-- Name: supabase_functions; Type: SCHEMA; Schema: -; Owner: supabase_admin
|
|
--
|
|
|
|
CREATE SCHEMA IF NOT EXISTS supabase_functions;
|
|
|
|
|
|
ALTER SCHEMA supabase_functions OWNER TO supabase_admin;
|
|
|
|
--
|
|
-- Name: pg_graphql; Type: EXTENSION; Schema: -; Owner: -
|
|
--
|
|
|
|
CREATE EXTENSION IF NOT EXISTS pg_graphql WITH SCHEMA graphql;
|
|
|
|
|
|
--
|
|
-- Name: EXTENSION pg_graphql; Type: COMMENT; Schema: -; Owner:
|
|
--
|
|
|
|
COMMENT ON EXTENSION pg_graphql IS 'pg_graphql: GraphQL support';
|
|
|
|
|
|
--
|
|
-- Name: pg_stat_statements; Type: EXTENSION; Schema: -; Owner: -
|
|
--
|
|
|
|
CREATE EXTENSION IF NOT EXISTS pg_stat_statements WITH SCHEMA extensions;
|
|
|
|
|
|
--
|
|
-- Name: EXTENSION pg_stat_statements; Type: COMMENT; Schema: -; Owner:
|
|
--
|
|
|
|
COMMENT ON EXTENSION pg_stat_statements IS 'track planning and execution statistics of all SQL statements executed';
|
|
|
|
|
|
--
|
|
-- Name: pgcrypto; Type: EXTENSION; Schema: -; Owner: -
|
|
--
|
|
|
|
CREATE EXTENSION IF NOT EXISTS pgcrypto WITH SCHEMA extensions;
|
|
|
|
|
|
--
|
|
-- Name: EXTENSION pgcrypto; Type: COMMENT; Schema: -; Owner:
|
|
--
|
|
|
|
COMMENT ON EXTENSION pgcrypto IS 'cryptographic functions';
|
|
|
|
|
|
--
|
|
-- Name: pgjwt; Type: EXTENSION; Schema: -; Owner: -
|
|
--
|
|
|
|
CREATE EXTENSION IF NOT EXISTS pgjwt WITH SCHEMA extensions;
|
|
|
|
|
|
--
|
|
-- Name: EXTENSION pgjwt; Type: COMMENT; Schema: -; Owner:
|
|
--
|
|
|
|
COMMENT ON EXTENSION pgjwt IS 'JSON Web Token API for Postgresql';
|
|
|
|
|
|
--
|
|
-- Name: uuid-ossp; Type: EXTENSION; Schema: -; Owner: -
|
|
--
|
|
|
|
CREATE EXTENSION IF NOT EXISTS "uuid-ossp" WITH SCHEMA extensions;
|
|
|
|
|
|
--
|
|
-- Name: EXTENSION "uuid-ossp"; Type: COMMENT; Schema: -; Owner:
|
|
--
|
|
|
|
COMMENT ON EXTENSION "uuid-ossp" IS 'generate universally unique identifiers (UUIDs)';
|
|
|
|
|
|
--
|
|
-- Name: aal_level; Type: TYPE; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE TYPE auth.aal_level AS ENUM (
|
|
'aal1',
|
|
'aal2',
|
|
'aal3'
|
|
);
|
|
|
|
|
|
ALTER TYPE auth.aal_level OWNER TO supabase_auth_admin;
|
|
|
|
--
|
|
-- Name: code_challenge_method; Type: TYPE; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE TYPE auth.code_challenge_method AS ENUM (
|
|
's256',
|
|
'plain'
|
|
);
|
|
|
|
|
|
ALTER TYPE auth.code_challenge_method OWNER TO supabase_auth_admin;
|
|
|
|
--
|
|
-- Name: factor_status; Type: TYPE; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE TYPE auth.factor_status AS ENUM (
|
|
'unverified',
|
|
'verified'
|
|
);
|
|
|
|
|
|
ALTER TYPE auth.factor_status OWNER TO supabase_auth_admin;
|
|
|
|
--
|
|
-- Name: factor_type; Type: TYPE; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE TYPE auth.factor_type AS ENUM (
|
|
'totp',
|
|
'webauthn'
|
|
);
|
|
|
|
|
|
ALTER TYPE auth.factor_type OWNER TO supabase_auth_admin;
|
|
|
|
--
|
|
-- Name: email(); Type: FUNCTION; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE OR REPLACE FUNCTION auth.email() RETURNS text
|
|
LANGUAGE sql STABLE
|
|
AS $$
|
|
select
|
|
coalesce(
|
|
nullif(current_setting('request.jwt.claim.email', true), ''),
|
|
(nullif(current_setting('request.jwt.claims', true), '')::jsonb ->> 'email')
|
|
)::text
|
|
$$;
|
|
|
|
|
|
ALTER FUNCTION auth.email() OWNER TO supabase_auth_admin;
|
|
|
|
--
|
|
-- Name: FUNCTION email(); Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
COMMENT ON FUNCTION auth.email() IS 'Deprecated. Use auth.jwt() -> ''email'' instead.';
|
|
|
|
|
|
--
|
|
-- Name: jwt(); Type: FUNCTION; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE OR REPLACE FUNCTION auth.jwt() RETURNS jsonb
|
|
LANGUAGE sql STABLE
|
|
AS $$
|
|
select
|
|
coalesce(
|
|
nullif(current_setting('request.jwt.claim', true), ''),
|
|
nullif(current_setting('request.jwt.claims', true), '')
|
|
)::jsonb
|
|
$$;
|
|
|
|
|
|
ALTER FUNCTION auth.jwt() OWNER TO supabase_auth_admin;
|
|
|
|
--
|
|
-- Name: role(); Type: FUNCTION; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE OR REPLACE FUNCTION auth.role() RETURNS text
|
|
LANGUAGE sql STABLE
|
|
AS $$
|
|
select
|
|
coalesce(
|
|
nullif(current_setting('request.jwt.claim.role', true), ''),
|
|
(nullif(current_setting('request.jwt.claims', true), '')::jsonb ->> 'role')
|
|
)::text
|
|
$$;
|
|
|
|
|
|
ALTER FUNCTION auth.role() OWNER TO supabase_auth_admin;
|
|
|
|
--
|
|
-- Name: FUNCTION role(); Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
COMMENT ON FUNCTION auth.role() IS 'Deprecated. Use auth.jwt() -> ''role'' instead.';
|
|
|
|
|
|
--
|
|
-- Name: uid(); Type: FUNCTION; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE OR REPLACE FUNCTION auth.uid() RETURNS uuid
|
|
LANGUAGE sql STABLE
|
|
AS $$
|
|
select
|
|
coalesce(
|
|
nullif(current_setting('request.jwt.claim.sub', true), ''),
|
|
(nullif(current_setting('request.jwt.claims', true), '')::jsonb ->> 'sub')
|
|
)::uuid
|
|
$$;
|
|
|
|
|
|
ALTER FUNCTION auth.uid() OWNER TO supabase_auth_admin;
|
|
|
|
--
|
|
-- Name: FUNCTION uid(); Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
COMMENT ON FUNCTION auth.uid() IS 'Deprecated. Use auth.jwt() -> ''sub'' instead.';
|
|
|
|
|
|
--
|
|
-- Name: grant_pg_cron_access(); Type: FUNCTION; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
CREATE OR REPLACE FUNCTION extensions.grant_pg_cron_access() RETURNS event_trigger
|
|
LANGUAGE plpgsql
|
|
AS $$
|
|
DECLARE
|
|
schema_is_cron bool;
|
|
BEGIN
|
|
schema_is_cron = (
|
|
SELECT n.nspname = 'cron'
|
|
FROM pg_event_trigger_ddl_commands() AS ev
|
|
LEFT JOIN pg_catalog.pg_namespace AS n
|
|
ON ev.objid = n.oid
|
|
);
|
|
|
|
IF schema_is_cron
|
|
THEN
|
|
grant usage on schema cron to postgres with grant option;
|
|
|
|
alter default privileges in schema cron grant all on tables to postgres with grant option;
|
|
alter default privileges in schema cron grant all on functions to postgres with grant option;
|
|
alter default privileges in schema cron grant all on sequences to postgres with grant option;
|
|
|
|
alter default privileges for user supabase_admin in schema cron grant all
|
|
on sequences to postgres with grant option;
|
|
alter default privileges for user supabase_admin in schema cron grant all
|
|
on tables to postgres with grant option;
|
|
alter default privileges for user supabase_admin in schema cron grant all
|
|
on functions to postgres with grant option;
|
|
|
|
grant all privileges on all tables in schema cron to postgres with grant option;
|
|
|
|
END IF;
|
|
|
|
END;
|
|
$$;
|
|
|
|
|
|
ALTER FUNCTION extensions.grant_pg_cron_access() OWNER TO postgres;
|
|
|
|
--
|
|
-- Name: FUNCTION grant_pg_cron_access(); Type: COMMENT; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
COMMENT ON FUNCTION extensions.grant_pg_cron_access() IS 'Grants access to pg_cron';
|
|
|
|
|
|
--
|
|
-- Name: grant_pg_graphql_access(); Type: FUNCTION; Schema: extensions; Owner: supabase_admin
|
|
--
|
|
|
|
CREATE OR REPLACE FUNCTION extensions.grant_pg_graphql_access() RETURNS event_trigger
|
|
LANGUAGE plpgsql
|
|
AS $_$
|
|
DECLARE
|
|
func_is_graphql_resolve bool;
|
|
BEGIN
|
|
func_is_graphql_resolve = (
|
|
SELECT n.proname = 'resolve'
|
|
FROM pg_event_trigger_ddl_commands() AS ev
|
|
LEFT JOIN pg_catalog.pg_proc AS n
|
|
ON ev.objid = n.oid
|
|
);
|
|
|
|
IF func_is_graphql_resolve
|
|
THEN
|
|
-- Update public wrapper to pass all arguments through to the pg_graphql resolve func
|
|
DROP FUNCTION IF EXISTS graphql_public.graphql;
|
|
create or replace function graphql_public.graphql(
|
|
"operationName" text default null,
|
|
query text default null,
|
|
variables jsonb default null,
|
|
extensions jsonb default null
|
|
)
|
|
returns jsonb
|
|
language sql
|
|
as $$
|
|
select graphql.resolve(
|
|
query := query,
|
|
variables := coalesce(variables, '{}'),
|
|
"operationName" := "operationName",
|
|
extensions := extensions
|
|
);
|
|
$$;
|
|
|
|
-- This hook executes when `graphql.resolve` is created. That is not necessarily the last
|
|
-- function in the extension so we need to grant permissions on existing entities AND
|
|
-- update default permissions to any others that are created after `graphql.resolve`
|
|
grant usage on schema graphql to postgres, anon, authenticated, service_role;
|
|
grant select on all tables in schema graphql to postgres, anon, authenticated, service_role;
|
|
grant execute on all functions in schema graphql to postgres, anon, authenticated, service_role;
|
|
grant all on all sequences in schema graphql to postgres, anon, authenticated, service_role;
|
|
alter default privileges in schema graphql grant all on tables to postgres, anon, authenticated, service_role;
|
|
alter default privileges in schema graphql grant all on functions to postgres, anon, authenticated, service_role;
|
|
alter default privileges in schema graphql grant all on sequences to postgres, anon, authenticated, service_role;
|
|
END IF;
|
|
|
|
END;
|
|
$_$;
|
|
|
|
|
|
ALTER FUNCTION extensions.grant_pg_graphql_access() OWNER TO supabase_admin;
|
|
|
|
--
|
|
-- Name: FUNCTION grant_pg_graphql_access(); Type: COMMENT; Schema: extensions; Owner: supabase_admin
|
|
--
|
|
|
|
COMMENT ON FUNCTION extensions.grant_pg_graphql_access() IS 'Grants access to pg_graphql';
|
|
|
|
|
|
--
|
|
-- Name: grant_pg_net_access(); Type: FUNCTION; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
CREATE OR REPLACE FUNCTION extensions.grant_pg_net_access() RETURNS event_trigger
|
|
LANGUAGE plpgsql
|
|
AS $$
|
|
BEGIN
|
|
IF EXISTS (
|
|
SELECT 1
|
|
FROM pg_event_trigger_ddl_commands() AS ev
|
|
JOIN pg_extension AS ext
|
|
ON ev.objid = ext.oid
|
|
WHERE ext.extname = 'pg_net'
|
|
)
|
|
THEN
|
|
GRANT USAGE ON SCHEMA net TO supabase_functions_admin, postgres, anon, authenticated, service_role;
|
|
|
|
ALTER function net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) SECURITY DEFINER;
|
|
ALTER function net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) SECURITY DEFINER;
|
|
|
|
ALTER function net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) SET search_path = net;
|
|
ALTER function net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) SET search_path = net;
|
|
|
|
REVOKE ALL ON FUNCTION net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) FROM PUBLIC;
|
|
REVOKE ALL ON FUNCTION net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) FROM PUBLIC;
|
|
|
|
GRANT EXECUTE ON FUNCTION net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) TO supabase_functions_admin, postgres, anon, authenticated, service_role;
|
|
GRANT EXECUTE ON FUNCTION net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) TO supabase_functions_admin, postgres, anon, authenticated, service_role;
|
|
END IF;
|
|
END;
|
|
$$;
|
|
|
|
|
|
ALTER FUNCTION extensions.grant_pg_net_access() OWNER TO postgres;
|
|
|
|
--
|
|
-- Name: FUNCTION grant_pg_net_access(); Type: COMMENT; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
COMMENT ON FUNCTION extensions.grant_pg_net_access() IS 'Grants access to pg_net';
|
|
|
|
|
|
--
|
|
-- Name: pgrst_ddl_watch(); Type: FUNCTION; Schema: extensions; Owner: supabase_admin
|
|
--
|
|
|
|
CREATE OR REPLACE FUNCTION extensions.pgrst_ddl_watch() RETURNS event_trigger
|
|
LANGUAGE plpgsql
|
|
AS $$
|
|
DECLARE
|
|
cmd record;
|
|
BEGIN
|
|
FOR cmd IN SELECT * FROM pg_event_trigger_ddl_commands()
|
|
LOOP
|
|
IF cmd.command_tag IN (
|
|
'CREATE SCHEMA', 'ALTER SCHEMA'
|
|
, 'CREATE TABLE', 'CREATE TABLE AS', 'SELECT INTO', 'ALTER TABLE'
|
|
, 'CREATE FOREIGN TABLE', 'ALTER FOREIGN TABLE'
|
|
, 'CREATE VIEW', 'ALTER VIEW'
|
|
, 'CREATE MATERIALIZED VIEW', 'ALTER MATERIALIZED VIEW'
|
|
, 'CREATE FUNCTION', 'ALTER FUNCTION'
|
|
, 'CREATE TRIGGER'
|
|
, 'CREATE TYPE', 'ALTER TYPE'
|
|
, 'CREATE RULE'
|
|
, 'COMMENT'
|
|
)
|
|
-- don't notify in case of CREATE TEMP table or other objects created on pg_temp
|
|
AND cmd.schema_name is distinct from 'pg_temp'
|
|
THEN
|
|
NOTIFY pgrst, 'reload schema';
|
|
END IF;
|
|
END LOOP;
|
|
END; $$;
|
|
|
|
|
|
ALTER FUNCTION extensions.pgrst_ddl_watch() OWNER TO supabase_admin;
|
|
|
|
--
|
|
-- Name: pgrst_drop_watch(); Type: FUNCTION; Schema: extensions; Owner: supabase_admin
|
|
--
|
|
|
|
CREATE OR REPLACE FUNCTION extensions.pgrst_drop_watch() RETURNS event_trigger
|
|
LANGUAGE plpgsql
|
|
AS $$
|
|
DECLARE
|
|
obj record;
|
|
BEGIN
|
|
FOR obj IN SELECT * FROM pg_event_trigger_dropped_objects()
|
|
LOOP
|
|
IF obj.object_type IN (
|
|
'schema'
|
|
, 'table'
|
|
, 'foreign table'
|
|
, 'view'
|
|
, 'materialized view'
|
|
, 'function'
|
|
, 'trigger'
|
|
, 'type'
|
|
, 'rule'
|
|
)
|
|
AND obj.is_temporary IS false -- no pg_temp objects
|
|
THEN
|
|
NOTIFY pgrst, 'reload schema';
|
|
END IF;
|
|
END LOOP;
|
|
END; $$;
|
|
|
|
|
|
ALTER FUNCTION extensions.pgrst_drop_watch() OWNER TO supabase_admin;
|
|
|
|
--
|
|
-- Name: set_graphql_placeholder(); Type: FUNCTION; Schema: extensions; Owner: supabase_admin
|
|
--
|
|
|
|
CREATE OR REPLACE FUNCTION extensions.set_graphql_placeholder() RETURNS event_trigger
|
|
LANGUAGE plpgsql
|
|
AS $_$
|
|
DECLARE
|
|
graphql_is_dropped bool;
|
|
BEGIN
|
|
graphql_is_dropped = (
|
|
SELECT ev.schema_name = 'graphql_public'
|
|
FROM pg_event_trigger_dropped_objects() AS ev
|
|
WHERE ev.schema_name = 'graphql_public'
|
|
);
|
|
|
|
IF graphql_is_dropped
|
|
THEN
|
|
create or replace function graphql_public.graphql(
|
|
"operationName" text default null,
|
|
query text default null,
|
|
variables jsonb default null,
|
|
extensions jsonb default null
|
|
)
|
|
returns jsonb
|
|
language plpgsql
|
|
as $$
|
|
DECLARE
|
|
server_version float;
|
|
BEGIN
|
|
server_version = (SELECT (SPLIT_PART((select version()), ' ', 2))::float);
|
|
|
|
IF server_version >= 14 THEN
|
|
RETURN jsonb_build_object(
|
|
'errors', jsonb_build_array(
|
|
jsonb_build_object(
|
|
'message', 'pg_graphql extension is not enabled.'
|
|
)
|
|
)
|
|
);
|
|
ELSE
|
|
RETURN jsonb_build_object(
|
|
'errors', jsonb_build_array(
|
|
jsonb_build_object(
|
|
'message', 'pg_graphql is only available on projects running Postgres 14 onwards.'
|
|
)
|
|
)
|
|
);
|
|
END IF;
|
|
END;
|
|
$$;
|
|
END IF;
|
|
|
|
END;
|
|
$_$;
|
|
|
|
|
|
ALTER FUNCTION extensions.set_graphql_placeholder() OWNER TO supabase_admin;
|
|
|
|
--
|
|
-- Name: FUNCTION set_graphql_placeholder(); Type: COMMENT; Schema: extensions; Owner: supabase_admin
|
|
--
|
|
|
|
COMMENT ON FUNCTION extensions.set_graphql_placeholder() IS 'Reintroduces placeholder function for graphql_public.graphql';
|
|
|
|
|
|
--
|
|
-- Name: get_auth(text); Type: FUNCTION; Schema: pgbouncer; Owner: postgres
|
|
--
|
|
|
|
CREATE OR REPLACE FUNCTION pgbouncer.get_auth(p_usename text) RETURNS TABLE(username text, password text)
|
|
LANGUAGE plpgsql SECURITY DEFINER
|
|
AS $$
|
|
BEGIN
|
|
RAISE WARNING 'PgBouncer auth request: %', p_usename;
|
|
|
|
RETURN QUERY
|
|
SELECT usename::TEXT, passwd::TEXT FROM pg_catalog.pg_shadow
|
|
WHERE usename = p_usename;
|
|
END;
|
|
$$;
|
|
|
|
|
|
ALTER FUNCTION pgbouncer.get_auth(p_usename text) OWNER TO postgres;
|
|
|
|
--
|
|
-- Name: can_insert_object(text, text, uuid, jsonb); Type: FUNCTION; Schema: storage; Owner: supabase_storage_admin
|
|
--
|
|
|
|
CREATE OR REPLACE FUNCTION storage.can_insert_object(bucketid text, name text, owner uuid, metadata jsonb) RETURNS void
|
|
LANGUAGE plpgsql
|
|
AS $$
|
|
BEGIN
|
|
INSERT INTO "storage"."objects" ("bucket_id", "name", "owner", "metadata") VALUES (bucketid, name, owner, metadata);
|
|
-- hack to rollback the successful insert
|
|
RAISE sqlstate 'PT200' using
|
|
message = 'ROLLBACK',
|
|
detail = 'rollback successful insert';
|
|
END
|
|
$$;
|
|
|
|
|
|
ALTER FUNCTION storage.can_insert_object(bucketid text, name text, owner uuid, metadata jsonb) OWNER TO supabase_storage_admin;
|
|
|
|
--
|
|
-- Name: extension(text); Type: FUNCTION; Schema: storage; Owner: supabase_storage_admin
|
|
--
|
|
|
|
CREATE OR REPLACE FUNCTION storage.extension(name text) RETURNS text
|
|
LANGUAGE plpgsql
|
|
AS $$
|
|
DECLARE
|
|
_parts text[];
|
|
_filename text;
|
|
BEGIN
|
|
select string_to_array(name, '/') into _parts;
|
|
select _parts[array_length(_parts,1)] into _filename;
|
|
-- @todo return the last part instead of 2
|
|
return split_part(_filename, '.', 2);
|
|
END
|
|
$$;
|
|
|
|
|
|
ALTER FUNCTION storage.extension(name text) OWNER TO supabase_storage_admin;
|
|
|
|
--
|
|
-- Name: filename(text); Type: FUNCTION; Schema: storage; Owner: supabase_storage_admin
|
|
--
|
|
|
|
CREATE OR REPLACE FUNCTION storage.filename(name text) RETURNS text
|
|
LANGUAGE plpgsql
|
|
AS $$
|
|
DECLARE
|
|
_parts text[];
|
|
BEGIN
|
|
select string_to_array(name, '/') into _parts;
|
|
return _parts[array_length(_parts,1)];
|
|
END
|
|
$$;
|
|
|
|
|
|
ALTER FUNCTION storage.filename(name text) OWNER TO supabase_storage_admin;
|
|
|
|
--
|
|
-- Name: foldername(text); Type: FUNCTION; Schema: storage; Owner: supabase_storage_admin
|
|
--
|
|
|
|
CREATE OR REPLACE FUNCTION storage.foldername(name text) RETURNS text[]
|
|
LANGUAGE plpgsql
|
|
AS $$
|
|
DECLARE
|
|
_parts text[];
|
|
BEGIN
|
|
select string_to_array(name, '/') into _parts;
|
|
return _parts[1:array_length(_parts,1)-1];
|
|
END
|
|
$$;
|
|
|
|
|
|
ALTER FUNCTION storage.foldername(name text) OWNER TO supabase_storage_admin;
|
|
|
|
--
|
|
-- Name: get_size_by_bucket(); Type: FUNCTION; Schema: storage; Owner: supabase_storage_admin
|
|
--
|
|
|
|
CREATE OR REPLACE FUNCTION storage.get_size_by_bucket() RETURNS TABLE(size bigint, bucket_id text)
|
|
LANGUAGE plpgsql
|
|
AS $$
|
|
BEGIN
|
|
return query
|
|
select sum((metadata->>'size')::int) as size, obj.bucket_id
|
|
from "storage".objects as obj
|
|
group by obj.bucket_id;
|
|
END
|
|
$$;
|
|
|
|
|
|
ALTER FUNCTION storage.get_size_by_bucket() OWNER TO supabase_storage_admin;
|
|
|
|
--
|
|
-- Name: search(text, text, integer, integer, integer, text, text, text); Type: FUNCTION; Schema: storage; Owner: supabase_storage_admin
|
|
--
|
|
|
|
CREATE OR REPLACE FUNCTION storage.search(prefix text, bucketname text, limits integer DEFAULT 100, levels integer DEFAULT 1, offsets integer DEFAULT 0, search text DEFAULT ''::text, sortcolumn text DEFAULT 'name'::text, sortorder text DEFAULT 'asc'::text) RETURNS TABLE(name text, id uuid, updated_at timestamp with time zone, created_at timestamp with time zone, last_accessed_at timestamp with time zone, metadata jsonb)
|
|
LANGUAGE plpgsql STABLE
|
|
AS $_$
|
|
declare
|
|
v_order_by text;
|
|
v_sort_order text;
|
|
begin
|
|
case
|
|
when sortcolumn = 'name' then
|
|
v_order_by = 'name';
|
|
when sortcolumn = 'updated_at' then
|
|
v_order_by = 'updated_at';
|
|
when sortcolumn = 'created_at' then
|
|
v_order_by = 'created_at';
|
|
when sortcolumn = 'last_accessed_at' then
|
|
v_order_by = 'last_accessed_at';
|
|
else
|
|
v_order_by = 'name';
|
|
end case;
|
|
|
|
case
|
|
when sortorder = 'asc' then
|
|
v_sort_order = 'asc';
|
|
when sortorder = 'desc' then
|
|
v_sort_order = 'desc';
|
|
else
|
|
v_sort_order = 'asc';
|
|
end case;
|
|
|
|
v_order_by = v_order_by || ' ' || v_sort_order;
|
|
|
|
return query execute
|
|
'with folders as (
|
|
select path_tokens[$1] as folder
|
|
from storage.objects
|
|
where objects.name ilike $2 || $3 || ''%''
|
|
and bucket_id = $4
|
|
and array_length(regexp_split_to_array(objects.name, ''/''), 1) <> $1
|
|
group by folder
|
|
order by folder ' || v_sort_order || '
|
|
)
|
|
(select folder as "name",
|
|
null as id,
|
|
null as updated_at,
|
|
null as created_at,
|
|
null as last_accessed_at,
|
|
null as metadata from folders)
|
|
union all
|
|
(select path_tokens[$1] as "name",
|
|
id,
|
|
updated_at,
|
|
created_at,
|
|
last_accessed_at,
|
|
metadata
|
|
from storage.objects
|
|
where objects.name ilike $2 || $3 || ''%''
|
|
and bucket_id = $4
|
|
and array_length(regexp_split_to_array(objects.name, ''/''), 1) = $1
|
|
order by ' || v_order_by || ')
|
|
limit $5
|
|
offset $6' using levels, prefix, search, bucketname, limits, offsets;
|
|
end;
|
|
$_$;
|
|
|
|
|
|
ALTER FUNCTION storage.search(prefix text, bucketname text, limits integer, levels integer, offsets integer, search text, sortcolumn text, sortorder text) OWNER TO supabase_storage_admin;
|
|
|
|
--
|
|
-- Name: update_updated_at_column(); Type: FUNCTION; Schema: storage; Owner: supabase_storage_admin
|
|
--
|
|
|
|
CREATE OR REPLACE FUNCTION storage.update_updated_at_column() RETURNS trigger
|
|
LANGUAGE plpgsql
|
|
AS $$
|
|
BEGIN
|
|
NEW.updated_at = now();
|
|
RETURN NEW;
|
|
END;
|
|
$$;
|
|
|
|
|
|
ALTER FUNCTION storage.update_updated_at_column() OWNER TO supabase_storage_admin;
|
|
|
|
--
|
|
-- Name: http_request(); Type: FUNCTION; Schema: supabase_functions; Owner: supabase_functions_admin
|
|
--
|
|
|
|
CREATE OR REPLACE FUNCTION supabase_functions.http_request() RETURNS trigger
|
|
LANGUAGE plpgsql SECURITY DEFINER
|
|
SET search_path TO 'supabase_functions'
|
|
AS $$
|
|
DECLARE
|
|
request_id bigint;
|
|
payload jsonb;
|
|
url text := TG_ARGV[0]::text;
|
|
method text := TG_ARGV[1]::text;
|
|
headers jsonb DEFAULT '{}'::jsonb;
|
|
params jsonb DEFAULT '{}'::jsonb;
|
|
timeout_ms integer DEFAULT 1000;
|
|
BEGIN
|
|
IF url IS NULL OR url = 'null' THEN
|
|
RAISE EXCEPTION 'url argument is missing';
|
|
END IF;
|
|
|
|
IF method IS NULL OR method = 'null' THEN
|
|
RAISE EXCEPTION 'method argument is missing';
|
|
END IF;
|
|
|
|
IF TG_ARGV[2] IS NULL OR TG_ARGV[2] = 'null' THEN
|
|
headers = '{"Content-Type": "application/json"}'::jsonb;
|
|
ELSE
|
|
headers = TG_ARGV[2]::jsonb;
|
|
END IF;
|
|
|
|
IF TG_ARGV[3] IS NULL OR TG_ARGV[3] = 'null' THEN
|
|
params = '{}'::jsonb;
|
|
ELSE
|
|
params = TG_ARGV[3]::jsonb;
|
|
END IF;
|
|
|
|
IF TG_ARGV[4] IS NULL OR TG_ARGV[4] = 'null' THEN
|
|
timeout_ms = 1000;
|
|
ELSE
|
|
timeout_ms = TG_ARGV[4]::integer;
|
|
END IF;
|
|
|
|
CASE
|
|
WHEN method = 'GET' THEN
|
|
SELECT http_get INTO request_id FROM net.http_get(
|
|
url,
|
|
params,
|
|
headers,
|
|
timeout_ms
|
|
);
|
|
WHEN method = 'POST' THEN
|
|
payload = jsonb_build_object(
|
|
'old_record', OLD,
|
|
'record', NEW,
|
|
'type', TG_OP,
|
|
'table', TG_TABLE_NAME,
|
|
'schema', TG_TABLE_SCHEMA
|
|
);
|
|
|
|
SELECT http_post INTO request_id FROM net.http_post(
|
|
url,
|
|
payload,
|
|
params,
|
|
headers,
|
|
timeout_ms
|
|
);
|
|
ELSE
|
|
RAISE EXCEPTION 'method argument % is invalid', method;
|
|
END CASE;
|
|
|
|
INSERT INTO supabase_functions.hooks
|
|
(hook_table_id, hook_name, request_id)
|
|
VALUES
|
|
(TG_RELID, TG_NAME, request_id);
|
|
|
|
RETURN NEW;
|
|
END
|
|
$$;
|
|
|
|
|
|
ALTER FUNCTION supabase_functions.http_request() OWNER TO supabase_functions_admin;
|
|
|
|
SET default_tablespace = '';
|
|
|
|
SET default_table_access_method = heap;
|
|
|
|
--
|
|
-- Name: extensions; Type: TABLE; Schema: _realtime; Owner: postgres
|
|
--
|
|
|
|
CREATE TABLE IF NOT EXISTS _realtime.extensions (
|
|
id uuid NOT NULL,
|
|
type text,
|
|
settings jsonb,
|
|
tenant_external_id text,
|
|
inserted_at timestamp(0) without time zone NOT NULL,
|
|
updated_at timestamp(0) without time zone NOT NULL
|
|
);
|
|
|
|
|
|
ALTER TABLE _realtime.extensions OWNER TO postgres;
|
|
|
|
--
|
|
-- Name: schema_migrations; Type: TABLE; Schema: _realtime; Owner: postgres
|
|
--
|
|
|
|
CREATE TABLE IF NOT EXISTS _realtime.schema_migrations (
|
|
version bigint NOT NULL,
|
|
inserted_at timestamp(0) without time zone
|
|
);
|
|
|
|
|
|
ALTER TABLE _realtime.schema_migrations OWNER TO postgres;
|
|
|
|
--
|
|
-- Name: tenants; Type: TABLE; Schema: _realtime; Owner: postgres
|
|
--
|
|
|
|
CREATE TABLE IF NOT EXISTS _realtime.tenants (
|
|
id uuid NOT NULL,
|
|
name text,
|
|
external_id text,
|
|
jwt_secret text,
|
|
max_concurrent_users integer DEFAULT 200 NOT NULL,
|
|
inserted_at timestamp(0) without time zone NOT NULL,
|
|
updated_at timestamp(0) without time zone NOT NULL,
|
|
max_events_per_second integer DEFAULT 100 NOT NULL,
|
|
postgres_cdc_default text DEFAULT 'postgres_cdc_rls'::text,
|
|
max_bytes_per_second integer DEFAULT 100000 NOT NULL,
|
|
max_channels_per_client integer DEFAULT 100 NOT NULL,
|
|
max_joins_per_second integer DEFAULT 500 NOT NULL,
|
|
suspend boolean DEFAULT false
|
|
);
|
|
|
|
|
|
ALTER TABLE _realtime.tenants OWNER TO postgres;
|
|
|
|
--
|
|
-- Name: audit_log_entries; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE TABLE IF NOT EXISTS auth.audit_log_entries (
|
|
instance_id uuid,
|
|
id uuid NOT NULL,
|
|
payload json,
|
|
created_at timestamp with time zone,
|
|
ip_address character varying(64) DEFAULT ''::character varying NOT NULL
|
|
);
|
|
|
|
|
|
ALTER TABLE auth.audit_log_entries OWNER TO supabase_auth_admin;
|
|
|
|
--
|
|
-- Name: TABLE audit_log_entries; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
COMMENT ON TABLE auth.audit_log_entries IS 'Auth: Audit trail for user actions.';
|
|
|
|
|
|
--
|
|
-- Name: flow_state; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE TABLE IF NOT EXISTS auth.flow_state (
|
|
id uuid NOT NULL,
|
|
user_id uuid,
|
|
auth_code text NOT NULL,
|
|
code_challenge_method auth.code_challenge_method NOT NULL,
|
|
code_challenge text NOT NULL,
|
|
provider_type text NOT NULL,
|
|
provider_access_token text,
|
|
provider_refresh_token text,
|
|
created_at timestamp with time zone,
|
|
updated_at timestamp with time zone,
|
|
authentication_method text NOT NULL
|
|
);
|
|
|
|
|
|
ALTER TABLE auth.flow_state OWNER TO supabase_auth_admin;
|
|
|
|
--
|
|
-- Name: TABLE flow_state; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
COMMENT ON TABLE auth.flow_state IS 'stores metadata for pkce logins';
|
|
|
|
|
|
--
|
|
-- Name: identities; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE TABLE IF NOT EXISTS auth.identities (
|
|
provider_id text NOT NULL,
|
|
user_id uuid NOT NULL,
|
|
identity_data jsonb NOT NULL,
|
|
provider text NOT NULL,
|
|
last_sign_in_at timestamp with time zone,
|
|
created_at timestamp with time zone,
|
|
updated_at timestamp with time zone,
|
|
email text GENERATED ALWAYS AS (lower((identity_data ->> 'email'::text))) STORED,
|
|
id uuid DEFAULT gen_random_uuid() NOT NULL
|
|
);
|
|
|
|
|
|
ALTER TABLE auth.identities OWNER TO supabase_auth_admin;
|
|
|
|
--
|
|
-- Name: TABLE identities; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
COMMENT ON TABLE auth.identities IS 'Auth: Stores identities associated to a user.';
|
|
|
|
|
|
--
|
|
-- Name: COLUMN identities.email; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
COMMENT ON COLUMN auth.identities.email IS 'Auth: Email is a generated column that references the optional email property in the identity_data';
|
|
|
|
|
|
--
|
|
-- Name: instances; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE TABLE IF NOT EXISTS auth.instances (
|
|
id uuid NOT NULL,
|
|
uuid uuid,
|
|
raw_base_config text,
|
|
created_at timestamp with time zone,
|
|
updated_at timestamp with time zone
|
|
);
|
|
|
|
|
|
ALTER TABLE auth.instances OWNER TO supabase_auth_admin;
|
|
|
|
--
|
|
-- Name: TABLE instances; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
COMMENT ON TABLE auth.instances IS 'Auth: Manages users across multiple sites.';
|
|
|
|
|
|
--
|
|
-- Name: mfa_amr_claims; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE TABLE IF NOT EXISTS auth.mfa_amr_claims (
|
|
session_id uuid NOT NULL,
|
|
created_at timestamp with time zone NOT NULL,
|
|
updated_at timestamp with time zone NOT NULL,
|
|
authentication_method text NOT NULL,
|
|
id uuid NOT NULL
|
|
);
|
|
|
|
|
|
ALTER TABLE auth.mfa_amr_claims OWNER TO supabase_auth_admin;
|
|
|
|
--
|
|
-- Name: TABLE mfa_amr_claims; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
COMMENT ON TABLE auth.mfa_amr_claims IS 'auth: stores authenticator method reference claims for multi factor authentication';
|
|
|
|
|
|
--
|
|
-- Name: mfa_challenges; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE TABLE IF NOT EXISTS auth.mfa_challenges (
|
|
id uuid NOT NULL,
|
|
factor_id uuid NOT NULL,
|
|
created_at timestamp with time zone NOT NULL,
|
|
verified_at timestamp with time zone,
|
|
ip_address inet NOT NULL
|
|
);
|
|
|
|
|
|
ALTER TABLE auth.mfa_challenges OWNER TO supabase_auth_admin;
|
|
|
|
--
|
|
-- Name: TABLE mfa_challenges; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
COMMENT ON TABLE auth.mfa_challenges IS 'auth: stores metadata about challenge requests made';
|
|
|
|
|
|
--
|
|
-- Name: mfa_factors; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE TABLE IF NOT EXISTS auth.mfa_factors (
|
|
id uuid NOT NULL,
|
|
user_id uuid NOT NULL,
|
|
friendly_name text,
|
|
factor_type auth.factor_type NOT NULL,
|
|
status auth.factor_status NOT NULL,
|
|
created_at timestamp with time zone NOT NULL,
|
|
updated_at timestamp with time zone NOT NULL,
|
|
secret text
|
|
);
|
|
|
|
|
|
ALTER TABLE auth.mfa_factors OWNER TO supabase_auth_admin;
|
|
|
|
--
|
|
-- Name: TABLE mfa_factors; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
COMMENT ON TABLE auth.mfa_factors IS 'auth: stores metadata about factors';
|
|
|
|
|
|
--
|
|
-- Name: refresh_tokens; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE TABLE IF NOT EXISTS auth.refresh_tokens (
|
|
instance_id uuid,
|
|
id bigint NOT NULL,
|
|
token character varying(255),
|
|
user_id character varying(255),
|
|
revoked boolean,
|
|
created_at timestamp with time zone,
|
|
updated_at timestamp with time zone,
|
|
parent character varying(255),
|
|
session_id uuid
|
|
);
|
|
|
|
|
|
ALTER TABLE auth.refresh_tokens OWNER TO supabase_auth_admin;
|
|
|
|
--
|
|
-- Name: TABLE refresh_tokens; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
COMMENT ON TABLE auth.refresh_tokens IS 'Auth: Store of tokens used to refresh JWT tokens once they expire.';
|
|
|
|
|
|
--
|
|
-- Name: refresh_tokens_id_seq; Type: SEQUENCE; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE SEQUENCE IF NOT EXISTS auth.refresh_tokens_id_seq
|
|
START WITH 1
|
|
INCREMENT BY 1
|
|
NO MINVALUE
|
|
NO MAXVALUE
|
|
CACHE 1;
|
|
|
|
|
|
ALTER TABLE auth.refresh_tokens_id_seq OWNER TO supabase_auth_admin;
|
|
|
|
--
|
|
-- Name: refresh_tokens_id_seq; Type: SEQUENCE OWNED BY; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
ALTER SEQUENCE auth.refresh_tokens_id_seq OWNED BY auth.refresh_tokens.id;
|
|
|
|
|
|
--
|
|
-- Name: saml_providers; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE TABLE IF NOT EXISTS auth.saml_providers (
|
|
id uuid NOT NULL,
|
|
sso_provider_id uuid NOT NULL,
|
|
entity_id text NOT NULL,
|
|
metadata_xml text NOT NULL,
|
|
metadata_url text,
|
|
attribute_mapping jsonb,
|
|
created_at timestamp with time zone,
|
|
updated_at timestamp with time zone,
|
|
CONSTRAINT "entity_id not empty" CHECK ((char_length(entity_id) > 0)),
|
|
CONSTRAINT "metadata_url not empty" CHECK (((metadata_url = NULL::text) OR (char_length(metadata_url) > 0))),
|
|
CONSTRAINT "metadata_xml not empty" CHECK ((char_length(metadata_xml) > 0))
|
|
);
|
|
|
|
|
|
ALTER TABLE auth.saml_providers OWNER TO supabase_auth_admin;
|
|
|
|
--
|
|
-- Name: TABLE saml_providers; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
COMMENT ON TABLE auth.saml_providers IS 'Auth: Manages SAML Identity Provider connections.';
|
|
|
|
|
|
--
|
|
-- Name: saml_relay_states; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE TABLE IF NOT EXISTS auth.saml_relay_states (
|
|
id uuid NOT NULL,
|
|
sso_provider_id uuid NOT NULL,
|
|
request_id text NOT NULL,
|
|
for_email text,
|
|
redirect_to text,
|
|
from_ip_address inet,
|
|
created_at timestamp with time zone,
|
|
updated_at timestamp with time zone,
|
|
flow_state_id uuid,
|
|
CONSTRAINT "request_id not empty" CHECK ((char_length(request_id) > 0))
|
|
);
|
|
|
|
|
|
ALTER TABLE auth.saml_relay_states OWNER TO supabase_auth_admin;
|
|
|
|
--
|
|
-- Name: TABLE saml_relay_states; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
COMMENT ON TABLE auth.saml_relay_states IS 'Auth: Contains SAML Relay State information for each Service Provider initiated login.';
|
|
|
|
|
|
--
|
|
-- Name: schema_migrations; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE TABLE IF NOT EXISTS auth.schema_migrations (
|
|
version character varying(255) NOT NULL
|
|
);
|
|
|
|
|
|
ALTER TABLE auth.schema_migrations OWNER TO supabase_auth_admin;
|
|
|
|
--
|
|
-- Name: TABLE schema_migrations; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
COMMENT ON TABLE auth.schema_migrations IS 'Auth: Manages updates to the auth system.';
|
|
|
|
|
|
--
|
|
-- Name: sessions; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE TABLE IF NOT EXISTS auth.sessions (
|
|
id uuid NOT NULL,
|
|
user_id uuid NOT NULL,
|
|
created_at timestamp with time zone,
|
|
updated_at timestamp with time zone,
|
|
factor_id uuid,
|
|
aal auth.aal_level,
|
|
not_after timestamp with time zone,
|
|
refreshed_at timestamp without time zone,
|
|
user_agent text,
|
|
ip inet,
|
|
tag text
|
|
);
|
|
|
|
|
|
ALTER TABLE auth.sessions OWNER TO supabase_auth_admin;
|
|
|
|
--
|
|
-- Name: TABLE sessions; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
COMMENT ON TABLE auth.sessions IS 'Auth: Stores session data associated to a user.';
|
|
|
|
|
|
--
|
|
-- Name: COLUMN sessions.not_after; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
COMMENT ON COLUMN auth.sessions.not_after IS 'Auth: Not after is a nullable column that contains a timestamp after which the session should be regarded as expired.';
|
|
|
|
|
|
--
|
|
-- Name: sso_domains; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE TABLE IF NOT EXISTS auth.sso_domains (
|
|
id uuid NOT NULL,
|
|
sso_provider_id uuid NOT NULL,
|
|
domain text NOT NULL,
|
|
created_at timestamp with time zone,
|
|
updated_at timestamp with time zone,
|
|
CONSTRAINT "domain not empty" CHECK ((char_length(domain) > 0))
|
|
);
|
|
|
|
|
|
ALTER TABLE auth.sso_domains OWNER TO supabase_auth_admin;
|
|
|
|
--
|
|
-- Name: TABLE sso_domains; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
COMMENT ON TABLE auth.sso_domains IS 'Auth: Manages SSO email address domain mapping to an SSO Identity Provider.';
|
|
|
|
|
|
--
|
|
-- Name: sso_providers; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE TABLE IF NOT EXISTS auth.sso_providers (
|
|
id uuid NOT NULL,
|
|
resource_id text,
|
|
created_at timestamp with time zone,
|
|
updated_at timestamp with time zone,
|
|
CONSTRAINT "resource_id not empty" CHECK (((resource_id = NULL::text) OR (char_length(resource_id) > 0)))
|
|
);
|
|
|
|
|
|
ALTER TABLE auth.sso_providers OWNER TO supabase_auth_admin;
|
|
|
|
--
|
|
-- Name: TABLE sso_providers; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
COMMENT ON TABLE auth.sso_providers IS 'Auth: Manages SSO identity provider information; see saml_providers for SAML.';
|
|
|
|
|
|
--
|
|
-- Name: COLUMN sso_providers.resource_id; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
COMMENT ON COLUMN auth.sso_providers.resource_id IS 'Auth: Uniquely identifies a SSO provider according to a user-chosen resource ID (case insensitive), useful in infrastructure as code.';
|
|
|
|
|
|
--
|
|
-- Name: users; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE TABLE IF NOT EXISTS auth.users (
|
|
instance_id uuid,
|
|
id uuid NOT NULL,
|
|
aud character varying(255),
|
|
role character varying(255),
|
|
email character varying(255),
|
|
encrypted_password character varying(255),
|
|
email_confirmed_at timestamp with time zone,
|
|
invited_at timestamp with time zone,
|
|
confirmation_token character varying(255),
|
|
confirmation_sent_at timestamp with time zone,
|
|
recovery_token character varying(255),
|
|
recovery_sent_at timestamp with time zone,
|
|
email_change_token_new character varying(255),
|
|
email_change character varying(255),
|
|
email_change_sent_at timestamp with time zone,
|
|
last_sign_in_at timestamp with time zone,
|
|
raw_app_meta_data jsonb,
|
|
raw_user_meta_data jsonb,
|
|
is_super_admin boolean,
|
|
created_at timestamp with time zone,
|
|
updated_at timestamp with time zone,
|
|
phone text DEFAULT NULL::character varying,
|
|
phone_confirmed_at timestamp with time zone,
|
|
phone_change text DEFAULT ''::character varying,
|
|
phone_change_token character varying(255) DEFAULT ''::character varying,
|
|
phone_change_sent_at timestamp with time zone,
|
|
confirmed_at timestamp with time zone GENERATED ALWAYS AS (LEAST(email_confirmed_at, phone_confirmed_at)) STORED,
|
|
email_change_token_current character varying(255) DEFAULT ''::character varying,
|
|
email_change_confirm_status smallint DEFAULT 0,
|
|
banned_until timestamp with time zone,
|
|
reauthentication_token character varying(255) DEFAULT ''::character varying,
|
|
reauthentication_sent_at timestamp with time zone,
|
|
is_sso_user boolean DEFAULT false NOT NULL,
|
|
deleted_at timestamp with time zone,
|
|
CONSTRAINT users_email_change_confirm_status_check CHECK (((email_change_confirm_status >= 0) AND (email_change_confirm_status <= 2)))
|
|
);
|
|
|
|
|
|
ALTER TABLE auth.users OWNER TO supabase_auth_admin;
|
|
|
|
--
|
|
-- Name: TABLE users; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
COMMENT ON TABLE auth.users IS 'Auth: Stores user login data within a secure schema.';
|
|
|
|
|
|
--
|
|
-- Name: COLUMN users.is_sso_user; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
COMMENT ON COLUMN auth.users.is_sso_user IS 'Auth: Set this column to true when the account comes from SSO. These accounts can have duplicate emails.';
|
|
|
|
|
|
--
|
|
-- Name: buckets; Type: TABLE; Schema: storage; Owner: supabase_storage_admin
|
|
--
|
|
|
|
CREATE TABLE IF NOT EXISTS storage.buckets (
|
|
id text NOT NULL,
|
|
name text NOT NULL,
|
|
owner uuid,
|
|
created_at timestamp with time zone DEFAULT now(),
|
|
updated_at timestamp with time zone DEFAULT now(),
|
|
public boolean DEFAULT false,
|
|
avif_autodetection boolean DEFAULT false,
|
|
file_size_limit bigint,
|
|
allowed_mime_types text[],
|
|
owner_id text
|
|
);
|
|
|
|
|
|
ALTER TABLE storage.buckets OWNER TO supabase_storage_admin;
|
|
|
|
--
|
|
-- Name: COLUMN buckets.owner; Type: COMMENT; Schema: storage; Owner: supabase_storage_admin
|
|
--
|
|
|
|
COMMENT ON COLUMN storage.buckets.owner IS 'Field is deprecated, use owner_id instead';
|
|
|
|
|
|
--
|
|
-- Name: migrations; Type: TABLE; Schema: storage; Owner: supabase_storage_admin
|
|
--
|
|
|
|
CREATE TABLE IF NOT EXISTS storage.migrations (
|
|
id integer NOT NULL,
|
|
name character varying(100) NOT NULL,
|
|
hash character varying(40) NOT NULL,
|
|
executed_at timestamp without time zone DEFAULT CURRENT_TIMESTAMP
|
|
);
|
|
|
|
|
|
ALTER TABLE storage.migrations OWNER TO supabase_storage_admin;
|
|
|
|
--
|
|
-- Name: objects; Type: TABLE; Schema: storage; Owner: supabase_storage_admin
|
|
--
|
|
|
|
CREATE TABLE IF NOT EXISTS storage.objects (
|
|
id uuid DEFAULT extensions.uuid_generate_v4() NOT NULL,
|
|
bucket_id text,
|
|
name text,
|
|
owner uuid,
|
|
created_at timestamp with time zone DEFAULT now(),
|
|
updated_at timestamp with time zone DEFAULT now(),
|
|
last_accessed_at timestamp with time zone DEFAULT now(),
|
|
metadata jsonb,
|
|
path_tokens text[] GENERATED ALWAYS AS (string_to_array(name, '/'::text)) STORED,
|
|
version text,
|
|
owner_id text
|
|
);
|
|
|
|
|
|
ALTER TABLE storage.objects OWNER TO supabase_storage_admin;
|
|
|
|
--
|
|
-- Name: COLUMN objects.owner; Type: COMMENT; Schema: storage; Owner: supabase_storage_admin
|
|
--
|
|
|
|
COMMENT ON COLUMN storage.objects.owner IS 'Field is deprecated, use owner_id instead';
|
|
|
|
|
|
--
|
|
-- Name: hooks; Type: TABLE; Schema: supabase_functions; Owner: supabase_functions_admin
|
|
--
|
|
|
|
CREATE TABLE IF NOT EXISTS supabase_functions.hooks (
|
|
id bigint NOT NULL,
|
|
hook_table_id integer NOT NULL,
|
|
hook_name text NOT NULL,
|
|
created_at timestamp with time zone DEFAULT now() NOT NULL,
|
|
request_id bigint
|
|
);
|
|
|
|
|
|
ALTER TABLE supabase_functions.hooks OWNER TO supabase_functions_admin;
|
|
|
|
--
|
|
-- Name: TABLE hooks; Type: COMMENT; Schema: supabase_functions; Owner: supabase_functions_admin
|
|
--
|
|
|
|
COMMENT ON TABLE supabase_functions.hooks IS 'Supabase Functions Hooks: Audit trail for triggered hooks.';
|
|
|
|
|
|
--
|
|
-- Name: hooks_id_seq; Type: SEQUENCE; Schema: supabase_functions; Owner: supabase_functions_admin
|
|
--
|
|
|
|
CREATE SEQUENCE IF NOT EXISTS supabase_functions.hooks_id_seq
|
|
START WITH 1
|
|
INCREMENT BY 1
|
|
NO MINVALUE
|
|
NO MAXVALUE
|
|
CACHE 1;
|
|
|
|
|
|
ALTER TABLE supabase_functions.hooks_id_seq OWNER TO supabase_functions_admin;
|
|
|
|
--
|
|
-- Name: hooks_id_seq; Type: SEQUENCE OWNED BY; Schema: supabase_functions; Owner: supabase_functions_admin
|
|
--
|
|
|
|
ALTER SEQUENCE supabase_functions.hooks_id_seq OWNED BY supabase_functions.hooks.id;
|
|
|
|
|
|
--
|
|
-- Name: migrations; Type: TABLE; Schema: supabase_functions; Owner: supabase_functions_admin
|
|
--
|
|
|
|
CREATE TABLE IF NOT EXISTS supabase_functions.migrations (
|
|
version text NOT NULL,
|
|
inserted_at timestamp with time zone DEFAULT now() NOT NULL
|
|
);
|
|
|
|
|
|
ALTER TABLE supabase_functions.migrations OWNER TO supabase_functions_admin;
|
|
|
|
--
|
|
-- Name: refresh_tokens id; Type: DEFAULT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
ALTER TABLE ONLY auth.refresh_tokens ALTER COLUMN id SET DEFAULT nextval('auth.refresh_tokens_id_seq'::regclass);
|
|
|
|
|
|
--
|
|
-- Name: hooks id; Type: DEFAULT; Schema: supabase_functions; Owner: supabase_functions_admin
|
|
--
|
|
|
|
ALTER TABLE ONLY supabase_functions.hooks ALTER COLUMN id SET DEFAULT nextval('supabase_functions.hooks_id_seq'::regclass);
|
|
|
|
|
|
--
|
|
-- Data for Name: extensions; Type: TABLE DATA; Schema: _realtime; Owner: postgres
|
|
--
|
|
|
|
INSERT INTO _realtime.extensions (id, type, settings, tenant_external_id, inserted_at, updated_at) VALUES ('832b3aeb-9d7f-41aa-ad31-60ea054c294f', 'postgres_cdc_rls', '{"region": "us-east-1", "db_host": "ABK7kBu27y/PVdL10i/b+A==", "db_name": "sWBpZNdjggEPTQVlI52Zfw==", "db_port": "+enMDFi1J/3IrrquHHwUmA==", "db_user": "uxbEq/zz8DXVD53TOI1zmw==", "slot_name": "supabase_realtime_replication_slot", "ip_version": 4, "db_password": "sWBpZNdjggEPTQVlI52Zfw==", "publication": "supabase_realtime", "ssl_enforced": false, "poll_interval_ms": 100, "poll_max_changes": 100, "poll_max_record_bytes": 1048576}', 'realtime-dev', '2023-11-20 22:04:38', '2023-11-20 22:04:38');
|
|
|
|
|
|
--
|
|
-- Data for Name: schema_migrations; Type: TABLE DATA; Schema: _realtime; Owner: postgres
|
|
--
|
|
|
|
INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20210706140551, '2023-03-16 02:25:35');
|
|
INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20220329161857, '2023-03-16 02:25:35');
|
|
INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20220410212326, '2023-03-16 02:25:35');
|
|
INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20220506102948, '2023-03-16 02:25:35');
|
|
INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20220527210857, '2023-03-16 02:25:36');
|
|
INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20220815211129, '2023-03-16 02:25:36');
|
|
INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20220815215024, '2023-03-16 02:25:36');
|
|
INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20220818141501, '2023-03-16 02:25:36');
|
|
INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20221018173709, '2023-03-16 02:25:36');
|
|
INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20221102172703, '2023-03-16 02:25:36');
|
|
INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20221223010058, '2023-03-16 02:25:36');
|
|
INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20230110180046, '2023-03-16 02:25:36');
|
|
INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20230810220907, '2023-11-20 21:54:23');
|
|
INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20230810220924, '2023-11-20 21:54:23');
|
|
INSERT INTO _realtime.schema_migrations (version, inserted_at) VALUES (20231024094642, '2023-11-20 21:54:23');
|
|
|
|
|
|
--
|
|
-- Data for Name: tenants; Type: TABLE DATA; Schema: _realtime; Owner: postgres
|
|
--
|
|
|
|
INSERT INTO _realtime.tenants (id, name, external_id, jwt_secret, max_concurrent_users, inserted_at, updated_at, max_events_per_second, postgres_cdc_default, max_bytes_per_second, max_channels_per_client, max_joins_per_second, suspend) VALUES ('f418662c-07b5-4160-9338-4db7fbaaabbd', 'realtime-dev', 'realtime-dev', 'iNjicxc4+llvc9wovDvqymwfnj9teWMlyOIbJ8Fh6j2WNU8CIJ2ZgjR6MUIKqSmeDmvpsKLsZ9jgXJmQPpwL8w==', 200, '2023-11-20 22:04:38', '2023-11-20 22:04:38', 100, 'postgres_cdc_rls', 100000, 100, 100, false);
|
|
|
|
|
|
--
|
|
-- Data for Name: audit_log_entries; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
|
|
|
|
--
|
|
-- Data for Name: flow_state; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
|
|
|
|
--
|
|
-- Data for Name: identities; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
|
|
|
|
--
|
|
-- Data for Name: instances; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
|
|
|
|
--
|
|
-- Data for Name: mfa_amr_claims; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
|
|
|
|
--
|
|
-- Data for Name: mfa_challenges; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
|
|
|
|
--
|
|
-- Data for Name: mfa_factors; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
|
|
|
|
--
|
|
-- Data for Name: refresh_tokens; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
|
|
|
|
--
|
|
-- Data for Name: saml_providers; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
|
|
|
|
--
|
|
-- Data for Name: saml_relay_states; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
|
|
|
|
--
|
|
-- Data for Name: schema_migrations; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20171026211738');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20171026211808');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20171026211834');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20180103212743');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20180108183307');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20180119214651');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20180125194653');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('00');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20210710035447');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20210722035447');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20210730183235');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20210909172000');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20210927181326');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20211122151130');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20211124214934');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20211202183645');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20220114185221');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20220114185340');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20220224000811');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20220323170000');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20220429102000');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20220531120530');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20220614074223');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20220811173540');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20221003041349');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20221003041400');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20221011041400');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20221020193600');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20221021073300');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20221021082433');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20221027105023');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20221114143122');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20221114143410');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20221125140132');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20221208132122');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20221215195500');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20221215195800');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20221215195900');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20230116124310');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20230116124412');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20230131181311');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20230322519590');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20230402418590');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20230411005111');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20230508135423');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20230523124323');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20230818113222');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20230914180801');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20231027141322');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20231114161723');
|
|
INSERT INTO auth.schema_migrations (version) VALUES ('20231117164230');
|
|
|
|
|
|
--
|
|
-- Data for Name: sessions; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
|
|
|
|
--
|
|
-- Data for Name: sso_domains; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
|
|
|
|
--
|
|
-- Data for Name: sso_providers; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
|
|
|
|
--
|
|
-- Data for Name: users; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
|
|
|
|
--
|
|
-- Data for Name: buckets; Type: TABLE DATA; Schema: storage; Owner: supabase_storage_admin
|
|
--
|
|
|
|
|
|
|
|
--
|
|
-- Data for Name: migrations; Type: TABLE DATA; Schema: storage; Owner: supabase_storage_admin
|
|
--
|
|
|
|
INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (0, 'create-migrations-table', 'e18db593bcde2aca2a408c4d1100f6abba2195df', '2023-03-16 02:25:37.548482');
|
|
INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (1, 'initialmigration', '6ab16121fbaa08bbd11b712d05f358f9b555d777', '2023-03-16 02:25:37.55595');
|
|
INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (2, 'pathtoken-column', '49756be03be4c17bb85fe70d4a861f27de7e49ad', '2023-03-16 02:25:37.560258');
|
|
INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (3, 'add-migrations-rls', 'bb5d124c53d68635a883e399426c6a5a25fc893d', '2023-03-16 02:25:37.594153');
|
|
INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (4, 'add-size-functions', '6d79007d04f5acd288c9c250c42d2d5fd286c54d', '2023-03-16 02:25:37.599194');
|
|
INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (5, 'change-column-name-in-get-size', 'fd65688505d2ffa9fbdc58a944348dd8604d688c', '2023-03-16 02:25:37.604658');
|
|
INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (6, 'add-rls-to-buckets', '63e2bab75a2040fee8e3fb3f15a0d26f3380e9b6', '2023-03-16 02:25:37.609563');
|
|
INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (7, 'add-public-to-buckets', '82568934f8a4d9e0a85f126f6fb483ad8214c418', '2023-03-16 02:25:37.615929');
|
|
INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (8, 'fix-search-function', '1a43a40eddb525f2e2f26efd709e6c06e58e059c', '2023-03-16 02:25:37.620171');
|
|
INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (9, 'search-files-search-function', '34c096597eb8b9d077fdfdde9878c88501b2fafc', '2023-03-16 02:25:37.624484');
|
|
INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (10, 'add-trigger-to-auto-update-updated_at-column', '37d6bb964a70a822e6d37f22f457b9bca7885928', '2023-03-16 02:25:37.629534');
|
|
INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (11, 'add-automatic-avif-detection-flag', 'bd76c53a9c564c80d98d119c1b3a28e16c8152db', '2023-03-16 02:25:37.634022');
|
|
INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (12, 'add-bucket-custom-limits', 'cbe0a4c32a0e891554a21020433b7a4423c07ee7', '2023-03-16 02:25:37.639132');
|
|
INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (13, 'use-bytes-for-max-size', '7a158ebce8a0c2801c9c65b7e9b2f98f68b3874e', '2023-03-16 02:25:37.643598');
|
|
INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (14, 'add-can-insert-object-function', '273193826bca7e0990b458d1ba72f8aa27c0d825', '2023-04-06 09:18:55.232202');
|
|
INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (15, 'add-version', 'e821a779d26612899b8c2dfe20245f904a327c4f', '2023-04-06 09:18:55.239444');
|
|
INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (16, 'drop-owner-foreign-key', '536b33f8878eed09d0144219777dcac96bdb25da', '2023-11-20 21:54:33.540386');
|
|
INSERT INTO storage.migrations (id, name, hash, executed_at) VALUES (17, 'add_owner_id_column_deprecate_owner', '7545f216a39358b5487df75d941d05dbcd75eb46', '2023-11-20 22:04:38.959686');
|
|
|
|
|
|
--
|
|
-- Data for Name: objects; Type: TABLE DATA; Schema: storage; Owner: supabase_storage_admin
|
|
--
|
|
|
|
|
|
|
|
--
|
|
-- Data for Name: hooks; Type: TABLE DATA; Schema: supabase_functions; Owner: supabase_functions_admin
|
|
--
|
|
|
|
|
|
|
|
--
|
|
-- Data for Name: migrations; Type: TABLE DATA; Schema: supabase_functions; Owner: supabase_functions_admin
|
|
--
|
|
|
|
INSERT INTO supabase_functions.migrations (version, inserted_at) VALUES ('initial', '2023-03-16 02:25:30.966697+00');
|
|
INSERT INTO supabase_functions.migrations (version, inserted_at) VALUES ('20210809183423_update_grants', '2023-03-16 02:25:30.966697+00');
|
|
|
|
|
|
--
|
|
-- Name: refresh_tokens_id_seq; Type: SEQUENCE SET; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
SELECT pg_catalog.setval('auth.refresh_tokens_id_seq', 1, false);
|
|
|
|
|
|
--
|
|
-- Name: hooks_id_seq; Type: SEQUENCE SET; Schema: supabase_functions; Owner: supabase_functions_admin
|
|
--
|
|
|
|
SELECT pg_catalog.setval('supabase_functions.hooks_id_seq', 1, false);
|
|
|
|
|
|
--
|
|
-- Name: extensions extensions_pkey; Type: CONSTRAINT; Schema: _realtime; Owner: postgres
|
|
--
|
|
|
|
ALTER TABLE ONLY _realtime.extensions
|
|
ADD CONSTRAINT extensions_pkey PRIMARY KEY (id);
|
|
|
|
|
|
--
|
|
-- Name: schema_migrations schema_migrations_pkey; Type: CONSTRAINT; Schema: _realtime; Owner: postgres
|
|
--
|
|
|
|
ALTER TABLE ONLY _realtime.schema_migrations
|
|
ADD CONSTRAINT schema_migrations_pkey PRIMARY KEY (version);
|
|
|
|
|
|
--
|
|
-- Name: tenants tenants_pkey; Type: CONSTRAINT; Schema: _realtime; Owner: postgres
|
|
--
|
|
|
|
ALTER TABLE ONLY _realtime.tenants
|
|
ADD CONSTRAINT tenants_pkey PRIMARY KEY (id);
|
|
|
|
|
|
--
|
|
-- Name: mfa_amr_claims amr_id_pk; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
ALTER TABLE ONLY auth.mfa_amr_claims
|
|
ADD CONSTRAINT amr_id_pk PRIMARY KEY (id);
|
|
|
|
|
|
--
|
|
-- Name: audit_log_entries audit_log_entries_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
ALTER TABLE ONLY auth.audit_log_entries
|
|
ADD CONSTRAINT audit_log_entries_pkey PRIMARY KEY (id);
|
|
|
|
|
|
--
|
|
-- Name: flow_state flow_state_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
ALTER TABLE ONLY auth.flow_state
|
|
ADD CONSTRAINT flow_state_pkey PRIMARY KEY (id);
|
|
|
|
|
|
--
|
|
-- Name: identities identities_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
ALTER TABLE ONLY auth.identities
|
|
ADD CONSTRAINT identities_pkey PRIMARY KEY (id);
|
|
|
|
|
|
--
|
|
-- Name: identities identities_provider_id_provider_unique; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
ALTER TABLE ONLY auth.identities
|
|
ADD CONSTRAINT identities_provider_id_provider_unique UNIQUE (provider_id, provider);
|
|
|
|
|
|
--
|
|
-- Name: instances instances_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
ALTER TABLE ONLY auth.instances
|
|
ADD CONSTRAINT instances_pkey PRIMARY KEY (id);
|
|
|
|
|
|
--
|
|
-- Name: mfa_amr_claims mfa_amr_claims_session_id_authentication_method_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
ALTER TABLE ONLY auth.mfa_amr_claims
|
|
ADD CONSTRAINT mfa_amr_claims_session_id_authentication_method_pkey UNIQUE (session_id, authentication_method);
|
|
|
|
|
|
--
|
|
-- Name: mfa_challenges mfa_challenges_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
ALTER TABLE ONLY auth.mfa_challenges
|
|
ADD CONSTRAINT mfa_challenges_pkey PRIMARY KEY (id);
|
|
|
|
|
|
--
|
|
-- Name: mfa_factors mfa_factors_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
ALTER TABLE ONLY auth.mfa_factors
|
|
ADD CONSTRAINT mfa_factors_pkey PRIMARY KEY (id);
|
|
|
|
|
|
--
|
|
-- Name: refresh_tokens refresh_tokens_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
ALTER TABLE ONLY auth.refresh_tokens
|
|
ADD CONSTRAINT refresh_tokens_pkey PRIMARY KEY (id);
|
|
|
|
|
|
--
|
|
-- Name: refresh_tokens refresh_tokens_token_unique; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
ALTER TABLE ONLY auth.refresh_tokens
|
|
ADD CONSTRAINT refresh_tokens_token_unique UNIQUE (token);
|
|
|
|
|
|
--
|
|
-- Name: saml_providers saml_providers_entity_id_key; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
ALTER TABLE ONLY auth.saml_providers
|
|
ADD CONSTRAINT saml_providers_entity_id_key UNIQUE (entity_id);
|
|
|
|
|
|
--
|
|
-- Name: saml_providers saml_providers_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
ALTER TABLE ONLY auth.saml_providers
|
|
ADD CONSTRAINT saml_providers_pkey PRIMARY KEY (id);
|
|
|
|
|
|
--
|
|
-- Name: saml_relay_states saml_relay_states_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
ALTER TABLE ONLY auth.saml_relay_states
|
|
ADD CONSTRAINT saml_relay_states_pkey PRIMARY KEY (id);
|
|
|
|
|
|
--
|
|
-- Name: schema_migrations schema_migrations_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
ALTER TABLE ONLY auth.schema_migrations
|
|
ADD CONSTRAINT schema_migrations_pkey PRIMARY KEY (version);
|
|
|
|
|
|
--
|
|
-- Name: sessions sessions_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
ALTER TABLE ONLY auth.sessions
|
|
ADD CONSTRAINT sessions_pkey PRIMARY KEY (id);
|
|
|
|
|
|
--
|
|
-- Name: sso_domains sso_domains_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
ALTER TABLE ONLY auth.sso_domains
|
|
ADD CONSTRAINT sso_domains_pkey PRIMARY KEY (id);
|
|
|
|
|
|
--
|
|
-- Name: sso_providers sso_providers_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
ALTER TABLE ONLY auth.sso_providers
|
|
ADD CONSTRAINT sso_providers_pkey PRIMARY KEY (id);
|
|
|
|
|
|
--
|
|
-- Name: users users_phone_key; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
ALTER TABLE ONLY auth.users
|
|
ADD CONSTRAINT users_phone_key UNIQUE (phone);
|
|
|
|
|
|
--
|
|
-- Name: users users_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
ALTER TABLE ONLY auth.users
|
|
ADD CONSTRAINT users_pkey PRIMARY KEY (id);
|
|
|
|
|
|
--
|
|
-- Name: buckets buckets_pkey; Type: CONSTRAINT; Schema: storage; Owner: supabase_storage_admin
|
|
--
|
|
|
|
ALTER TABLE ONLY storage.buckets
|
|
ADD CONSTRAINT buckets_pkey PRIMARY KEY (id);
|
|
|
|
|
|
--
|
|
-- Name: migrations migrations_name_key; Type: CONSTRAINT; Schema: storage; Owner: supabase_storage_admin
|
|
--
|
|
|
|
ALTER TABLE ONLY storage.migrations
|
|
ADD CONSTRAINT migrations_name_key UNIQUE (name);
|
|
|
|
|
|
--
|
|
-- Name: migrations migrations_pkey; Type: CONSTRAINT; Schema: storage; Owner: supabase_storage_admin
|
|
--
|
|
|
|
ALTER TABLE ONLY storage.migrations
|
|
ADD CONSTRAINT migrations_pkey PRIMARY KEY (id);
|
|
|
|
|
|
--
|
|
-- Name: objects objects_pkey; Type: CONSTRAINT; Schema: storage; Owner: supabase_storage_admin
|
|
--
|
|
|
|
ALTER TABLE ONLY storage.objects
|
|
ADD CONSTRAINT objects_pkey PRIMARY KEY (id);
|
|
|
|
|
|
--
|
|
-- Name: hooks hooks_pkey; Type: CONSTRAINT; Schema: supabase_functions; Owner: supabase_functions_admin
|
|
--
|
|
|
|
ALTER TABLE ONLY supabase_functions.hooks
|
|
ADD CONSTRAINT hooks_pkey PRIMARY KEY (id);
|
|
|
|
|
|
--
|
|
-- Name: migrations migrations_pkey; Type: CONSTRAINT; Schema: supabase_functions; Owner: supabase_functions_admin
|
|
--
|
|
|
|
ALTER TABLE ONLY supabase_functions.migrations
|
|
ADD CONSTRAINT migrations_pkey PRIMARY KEY (version);
|
|
|
|
|
|
--
|
|
-- Name: extensions_tenant_external_id_type_index; Type: INDEX; Schema: _realtime; Owner: postgres
|
|
--
|
|
|
|
CREATE UNIQUE INDEX extensions_tenant_external_id_type_index ON _realtime.extensions USING btree (tenant_external_id, type);
|
|
|
|
|
|
--
|
|
-- Name: tenants_external_id_index; Type: INDEX; Schema: _realtime; Owner: postgres
|
|
--
|
|
|
|
CREATE UNIQUE INDEX tenants_external_id_index ON _realtime.tenants USING btree (external_id);
|
|
|
|
|
|
--
|
|
-- Name: audit_logs_instance_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE INDEX audit_logs_instance_id_idx ON auth.audit_log_entries USING btree (instance_id);
|
|
|
|
|
|
--
|
|
-- Name: confirmation_token_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE UNIQUE INDEX confirmation_token_idx ON auth.users USING btree (confirmation_token) WHERE ((confirmation_token)::text !~ '^[0-9 ]*$'::text);
|
|
|
|
|
|
--
|
|
-- Name: email_change_token_current_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE UNIQUE INDEX email_change_token_current_idx ON auth.users USING btree (email_change_token_current) WHERE ((email_change_token_current)::text !~ '^[0-9 ]*$'::text);
|
|
|
|
|
|
--
|
|
-- Name: email_change_token_new_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE UNIQUE INDEX email_change_token_new_idx ON auth.users USING btree (email_change_token_new) WHERE ((email_change_token_new)::text !~ '^[0-9 ]*$'::text);
|
|
|
|
|
|
--
|
|
-- Name: factor_id_created_at_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE INDEX factor_id_created_at_idx ON auth.mfa_factors USING btree (user_id, created_at);
|
|
|
|
|
|
--
|
|
-- Name: flow_state_created_at_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE INDEX flow_state_created_at_idx ON auth.flow_state USING btree (created_at DESC);
|
|
|
|
|
|
--
|
|
-- Name: identities_email_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE INDEX identities_email_idx ON auth.identities USING btree (email text_pattern_ops);
|
|
|
|
|
|
--
|
|
-- Name: INDEX identities_email_idx; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
COMMENT ON INDEX auth.identities_email_idx IS 'Auth: Ensures indexed queries on the email column';
|
|
|
|
|
|
--
|
|
-- Name: identities_user_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE INDEX identities_user_id_idx ON auth.identities USING btree (user_id);
|
|
|
|
|
|
--
|
|
-- Name: idx_auth_code; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE INDEX idx_auth_code ON auth.flow_state USING btree (auth_code);
|
|
|
|
|
|
--
|
|
-- Name: idx_user_id_auth_method; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE INDEX idx_user_id_auth_method ON auth.flow_state USING btree (user_id, authentication_method);
|
|
|
|
|
|
--
|
|
-- Name: mfa_challenge_created_at_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE INDEX mfa_challenge_created_at_idx ON auth.mfa_challenges USING btree (created_at DESC);
|
|
|
|
|
|
--
|
|
-- Name: mfa_factors_user_friendly_name_unique; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE UNIQUE INDEX mfa_factors_user_friendly_name_unique ON auth.mfa_factors USING btree (friendly_name, user_id) WHERE (TRIM(BOTH FROM friendly_name) <> ''::text);
|
|
|
|
|
|
--
|
|
-- Name: mfa_factors_user_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE INDEX mfa_factors_user_id_idx ON auth.mfa_factors USING btree (user_id);
|
|
|
|
|
|
--
|
|
-- Name: reauthentication_token_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE UNIQUE INDEX reauthentication_token_idx ON auth.users USING btree (reauthentication_token) WHERE ((reauthentication_token)::text !~ '^[0-9 ]*$'::text);
|
|
|
|
|
|
--
|
|
-- Name: recovery_token_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE UNIQUE INDEX recovery_token_idx ON auth.users USING btree (recovery_token) WHERE ((recovery_token)::text !~ '^[0-9 ]*$'::text);
|
|
|
|
|
|
--
|
|
-- Name: refresh_tokens_instance_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE INDEX refresh_tokens_instance_id_idx ON auth.refresh_tokens USING btree (instance_id);
|
|
|
|
|
|
--
|
|
-- Name: refresh_tokens_instance_id_user_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE INDEX refresh_tokens_instance_id_user_id_idx ON auth.refresh_tokens USING btree (instance_id, user_id);
|
|
|
|
|
|
--
|
|
-- Name: refresh_tokens_parent_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE INDEX refresh_tokens_parent_idx ON auth.refresh_tokens USING btree (parent);
|
|
|
|
|
|
--
|
|
-- Name: refresh_tokens_session_id_revoked_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE INDEX refresh_tokens_session_id_revoked_idx ON auth.refresh_tokens USING btree (session_id, revoked);
|
|
|
|
|
|
--
|
|
-- Name: refresh_tokens_updated_at_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE INDEX refresh_tokens_updated_at_idx ON auth.refresh_tokens USING btree (updated_at DESC);
|
|
|
|
|
|
--
|
|
-- Name: saml_providers_sso_provider_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE INDEX saml_providers_sso_provider_id_idx ON auth.saml_providers USING btree (sso_provider_id);
|
|
|
|
|
|
--
|
|
-- Name: saml_relay_states_created_at_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE INDEX saml_relay_states_created_at_idx ON auth.saml_relay_states USING btree (created_at DESC);
|
|
|
|
|
|
--
|
|
-- Name: saml_relay_states_for_email_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE INDEX saml_relay_states_for_email_idx ON auth.saml_relay_states USING btree (for_email);
|
|
|
|
|
|
--
|
|
-- Name: saml_relay_states_sso_provider_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE INDEX saml_relay_states_sso_provider_id_idx ON auth.saml_relay_states USING btree (sso_provider_id);
|
|
|
|
|
|
--
|
|
-- Name: sessions_not_after_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE INDEX sessions_not_after_idx ON auth.sessions USING btree (not_after DESC);
|
|
|
|
|
|
--
|
|
-- Name: sessions_user_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE INDEX sessions_user_id_idx ON auth.sessions USING btree (user_id);
|
|
|
|
|
|
--
|
|
-- Name: sso_domains_domain_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE UNIQUE INDEX sso_domains_domain_idx ON auth.sso_domains USING btree (lower(domain));
|
|
|
|
|
|
--
|
|
-- Name: sso_domains_sso_provider_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE INDEX sso_domains_sso_provider_id_idx ON auth.sso_domains USING btree (sso_provider_id);
|
|
|
|
|
|
--
|
|
-- Name: sso_providers_resource_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE UNIQUE INDEX sso_providers_resource_id_idx ON auth.sso_providers USING btree (lower(resource_id));
|
|
|
|
|
|
--
|
|
-- Name: user_id_created_at_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE INDEX user_id_created_at_idx ON auth.sessions USING btree (user_id, created_at);
|
|
|
|
|
|
--
|
|
-- Name: users_email_partial_key; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE UNIQUE INDEX users_email_partial_key ON auth.users USING btree (email) WHERE (is_sso_user = false);
|
|
|
|
|
|
--
|
|
-- Name: INDEX users_email_partial_key; Type: COMMENT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
COMMENT ON INDEX auth.users_email_partial_key IS 'Auth: A partial unique index that applies only when is_sso_user is false';
|
|
|
|
|
|
--
|
|
-- Name: users_instance_id_email_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE INDEX users_instance_id_email_idx ON auth.users USING btree (instance_id, lower((email)::text));
|
|
|
|
|
|
--
|
|
-- Name: users_instance_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
CREATE INDEX users_instance_id_idx ON auth.users USING btree (instance_id);
|
|
|
|
|
|
--
|
|
-- Name: bname; Type: INDEX; Schema: storage; Owner: supabase_storage_admin
|
|
--
|
|
|
|
CREATE UNIQUE INDEX bname ON storage.buckets USING btree (name);
|
|
|
|
|
|
--
|
|
-- Name: bucketid_objname; Type: INDEX; Schema: storage; Owner: supabase_storage_admin
|
|
--
|
|
|
|
CREATE UNIQUE INDEX bucketid_objname ON storage.objects USING btree (bucket_id, name);
|
|
|
|
|
|
--
|
|
-- Name: name_prefix_search; Type: INDEX; Schema: storage; Owner: supabase_storage_admin
|
|
--
|
|
|
|
CREATE INDEX name_prefix_search ON storage.objects USING btree (name text_pattern_ops);
|
|
|
|
|
|
--
|
|
-- Name: supabase_functions_hooks_h_table_id_h_name_idx; Type: INDEX; Schema: supabase_functions; Owner: supabase_functions_admin
|
|
--
|
|
|
|
CREATE INDEX supabase_functions_hooks_h_table_id_h_name_idx ON supabase_functions.hooks USING btree (hook_table_id, hook_name);
|
|
|
|
|
|
--
|
|
-- Name: supabase_functions_hooks_request_id_idx; Type: INDEX; Schema: supabase_functions; Owner: supabase_functions_admin
|
|
--
|
|
|
|
CREATE INDEX supabase_functions_hooks_request_id_idx ON supabase_functions.hooks USING btree (request_id);
|
|
|
|
|
|
--
|
|
-- Name: objects update_objects_updated_at; Type: TRIGGER; Schema: storage; Owner: supabase_storage_admin
|
|
--
|
|
|
|
CREATE TRIGGER update_objects_updated_at BEFORE UPDATE ON storage.objects FOR EACH ROW EXECUTE FUNCTION storage.update_updated_at_column();
|
|
|
|
|
|
--
|
|
-- Name: extensions extensions_tenant_external_id_fkey; Type: FK CONSTRAINT; Schema: _realtime; Owner: postgres
|
|
--
|
|
|
|
ALTER TABLE ONLY _realtime.extensions
|
|
ADD CONSTRAINT extensions_tenant_external_id_fkey FOREIGN KEY (tenant_external_id) REFERENCES _realtime.tenants(external_id) ON DELETE CASCADE;
|
|
|
|
|
|
--
|
|
-- Name: identities identities_user_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
ALTER TABLE ONLY auth.identities
|
|
ADD CONSTRAINT identities_user_id_fkey FOREIGN KEY (user_id) REFERENCES auth.users(id) ON DELETE CASCADE;
|
|
|
|
|
|
--
|
|
-- Name: mfa_amr_claims mfa_amr_claims_session_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
ALTER TABLE ONLY auth.mfa_amr_claims
|
|
ADD CONSTRAINT mfa_amr_claims_session_id_fkey FOREIGN KEY (session_id) REFERENCES auth.sessions(id) ON DELETE CASCADE;
|
|
|
|
|
|
--
|
|
-- Name: mfa_challenges mfa_challenges_auth_factor_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
ALTER TABLE ONLY auth.mfa_challenges
|
|
ADD CONSTRAINT mfa_challenges_auth_factor_id_fkey FOREIGN KEY (factor_id) REFERENCES auth.mfa_factors(id) ON DELETE CASCADE;
|
|
|
|
|
|
--
|
|
-- Name: mfa_factors mfa_factors_user_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
ALTER TABLE ONLY auth.mfa_factors
|
|
ADD CONSTRAINT mfa_factors_user_id_fkey FOREIGN KEY (user_id) REFERENCES auth.users(id) ON DELETE CASCADE;
|
|
|
|
|
|
--
|
|
-- Name: refresh_tokens refresh_tokens_session_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
ALTER TABLE ONLY auth.refresh_tokens
|
|
ADD CONSTRAINT refresh_tokens_session_id_fkey FOREIGN KEY (session_id) REFERENCES auth.sessions(id) ON DELETE CASCADE;
|
|
|
|
|
|
--
|
|
-- Name: saml_providers saml_providers_sso_provider_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
ALTER TABLE ONLY auth.saml_providers
|
|
ADD CONSTRAINT saml_providers_sso_provider_id_fkey FOREIGN KEY (sso_provider_id) REFERENCES auth.sso_providers(id) ON DELETE CASCADE;
|
|
|
|
|
|
--
|
|
-- Name: saml_relay_states saml_relay_states_flow_state_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
ALTER TABLE ONLY auth.saml_relay_states
|
|
ADD CONSTRAINT saml_relay_states_flow_state_id_fkey FOREIGN KEY (flow_state_id) REFERENCES auth.flow_state(id) ON DELETE CASCADE;
|
|
|
|
|
|
--
|
|
-- Name: saml_relay_states saml_relay_states_sso_provider_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
ALTER TABLE ONLY auth.saml_relay_states
|
|
ADD CONSTRAINT saml_relay_states_sso_provider_id_fkey FOREIGN KEY (sso_provider_id) REFERENCES auth.sso_providers(id) ON DELETE CASCADE;
|
|
|
|
|
|
--
|
|
-- Name: sessions sessions_user_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
ALTER TABLE ONLY auth.sessions
|
|
ADD CONSTRAINT sessions_user_id_fkey FOREIGN KEY (user_id) REFERENCES auth.users(id) ON DELETE CASCADE;
|
|
|
|
|
|
--
|
|
-- Name: sso_domains sso_domains_sso_provider_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
ALTER TABLE ONLY auth.sso_domains
|
|
ADD CONSTRAINT sso_domains_sso_provider_id_fkey FOREIGN KEY (sso_provider_id) REFERENCES auth.sso_providers(id) ON DELETE CASCADE;
|
|
|
|
|
|
--
|
|
-- Name: objects objects_bucketId_fkey; Type: FK CONSTRAINT; Schema: storage; Owner: supabase_storage_admin
|
|
--
|
|
|
|
ALTER TABLE ONLY storage.objects
|
|
ADD CONSTRAINT "objects_bucketId_fkey" FOREIGN KEY (bucket_id) REFERENCES storage.buckets(id);
|
|
|
|
|
|
--
|
|
-- Name: buckets; Type: ROW SECURITY; Schema: storage; Owner: supabase_storage_admin
|
|
--
|
|
|
|
ALTER TABLE storage.buckets ENABLE ROW LEVEL SECURITY;
|
|
|
|
--
|
|
-- Name: migrations; Type: ROW SECURITY; Schema: storage; Owner: supabase_storage_admin
|
|
--
|
|
|
|
ALTER TABLE storage.migrations ENABLE ROW LEVEL SECURITY;
|
|
|
|
--
|
|
-- Name: objects; Type: ROW SECURITY; Schema: storage; Owner: supabase_storage_admin
|
|
--
|
|
|
|
ALTER TABLE storage.objects ENABLE ROW LEVEL SECURITY;
|
|
|
|
--
|
|
-- Name: supabase_realtime; Type: PUBLICATION; Schema: -; Owner: postgres
|
|
--
|
|
|
|
CREATE PUBLICATION supabase_realtime WITH (publish = 'insert, update, delete, truncate');
|
|
|
|
|
|
ALTER PUBLICATION supabase_realtime OWNER TO postgres;
|
|
|
|
--
|
|
-- Name: SCHEMA auth; Type: ACL; Schema: -; Owner: supabase_admin
|
|
--
|
|
|
|
GRANT USAGE ON SCHEMA auth TO anon;
|
|
GRANT USAGE ON SCHEMA auth TO authenticated;
|
|
GRANT USAGE ON SCHEMA auth TO service_role;
|
|
GRANT ALL ON SCHEMA auth TO supabase_auth_admin;
|
|
GRANT ALL ON SCHEMA auth TO dashboard_user;
|
|
GRANT ALL ON SCHEMA auth TO postgres;
|
|
|
|
|
|
--
|
|
-- Name: SCHEMA extensions; Type: ACL; Schema: -; Owner: postgres
|
|
--
|
|
|
|
GRANT USAGE ON SCHEMA extensions TO anon;
|
|
GRANT USAGE ON SCHEMA extensions TO authenticated;
|
|
GRANT USAGE ON SCHEMA extensions TO service_role;
|
|
GRANT ALL ON SCHEMA extensions TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: SCHEMA graphql_public; Type: ACL; Schema: -; Owner: supabase_admin
|
|
--
|
|
|
|
GRANT USAGE ON SCHEMA graphql_public TO postgres;
|
|
GRANT USAGE ON SCHEMA graphql_public TO anon;
|
|
GRANT USAGE ON SCHEMA graphql_public TO authenticated;
|
|
GRANT USAGE ON SCHEMA graphql_public TO service_role;
|
|
|
|
|
|
--
|
|
-- Name: SCHEMA net; Type: ACL; Schema: -; Owner: postgres
|
|
--
|
|
|
|
GRANT USAGE ON SCHEMA net TO supabase_functions_admin;
|
|
GRANT USAGE ON SCHEMA net TO anon;
|
|
GRANT USAGE ON SCHEMA net TO authenticated;
|
|
GRANT USAGE ON SCHEMA net TO service_role;
|
|
|
|
|
|
--
|
|
-- Name: SCHEMA public; Type: ACL; Schema: -; Owner: postgres
|
|
--
|
|
|
|
REVOKE USAGE ON SCHEMA public FROM PUBLIC;
|
|
GRANT ALL ON SCHEMA public TO PUBLIC;
|
|
GRANT USAGE ON SCHEMA public TO anon;
|
|
GRANT USAGE ON SCHEMA public TO authenticated;
|
|
GRANT USAGE ON SCHEMA public TO service_role;
|
|
|
|
|
|
--
|
|
-- Name: SCHEMA realtime; Type: ACL; Schema: -; Owner: supabase_admin
|
|
--
|
|
|
|
GRANT USAGE ON SCHEMA realtime TO postgres;
|
|
|
|
|
|
--
|
|
-- Name: SCHEMA storage; Type: ACL; Schema: -; Owner: supabase_admin
|
|
--
|
|
|
|
GRANT ALL ON SCHEMA storage TO postgres;
|
|
GRANT USAGE ON SCHEMA storage TO anon;
|
|
GRANT USAGE ON SCHEMA storage TO authenticated;
|
|
GRANT USAGE ON SCHEMA storage TO service_role;
|
|
GRANT ALL ON SCHEMA storage TO supabase_storage_admin;
|
|
GRANT ALL ON SCHEMA storage TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: SCHEMA supabase_functions; Type: ACL; Schema: -; Owner: supabase_admin
|
|
--
|
|
|
|
GRANT USAGE ON SCHEMA supabase_functions TO postgres;
|
|
GRANT USAGE ON SCHEMA supabase_functions TO anon;
|
|
GRANT USAGE ON SCHEMA supabase_functions TO authenticated;
|
|
GRANT USAGE ON SCHEMA supabase_functions TO service_role;
|
|
GRANT ALL ON SCHEMA supabase_functions TO supabase_functions_admin;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION email(); Type: ACL; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION auth.email() TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION jwt(); Type: ACL; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION auth.jwt() TO postgres;
|
|
GRANT ALL ON FUNCTION auth.jwt() TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION role(); Type: ACL; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION auth.role() TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION uid(); Type: ACL; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION auth.uid() TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION algorithm_sign(signables text, secret text, algorithm text); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.algorithm_sign(signables text, secret text, algorithm text) TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION armor(bytea); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.armor(bytea) TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION armor(bytea, text[], text[]); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.armor(bytea, text[], text[]) TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION crypt(text, text); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.crypt(text, text) TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION dearmor(text); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.dearmor(text) TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION decrypt(bytea, bytea, text); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.decrypt(bytea, bytea, text) TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION decrypt_iv(bytea, bytea, bytea, text); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.decrypt_iv(bytea, bytea, bytea, text) TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION digest(bytea, text); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.digest(bytea, text) TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION digest(text, text); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.digest(text, text) TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION encrypt(bytea, bytea, text); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.encrypt(bytea, bytea, text) TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION encrypt_iv(bytea, bytea, bytea, text); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.encrypt_iv(bytea, bytea, bytea, text) TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION gen_random_bytes(integer); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.gen_random_bytes(integer) TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION gen_random_uuid(); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.gen_random_uuid() TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION gen_salt(text); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.gen_salt(text) TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION gen_salt(text, integer); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.gen_salt(text, integer) TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION grant_pg_cron_access(); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.grant_pg_cron_access() TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION grant_pg_net_access(); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.grant_pg_net_access() TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION hmac(bytea, bytea, text); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.hmac(bytea, bytea, text) TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION hmac(text, text, text); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.hmac(text, text, text) TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION pg_stat_statements(showtext boolean, OUT userid oid, OUT dbid oid, OUT toplevel boolean, OUT queryid bigint, OUT query text, OUT plans bigint, OUT total_plan_time double precision, OUT min_plan_time double precision, OUT max_plan_time double precision, OUT mean_plan_time double precision, OUT stddev_plan_time double precision, OUT calls bigint, OUT total_exec_time double precision, OUT min_exec_time double precision, OUT max_exec_time double precision, OUT mean_exec_time double precision, OUT stddev_exec_time double precision, OUT rows bigint, OUT shared_blks_hit bigint, OUT shared_blks_read bigint, OUT shared_blks_dirtied bigint, OUT shared_blks_written bigint, OUT local_blks_hit bigint, OUT local_blks_read bigint, OUT local_blks_dirtied bigint, OUT local_blks_written bigint, OUT temp_blks_read bigint, OUT temp_blks_written bigint, OUT blk_read_time double precision, OUT blk_write_time double precision, OUT wal_records bigint, OUT wal_fpi bigint, OUT wal_bytes numeric); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.pg_stat_statements(showtext boolean, OUT userid oid, OUT dbid oid, OUT toplevel boolean, OUT queryid bigint, OUT query text, OUT plans bigint, OUT total_plan_time double precision, OUT min_plan_time double precision, OUT max_plan_time double precision, OUT mean_plan_time double precision, OUT stddev_plan_time double precision, OUT calls bigint, OUT total_exec_time double precision, OUT min_exec_time double precision, OUT max_exec_time double precision, OUT mean_exec_time double precision, OUT stddev_exec_time double precision, OUT rows bigint, OUT shared_blks_hit bigint, OUT shared_blks_read bigint, OUT shared_blks_dirtied bigint, OUT shared_blks_written bigint, OUT local_blks_hit bigint, OUT local_blks_read bigint, OUT local_blks_dirtied bigint, OUT local_blks_written bigint, OUT temp_blks_read bigint, OUT temp_blks_written bigint, OUT blk_read_time double precision, OUT blk_write_time double precision, OUT wal_records bigint, OUT wal_fpi bigint, OUT wal_bytes numeric) TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION pg_stat_statements_info(OUT dealloc bigint, OUT stats_reset timestamp with time zone); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.pg_stat_statements_info(OUT dealloc bigint, OUT stats_reset timestamp with time zone) TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION pg_stat_statements_reset(userid oid, dbid oid, queryid bigint); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.pg_stat_statements_reset(userid oid, dbid oid, queryid bigint) TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION pgp_armor_headers(text, OUT key text, OUT value text); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.pgp_armor_headers(text, OUT key text, OUT value text) TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION pgp_key_id(bytea); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.pgp_key_id(bytea) TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION pgp_pub_decrypt(bytea, bytea); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.pgp_pub_decrypt(bytea, bytea) TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION pgp_pub_decrypt(bytea, bytea, text); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.pgp_pub_decrypt(bytea, bytea, text) TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION pgp_pub_decrypt(bytea, bytea, text, text); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.pgp_pub_decrypt(bytea, bytea, text, text) TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION pgp_pub_decrypt_bytea(bytea, bytea); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.pgp_pub_decrypt_bytea(bytea, bytea) TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION pgp_pub_decrypt_bytea(bytea, bytea, text); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.pgp_pub_decrypt_bytea(bytea, bytea, text) TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION pgp_pub_decrypt_bytea(bytea, bytea, text, text); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.pgp_pub_decrypt_bytea(bytea, bytea, text, text) TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION pgp_pub_encrypt(text, bytea); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.pgp_pub_encrypt(text, bytea) TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION pgp_pub_encrypt(text, bytea, text); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.pgp_pub_encrypt(text, bytea, text) TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION pgp_pub_encrypt_bytea(bytea, bytea); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.pgp_pub_encrypt_bytea(bytea, bytea) TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION pgp_pub_encrypt_bytea(bytea, bytea, text); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.pgp_pub_encrypt_bytea(bytea, bytea, text) TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION pgp_sym_decrypt(bytea, text); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.pgp_sym_decrypt(bytea, text) TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION pgp_sym_decrypt(bytea, text, text); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.pgp_sym_decrypt(bytea, text, text) TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION pgp_sym_decrypt_bytea(bytea, text); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.pgp_sym_decrypt_bytea(bytea, text) TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION pgp_sym_decrypt_bytea(bytea, text, text); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.pgp_sym_decrypt_bytea(bytea, text, text) TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION pgp_sym_encrypt(text, text); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.pgp_sym_encrypt(text, text) TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION pgp_sym_encrypt(text, text, text); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.pgp_sym_encrypt(text, text, text) TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION pgp_sym_encrypt_bytea(bytea, text); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.pgp_sym_encrypt_bytea(bytea, text) TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION pgp_sym_encrypt_bytea(bytea, text, text); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.pgp_sym_encrypt_bytea(bytea, text, text) TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION sign(payload json, secret text, algorithm text); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.sign(payload json, secret text, algorithm text) TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION try_cast_double(inp text); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.try_cast_double(inp text) TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION url_decode(data text); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.url_decode(data text) TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION url_encode(data bytea); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.url_encode(data bytea) TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION uuid_generate_v1(); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.uuid_generate_v1() TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION uuid_generate_v1mc(); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.uuid_generate_v1mc() TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION uuid_generate_v3(namespace uuid, name text); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.uuid_generate_v3(namespace uuid, name text) TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION uuid_generate_v4(); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.uuid_generate_v4() TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION uuid_generate_v5(namespace uuid, name text); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.uuid_generate_v5(namespace uuid, name text) TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION uuid_nil(); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.uuid_nil() TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION uuid_ns_dns(); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.uuid_ns_dns() TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION uuid_ns_oid(); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.uuid_ns_oid() TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION uuid_ns_url(); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.uuid_ns_url() TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION uuid_ns_x500(); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.uuid_ns_x500() TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION verify(token text, secret text, algorithm text); Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION extensions.verify(token text, secret text, algorithm text) TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION comment_directive(comment_ text); Type: ACL; Schema: graphql; Owner: supabase_admin
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION graphql.comment_directive(comment_ text) TO postgres;
|
|
GRANT ALL ON FUNCTION graphql.comment_directive(comment_ text) TO anon;
|
|
GRANT ALL ON FUNCTION graphql.comment_directive(comment_ text) TO authenticated;
|
|
GRANT ALL ON FUNCTION graphql.comment_directive(comment_ text) TO service_role;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION exception(message text); Type: ACL; Schema: graphql; Owner: supabase_admin
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION graphql.exception(message text) TO postgres;
|
|
GRANT ALL ON FUNCTION graphql.exception(message text) TO anon;
|
|
GRANT ALL ON FUNCTION graphql.exception(message text) TO authenticated;
|
|
GRANT ALL ON FUNCTION graphql.exception(message text) TO service_role;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION get_schema_version(); Type: ACL; Schema: graphql; Owner: supabase_admin
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION graphql.get_schema_version() TO postgres;
|
|
GRANT ALL ON FUNCTION graphql.get_schema_version() TO anon;
|
|
GRANT ALL ON FUNCTION graphql.get_schema_version() TO authenticated;
|
|
GRANT ALL ON FUNCTION graphql.get_schema_version() TO service_role;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION increment_schema_version(); Type: ACL; Schema: graphql; Owner: supabase_admin
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION graphql.increment_schema_version() TO postgres;
|
|
GRANT ALL ON FUNCTION graphql.increment_schema_version() TO anon;
|
|
GRANT ALL ON FUNCTION graphql.increment_schema_version() TO authenticated;
|
|
GRANT ALL ON FUNCTION graphql.increment_schema_version() TO service_role;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION sequential_executor(prepared_statement_names text[]); Type: ACL; Schema: graphql; Owner: supabase_admin
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION graphql.sequential_executor(prepared_statement_names text[]) TO postgres;
|
|
GRANT ALL ON FUNCTION graphql.sequential_executor(prepared_statement_names text[]) TO anon;
|
|
GRANT ALL ON FUNCTION graphql.sequential_executor(prepared_statement_names text[]) TO authenticated;
|
|
GRANT ALL ON FUNCTION graphql.sequential_executor(prepared_statement_names text[]) TO service_role;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION graphql("operationName" text, query text, variables jsonb, extensions jsonb); Type: ACL; Schema: graphql_public; Owner: supabase_admin
|
|
--
|
|
|
|
-- GRANT ALL ON FUNCTION graphql_public.graphql("operationName" text, query text, variables jsonb, extensions jsonb) TO postgres;
|
|
-- GRANT ALL ON FUNCTION graphql_public.graphql("operationName" text, query text, variables jsonb, extensions jsonb) TO anon;
|
|
-- GRANT ALL ON FUNCTION graphql_public.graphql("operationName" text, query text, variables jsonb, extensions jsonb) TO authenticated;
|
|
-- GRANT ALL ON FUNCTION graphql_public.graphql("operationName" text, query text, variables jsonb, extensions jsonb) TO service_role;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION http_collect_response(request_id bigint, async boolean); Type: ACL; Schema: net; Owner: supabase_admin
|
|
--
|
|
|
|
REVOKE ALL ON FUNCTION net.http_collect_response(request_id bigint, async boolean) FROM PUBLIC;
|
|
GRANT ALL ON FUNCTION net.http_collect_response(request_id bigint, async boolean) TO supabase_functions_admin;
|
|
GRANT ALL ON FUNCTION net.http_collect_response(request_id bigint, async boolean) TO postgres;
|
|
GRANT ALL ON FUNCTION net.http_collect_response(request_id bigint, async boolean) TO anon;
|
|
GRANT ALL ON FUNCTION net.http_collect_response(request_id bigint, async boolean) TO authenticated;
|
|
GRANT ALL ON FUNCTION net.http_collect_response(request_id bigint, async boolean) TO service_role;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer); Type: ACL; Schema: net; Owner: supabase_admin
|
|
--
|
|
|
|
REVOKE ALL ON FUNCTION net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) FROM PUBLIC;
|
|
GRANT ALL ON FUNCTION net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) TO supabase_functions_admin;
|
|
GRANT ALL ON FUNCTION net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) TO postgres;
|
|
GRANT ALL ON FUNCTION net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) TO anon;
|
|
GRANT ALL ON FUNCTION net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) TO authenticated;
|
|
GRANT ALL ON FUNCTION net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) TO service_role;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer); Type: ACL; Schema: net; Owner: supabase_admin
|
|
--
|
|
|
|
REVOKE ALL ON FUNCTION net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) FROM PUBLIC;
|
|
GRANT ALL ON FUNCTION net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) TO supabase_functions_admin;
|
|
GRANT ALL ON FUNCTION net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) TO postgres;
|
|
GRANT ALL ON FUNCTION net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) TO anon;
|
|
GRANT ALL ON FUNCTION net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) TO authenticated;
|
|
GRANT ALL ON FUNCTION net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) TO service_role;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION get_auth(p_usename text); Type: ACL; Schema: pgbouncer; Owner: postgres
|
|
--
|
|
|
|
REVOKE ALL ON FUNCTION pgbouncer.get_auth(p_usename text) FROM PUBLIC;
|
|
GRANT ALL ON FUNCTION pgbouncer.get_auth(p_usename text) TO pgbouncer;
|
|
|
|
|
|
--
|
|
-- Name: SEQUENCE key_key_id_seq; Type: ACL; Schema: pgsodium; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON SEQUENCE pgsodium.key_key_id_seq TO pgsodium_keyiduser;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION extension(name text); Type: ACL; Schema: storage; Owner: supabase_storage_admin
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION storage.extension(name text) TO anon;
|
|
GRANT ALL ON FUNCTION storage.extension(name text) TO authenticated;
|
|
GRANT ALL ON FUNCTION storage.extension(name text) TO service_role;
|
|
GRANT ALL ON FUNCTION storage.extension(name text) TO dashboard_user;
|
|
GRANT ALL ON FUNCTION storage.extension(name text) TO postgres;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION filename(name text); Type: ACL; Schema: storage; Owner: supabase_storage_admin
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION storage.filename(name text) TO anon;
|
|
GRANT ALL ON FUNCTION storage.filename(name text) TO authenticated;
|
|
GRANT ALL ON FUNCTION storage.filename(name text) TO service_role;
|
|
GRANT ALL ON FUNCTION storage.filename(name text) TO dashboard_user;
|
|
GRANT ALL ON FUNCTION storage.filename(name text) TO postgres;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION foldername(name text); Type: ACL; Schema: storage; Owner: supabase_storage_admin
|
|
--
|
|
|
|
GRANT ALL ON FUNCTION storage.foldername(name text) TO anon;
|
|
GRANT ALL ON FUNCTION storage.foldername(name text) TO authenticated;
|
|
GRANT ALL ON FUNCTION storage.foldername(name text) TO service_role;
|
|
GRANT ALL ON FUNCTION storage.foldername(name text) TO dashboard_user;
|
|
GRANT ALL ON FUNCTION storage.foldername(name text) TO postgres;
|
|
|
|
|
|
--
|
|
-- Name: FUNCTION http_request(); Type: ACL; Schema: supabase_functions; Owner: supabase_functions_admin
|
|
--
|
|
|
|
REVOKE ALL ON FUNCTION supabase_functions.http_request() FROM PUBLIC;
|
|
GRANT ALL ON FUNCTION supabase_functions.http_request() TO postgres;
|
|
GRANT ALL ON FUNCTION supabase_functions.http_request() TO anon;
|
|
GRANT ALL ON FUNCTION supabase_functions.http_request() TO authenticated;
|
|
GRANT ALL ON FUNCTION supabase_functions.http_request() TO service_role;
|
|
|
|
|
|
--
|
|
-- Name: TABLE audit_log_entries; Type: ACL; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
GRANT ALL ON TABLE auth.audit_log_entries TO dashboard_user;
|
|
GRANT ALL ON TABLE auth.audit_log_entries TO postgres;
|
|
|
|
|
|
--
|
|
-- Name: TABLE flow_state; Type: ACL; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
GRANT ALL ON TABLE auth.flow_state TO postgres;
|
|
GRANT ALL ON TABLE auth.flow_state TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: TABLE identities; Type: ACL; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
GRANT ALL ON TABLE auth.identities TO postgres;
|
|
GRANT ALL ON TABLE auth.identities TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: TABLE instances; Type: ACL; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
GRANT ALL ON TABLE auth.instances TO dashboard_user;
|
|
GRANT ALL ON TABLE auth.instances TO postgres;
|
|
|
|
|
|
--
|
|
-- Name: TABLE mfa_amr_claims; Type: ACL; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
GRANT ALL ON TABLE auth.mfa_amr_claims TO postgres;
|
|
GRANT ALL ON TABLE auth.mfa_amr_claims TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: TABLE mfa_challenges; Type: ACL; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
GRANT ALL ON TABLE auth.mfa_challenges TO postgres;
|
|
GRANT ALL ON TABLE auth.mfa_challenges TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: TABLE mfa_factors; Type: ACL; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
GRANT ALL ON TABLE auth.mfa_factors TO postgres;
|
|
GRANT ALL ON TABLE auth.mfa_factors TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: TABLE refresh_tokens; Type: ACL; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
GRANT ALL ON TABLE auth.refresh_tokens TO dashboard_user;
|
|
GRANT ALL ON TABLE auth.refresh_tokens TO postgres;
|
|
|
|
|
|
--
|
|
-- Name: SEQUENCE refresh_tokens_id_seq; Type: ACL; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
GRANT ALL ON SEQUENCE auth.refresh_tokens_id_seq TO dashboard_user;
|
|
GRANT ALL ON SEQUENCE auth.refresh_tokens_id_seq TO postgres;
|
|
|
|
|
|
--
|
|
-- Name: TABLE saml_providers; Type: ACL; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
GRANT ALL ON TABLE auth.saml_providers TO postgres;
|
|
GRANT ALL ON TABLE auth.saml_providers TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: TABLE saml_relay_states; Type: ACL; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
GRANT ALL ON TABLE auth.saml_relay_states TO postgres;
|
|
GRANT ALL ON TABLE auth.saml_relay_states TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: TABLE schema_migrations; Type: ACL; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
GRANT ALL ON TABLE auth.schema_migrations TO dashboard_user;
|
|
GRANT ALL ON TABLE auth.schema_migrations TO postgres;
|
|
|
|
|
|
--
|
|
-- Name: TABLE sessions; Type: ACL; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
GRANT ALL ON TABLE auth.sessions TO postgres;
|
|
GRANT ALL ON TABLE auth.sessions TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: TABLE sso_domains; Type: ACL; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
GRANT ALL ON TABLE auth.sso_domains TO postgres;
|
|
GRANT ALL ON TABLE auth.sso_domains TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: TABLE sso_providers; Type: ACL; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
GRANT ALL ON TABLE auth.sso_providers TO postgres;
|
|
GRANT ALL ON TABLE auth.sso_providers TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: TABLE users; Type: ACL; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
GRANT ALL ON TABLE auth.users TO dashboard_user;
|
|
GRANT ALL ON TABLE auth.users TO postgres;
|
|
|
|
|
|
--
|
|
-- Name: TABLE pg_stat_statements; Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON TABLE extensions.pg_stat_statements TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: TABLE pg_stat_statements_info; Type: ACL; Schema: extensions; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON TABLE extensions.pg_stat_statements_info TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: SEQUENCE seq_schema_version; Type: ACL; Schema: graphql; Owner: supabase_admin
|
|
--
|
|
|
|
GRANT ALL ON SEQUENCE graphql.seq_schema_version TO postgres;
|
|
GRANT ALL ON SEQUENCE graphql.seq_schema_version TO anon;
|
|
GRANT ALL ON SEQUENCE graphql.seq_schema_version TO authenticated;
|
|
GRANT ALL ON SEQUENCE graphql.seq_schema_version TO service_role;
|
|
|
|
|
|
--
|
|
-- Name: TABLE valid_key; Type: ACL; Schema: pgsodium; Owner: postgres
|
|
--
|
|
|
|
GRANT ALL ON TABLE pgsodium.valid_key TO pgsodium_keyiduser;
|
|
|
|
|
|
--
|
|
-- Name: TABLE buckets; Type: ACL; Schema: storage; Owner: supabase_storage_admin
|
|
--
|
|
|
|
GRANT ALL ON TABLE storage.buckets TO anon;
|
|
GRANT ALL ON TABLE storage.buckets TO authenticated;
|
|
GRANT ALL ON TABLE storage.buckets TO service_role;
|
|
GRANT ALL ON TABLE storage.buckets TO postgres;
|
|
|
|
|
|
--
|
|
-- Name: TABLE migrations; Type: ACL; Schema: storage; Owner: supabase_storage_admin
|
|
--
|
|
|
|
GRANT ALL ON TABLE storage.migrations TO anon;
|
|
GRANT ALL ON TABLE storage.migrations TO authenticated;
|
|
GRANT ALL ON TABLE storage.migrations TO service_role;
|
|
GRANT ALL ON TABLE storage.migrations TO postgres;
|
|
|
|
|
|
--
|
|
-- Name: TABLE objects; Type: ACL; Schema: storage; Owner: supabase_storage_admin
|
|
--
|
|
|
|
GRANT ALL ON TABLE storage.objects TO anon;
|
|
GRANT ALL ON TABLE storage.objects TO authenticated;
|
|
GRANT ALL ON TABLE storage.objects TO service_role;
|
|
GRANT ALL ON TABLE storage.objects TO postgres;
|
|
|
|
|
|
--
|
|
-- Name: TABLE hooks; Type: ACL; Schema: supabase_functions; Owner: supabase_functions_admin
|
|
--
|
|
|
|
GRANT ALL ON TABLE supabase_functions.hooks TO postgres;
|
|
GRANT ALL ON TABLE supabase_functions.hooks TO anon;
|
|
GRANT ALL ON TABLE supabase_functions.hooks TO authenticated;
|
|
GRANT ALL ON TABLE supabase_functions.hooks TO service_role;
|
|
|
|
|
|
--
|
|
-- Name: SEQUENCE hooks_id_seq; Type: ACL; Schema: supabase_functions; Owner: supabase_functions_admin
|
|
--
|
|
|
|
GRANT ALL ON SEQUENCE supabase_functions.hooks_id_seq TO postgres;
|
|
GRANT ALL ON SEQUENCE supabase_functions.hooks_id_seq TO anon;
|
|
GRANT ALL ON SEQUENCE supabase_functions.hooks_id_seq TO authenticated;
|
|
GRANT ALL ON SEQUENCE supabase_functions.hooks_id_seq TO service_role;
|
|
|
|
|
|
--
|
|
-- Name: TABLE migrations; Type: ACL; Schema: supabase_functions; Owner: supabase_functions_admin
|
|
--
|
|
|
|
GRANT ALL ON TABLE supabase_functions.migrations TO postgres;
|
|
GRANT ALL ON TABLE supabase_functions.migrations TO anon;
|
|
GRANT ALL ON TABLE supabase_functions.migrations TO authenticated;
|
|
GRANT ALL ON TABLE supabase_functions.migrations TO service_role;
|
|
|
|
|
|
--
|
|
-- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_auth_admin IN SCHEMA auth GRANT ALL ON SEQUENCES TO postgres;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_auth_admin IN SCHEMA auth GRANT ALL ON SEQUENCES TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_auth_admin IN SCHEMA auth GRANT ALL ON FUNCTIONS TO postgres;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_auth_admin IN SCHEMA auth GRANT ALL ON FUNCTIONS TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: auth; Owner: supabase_auth_admin
|
|
--
|
|
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_auth_admin IN SCHEMA auth GRANT ALL ON TABLES TO postgres;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_auth_admin IN SCHEMA auth GRANT ALL ON TABLES TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: graphql; Owner: supabase_admin
|
|
--
|
|
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql GRANT ALL ON SEQUENCES TO postgres;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql GRANT ALL ON SEQUENCES TO anon;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql GRANT ALL ON SEQUENCES TO authenticated;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql GRANT ALL ON SEQUENCES TO service_role;
|
|
|
|
|
|
--
|
|
-- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: graphql; Owner: postgres
|
|
--
|
|
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA graphql GRANT ALL ON SEQUENCES TO postgres;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA graphql GRANT ALL ON SEQUENCES TO anon;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA graphql GRANT ALL ON SEQUENCES TO authenticated;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA graphql GRANT ALL ON SEQUENCES TO service_role;
|
|
|
|
|
|
--
|
|
-- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: graphql; Owner: supabase_admin
|
|
--
|
|
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql GRANT ALL ON FUNCTIONS TO postgres;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql GRANT ALL ON FUNCTIONS TO anon;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql GRANT ALL ON FUNCTIONS TO authenticated;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql GRANT ALL ON FUNCTIONS TO service_role;
|
|
|
|
|
|
--
|
|
-- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: graphql; Owner: postgres
|
|
--
|
|
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA graphql GRANT ALL ON FUNCTIONS TO postgres;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA graphql GRANT ALL ON FUNCTIONS TO anon;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA graphql GRANT ALL ON FUNCTIONS TO authenticated;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA graphql GRANT ALL ON FUNCTIONS TO service_role;
|
|
|
|
|
|
--
|
|
-- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: graphql; Owner: supabase_admin
|
|
--
|
|
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql GRANT ALL ON TABLES TO postgres;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql GRANT ALL ON TABLES TO anon;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql GRANT ALL ON TABLES TO authenticated;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql GRANT ALL ON TABLES TO service_role;
|
|
|
|
|
|
--
|
|
-- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: graphql; Owner: postgres
|
|
--
|
|
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA graphql GRANT ALL ON TABLES TO postgres;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA graphql GRANT ALL ON TABLES TO anon;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA graphql GRANT ALL ON TABLES TO authenticated;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA graphql GRANT ALL ON TABLES TO service_role;
|
|
|
|
|
|
--
|
|
-- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: graphql_public; Owner: supabase_admin
|
|
--
|
|
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON SEQUENCES TO postgres;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON SEQUENCES TO anon;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON SEQUENCES TO authenticated;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON SEQUENCES TO service_role;
|
|
|
|
|
|
--
|
|
-- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: graphql_public; Owner: supabase_admin
|
|
--
|
|
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON FUNCTIONS TO postgres;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON FUNCTIONS TO anon;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON FUNCTIONS TO authenticated;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON FUNCTIONS TO service_role;
|
|
|
|
|
|
--
|
|
-- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: graphql_public; Owner: supabase_admin
|
|
--
|
|
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON TABLES TO postgres;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON TABLES TO anon;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON TABLES TO authenticated;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA graphql_public GRANT ALL ON TABLES TO service_role;
|
|
|
|
|
|
--
|
|
-- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: pgsodium; Owner: postgres
|
|
--
|
|
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA pgsodium GRANT ALL ON SEQUENCES TO pgsodium_keyiduser;
|
|
|
|
|
|
--
|
|
-- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: pgsodium; Owner: postgres
|
|
--
|
|
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA pgsodium GRANT ALL ON TABLES TO pgsodium_keyiduser;
|
|
|
|
|
|
--
|
|
-- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: public; Owner: postgres
|
|
--
|
|
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON SEQUENCES TO postgres;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON SEQUENCES TO anon;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON SEQUENCES TO authenticated;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON SEQUENCES TO service_role;
|
|
|
|
|
|
--
|
|
-- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: public; Owner: supabase_admin
|
|
--
|
|
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON SEQUENCES TO postgres;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON SEQUENCES TO anon;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON SEQUENCES TO authenticated;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON SEQUENCES TO service_role;
|
|
|
|
|
|
--
|
|
-- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: public; Owner: postgres
|
|
--
|
|
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON FUNCTIONS TO postgres;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON FUNCTIONS TO anon;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON FUNCTIONS TO authenticated;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON FUNCTIONS TO service_role;
|
|
|
|
|
|
--
|
|
-- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: public; Owner: supabase_admin
|
|
--
|
|
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON FUNCTIONS TO postgres;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON FUNCTIONS TO anon;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON FUNCTIONS TO authenticated;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON FUNCTIONS TO service_role;
|
|
|
|
|
|
--
|
|
-- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: public; Owner: postgres
|
|
--
|
|
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON TABLES TO postgres;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON TABLES TO anon;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON TABLES TO authenticated;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA public GRANT ALL ON TABLES TO service_role;
|
|
|
|
|
|
--
|
|
-- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: public; Owner: supabase_admin
|
|
--
|
|
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON TABLES TO postgres;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON TABLES TO anon;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON TABLES TO authenticated;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA public GRANT ALL ON TABLES TO service_role;
|
|
|
|
|
|
--
|
|
-- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: realtime; Owner: supabase_admin
|
|
--
|
|
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA realtime GRANT ALL ON SEQUENCES TO postgres;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA realtime GRANT ALL ON SEQUENCES TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: realtime; Owner: supabase_admin
|
|
--
|
|
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA realtime GRANT ALL ON FUNCTIONS TO postgres;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA realtime GRANT ALL ON FUNCTIONS TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: realtime; Owner: supabase_admin
|
|
--
|
|
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA realtime GRANT ALL ON TABLES TO postgres;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA realtime GRANT ALL ON TABLES TO dashboard_user;
|
|
|
|
|
|
--
|
|
-- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: storage; Owner: postgres
|
|
--
|
|
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON SEQUENCES TO postgres;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON SEQUENCES TO anon;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON SEQUENCES TO authenticated;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON SEQUENCES TO service_role;
|
|
|
|
|
|
--
|
|
-- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: storage; Owner: postgres
|
|
--
|
|
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON FUNCTIONS TO postgres;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON FUNCTIONS TO anon;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON FUNCTIONS TO authenticated;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON FUNCTIONS TO service_role;
|
|
|
|
|
|
--
|
|
-- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: storage; Owner: postgres
|
|
--
|
|
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON TABLES TO postgres;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON TABLES TO anon;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON TABLES TO authenticated;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE postgres IN SCHEMA storage GRANT ALL ON TABLES TO service_role;
|
|
|
|
|
|
--
|
|
-- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: supabase_functions; Owner: supabase_admin
|
|
--
|
|
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA supabase_functions GRANT ALL ON SEQUENCES TO postgres;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA supabase_functions GRANT ALL ON SEQUENCES TO anon;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA supabase_functions GRANT ALL ON SEQUENCES TO authenticated;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA supabase_functions GRANT ALL ON SEQUENCES TO service_role;
|
|
|
|
|
|
--
|
|
-- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: supabase_functions; Owner: supabase_admin
|
|
--
|
|
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA supabase_functions GRANT ALL ON FUNCTIONS TO postgres;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA supabase_functions GRANT ALL ON FUNCTIONS TO anon;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA supabase_functions GRANT ALL ON FUNCTIONS TO authenticated;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA supabase_functions GRANT ALL ON FUNCTIONS TO service_role;
|
|
|
|
|
|
--
|
|
-- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: supabase_functions; Owner: supabase_admin
|
|
--
|
|
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA supabase_functions GRANT ALL ON TABLES TO postgres;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA supabase_functions GRANT ALL ON TABLES TO anon;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA supabase_functions GRANT ALL ON TABLES TO authenticated;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE supabase_admin IN SCHEMA supabase_functions GRANT ALL ON TABLES TO service_role;
|
|
|
|
|
|
--
|
|
-- Name: issue_graphql_placeholder; Type: EVENT TRIGGER; Schema: -; Owner: supabase_admin
|
|
--
|
|
|
|
CREATE EVENT TRIGGER issue_graphql_placeholder ON sql_drop
|
|
WHEN TAG IN ('DROP EXTENSION')
|
|
EXECUTE FUNCTION extensions.set_graphql_placeholder();
|
|
|
|
|
|
ALTER EVENT TRIGGER issue_graphql_placeholder OWNER TO supabase_admin;
|
|
|
|
--
|
|
-- Name: issue_pg_cron_access; Type: EVENT TRIGGER; Schema: -; Owner: supabase_admin
|
|
--
|
|
|
|
CREATE EVENT TRIGGER issue_pg_cron_access ON ddl_command_end
|
|
WHEN TAG IN ('CREATE SCHEMA')
|
|
EXECUTE FUNCTION extensions.grant_pg_cron_access();
|
|
|
|
|
|
ALTER EVENT TRIGGER issue_pg_cron_access OWNER TO supabase_admin;
|
|
|
|
--
|
|
-- Name: issue_pg_graphql_access; Type: EVENT TRIGGER; Schema: -; Owner: supabase_admin
|
|
--
|
|
|
|
CREATE EVENT TRIGGER issue_pg_graphql_access ON ddl_command_end
|
|
WHEN TAG IN ('CREATE FUNCTION')
|
|
EXECUTE FUNCTION extensions.grant_pg_graphql_access();
|
|
|
|
|
|
ALTER EVENT TRIGGER issue_pg_graphql_access OWNER TO supabase_admin;
|
|
|
|
--
|
|
-- Name: issue_pg_net_access; Type: EVENT TRIGGER; Schema: -; Owner: supabase_admin
|
|
--
|
|
|
|
CREATE EVENT TRIGGER issue_pg_net_access ON ddl_command_end
|
|
WHEN TAG IN ('CREATE EXTENSION')
|
|
EXECUTE FUNCTION extensions.grant_pg_net_access();
|
|
|
|
|
|
ALTER EVENT TRIGGER issue_pg_net_access OWNER TO supabase_admin;
|
|
|
|
--
|
|
-- Name: pgrst_ddl_watch; Type: EVENT TRIGGER; Schema: -; Owner: supabase_admin
|
|
--
|
|
|
|
CREATE EVENT TRIGGER pgrst_ddl_watch ON ddl_command_end
|
|
EXECUTE FUNCTION extensions.pgrst_ddl_watch();
|
|
|
|
|
|
ALTER EVENT TRIGGER pgrst_ddl_watch OWNER TO supabase_admin;
|
|
|
|
--
|
|
-- Name: pgrst_drop_watch; Type: EVENT TRIGGER; Schema: -; Owner: supabase_admin
|
|
--
|
|
|
|
CREATE EVENT TRIGGER pgrst_drop_watch ON sql_drop
|
|
EXECUTE FUNCTION extensions.pgrst_drop_watch();
|
|
|
|
|
|
ALTER EVENT TRIGGER pgrst_drop_watch OWNER TO supabase_admin;
|
|
|
|
--
|
|
-- PostgreSQL database dump complete
|
|
--
|
|
|
|
DROP EXTENSION pg_graphql; CREATE EXTENSION pg_graphql WITH SCHEMA graphql;
|
|
RESET ALL;
|