├── .env.example ├── .eslintignore ├── .eslintrc.cjs ├── .gitignore ├── .npmrc ├── .prettierignore ├── .prettierrc ├── LICENSE ├── README.md ├── index.html ├── jsconfig.json ├── package.json ├── pnpm-lock.yaml ├── screenshot.png ├── setup.sql ├── src ├── app.d.ts ├── app.html ├── index.test.js └── routes │ ├── +layout.js │ ├── +page.svelte │ ├── BoardList.svelte │ ├── Header.svelte │ ├── Login.svelte │ ├── boards │ └── [id] │ │ ├── +page.js │ │ ├── +page.svelte │ │ ├── AddForm.svelte │ │ ├── AddList.svelte │ │ ├── InPlaceEdit.svelte │ │ └── List.svelte │ └── db.js ├── static ├── favicon.png ├── global.css ├── logo.svg └── robots.txt ├── supabase ├── .branches │ ├── _current_branch │ └── main │ │ └── dump.sql ├── config.toml └── seed.sql ├── svelte.config.js └── vite.config.js /.env.example: -------------------------------------------------------------------------------- 1 | PUBLIC_SUPABASE_URL="supabase_url" 2 | PUBLIC_SUPABASE_KEY="supabase_anon_key" 3 | -------------------------------------------------------------------------------- /.eslintignore: -------------------------------------------------------------------------------- 1 | .DS_Store 2 | node_modules 3 | /build 4 | /.svelte-kit 5 | /package 6 | .env 7 | .env.* 8 | !.env.example 9 | 10 | # Ignore files for PNPM, NPM and YARN 11 | pnpm-lock.yaml 12 | package-lock.json 13 | yarn.lock 14 | -------------------------------------------------------------------------------- /.eslintrc.cjs: -------------------------------------------------------------------------------- 1 | module.exports = { 2 | root: true, 3 | extends: ['eslint:recommended', 'prettier'], 4 | plugins: ['svelte3'], 5 | overrides: [{ files: ['*.svelte'], processor: 'svelte3/svelte3' }], 6 | parserOptions: { 7 | sourceType: 'module', 8 | ecmaVersion: 2020 9 | }, 10 | env: { 11 | browser: true, 12 | es2017: true, 13 | node: true 14 | } 15 | }; 16 | -------------------------------------------------------------------------------- /.gitignore: -------------------------------------------------------------------------------- 1 | .DS_Store 2 | node_modules 3 | /build 4 | /.svelte-kit 5 | /package 6 | .env 7 | .env.* 8 | !.env.example 9 | vite.config.js.timestamp-* 10 | vite.config.ts.timestamp-* -------------------------------------------------------------------------------- /.npmrc: -------------------------------------------------------------------------------- 1 | auto-install-peers=true -------------------------------------------------------------------------------- /.prettierignore: -------------------------------------------------------------------------------- 1 | .DS_Store 2 | node_modules 3 | /build 4 | /.svelte-kit 5 | /package 6 | .env 7 | .env.* 8 | !.env.example 9 | 10 | # Ignore files for PNPM, NPM and YARN 11 | pnpm-lock.yaml 12 | package-lock.json 13 | yarn.lock 14 | -------------------------------------------------------------------------------- /.prettierrc: -------------------------------------------------------------------------------- 1 | { 2 | "useTabs": true, 3 | "singleQuote": true, 4 | "trailingComma": "none", 5 | "printWidth": 100, 6 | "plugins": ["prettier-plugin-svelte"], 7 | "pluginSearchDirs": ["."], 8 | "overrides": [{ "files": "*.svelte", "options": { "parser": "svelte" } }] 9 | } 10 | -------------------------------------------------------------------------------- /LICENSE: -------------------------------------------------------------------------------- 1 | MIT License 2 | 3 | Copyright (c) 2019 Fred K. Schott 4 | 5 | Permission is hereby granted, free of charge, to any person obtaining a copy 6 | of this software and associated documentation files (the "Software"), to deal 7 | in the Software without restriction, including without limitation the rights 8 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell 9 | copies of the Software, and to permit persons to whom the Software is 10 | furnished to do so, subject to the following conditions: 11 | 12 | The above copyright notice and this permission notice shall be included in all 13 | copies or substantial portions of the Software. 14 | 15 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 16 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 17 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE 18 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 19 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, 20 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 21 | SOFTWARE. 22 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # Supabase/Svelte Kanban 2 | 3 | A [Trello](https://trello.com) clone using [Supabase](https://supabase.io) as the storage system. 4 | 5 | ## [Live Demo](https://supabase-kanban.vercel.app/) 6 | 7 | ### Screenshot 8 | 9 | ![Screenshot](https://github.com/supabase-community/supabase-kanban/blob/main/screenshot.png) 10 | 11 | # Setup locally 12 | 13 | 1. Clone the repo with `gh repo clone supabase-community/supabase-kanban` and install dependencies with `pnpm install` 14 | 2. Setup the database on [supabase](https://supabase.io) and run the commands in [`setup.sql`](https://github.com/supabase-community/supabase-kanban/blob/main/setup.sql) 15 | 3. Rename `.env.example` to `.env` and update the credentials 16 | 4. Start development server with `pnpm dev` 17 | 5. Done! 18 | 19 | ## Developing 20 | 21 | Once you've created a project and installed dependencies with `npm install` (or `pnpm install` or `yarn`), start a development server: 22 | 23 | ```bash 24 | npm run dev 25 | 26 | # or start the server and open the app in a new browser tab 27 | npm run dev -- --open 28 | ``` 29 | 30 | ## Building 31 | 32 | To create a production version of your app: 33 | 34 | ```bash 35 | npm run build 36 | ``` 37 | 38 | You can preview the production build with `npm run preview`. 39 | 40 | > To deploy your app, you may need to install an [adapter](https://kit.svelte.dev/docs/adapters) for your target environment. 41 | 42 | # License 43 | 44 | MIT -------------------------------------------------------------------------------- /index.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | Svelte Kanban 9 | 10 | 11 | 12 |
13 | 14 | 24 | 25 | 26 | -------------------------------------------------------------------------------- /jsconfig.json: -------------------------------------------------------------------------------- 1 | { 2 | "extends": "./.svelte-kit/tsconfig.json", 3 | "compilerOptions": { 4 | "allowJs": true, 5 | "checkJs": false, 6 | "esModuleInterop": true, 7 | "forceConsistentCasingInFileNames": true, 8 | "resolveJsonModule": true, 9 | "skipLibCheck": true, 10 | "sourceMap": true, 11 | "strict": false 12 | } 13 | // Path aliases are handled by https://kit.svelte.dev/docs/configuration#alias and https://kit.svelte.dev/docs/configuration#files 14 | // 15 | // If you want to overwrite includes/excludes, make sure to copy over the relevant includes/excludes 16 | // from the referenced tsconfig.json - TypeScript does not merge them in 17 | } 18 | -------------------------------------------------------------------------------- /package.json: -------------------------------------------------------------------------------- 1 | { 2 | "name": "svelte-kanban", 3 | "version": "0.3.0", 4 | "private": true, 5 | "scripts": { 6 | "dev": "vite dev", 7 | "build": "vite build", 8 | "preview": "vite preview", 9 | "check": "svelte-kit sync && svelte-check --tsconfig ./jsconfig.json", 10 | "check:watch": "svelte-kit sync && svelte-check --tsconfig ./jsconfig.json --watch", 11 | "test:unit": "vitest", 12 | "lint": "prettier --plugin-search-dir . --check . && eslint .", 13 | "format": "prettier --plugin-search-dir . --write ." 14 | }, 15 | "devDependencies": { 16 | "@sveltejs/adapter-auto": "^1.0.0", 17 | "@sveltejs/kit": "^1.0.0", 18 | "eslint": "^8.28.0", 19 | "eslint-config-prettier": "^8.5.0", 20 | "eslint-plugin-svelte3": "^4.0.0", 21 | "gravatar-url": "^4.0.1", 22 | "prettier": "^2.8.0", 23 | "prettier-plugin-svelte": "^2.8.1", 24 | "svelte": "^3.54.0", 25 | "svelte-check": "^2.9.2", 26 | "svelte-dnd-action": "^0.9.22", 27 | "typescript": "^4.9.3", 28 | "vite": "^4.0.0", 29 | "vitest": "^0.25.3" 30 | }, 31 | "type": "module", 32 | "dependencies": { 33 | "@supabase/supabase-js": "2.2.3" 34 | } 35 | } 36 | -------------------------------------------------------------------------------- /pnpm-lock.yaml: -------------------------------------------------------------------------------- 1 | lockfileVersion: 5.4 2 | 3 | specifiers: 4 | '@supabase/supabase-js': 2.2.3 5 | '@sveltejs/adapter-auto': ^1.0.0 6 | '@sveltejs/kit': ^1.0.0 7 | eslint: ^8.28.0 8 | eslint-config-prettier: ^8.5.0 9 | eslint-plugin-svelte3: ^4.0.0 10 | gravatar-url: ^4.0.1 11 | prettier: ^2.8.0 12 | prettier-plugin-svelte: ^2.8.1 13 | svelte: ^3.54.0 14 | svelte-check: ^2.9.2 15 | svelte-dnd-action: ^0.9.22 16 | typescript: ^4.9.3 17 | vite: ^4.0.0 18 | vitest: ^0.25.3 19 | 20 | dependencies: 21 | '@supabase/supabase-js': 2.2.3 22 | 23 | devDependencies: 24 | '@sveltejs/adapter-auto': 1.0.0_@sveltejs+kit@1.0.1 25 | '@sveltejs/kit': 1.0.1_svelte@3.55.0+vite@4.0.3 26 | eslint: 8.30.0 27 | eslint-config-prettier: 8.5.0_eslint@8.30.0 28 | eslint-plugin-svelte3: 4.0.0_khrjkzzv5v2x7orkj5o7sxbz3a 29 | gravatar-url: 4.0.1 30 | prettier: 2.8.1 31 | prettier-plugin-svelte: 2.9.0_ajxj753sv7dbwexjherrch25ta 32 | svelte: 3.55.0 33 | svelte-check: 2.10.3_svelte@3.55.0 34 | svelte-dnd-action: 0.9.22_svelte@3.55.0 35 | typescript: 4.9.4 36 | vite: 4.0.3 37 | vitest: 0.25.8 38 | 39 | packages: 40 | 41 | /@esbuild/android-arm/0.16.12: 42 | resolution: {integrity: sha512-CTWgMJtpCyCltrvipZrrcjjRu+rzm6pf9V8muCsJqtKujR3kPmU4ffbckvugNNaRmhxAF1ZI3J+0FUIFLFg8KA==} 43 | engines: {node: '>=12'} 44 | cpu: [arm] 45 | os: [android] 46 | requiresBuild: true 47 | dev: true 48 | optional: true 49 | 50 | /@esbuild/android-arm64/0.16.12: 51 | resolution: {integrity: sha512-0LacmiIW+X0/LOLMZqYtZ7d4uY9fxYABAYhSSOu+OGQVBqH4N5eIYgkT7bBFnR4Nm3qo6qS3RpHKVrDASqj/uQ==} 52 | engines: {node: '>=12'} 53 | cpu: [arm64] 54 | os: [android] 55 | requiresBuild: true 56 | dev: true 57 | optional: true 58 | 59 | /@esbuild/android-x64/0.16.12: 60 | resolution: {integrity: sha512-sS5CR3XBKQXYpSGMM28VuiUnbX83Z+aWPZzClW+OB2JquKqxoiwdqucJ5qvXS8pM6Up3RtJfDnRQZkz3en2z5g==} 61 | engines: {node: '>=12'} 62 | cpu: [x64] 63 | os: [android] 64 | requiresBuild: true 65 | dev: true 66 | optional: true 67 | 68 | /@esbuild/darwin-arm64/0.16.12: 69 | resolution: {integrity: sha512-Dpe5hOAQiQRH20YkFAg+wOpcd4PEuXud+aGgKBQa/VriPJA8zuVlgCOSTwna1CgYl05lf6o5els4dtuyk1qJxQ==} 70 | engines: {node: '>=12'} 71 | cpu: [arm64] 72 | os: [darwin] 73 | requiresBuild: true 74 | dev: true 75 | optional: true 76 | 77 | /@esbuild/darwin-x64/0.16.12: 78 | resolution: {integrity: sha512-ApGRA6X5txIcxV0095X4e4KKv87HAEXfuDRcGTniDWUUN+qPia8sl/BqG/0IomytQWajnUn4C7TOwHduk/FXBQ==} 79 | engines: {node: '>=12'} 80 | cpu: [x64] 81 | os: [darwin] 82 | requiresBuild: true 83 | dev: true 84 | optional: true 85 | 86 | /@esbuild/freebsd-arm64/0.16.12: 87 | resolution: {integrity: sha512-AMdK2gA9EU83ccXCWS1B/KcWYZCj4P3vDofZZkl/F/sBv/fphi2oUqUTox/g5GMcIxk8CF1CVYTC82+iBSyiUg==} 88 | engines: {node: '>=12'} 89 | cpu: [arm64] 90 | os: [freebsd] 91 | requiresBuild: true 92 | dev: true 93 | optional: true 94 | 95 | /@esbuild/freebsd-x64/0.16.12: 96 | resolution: {integrity: sha512-KUKB9w8G/xaAbD39t6gnRBuhQ8vIYYlxGT2I+mT6UGRnCGRr1+ePFIGBQmf5V16nxylgUuuWVW1zU2ktKkf6WQ==} 97 | engines: {node: '>=12'} 98 | cpu: [x64] 99 | os: [freebsd] 100 | requiresBuild: true 101 | dev: true 102 | optional: true 103 | 104 | /@esbuild/linux-arm/0.16.12: 105 | resolution: {integrity: sha512-vhDdIv6z4eL0FJyNVfdr3C/vdd/Wc6h1683GJsFoJzfKb92dU/v88FhWdigg0i6+3TsbSDeWbsPUXb4dif2abg==} 106 | engines: {node: '>=12'} 107 | cpu: [arm] 108 | os: [linux] 109 | requiresBuild: true 110 | dev: true 111 | optional: true 112 | 113 | /@esbuild/linux-arm64/0.16.12: 114 | resolution: {integrity: sha512-29HXMLpLklDfmw7T2buGqq3HImSUaZ1ArmrPOMaNiZZQptOSZs32SQtOHEl8xWX5vfdwZqrBfNf8Te4nArVzKQ==} 115 | engines: {node: '>=12'} 116 | cpu: [arm64] 117 | os: [linux] 118 | requiresBuild: true 119 | dev: true 120 | optional: true 121 | 122 | /@esbuild/linux-ia32/0.16.12: 123 | resolution: {integrity: sha512-JFDuNDTTfgD1LJg7wHA42o2uAO/9VzHYK0leAVnCQE/FdMB599YMH73ux+nS0xGr79pv/BK+hrmdRin3iLgQjg==} 124 | engines: {node: '>=12'} 125 | cpu: [ia32] 126 | os: [linux] 127 | requiresBuild: true 128 | dev: true 129 | optional: true 130 | 131 | /@esbuild/linux-loong64/0.16.12: 132 | resolution: {integrity: sha512-xTGzVPqm6WKfCC0iuj1fryIWr1NWEM8DMhAIo+4rFgUtwy/lfHl+Obvus4oddzRDbBetLLmojfVZGmt/g/g+Rw==} 133 | engines: {node: '>=12'} 134 | cpu: [loong64] 135 | os: [linux] 136 | requiresBuild: true 137 | dev: true 138 | optional: true 139 | 140 | /@esbuild/linux-mips64el/0.16.12: 141 | resolution: {integrity: sha512-zI1cNgHa3Gol+vPYjIYHzKhU6qMyOQrvZ82REr5Fv7rlh5PG6SkkuCoH7IryPqR+BK2c/7oISGsvPJPGnO2bHQ==} 142 | engines: {node: '>=12'} 143 | cpu: [mips64el] 144 | os: [linux] 145 | requiresBuild: true 146 | dev: true 147 | optional: true 148 | 149 | /@esbuild/linux-ppc64/0.16.12: 150 | resolution: {integrity: sha512-/C8OFXExoMmvTDIOAM54AhtmmuDHKoedUd0Otpfw3+AuuVGemA1nQK99oN909uZbLEU6Bi+7JheFMG3xGfZluQ==} 151 | engines: {node: '>=12'} 152 | cpu: [ppc64] 153 | os: [linux] 154 | requiresBuild: true 155 | dev: true 156 | optional: true 157 | 158 | /@esbuild/linux-riscv64/0.16.12: 159 | resolution: {integrity: sha512-qeouyyc8kAGV6Ni6Isz8hUsKMr00EHgVwUKWNp1r4l88fHEoNTDB8mmestvykW6MrstoGI7g2EAsgr0nxmuGYg==} 160 | engines: {node: '>=12'} 161 | cpu: [riscv64] 162 | os: [linux] 163 | requiresBuild: true 164 | dev: true 165 | optional: true 166 | 167 | /@esbuild/linux-s390x/0.16.12: 168 | resolution: {integrity: sha512-s9AyI/5vz1U4NNqnacEGFElqwnHusWa81pskAf8JNDM2eb6b2E6PpBmT8RzeZv6/TxE6/TADn2g9bb0jOUmXwQ==} 169 | engines: {node: '>=12'} 170 | cpu: [s390x] 171 | os: [linux] 172 | requiresBuild: true 173 | dev: true 174 | optional: true 175 | 176 | /@esbuild/linux-x64/0.16.12: 177 | resolution: {integrity: sha512-e8YA7GQGLWhvakBecLptUiKxOk4E/EPtSckS1i0MGYctW8ouvNUoh7xnU15PGO2jz7BYl8q1R6g0gE5HFtzpqQ==} 178 | engines: {node: '>=12'} 179 | cpu: [x64] 180 | os: [linux] 181 | requiresBuild: true 182 | dev: true 183 | optional: true 184 | 185 | /@esbuild/netbsd-x64/0.16.12: 186 | resolution: {integrity: sha512-z2+kUxmOqBS+6SRVd57iOLIHE8oGOoEnGVAmwjm2aENSP35HPS+5cK+FL1l+rhrsJOFIPrNHqDUNechpuG96Sg==} 187 | engines: {node: '>=12'} 188 | cpu: [x64] 189 | os: [netbsd] 190 | requiresBuild: true 191 | dev: true 192 | optional: true 193 | 194 | /@esbuild/openbsd-x64/0.16.12: 195 | resolution: {integrity: sha512-PAonw4LqIybwn2/vJujhbg1N9W2W8lw9RtXIvvZoyzoA/4rA4CpiuahVbASmQohiytRsixbNoIOUSjRygKXpyA==} 196 | engines: {node: '>=12'} 197 | cpu: [x64] 198 | os: [openbsd] 199 | requiresBuild: true 200 | dev: true 201 | optional: true 202 | 203 | /@esbuild/sunos-x64/0.16.12: 204 | resolution: {integrity: sha512-+wr1tkt1RERi+Zi/iQtkzmMH4nS8+7UIRxjcyRz7lur84wCkAITT50Olq/HiT4JN2X2bjtlOV6vt7ptW5Gw60Q==} 205 | engines: {node: '>=12'} 206 | cpu: [x64] 207 | os: [sunos] 208 | requiresBuild: true 209 | dev: true 210 | optional: true 211 | 212 | /@esbuild/win32-arm64/0.16.12: 213 | resolution: {integrity: sha512-XEjeUSHmjsAOJk8+pXJu9pFY2O5KKQbHXZWQylJzQuIBeiGrpMeq9sTVrHefHxMOyxUgoKQTcaTS+VK/K5SviA==} 214 | engines: {node: '>=12'} 215 | cpu: [arm64] 216 | os: [win32] 217 | requiresBuild: true 218 | dev: true 219 | optional: true 220 | 221 | /@esbuild/win32-ia32/0.16.12: 222 | resolution: {integrity: sha512-eRKPM7e0IecUAUYr2alW7JGDejrFJXmpjt4MlfonmQ5Rz9HWpKFGCjuuIRgKO7W9C/CWVFXdJ2GjddsBXqQI4A==} 223 | engines: {node: '>=12'} 224 | cpu: [ia32] 225 | os: [win32] 226 | requiresBuild: true 227 | dev: true 228 | optional: true 229 | 230 | /@esbuild/win32-x64/0.16.12: 231 | resolution: {integrity: sha512-iPYKN78t3op2+erv2frW568j1q0RpqX6JOLZ7oPPaAV1VaF7dDstOrNw37PVOYoTWE11pV4A1XUitpdEFNIsPg==} 232 | engines: {node: '>=12'} 233 | cpu: [x64] 234 | os: [win32] 235 | requiresBuild: true 236 | dev: true 237 | optional: true 238 | 239 | /@eslint/eslintrc/1.4.0: 240 | resolution: {integrity: sha512-7yfvXy6MWLgWSFsLhz5yH3iQ52St8cdUY6FoGieKkRDVxuxmrNuUetIuu6cmjNWwniUHiWXjxCr5tTXDrbYS5A==} 241 | engines: {node: ^12.22.0 || ^14.17.0 || >=16.0.0} 242 | dependencies: 243 | ajv: 6.12.6 244 | debug: 4.3.4 245 | espree: 9.4.1 246 | globals: 13.19.0 247 | ignore: 5.2.4 248 | import-fresh: 3.3.0 249 | js-yaml: 4.1.0 250 | minimatch: 3.1.2 251 | strip-json-comments: 3.1.1 252 | transitivePeerDependencies: 253 | - supports-color 254 | dev: true 255 | 256 | /@humanwhocodes/config-array/0.11.8: 257 | resolution: {integrity: sha512-UybHIJzJnR5Qc/MsD9Kr+RpO2h+/P1GhOwdiLPXK5TWk5sgTdu88bTD9UP+CKbPPh5Rni1u0GjAdYQLemG8g+g==} 258 | engines: {node: '>=10.10.0'} 259 | dependencies: 260 | '@humanwhocodes/object-schema': 1.2.1 261 | debug: 4.3.4 262 | minimatch: 3.1.2 263 | transitivePeerDependencies: 264 | - supports-color 265 | dev: true 266 | 267 | /@humanwhocodes/module-importer/1.0.1: 268 | resolution: {integrity: sha512-bxveV4V8v5Yb4ncFTT3rPSgZBOpCkjfK0y4oVVVJwIuDVBRMDXrPyXRL988i5ap9m9bnyEEjWfm5WkBmtffLfA==} 269 | engines: {node: '>=12.22'} 270 | dev: true 271 | 272 | /@humanwhocodes/object-schema/1.2.1: 273 | resolution: {integrity: sha512-ZnQMnLV4e7hDlUvw8H+U8ASL02SS2Gn6+9Ac3wGGLIe7+je2AeAOxPY+izIPJDfFDb7eDjev0Us8MO1iFRN8hA==} 274 | dev: true 275 | 276 | /@jridgewell/resolve-uri/3.1.0: 277 | resolution: {integrity: sha512-F2msla3tad+Mfht5cJq7LSXcdudKTWCVYUgw6pLFOOHSTtZlj6SWNYAp+AhuqLmWdBO2X5hPrLcu8cVP8fy28w==} 278 | engines: {node: '>=6.0.0'} 279 | dev: true 280 | 281 | /@jridgewell/sourcemap-codec/1.4.14: 282 | resolution: {integrity: sha512-XPSJHWmi394fuUuzDnGz1wiKqWfo1yXecHQMRf2l6hztTO+nPru658AyDngaBe7isIxEkRsPR3FZh+s7iVa4Uw==} 283 | dev: true 284 | 285 | /@jridgewell/trace-mapping/0.3.17: 286 | resolution: {integrity: sha512-MCNzAp77qzKca9+W/+I0+sEpaUnZoeasnghNeVc41VZCEKaCH73Vq3BZZ/SzWIgrqE4H4ceI+p+b6C0mHf9T4g==} 287 | dependencies: 288 | '@jridgewell/resolve-uri': 3.1.0 289 | '@jridgewell/sourcemap-codec': 1.4.14 290 | dev: true 291 | 292 | /@nodelib/fs.scandir/2.1.5: 293 | resolution: {integrity: sha512-vq24Bq3ym5HEQm2NKCr3yXDwjc7vTsEThRDnkp2DK9p1uqLR+DHurm/NOTo0KG7HYHU7eppKZj3MyqYuMBf62g==} 294 | engines: {node: '>= 8'} 295 | dependencies: 296 | '@nodelib/fs.stat': 2.0.5 297 | run-parallel: 1.2.0 298 | dev: true 299 | 300 | /@nodelib/fs.stat/2.0.5: 301 | resolution: {integrity: sha512-RkhPPp2zrqDAQA/2jNhnztcPAlv64XdhIp7a7454A5ovI7Bukxgt7MX7udwAu3zg1DcpPU0rz3VV1SeaqvY4+A==} 302 | engines: {node: '>= 8'} 303 | dev: true 304 | 305 | /@nodelib/fs.walk/1.2.8: 306 | resolution: {integrity: sha512-oGB+UxlgWcgQkgwo8GcEGwemoTFt3FIO9ababBmaGwXIoBKZ+GTy0pP185beGg7Llih/NSHSV2XAs1lnznocSg==} 307 | engines: {node: '>= 8'} 308 | dependencies: 309 | '@nodelib/fs.scandir': 2.1.5 310 | fastq: 1.14.0 311 | dev: true 312 | 313 | /@polka/url/1.0.0-next.21: 314 | resolution: {integrity: sha512-a5Sab1C4/icpTZVzZc5Ghpz88yQtGOyNqYXcZgOssB2uuAr+wF/MvN6bgtW32q7HHrvBki+BsZ0OuNv6EV3K9g==} 315 | dev: true 316 | 317 | /@supabase/functions-js/2.0.0: 318 | resolution: {integrity: sha512-ozb7bds2yvf5k7NM2ZzUkxvsx4S4i2eRKFSJetdTADV91T65g4gCzEs9L3LUXSrghcGIkUaon03VPzOrFredqg==} 319 | dependencies: 320 | cross-fetch: 3.1.5 321 | transitivePeerDependencies: 322 | - encoding 323 | dev: false 324 | 325 | /@supabase/gotrue-js/2.6.1: 326 | resolution: {integrity: sha512-ez40a1TORJIlF6xlA8oALx8W8vneyInz77+Hmlt2qJvKGF4LhhbBN/YI7FYmxJ8KMUaDZeWJzUwTNNOIQhE6Vg==} 327 | dependencies: 328 | cross-fetch: 3.1.5 329 | transitivePeerDependencies: 330 | - encoding 331 | dev: false 332 | 333 | /@supabase/postgrest-js/1.1.1: 334 | resolution: {integrity: sha512-jhdBah1JIxkZUp+5QH5JS7Uq9teGwh0Bs3FzbhnVlH619FSUFquTpHuNDxLsJmqEe8r3Wcnw19Dz0t3wEpkfug==} 335 | dependencies: 336 | cross-fetch: 3.1.5 337 | transitivePeerDependencies: 338 | - encoding 339 | dev: false 340 | 341 | /@supabase/realtime-js/2.1.0: 342 | resolution: {integrity: sha512-iplLCofTeYjnx9FIOsIwHLhMp0+7UVyiA4/sCeq40VdOgN9eTIhjEno9Tgh4dJARi4aaXoKfRX1DTxgZaOpPAw==} 343 | dependencies: 344 | '@types/phoenix': 1.5.4 345 | websocket: 1.0.34 346 | transitivePeerDependencies: 347 | - supports-color 348 | dev: false 349 | 350 | /@supabase/storage-js/2.1.0: 351 | resolution: {integrity: sha512-bRMLWCbkkx84WDAtHAAMN7FAWuayrGZtTHj/WMUK6PsAWuonovvEa5s34a5iux61qJSn+ls3tFkyQgqxunl5ww==} 352 | dependencies: 353 | cross-fetch: 3.1.5 354 | transitivePeerDependencies: 355 | - encoding 356 | dev: false 357 | 358 | /@supabase/supabase-js/2.2.3: 359 | resolution: {integrity: sha512-UOKnbkwtCGpI/yoW5FbiDqV1tvtP+kJkYROosCGS7M+EAaNhklNYaU3l3wNfxpR5LW7wOO1O17cb+5CSRjv/zg==} 360 | dependencies: 361 | '@supabase/functions-js': 2.0.0 362 | '@supabase/gotrue-js': 2.6.1 363 | '@supabase/postgrest-js': 1.1.1 364 | '@supabase/realtime-js': 2.1.0 365 | '@supabase/storage-js': 2.1.0 366 | cross-fetch: 3.1.5 367 | transitivePeerDependencies: 368 | - encoding 369 | - supports-color 370 | dev: false 371 | 372 | /@sveltejs/adapter-auto/1.0.0_@sveltejs+kit@1.0.1: 373 | resolution: {integrity: sha512-yKyPvlLVua1bJ/42FrR3X041mFGdB4GzTZOAEoHUcNBRE5Mhx94+eqHpC3hNvAOiLEDcKfVO0ObyKSu7qldU+w==} 374 | peerDependencies: 375 | '@sveltejs/kit': ^1.0.0 376 | dependencies: 377 | '@sveltejs/kit': 1.0.1_svelte@3.55.0+vite@4.0.3 378 | import-meta-resolve: 2.2.0 379 | dev: true 380 | 381 | /@sveltejs/kit/1.0.1_svelte@3.55.0+vite@4.0.3: 382 | resolution: {integrity: sha512-C41aCaDjA7xoUdsrc/lSdU1059UdLPIRE1vEIRRynzpMujNgp82bTMHkDosb6vykH6LrLf3tT2w2/5NYQhKYGQ==} 383 | engines: {node: ^16.14 || >=18} 384 | hasBin: true 385 | requiresBuild: true 386 | peerDependencies: 387 | svelte: ^3.54.0 388 | vite: ^4.0.0 389 | dependencies: 390 | '@sveltejs/vite-plugin-svelte': 2.0.2_svelte@3.55.0+vite@4.0.3 391 | '@types/cookie': 0.5.1 392 | cookie: 0.5.0 393 | devalue: 4.2.0 394 | esm-env: 1.0.0 395 | kleur: 4.1.5 396 | magic-string: 0.27.0 397 | mime: 3.0.0 398 | sade: 1.8.1 399 | set-cookie-parser: 2.5.1 400 | sirv: 2.0.2 401 | svelte: 3.55.0 402 | tiny-glob: 0.2.9 403 | undici: 5.14.0 404 | vite: 4.0.3 405 | transitivePeerDependencies: 406 | - supports-color 407 | dev: true 408 | 409 | /@sveltejs/vite-plugin-svelte/2.0.2_svelte@3.55.0+vite@4.0.3: 410 | resolution: {integrity: sha512-xCEan0/NNpQuL0l5aS42FjwQ6wwskdxC3pW1OeFtEKNZwRg7Evro9lac9HesGP6TdFsTv2xMes5ASQVKbCacxg==} 411 | engines: {node: ^14.18.0 || >= 16} 412 | peerDependencies: 413 | svelte: ^3.54.0 414 | vite: ^4.0.0 415 | dependencies: 416 | debug: 4.3.4 417 | deepmerge: 4.2.2 418 | kleur: 4.1.5 419 | magic-string: 0.27.0 420 | svelte: 3.55.0 421 | svelte-hmr: 0.15.1_svelte@3.55.0 422 | vite: 4.0.3 423 | vitefu: 0.2.4_vite@4.0.3 424 | transitivePeerDependencies: 425 | - supports-color 426 | dev: true 427 | 428 | /@types/chai-subset/1.3.3: 429 | resolution: {integrity: sha512-frBecisrNGz+F4T6bcc+NLeolfiojh5FxW2klu669+8BARtyQv2C/GkNW6FUodVe4BroGMP/wER/YDGc7rEllw==} 430 | dependencies: 431 | '@types/chai': 4.3.4 432 | dev: true 433 | 434 | /@types/chai/4.3.4: 435 | resolution: {integrity: sha512-KnRanxnpfpjUTqTCXslZSEdLfXExwgNxYPdiO2WGUj8+HDjFi8R3k5RVKPeSCzLjCcshCAtVO2QBbVuAV4kTnw==} 436 | dev: true 437 | 438 | /@types/cookie/0.5.1: 439 | resolution: {integrity: sha512-COUnqfB2+ckwXXSFInsFdOAWQzCCx+a5hq2ruyj+Vjund94RJQd4LG2u9hnvJrTgunKAaax7ancBYlDrNYxA0g==} 440 | dev: true 441 | 442 | /@types/node/18.11.18: 443 | resolution: {integrity: sha512-DHQpWGjyQKSHj3ebjFI/wRKcqQcdR+MoFBygntYOZytCqNfkd2ZC4ARDJ2DQqhjH5p85Nnd3jhUJIXrszFX/JA==} 444 | dev: true 445 | 446 | /@types/phoenix/1.5.4: 447 | resolution: {integrity: sha512-L5eZmzw89eXBKkiqVBcJfU1QGx9y+wurRIEgt0cuLH0hwNtVUxtx+6cu0R2STwWj468sjXyBYPYDtGclUd1kjQ==} 448 | dev: false 449 | 450 | /@types/pug/2.0.6: 451 | resolution: {integrity: sha512-SnHmG9wN1UVmagJOnyo/qkk0Z7gejYxOYYmaAwr5u2yFYfsupN3sg10kyzN8Hep/2zbHxCnsumxOoRIRMBwKCg==} 452 | dev: true 453 | 454 | /@types/sass/1.43.1: 455 | resolution: {integrity: sha512-BPdoIt1lfJ6B7rw35ncdwBZrAssjcwzI5LByIrYs+tpXlj/CAkuVdRsgZDdP4lq5EjyWzwxZCqAoFyHKFwp32g==} 456 | dependencies: 457 | '@types/node': 18.11.18 458 | dev: true 459 | 460 | /acorn-jsx/5.3.2_acorn@8.8.1: 461 | resolution: {integrity: sha512-rq9s+JNhf0IChjtDXxllJ7g41oZk5SlXtp0LHwyA5cejwn7vKmKp4pPri6YEePv2PU65sAsegbXtIinmDFDXgQ==} 462 | peerDependencies: 463 | acorn: ^6.0.0 || ^7.0.0 || ^8.0.0 464 | dependencies: 465 | acorn: 8.8.1 466 | dev: true 467 | 468 | /acorn-walk/8.2.0: 469 | resolution: {integrity: sha512-k+iyHEuPgSw6SbuDpGQM+06HQUa04DZ3o+F6CSzXMvvI5KMvnaEqXe+YVe555R9nn6GPt404fos4wcgpw12SDA==} 470 | engines: {node: '>=0.4.0'} 471 | dev: true 472 | 473 | /acorn/8.8.1: 474 | resolution: {integrity: sha512-7zFpHzhnqYKrkYdUjF1HI1bzd0VygEGX8lFk4k5zVMqHEoES+P+7TKI+EvLO9WVMJ8eekdO0aDEK044xTXwPPA==} 475 | engines: {node: '>=0.4.0'} 476 | hasBin: true 477 | dev: true 478 | 479 | /ajv/6.12.6: 480 | resolution: {integrity: sha512-j3fVLgvTo527anyYyJOGTYJbG+vnnQYvE0m5mmkc1TK+nxAppkCLMIL0aZ4dblVCNoGShhm+kzE4ZUykBoMg4g==} 481 | dependencies: 482 | fast-deep-equal: 3.1.3 483 | fast-json-stable-stringify: 2.1.0 484 | json-schema-traverse: 0.4.1 485 | uri-js: 4.4.1 486 | dev: true 487 | 488 | /ansi-regex/5.0.1: 489 | resolution: {integrity: sha512-quJQXlTSUGL2LH9SUXo8VwsY4soanhgo6LNSm84E1LBcE8s3O0wpdiRzyR9z/ZZJMlMWv37qOOb9pdJlMUEKFQ==} 490 | engines: {node: '>=8'} 491 | dev: true 492 | 493 | /ansi-styles/4.3.0: 494 | resolution: {integrity: sha512-zbB9rCJAT1rbjiVDb2hqKFHNYLxgtk8NURxZ3IZwD3F6NtxbXZQCnnSi1Lkx+IDohdPlFp222wVALIheZJQSEg==} 495 | engines: {node: '>=8'} 496 | dependencies: 497 | color-convert: 2.0.1 498 | dev: true 499 | 500 | /anymatch/3.1.3: 501 | resolution: {integrity: sha512-KMReFUr0B4t+D+OBkjR3KYqvocp2XaSzO55UcB6mgQMd3KbcE+mWTyvVV7D/zsdEbNnV6acZUutkiHQXvTr1Rw==} 502 | engines: {node: '>= 8'} 503 | dependencies: 504 | normalize-path: 3.0.0 505 | picomatch: 2.3.1 506 | dev: true 507 | 508 | /argparse/2.0.1: 509 | resolution: {integrity: sha512-8+9WqebbFzpX9OR+Wa6O29asIogeRMzcGtAINdpMHHyAg10f05aSFVBbcEqGf/PXw1EjAZ+q2/bEBg3DvurK3Q==} 510 | dev: true 511 | 512 | /assertion-error/1.1.0: 513 | resolution: {integrity: sha512-jgsaNduz+ndvGyFt3uSuWqvy4lCnIJiovtouQN5JZHOKCS2QuhEdbcQHFhVksz2N2U9hXJo8odG7ETyWlEeuDw==} 514 | dev: true 515 | 516 | /balanced-match/1.0.2: 517 | resolution: {integrity: sha512-3oSeUO0TMV67hN1AmbXsK4yaqU7tjiHlbxRDZOpH0KW9+CeX4bRAaX0Anxt0tx2MrpRpWwQaPwIlISEJhYU5Pw==} 518 | dev: true 519 | 520 | /binary-extensions/2.2.0: 521 | resolution: {integrity: sha512-jDctJ/IVQbZoJykoeHbhXpOlNBqGNcwXJKJog42E5HDPUwQTSdjCHdihjj0DlnheQ7blbT6dHOafNAiS8ooQKA==} 522 | engines: {node: '>=8'} 523 | dev: true 524 | 525 | /blueimp-md5/2.19.0: 526 | resolution: {integrity: sha512-DRQrD6gJyy8FbiE4s+bDoXS9hiW3Vbx5uCdwvcCf3zLHL+Iv7LtGHLpr+GZV8rHG8tK766FGYBwRbu8pELTt+w==} 527 | dev: true 528 | 529 | /brace-expansion/1.1.11: 530 | resolution: {integrity: sha512-iCuPHDFgrHX7H2vEI/5xpz07zSHB00TpugqhmYtVmMO6518mCuRMoOYFldEBl0g187ufozdaHgWKcYFb61qGiA==} 531 | dependencies: 532 | balanced-match: 1.0.2 533 | concat-map: 0.0.1 534 | dev: true 535 | 536 | /braces/3.0.2: 537 | resolution: {integrity: sha512-b8um+L1RzM3WDSzvhm6gIz1yfTbBt6YTlcEKAvsmqCZZFw46z626lVj9j1yEPW33H5H+lBQpZMP1k8l+78Ha0A==} 538 | engines: {node: '>=8'} 539 | dependencies: 540 | fill-range: 7.0.1 541 | dev: true 542 | 543 | /buffer-crc32/0.2.13: 544 | resolution: {integrity: sha512-VO9Ht/+p3SN7SKWqcrgEzjGbRSJYTx+Q1pTQC0wrWqHx0vpJraQ6GtHx8tvcg1rlK1byhU5gccxgOgj7B0TDkQ==} 545 | dev: true 546 | 547 | /bufferutil/4.0.7: 548 | resolution: {integrity: sha512-kukuqc39WOHtdxtw4UScxF/WVnMFVSQVKhtx3AjZJzhd0RGZZldcrfSEbVsWWe6KNH253574cq5F+wpv0G9pJw==} 549 | engines: {node: '>=6.14.2'} 550 | requiresBuild: true 551 | dependencies: 552 | node-gyp-build: 4.5.0 553 | dev: false 554 | 555 | /busboy/1.6.0: 556 | resolution: {integrity: sha512-8SFQbg/0hQ9xy3UNTB0YEnsNBbWfhf7RtnzpL7TkBiTBRfrQ9Fxcnz7VJsleJpyp6rVLvXiuORqjlHi5q+PYuA==} 557 | engines: {node: '>=10.16.0'} 558 | dependencies: 559 | streamsearch: 1.1.0 560 | dev: true 561 | 562 | /callsites/3.1.0: 563 | resolution: {integrity: sha512-P8BjAsXvZS+VIDUI11hHCQEv74YT67YUi5JJFNWIqL235sBmjX4+qx9Muvls5ivyNENctx46xQLQ3aTuE7ssaQ==} 564 | engines: {node: '>=6'} 565 | dev: true 566 | 567 | /chai/4.3.7: 568 | resolution: {integrity: sha512-HLnAzZ2iupm25PlN0xFreAlBA5zaBSv3og0DdeGA4Ar6h6rJ3A0rolRUKJhSF2V10GZKDgWF/VmAEsNWjCRB+A==} 569 | engines: {node: '>=4'} 570 | dependencies: 571 | assertion-error: 1.1.0 572 | check-error: 1.0.2 573 | deep-eql: 4.1.3 574 | get-func-name: 2.0.0 575 | loupe: 2.3.6 576 | pathval: 1.1.1 577 | type-detect: 4.0.8 578 | dev: true 579 | 580 | /chalk/4.1.2: 581 | resolution: {integrity: sha512-oKnbhFyRIXpUuez8iBMmyEa4nbj4IOQyuhc/wy9kY7/WVPcwIO9VA668Pu8RkO7+0G76SLROeyw9CpQ061i4mA==} 582 | engines: {node: '>=10'} 583 | dependencies: 584 | ansi-styles: 4.3.0 585 | supports-color: 7.2.0 586 | dev: true 587 | 588 | /check-error/1.0.2: 589 | resolution: {integrity: sha512-BrgHpW9NURQgzoNyjfq0Wu6VFO6D7IZEmJNdtgNqpzGG8RuNFHt2jQxWlAs4HMe119chBnv+34syEZtc6IhLtA==} 590 | dev: true 591 | 592 | /chokidar/3.5.3: 593 | resolution: {integrity: sha512-Dr3sfKRP6oTcjf2JmUmFJfeVMvXBdegxB0iVQ5eb2V10uFJUCAS8OByZdVAyVb8xXNz3GjjTgj9kLWsZTqE6kw==} 594 | engines: {node: '>= 8.10.0'} 595 | dependencies: 596 | anymatch: 3.1.3 597 | braces: 3.0.2 598 | glob-parent: 5.1.2 599 | is-binary-path: 2.1.0 600 | is-glob: 4.0.3 601 | normalize-path: 3.0.0 602 | readdirp: 3.6.0 603 | optionalDependencies: 604 | fsevents: 2.3.2 605 | dev: true 606 | 607 | /color-convert/2.0.1: 608 | resolution: {integrity: sha512-RRECPsj7iu/xb5oKYcsFHSppFNnsj/52OVTRKb4zP5onXwVF3zVmmToNcOfGC+CRDpfK/U584fMg38ZHCaElKQ==} 609 | engines: {node: '>=7.0.0'} 610 | dependencies: 611 | color-name: 1.1.4 612 | dev: true 613 | 614 | /color-name/1.1.4: 615 | resolution: {integrity: sha512-dOy+3AuW3a2wNbZHIuMZpTcgjGuLU/uBL/ubcZF9OXbDo8ff4O8yVp5Bf0efS8uEoYo5q4Fx7dY9OgQGXgAsQA==} 616 | dev: true 617 | 618 | /concat-map/0.0.1: 619 | resolution: {integrity: sha1-2Klr13/Wjfd5OnMDajug1UBdR3s=} 620 | dev: true 621 | 622 | /cookie/0.5.0: 623 | resolution: {integrity: sha512-YZ3GUyn/o8gfKJlnlX7g7xq4gyO6OSuhGPKaaGssGB2qgDUS0gPgtTvoyZLTt9Ab6dC4hfc9dV5arkvc/OCmrw==} 624 | engines: {node: '>= 0.6'} 625 | dev: true 626 | 627 | /cross-fetch/3.1.5: 628 | resolution: {integrity: sha512-lvb1SBsI0Z7GDwmuid+mU3kWVBwTVUbe7S0H52yaaAdQOXq2YktTCZdlAcNKFzE6QtRz0snpw9bNiPeOIkkQvw==} 629 | dependencies: 630 | node-fetch: 2.6.7 631 | transitivePeerDependencies: 632 | - encoding 633 | dev: false 634 | 635 | /cross-spawn/7.0.3: 636 | resolution: {integrity: sha512-iRDPJKUPVEND7dHPO8rkbOnPpyDygcDFtWjpeWNCgy8WP2rXcxXL8TskReQl6OrB2G7+UJrags1q15Fudc7G6w==} 637 | engines: {node: '>= 8'} 638 | dependencies: 639 | path-key: 3.1.1 640 | shebang-command: 2.0.0 641 | which: 2.0.2 642 | dev: true 643 | 644 | /d/1.0.1: 645 | resolution: {integrity: sha512-m62ShEObQ39CfralilEQRjH6oAMtNCV1xJyEx5LpRYUVN+EviphDgUc/F3hnYbADmkiNs67Y+3ylmlG7Lnu+FA==} 646 | dependencies: 647 | es5-ext: 0.10.62 648 | type: 1.2.0 649 | dev: false 650 | 651 | /debug/2.6.9: 652 | resolution: {integrity: sha512-bC7ElrdJaJnPbAP+1EotYvqZsb3ecl5wi6Bfi6BJTUcNowp6cvspg0jXznRTKDjm/E7AdgFBVeAPVMNcKGsHMA==} 653 | peerDependencies: 654 | supports-color: '*' 655 | peerDependenciesMeta: 656 | supports-color: 657 | optional: true 658 | dependencies: 659 | ms: 2.0.0 660 | dev: false 661 | 662 | /debug/4.3.4: 663 | resolution: {integrity: sha512-PRWFHuSU3eDtQJPvnNY7Jcket1j0t5OuOsFzPPzsekD52Zl8qUfFIPEiswXqIvHWGVHOgX+7G/vCNNhehwxfkQ==} 664 | engines: {node: '>=6.0'} 665 | peerDependencies: 666 | supports-color: '*' 667 | peerDependenciesMeta: 668 | supports-color: 669 | optional: true 670 | dependencies: 671 | ms: 2.1.2 672 | dev: true 673 | 674 | /deep-eql/4.1.3: 675 | resolution: {integrity: sha512-WaEtAOpRA1MQ0eohqZjpGD8zdI0Ovsm8mmFhaDN8dvDZzyoUMcYDnf5Y6iu7HTXxf8JDS23qWa4a+hKCDyOPzw==} 676 | engines: {node: '>=6'} 677 | dependencies: 678 | type-detect: 4.0.8 679 | dev: true 680 | 681 | /deep-is/0.1.4: 682 | resolution: {integrity: sha512-oIPzksmTg4/MriiaYGO+okXDT7ztn/w3Eptv/+gSIdMdKsJo0u4CfYNFJPy+4SKMuCqGw2wxnA+URMg3t8a/bQ==} 683 | dev: true 684 | 685 | /deepmerge/4.2.2: 686 | resolution: {integrity: sha512-FJ3UgI4gIl+PHZm53knsuSFpE+nESMr7M4v9QcgB7S63Kj/6WqMiFQJpBBYz1Pt+66bZpP3Q7Lye0Oo9MPKEdg==} 687 | engines: {node: '>=0.10.0'} 688 | dev: true 689 | 690 | /detect-indent/6.1.0: 691 | resolution: {integrity: sha512-reYkTUJAZb9gUuZ2RvVCNhVHdg62RHnJ7WJl8ftMi4diZ6NWlciOzQN88pUhSELEwflJht4oQDv0F0BMlwaYtA==} 692 | engines: {node: '>=8'} 693 | dev: true 694 | 695 | /devalue/4.2.0: 696 | resolution: {integrity: sha512-mbjoAaCL2qogBKgeFxFPOXAUsZchircF+B/79LD4sHH0+NHfYm8gZpQrskKDn5gENGt35+5OI1GUF7hLVnkPDw==} 697 | dev: true 698 | 699 | /doctrine/3.0.0: 700 | resolution: {integrity: sha512-yS+Q5i3hBf7GBkd4KG8a7eBNNWNGLTaEwwYWUijIYM7zrlYDM0BFXHjjPWlWZ1Rg7UaddZeIDmi9jF3HmqiQ2w==} 701 | engines: {node: '>=6.0.0'} 702 | dependencies: 703 | esutils: 2.0.3 704 | dev: true 705 | 706 | /es5-ext/0.10.62: 707 | resolution: {integrity: sha512-BHLqn0klhEpnOKSrzn/Xsz2UIW8j+cGmo9JLzr8BiUapV8hPL9+FliFqjwr9ngW7jWdnxv6eO+/LqyhJVqgrjA==} 708 | engines: {node: '>=0.10'} 709 | requiresBuild: true 710 | dependencies: 711 | es6-iterator: 2.0.3 712 | es6-symbol: 3.1.3 713 | next-tick: 1.1.0 714 | dev: false 715 | 716 | /es6-iterator/2.0.3: 717 | resolution: {integrity: sha512-zw4SRzoUkd+cl+ZoE15A9o1oQd920Bb0iOJMQkQhl3jNc03YqVjAhG7scf9C5KWRU/R13Orf588uCC6525o02g==} 718 | dependencies: 719 | d: 1.0.1 720 | es5-ext: 0.10.62 721 | es6-symbol: 3.1.3 722 | dev: false 723 | 724 | /es6-promise/3.3.1: 725 | resolution: {integrity: sha512-SOp9Phqvqn7jtEUxPWdWfWoLmyt2VaJ6MpvP9Comy1MceMXqE6bxvaTu4iaxpYYPzhny28Lc+M87/c2cPK6lDg==} 726 | dev: true 727 | 728 | /es6-symbol/3.1.3: 729 | resolution: {integrity: sha512-NJ6Yn3FuDinBaBRWl/q5X/s4koRHBrgKAu+yGI6JCBeiu3qrcbJhwT2GeR/EXVfylRk8dpQVJoLEFhK+Mu31NA==} 730 | dependencies: 731 | d: 1.0.1 732 | ext: 1.7.0 733 | dev: false 734 | 735 | /esbuild/0.16.12: 736 | resolution: {integrity: sha512-eq5KcuXajf2OmivCl4e89AD3j8fbV+UTE9vczEzq5haA07U9oOTzBWlh3+6ZdjJR7Rz2QfWZ2uxZyhZxBgJ4+g==} 737 | engines: {node: '>=12'} 738 | hasBin: true 739 | requiresBuild: true 740 | optionalDependencies: 741 | '@esbuild/android-arm': 0.16.12 742 | '@esbuild/android-arm64': 0.16.12 743 | '@esbuild/android-x64': 0.16.12 744 | '@esbuild/darwin-arm64': 0.16.12 745 | '@esbuild/darwin-x64': 0.16.12 746 | '@esbuild/freebsd-arm64': 0.16.12 747 | '@esbuild/freebsd-x64': 0.16.12 748 | '@esbuild/linux-arm': 0.16.12 749 | '@esbuild/linux-arm64': 0.16.12 750 | '@esbuild/linux-ia32': 0.16.12 751 | '@esbuild/linux-loong64': 0.16.12 752 | '@esbuild/linux-mips64el': 0.16.12 753 | '@esbuild/linux-ppc64': 0.16.12 754 | '@esbuild/linux-riscv64': 0.16.12 755 | '@esbuild/linux-s390x': 0.16.12 756 | '@esbuild/linux-x64': 0.16.12 757 | '@esbuild/netbsd-x64': 0.16.12 758 | '@esbuild/openbsd-x64': 0.16.12 759 | '@esbuild/sunos-x64': 0.16.12 760 | '@esbuild/win32-arm64': 0.16.12 761 | '@esbuild/win32-ia32': 0.16.12 762 | '@esbuild/win32-x64': 0.16.12 763 | dev: true 764 | 765 | /escape-string-regexp/4.0.0: 766 | resolution: {integrity: sha512-TtpcNJ3XAzx3Gq8sWRzJaVajRs0uVxA2YAkdb1jm2YkPz4G6egUFAyA3n5vtEIZefPk5Wa4UXbKuS5fKkJWdgA==} 767 | engines: {node: '>=10'} 768 | dev: true 769 | 770 | /eslint-config-prettier/8.5.0_eslint@8.30.0: 771 | resolution: {integrity: sha512-obmWKLUNCnhtQRKc+tmnYuQl0pFU1ibYJQ5BGhTVB08bHe9wC8qUeG7c08dj9XX+AuPj1YSGSQIHl1pnDHZR0Q==} 772 | hasBin: true 773 | peerDependencies: 774 | eslint: '>=7.0.0' 775 | dependencies: 776 | eslint: 8.30.0 777 | dev: true 778 | 779 | /eslint-plugin-svelte3/4.0.0_khrjkzzv5v2x7orkj5o7sxbz3a: 780 | resolution: {integrity: sha512-OIx9lgaNzD02+MDFNLw0GEUbuovNcglg+wnd/UY0fbZmlQSz7GlQiQ1f+yX0XvC07XPcDOnFcichqI3xCwp71g==} 781 | peerDependencies: 782 | eslint: '>=8.0.0' 783 | svelte: ^3.2.0 784 | dependencies: 785 | eslint: 8.30.0 786 | svelte: 3.55.0 787 | dev: true 788 | 789 | /eslint-scope/7.1.1: 790 | resolution: {integrity: sha512-QKQM/UXpIiHcLqJ5AOyIW7XZmzjkzQXYE54n1++wb0u9V/abW3l9uQnxX8Z5Xd18xyKIMTUAyQ0k1e8pz6LUrw==} 791 | engines: {node: ^12.22.0 || ^14.17.0 || >=16.0.0} 792 | dependencies: 793 | esrecurse: 4.3.0 794 | estraverse: 5.3.0 795 | dev: true 796 | 797 | /eslint-utils/3.0.0_eslint@8.30.0: 798 | resolution: {integrity: sha512-uuQC43IGctw68pJA1RgbQS8/NP7rch6Cwd4j3ZBtgo4/8Flj4eGE7ZYSZRN3iq5pVUv6GPdW5Z1RFleo84uLDA==} 799 | engines: {node: ^10.0.0 || ^12.0.0 || >= 14.0.0} 800 | peerDependencies: 801 | eslint: '>=5' 802 | dependencies: 803 | eslint: 8.30.0 804 | eslint-visitor-keys: 2.1.0 805 | dev: true 806 | 807 | /eslint-visitor-keys/2.1.0: 808 | resolution: {integrity: sha512-0rSmRBzXgDzIsD6mGdJgevzgezI534Cer5L/vyMX0kHzT/jiB43jRhd9YUlMGYLQy2zprNmoT8qasCGtY+QaKw==} 809 | engines: {node: '>=10'} 810 | dev: true 811 | 812 | /eslint-visitor-keys/3.3.0: 813 | resolution: {integrity: sha512-mQ+suqKJVyeuwGYHAdjMFqjCyfl8+Ldnxuyp3ldiMBFKkvytrXUZWaiPCEav8qDHKty44bD+qV1IP4T+w+xXRA==} 814 | engines: {node: ^12.22.0 || ^14.17.0 || >=16.0.0} 815 | dev: true 816 | 817 | /eslint/8.30.0: 818 | resolution: {integrity: sha512-MGADB39QqYuzEGov+F/qb18r4i7DohCDOfatHaxI2iGlPuC65bwG2gxgO+7DkyL38dRFaRH7RaRAgU6JKL9rMQ==} 819 | engines: {node: ^12.22.0 || ^14.17.0 || >=16.0.0} 820 | hasBin: true 821 | dependencies: 822 | '@eslint/eslintrc': 1.4.0 823 | '@humanwhocodes/config-array': 0.11.8 824 | '@humanwhocodes/module-importer': 1.0.1 825 | '@nodelib/fs.walk': 1.2.8 826 | ajv: 6.12.6 827 | chalk: 4.1.2 828 | cross-spawn: 7.0.3 829 | debug: 4.3.4 830 | doctrine: 3.0.0 831 | escape-string-regexp: 4.0.0 832 | eslint-scope: 7.1.1 833 | eslint-utils: 3.0.0_eslint@8.30.0 834 | eslint-visitor-keys: 3.3.0 835 | espree: 9.4.1 836 | esquery: 1.4.0 837 | esutils: 2.0.3 838 | fast-deep-equal: 3.1.3 839 | file-entry-cache: 6.0.1 840 | find-up: 5.0.0 841 | glob-parent: 6.0.2 842 | globals: 13.19.0 843 | grapheme-splitter: 1.0.4 844 | ignore: 5.2.4 845 | import-fresh: 3.3.0 846 | imurmurhash: 0.1.4 847 | is-glob: 4.0.3 848 | is-path-inside: 3.0.3 849 | js-sdsl: 4.2.0 850 | js-yaml: 4.1.0 851 | json-stable-stringify-without-jsonify: 1.0.1 852 | levn: 0.4.1 853 | lodash.merge: 4.6.2 854 | minimatch: 3.1.2 855 | natural-compare: 1.4.0 856 | optionator: 0.9.1 857 | regexpp: 3.2.0 858 | strip-ansi: 6.0.1 859 | strip-json-comments: 3.1.1 860 | text-table: 0.2.0 861 | transitivePeerDependencies: 862 | - supports-color 863 | dev: true 864 | 865 | /esm-env/1.0.0: 866 | resolution: {integrity: sha512-Cf6VksWPsTuW01vU9Mk/3vRue91Zevka5SjyNf3nEpokFRuqt/KjUQoGAwq9qMmhpLTHmXzSIrFRw8zxWzmFBA==} 867 | dev: true 868 | 869 | /espree/9.4.1: 870 | resolution: {integrity: sha512-XwctdmTO6SIvCzd9810yyNzIrOrqNYV9Koizx4C/mRhf9uq0o4yHoCEU/670pOxOL/MSraektvSAji79kX90Vg==} 871 | engines: {node: ^12.22.0 || ^14.17.0 || >=16.0.0} 872 | dependencies: 873 | acorn: 8.8.1 874 | acorn-jsx: 5.3.2_acorn@8.8.1 875 | eslint-visitor-keys: 3.3.0 876 | dev: true 877 | 878 | /esquery/1.4.0: 879 | resolution: {integrity: sha512-cCDispWt5vHHtwMY2YrAQ4ibFkAL8RbH5YGBnZBc90MolvvfkkQcJro/aZiAQUlQ3qgrYS6D6v8Gc5G5CQsc9w==} 880 | engines: {node: '>=0.10'} 881 | dependencies: 882 | estraverse: 5.3.0 883 | dev: true 884 | 885 | /esrecurse/4.3.0: 886 | resolution: {integrity: sha512-KmfKL3b6G+RXvP8N1vr3Tq1kL/oCFgn2NYXEtqP8/L3pKapUA4G8cFVaoF3SU323CD4XypR/ffioHmkti6/Tag==} 887 | engines: {node: '>=4.0'} 888 | dependencies: 889 | estraverse: 5.3.0 890 | dev: true 891 | 892 | /estraverse/5.3.0: 893 | resolution: {integrity: sha512-MMdARuVEQziNTeJD8DgMqmhwR11BRQ/cBP+pLtYdSTnf3MIO8fFeiINEbX36ZdNlfU/7A9f3gUw49B3oQsvwBA==} 894 | engines: {node: '>=4.0'} 895 | dev: true 896 | 897 | /esutils/2.0.3: 898 | resolution: {integrity: sha512-kVscqXk4OCp68SZ0dkgEKVi6/8ij300KBWTJq32P/dYeWTSwK41WyTxalN1eRmA5Z9UU/LX9D7FWSmV9SAYx6g==} 899 | engines: {node: '>=0.10.0'} 900 | dev: true 901 | 902 | /ext/1.7.0: 903 | resolution: {integrity: sha512-6hxeJYaL110a9b5TEJSj0gojyHQAmA2ch5Os+ySCiA1QGdS697XWY1pzsrSjqA9LDEEgdB/KypIlR59RcLuHYw==} 904 | dependencies: 905 | type: 2.7.2 906 | dev: false 907 | 908 | /fast-deep-equal/3.1.3: 909 | resolution: {integrity: sha512-f3qQ9oQy9j2AhBe/H9VC91wLmKBCCU/gDOnKNAYG5hswO7BLKj09Hc5HYNz9cGI++xlpDCIgDaitVs03ATR84Q==} 910 | dev: true 911 | 912 | /fast-glob/3.2.12: 913 | resolution: {integrity: sha512-DVj4CQIYYow0BlaelwK1pHl5n5cRSJfM60UA0zK891sVInoPri2Ekj7+e1CT3/3qxXenpI+nBBmQAcJPJgaj4w==} 914 | engines: {node: '>=8.6.0'} 915 | dependencies: 916 | '@nodelib/fs.stat': 2.0.5 917 | '@nodelib/fs.walk': 1.2.8 918 | glob-parent: 5.1.2 919 | merge2: 1.4.1 920 | micromatch: 4.0.5 921 | dev: true 922 | 923 | /fast-json-stable-stringify/2.1.0: 924 | resolution: {integrity: sha512-lhd/wF+Lk98HZoTCtlVraHtfh5XYijIjalXck7saUtuanSDyLMxnHhSXEDJqHxD7msR8D0uCmqlkwjCV8xvwHw==} 925 | dev: true 926 | 927 | /fast-levenshtein/2.0.6: 928 | resolution: {integrity: sha512-DCXu6Ifhqcks7TZKY3Hxp3y6qphY5SJZmrWMDrKcERSOXWQdMhU9Ig/PYrzyw/ul9jOIyh0N4M0tbC5hodg8dw==} 929 | dev: true 930 | 931 | /fastq/1.14.0: 932 | resolution: {integrity: sha512-eR2D+V9/ExcbF9ls441yIuN6TI2ED1Y2ZcA5BmMtJsOkWOFRJQ0Jt0g1UwqXJJVAb+V+umH5Dfr8oh4EVP7VVg==} 933 | dependencies: 934 | reusify: 1.0.4 935 | dev: true 936 | 937 | /file-entry-cache/6.0.1: 938 | resolution: {integrity: sha512-7Gps/XWymbLk2QLYK4NzpMOrYjMhdIxXuIvy2QBsLE6ljuodKvdkWs/cpyJJ3CVIVpH0Oi1Hvg1ovbMzLdFBBg==} 939 | engines: {node: ^10.12.0 || >=12.0.0} 940 | dependencies: 941 | flat-cache: 3.0.4 942 | dev: true 943 | 944 | /fill-range/7.0.1: 945 | resolution: {integrity: sha512-qOo9F+dMUmC2Lcb4BbVvnKJxTPjCm+RRpe4gDuGrzkL7mEVl/djYSu2OdQ2Pa302N4oqkSg9ir6jaLWJ2USVpQ==} 946 | engines: {node: '>=8'} 947 | dependencies: 948 | to-regex-range: 5.0.1 949 | dev: true 950 | 951 | /find-up/5.0.0: 952 | resolution: {integrity: sha512-78/PXT1wlLLDgTzDs7sjq9hzz0vXD+zn+7wypEe4fXQxCmdmqfGsEPQxmiCSQI3ajFV91bVSsvNtrJRiW6nGng==} 953 | engines: {node: '>=10'} 954 | dependencies: 955 | locate-path: 6.0.0 956 | path-exists: 4.0.0 957 | dev: true 958 | 959 | /flat-cache/3.0.4: 960 | resolution: {integrity: sha512-dm9s5Pw7Jc0GvMYbshN6zchCA9RgQlzzEZX3vylR9IqFfS8XciblUXOKfW6SiuJ0e13eDYZoZV5wdrev7P3Nwg==} 961 | engines: {node: ^10.12.0 || >=12.0.0} 962 | dependencies: 963 | flatted: 3.2.7 964 | rimraf: 3.0.2 965 | dev: true 966 | 967 | /flatted/3.2.7: 968 | resolution: {integrity: sha512-5nqDSxl8nn5BSNxyR3n4I6eDmbolI6WT+QqR547RwxQapgjQBmtktdP+HTBb/a/zLsbzERTONyUB5pefh5TtjQ==} 969 | dev: true 970 | 971 | /fs.realpath/1.0.0: 972 | resolution: {integrity: sha512-OO0pH2lK6a0hZnAdau5ItzHPI6pUlvI7jMVnxUQRtw4owF2wk8lOSabtGDCTP4Ggrg2MbGnWO9X8K1t4+fGMDw==} 973 | dev: true 974 | 975 | /fsevents/2.3.2: 976 | resolution: {integrity: sha512-xiqMQR4xAeHTuB9uWm+fFRcIOgKBMiOBP+eXiyT7jsgVCq1bkVygt00oASowB7EdtpOHaaPgKt812P9ab+DDKA==} 977 | engines: {node: ^8.16.0 || ^10.6.0 || >=11.0.0} 978 | os: [darwin] 979 | requiresBuild: true 980 | dev: true 981 | optional: true 982 | 983 | /function-bind/1.1.1: 984 | resolution: {integrity: sha512-yIovAzMX49sF8Yl58fSCWJ5svSLuaibPxXQJFLmBObTuCr0Mf1KiPopGM9NiFjiYBCbfaa2Fh6breQ6ANVTI0A==} 985 | dev: true 986 | 987 | /get-func-name/2.0.0: 988 | resolution: {integrity: sha512-Hm0ixYtaSZ/V7C8FJrtZIuBBI+iSgL+1Aq82zSu8VQNB4S3Gk8e7Qs3VwBDJAhmRZcFqkl3tQu36g/Foh5I5ig==} 989 | dev: true 990 | 991 | /glob-parent/5.1.2: 992 | resolution: {integrity: sha512-AOIgSQCepiJYwP3ARnGx+5VnTu2HBYdzbGP45eLw1vr3zB3vZLeyed1sC9hnbcOc9/SrMyM5RPQrkGz4aS9Zow==} 993 | engines: {node: '>= 6'} 994 | dependencies: 995 | is-glob: 4.0.3 996 | dev: true 997 | 998 | /glob-parent/6.0.2: 999 | resolution: {integrity: sha512-XxwI8EOhVQgWp6iDL+3b0r86f4d6AX6zSU55HfB4ydCEuXLXc5FcYeOu+nnGftS4TEju/11rt4KJPTMgbfmv4A==} 1000 | engines: {node: '>=10.13.0'} 1001 | dependencies: 1002 | is-glob: 4.0.3 1003 | dev: true 1004 | 1005 | /glob/7.2.3: 1006 | resolution: {integrity: sha512-nFR0zLpU2YCaRxwoCJvL6UvCH2JFyFVIvwTLsIf21AuHlMskA1hhTdk+LlYJtOlYt9v6dvszD2BGRqBL+iQK9Q==} 1007 | dependencies: 1008 | fs.realpath: 1.0.0 1009 | inflight: 1.0.6 1010 | inherits: 2.0.4 1011 | minimatch: 3.1.2 1012 | once: 1.4.0 1013 | path-is-absolute: 1.0.1 1014 | dev: true 1015 | 1016 | /globals/13.19.0: 1017 | resolution: {integrity: sha512-dkQ957uSRWHw7CFXLUtUHQI3g3aWApYhfNR2O6jn/907riyTYKVBmxYVROkBcY614FSSeSJh7Xm7SrUWCxvJMQ==} 1018 | engines: {node: '>=8'} 1019 | dependencies: 1020 | type-fest: 0.20.2 1021 | dev: true 1022 | 1023 | /globalyzer/0.1.0: 1024 | resolution: {integrity: sha512-40oNTM9UfG6aBmuKxk/giHn5nQ8RVz/SS4Ir6zgzOv9/qC3kKZ9v4etGTcJbEl/NyVQH7FGU7d+X1egr57Md2Q==} 1025 | dev: true 1026 | 1027 | /globrex/0.1.2: 1028 | resolution: {integrity: sha512-uHJgbwAMwNFf5mLst7IWLNg14x1CkeqglJb/K3doi4dw6q2IvAAmM/Y81kevy83wP+Sst+nutFTYOGg3d1lsxg==} 1029 | dev: true 1030 | 1031 | /graceful-fs/4.2.10: 1032 | resolution: {integrity: sha512-9ByhssR2fPVsNZj478qUUbKfmL0+t5BDVyjShtyZZLiK7ZDAArFFfopyOTj0M05wE2tJPisA4iTnnXl2YoPvOA==} 1033 | dev: true 1034 | 1035 | /grapheme-splitter/1.0.4: 1036 | resolution: {integrity: sha512-bzh50DW9kTPM00T8y4o8vQg89Di9oLJVLW/KaOGIXJWP/iqCN6WKYkbNOF04vFLJhwcpYUh9ydh/+5vpOqV4YQ==} 1037 | dev: true 1038 | 1039 | /gravatar-url/4.0.1: 1040 | resolution: {integrity: sha512-AiU83cghGg2D8vAUwrMXCByejkkm4RtLwMNGmPU7VhqBYhsxcBCV0SAzRpYNbUCpTci5v46J/KFKPmDYaG2oyA==} 1041 | engines: {node: '>=12'} 1042 | dependencies: 1043 | md5-hex: 4.0.0 1044 | type-fest: 1.4.0 1045 | dev: true 1046 | 1047 | /has-flag/4.0.0: 1048 | resolution: {integrity: sha512-EykJT/Q1KjTWctppgIAgfSO0tKVuZUjhgMr17kqTumMl6Afv3EISleU7qZUzoXDFTAHTDC4NOoG/ZxU3EvlMPQ==} 1049 | engines: {node: '>=8'} 1050 | dev: true 1051 | 1052 | /has/1.0.3: 1053 | resolution: {integrity: sha512-f2dvO0VU6Oej7RkWJGrehjbzMAjFp5/VKPp5tTpWIV4JHHZK1/BxbFRtf/siA2SWTe09caDmVtYYzWEIbBS4zw==} 1054 | engines: {node: '>= 0.4.0'} 1055 | dependencies: 1056 | function-bind: 1.1.1 1057 | dev: true 1058 | 1059 | /ignore/5.2.4: 1060 | resolution: {integrity: sha512-MAb38BcSbH0eHNBxn7ql2NH/kX33OkB3lZ1BNdh7ENeRChHTYsTvWrMubiIAMNS2llXEEgZ1MUOBtXChP3kaFQ==} 1061 | engines: {node: '>= 4'} 1062 | dev: true 1063 | 1064 | /import-fresh/3.3.0: 1065 | resolution: {integrity: sha512-veYYhQa+D1QBKznvhUHxb8faxlrwUnxseDAbAp457E0wLNio2bOSKnjYDhMj+YiAq61xrMGhQk9iXVk5FzgQMw==} 1066 | engines: {node: '>=6'} 1067 | dependencies: 1068 | parent-module: 1.0.1 1069 | resolve-from: 4.0.0 1070 | dev: true 1071 | 1072 | /import-meta-resolve/2.2.0: 1073 | resolution: {integrity: sha512-CpPOtiCHxP9HdtDM5F45tNiAe66Cqlv3f5uHoJjt+KlaLrUh9/Wz9vepADZ78SlqEo62aDWZtj9ydMGXV+CPnw==} 1074 | dev: true 1075 | 1076 | /imurmurhash/0.1.4: 1077 | resolution: {integrity: sha512-JmXMZ6wuvDmLiHEml9ykzqO6lwFbof0GG4IkcGaENdCRDDmMVnny7s5HsIgHCbaq0w2MyPhDqkhTUgS2LU2PHA==} 1078 | engines: {node: '>=0.8.19'} 1079 | dev: true 1080 | 1081 | /inflight/1.0.6: 1082 | resolution: {integrity: sha512-k92I/b08q4wvFscXCLvqfsHCrjrF7yiXsQuIVvVE7N82W3+aqpzuUdBbfhWcy/FZR3/4IgflMgKLOsvPDrGCJA==} 1083 | dependencies: 1084 | once: 1.4.0 1085 | wrappy: 1.0.2 1086 | dev: true 1087 | 1088 | /inherits/2.0.4: 1089 | resolution: {integrity: sha512-k/vGaX4/Yla3WzyMCvTQOXYeIHvqOKtnqBduzTHpzpQZzAskKMhZ2K+EnBiSM9zGSoIFeMpXKxa4dYeZIQqewQ==} 1090 | dev: true 1091 | 1092 | /is-binary-path/2.1.0: 1093 | resolution: {integrity: sha512-ZMERYes6pDydyuGidse7OsHxtbI7WVeUEozgR/g7rd0xUimYNlvZRE/K2MgZTjWy725IfelLeVcEM97mmtRGXw==} 1094 | engines: {node: '>=8'} 1095 | dependencies: 1096 | binary-extensions: 2.2.0 1097 | dev: true 1098 | 1099 | /is-core-module/2.11.0: 1100 | resolution: {integrity: sha512-RRjxlvLDkD1YJwDbroBHMb+cukurkDWNyHx7D3oNB5x9rb5ogcksMC5wHCadcXoo67gVr/+3GFySh3134zi6rw==} 1101 | dependencies: 1102 | has: 1.0.3 1103 | dev: true 1104 | 1105 | /is-extglob/2.1.1: 1106 | resolution: {integrity: sha512-SbKbANkN603Vi4jEZv49LeVJMn4yGwsbzZworEoyEiutsN3nJYdbO36zfhGJ6QEDpOZIFkDtnq5JRxmvl3jsoQ==} 1107 | engines: {node: '>=0.10.0'} 1108 | dev: true 1109 | 1110 | /is-glob/4.0.3: 1111 | resolution: {integrity: sha512-xelSayHH36ZgE7ZWhli7pW34hNbNl8Ojv5KVmkJD4hBdD3th8Tfk9vYasLM+mXWOZhFkgZfxhLSnrwRr4elSSg==} 1112 | engines: {node: '>=0.10.0'} 1113 | dependencies: 1114 | is-extglob: 2.1.1 1115 | dev: true 1116 | 1117 | /is-number/7.0.0: 1118 | resolution: {integrity: sha512-41Cifkg6e8TylSpdtTpeLVMqvSBEVzTttHvERD741+pnZ8ANv0004MRL43QKPDlK9cGvNp6NZWZUBlbGXYxxng==} 1119 | engines: {node: '>=0.12.0'} 1120 | dev: true 1121 | 1122 | /is-path-inside/3.0.3: 1123 | resolution: {integrity: sha512-Fd4gABb+ycGAmKou8eMftCupSir5lRxqf4aD/vd0cD2qc4HL07OjCeuHMr8Ro4CoMaeCKDB0/ECBOVWjTwUvPQ==} 1124 | engines: {node: '>=8'} 1125 | dev: true 1126 | 1127 | /is-typedarray/1.0.0: 1128 | resolution: {integrity: sha512-cyA56iCMHAh5CdzjJIa4aohJyeO1YbwLi3Jc35MmRU6poroFjIGZzUzupGiRPOjgHg9TLu43xbpwXk523fMxKA==} 1129 | dev: false 1130 | 1131 | /isexe/2.0.0: 1132 | resolution: {integrity: sha512-RHxMLp9lnKHGHRng9QFhRCMbYAcVpn69smSGcq3f36xjgVVWThj4qqLbTLlq7Ssj8B+fIQ1EuCEGI2lKsyQeIw==} 1133 | dev: true 1134 | 1135 | /js-sdsl/4.2.0: 1136 | resolution: {integrity: sha512-dyBIzQBDkCqCu+0upx25Y2jGdbTGxE9fshMsCdK0ViOongpV+n5tXRcZY9v7CaVQ79AGS9KA1KHtojxiM7aXSQ==} 1137 | dev: true 1138 | 1139 | /js-yaml/4.1.0: 1140 | resolution: {integrity: sha512-wpxZs9NoxZaJESJGIZTyDEaYpl0FKSA+FB9aJiyemKhMwkxQg63h4T1KJgUGHpTqPDNRcmmYLugrRjJlBtWvRA==} 1141 | hasBin: true 1142 | dependencies: 1143 | argparse: 2.0.1 1144 | dev: true 1145 | 1146 | /json-schema-traverse/0.4.1: 1147 | resolution: {integrity: sha512-xbbCH5dCYU5T8LcEhhuh7HJ88HXuW3qsI3Y0zOZFKfZEHcpWiHU/Jxzk629Brsab/mMiHQti9wMP+845RPe3Vg==} 1148 | dev: true 1149 | 1150 | /json-stable-stringify-without-jsonify/1.0.1: 1151 | resolution: {integrity: sha512-Bdboy+l7tA3OGW6FjyFHWkP5LuByj1Tk33Ljyq0axyzdk9//JSi2u3fP1QSmd1KNwq6VOKYGlAu87CisVir6Pw==} 1152 | dev: true 1153 | 1154 | /kleur/4.1.5: 1155 | resolution: {integrity: sha512-o+NO+8WrRiQEE4/7nwRJhN1HWpVmJm511pBHUxPLtp0BUISzlBplORYSmTclCnJvQq2tKu/sgl3xVpkc7ZWuQQ==} 1156 | engines: {node: '>=6'} 1157 | dev: true 1158 | 1159 | /levn/0.4.1: 1160 | resolution: {integrity: sha512-+bT2uH4E5LGE7h/n3evcS/sQlJXCpIp6ym8OWJ5eV6+67Dsql/LaaT7qJBAt2rzfoa/5QBGBhxDix1dMt2kQKQ==} 1161 | engines: {node: '>= 0.8.0'} 1162 | dependencies: 1163 | prelude-ls: 1.2.1 1164 | type-check: 0.4.0 1165 | dev: true 1166 | 1167 | /local-pkg/0.4.2: 1168 | resolution: {integrity: sha512-mlERgSPrbxU3BP4qBqAvvwlgW4MTg78iwJdGGnv7kibKjWcJksrG3t6LB5lXI93wXRDvG4NpUgJFmTG4T6rdrg==} 1169 | engines: {node: '>=14'} 1170 | dev: true 1171 | 1172 | /locate-path/6.0.0: 1173 | resolution: {integrity: sha512-iPZK6eYjbxRu3uB4/WZ3EsEIMJFMqAoopl3R+zuq0UjcAm/MO6KCweDgPfP3elTztoKP3KtnVHxTn2NHBSDVUw==} 1174 | engines: {node: '>=10'} 1175 | dependencies: 1176 | p-locate: 5.0.0 1177 | dev: true 1178 | 1179 | /lodash.merge/4.6.2: 1180 | resolution: {integrity: sha512-0KpjqXRVvrYyCsX1swR/XTK0va6VQkQM6MNo7PqW77ByjAhoARA8EfrP1N4+KlKj8YS0ZUCtRT/YUuhyYDujIQ==} 1181 | dev: true 1182 | 1183 | /loupe/2.3.6: 1184 | resolution: {integrity: sha512-RaPMZKiMy8/JruncMU5Bt6na1eftNoo++R4Y+N2FrxkDVTrGvcyzFTsaGif4QTeKESheMGegbhw6iUAq+5A8zA==} 1185 | dependencies: 1186 | get-func-name: 2.0.0 1187 | dev: true 1188 | 1189 | /magic-string/0.25.9: 1190 | resolution: {integrity: sha512-RmF0AsMzgt25qzqqLc1+MbHmhdx0ojF2Fvs4XnOqz2ZOBXzzkEwc/dJQZCYHAn7v1jbVOjAZfK8msRn4BxO4VQ==} 1191 | dependencies: 1192 | sourcemap-codec: 1.4.8 1193 | dev: true 1194 | 1195 | /magic-string/0.27.0: 1196 | resolution: {integrity: sha512-8UnnX2PeRAPZuN12svgR9j7M1uWMovg/CEnIwIG0LFkXSJJe4PdfUGiTGl8V9bsBHFUtfVINcSyYxd7q+kx9fA==} 1197 | engines: {node: '>=12'} 1198 | dependencies: 1199 | '@jridgewell/sourcemap-codec': 1.4.14 1200 | dev: true 1201 | 1202 | /md5-hex/4.0.0: 1203 | resolution: {integrity: sha512-di38zHPn4Tz8LCb5Lz8SpLb/20Hv23aPXpF4Bq1mR5r9JuCZQ/JpcDUxFfZF9Ur5GiUvqS5NQOkR+fm5cYZ0IQ==} 1204 | engines: {node: '>=12'} 1205 | dependencies: 1206 | blueimp-md5: 2.19.0 1207 | dev: true 1208 | 1209 | /merge2/1.4.1: 1210 | resolution: {integrity: sha512-8q7VEgMJW4J8tcfVPy8g09NcQwZdbwFEqhe/WZkoIzjn/3TGDwtOCYtXGxA3O8tPzpczCCDgv+P2P5y00ZJOOg==} 1211 | engines: {node: '>= 8'} 1212 | dev: true 1213 | 1214 | /micromatch/4.0.5: 1215 | resolution: {integrity: sha512-DMy+ERcEW2q8Z2Po+WNXuw3c5YaUSFjAO5GsJqfEl7UjvtIuFKO6ZrKvcItdy98dwFI2N1tg3zNIdKaQT+aNdA==} 1216 | engines: {node: '>=8.6'} 1217 | dependencies: 1218 | braces: 3.0.2 1219 | picomatch: 2.3.1 1220 | dev: true 1221 | 1222 | /mime/3.0.0: 1223 | resolution: {integrity: sha512-jSCU7/VB1loIWBZe14aEYHU/+1UMEHoaO7qxCOVJOw9GgH72VAWppxNcjU+x9a2k3GSIBXNKxXQFqRvvZ7vr3A==} 1224 | engines: {node: '>=10.0.0'} 1225 | hasBin: true 1226 | dev: true 1227 | 1228 | /min-indent/1.0.1: 1229 | resolution: {integrity: sha512-I9jwMn07Sy/IwOj3zVkVik2JTvgpaykDZEigL6Rx6N9LbMywwUSMtxET+7lVoDLLd3O3IXwJwvuuns8UB/HeAg==} 1230 | engines: {node: '>=4'} 1231 | dev: true 1232 | 1233 | /minimatch/3.1.2: 1234 | resolution: {integrity: sha512-J7p63hRiAjw1NDEww1W7i37+ByIrOWO5XQQAzZ3VOcL0PNybwpfmV/N05zFAzwQ9USyEcX6t3UO+K5aqBQOIHw==} 1235 | dependencies: 1236 | brace-expansion: 1.1.11 1237 | dev: true 1238 | 1239 | /minimist/1.2.7: 1240 | resolution: {integrity: sha512-bzfL1YUZsP41gmu/qjrEk0Q6i2ix/cVeAhbCbqH9u3zYutS1cLg00qhrD0M2MVdCcx4Sc0UpP2eBWo9rotpq6g==} 1241 | dev: true 1242 | 1243 | /mkdirp/0.5.6: 1244 | resolution: {integrity: sha512-FP+p8RB8OWpF3YZBCrP5gtADmtXApB5AMLn+vdyA+PyxCjrCs00mjyUozssO33cwDeT3wNGdLxJ5M//YqtHAJw==} 1245 | hasBin: true 1246 | dependencies: 1247 | minimist: 1.2.7 1248 | dev: true 1249 | 1250 | /mri/1.2.0: 1251 | resolution: {integrity: sha512-tzzskb3bG8LvYGFF/mDTpq3jpI6Q9wc3LEmBaghu+DdCssd1FakN7Bc0hVNmEyGq1bq3RgfkCb3cmQLpNPOroA==} 1252 | engines: {node: '>=4'} 1253 | dev: true 1254 | 1255 | /mrmime/1.0.1: 1256 | resolution: {integrity: sha512-hzzEagAgDyoU1Q6yg5uI+AorQgdvMCur3FcKf7NhMKWsaYg+RnbTyHRa/9IlLF9rf455MOCtcqqrQQ83pPP7Uw==} 1257 | engines: {node: '>=10'} 1258 | dev: true 1259 | 1260 | /ms/2.0.0: 1261 | resolution: {integrity: sha512-Tpp60P6IUJDTuOq/5Z8cdskzJujfwqfOTkrwIwj7IRISpnkJnT6SyJ4PCPnGMoFjC9ddhal5KVIYtAt97ix05A==} 1262 | dev: false 1263 | 1264 | /ms/2.1.2: 1265 | resolution: {integrity: sha512-sGkPx+VjMtmA6MX27oA4FBFELFCZZ4S4XqeGOXCv68tT+jb3vk/RyaKWP0PTKyWtmLSM0b+adUTEvbs1PEaH2w==} 1266 | dev: true 1267 | 1268 | /nanoid/3.3.4: 1269 | resolution: {integrity: sha512-MqBkQh/OHTS2egovRtLk45wEyNXwF+cokD+1YPf9u5VfJiRdAiRwB2froX5Co9Rh20xs4siNPm8naNotSD6RBw==} 1270 | engines: {node: ^10 || ^12 || ^13.7 || ^14 || >=15.0.1} 1271 | hasBin: true 1272 | dev: true 1273 | 1274 | /natural-compare/1.4.0: 1275 | resolution: {integrity: sha512-OWND8ei3VtNC9h7V60qff3SVobHr996CTwgxubgyQYEpg290h9J0buyECNNJexkFm5sOajh5G116RYA1c8ZMSw==} 1276 | dev: true 1277 | 1278 | /next-tick/1.1.0: 1279 | resolution: {integrity: sha512-CXdUiJembsNjuToQvxayPZF9Vqht7hewsvy2sOWafLvi2awflj9mOC6bHIg50orX8IJvWKY9wYQ/zB2kogPslQ==} 1280 | dev: false 1281 | 1282 | /node-fetch/2.6.7: 1283 | resolution: {integrity: sha512-ZjMPFEfVx5j+y2yF35Kzx5sF7kDzxuDj6ziH4FFbOp87zKDZNx8yExJIb05OGF4Nlt9IHFIMBkRl41VdvcNdbQ==} 1284 | engines: {node: 4.x || >=6.0.0} 1285 | peerDependencies: 1286 | encoding: ^0.1.0 1287 | peerDependenciesMeta: 1288 | encoding: 1289 | optional: true 1290 | dependencies: 1291 | whatwg-url: 5.0.0 1292 | dev: false 1293 | 1294 | /node-gyp-build/4.5.0: 1295 | resolution: {integrity: sha512-2iGbaQBV+ITgCz76ZEjmhUKAKVf7xfY1sRl4UiKQspfZMH2h06SyhNsnSVy50cwkFQDGLyif6m/6uFXHkOZ6rg==} 1296 | hasBin: true 1297 | dev: false 1298 | 1299 | /normalize-path/3.0.0: 1300 | resolution: {integrity: sha512-6eZs5Ls3WtCisHWp9S2GUy8dqkpGi4BVSz3GaqiE6ezub0512ESztXUwUB6C6IKbQkY2Pnb/mD4WYojCRwcwLA==} 1301 | engines: {node: '>=0.10.0'} 1302 | dev: true 1303 | 1304 | /once/1.4.0: 1305 | resolution: {integrity: sha512-lNaJgI+2Q5URQBkccEKHTQOPaXdUxnZZElQTZY0MFUAuaEqe1E+Nyvgdz/aIyNi6Z9MzO5dv1H8n58/GELp3+w==} 1306 | dependencies: 1307 | wrappy: 1.0.2 1308 | dev: true 1309 | 1310 | /optionator/0.9.1: 1311 | resolution: {integrity: sha512-74RlY5FCnhq4jRxVUPKDaRwrVNXMqsGsiW6AJw4XK8hmtm10wC0ypZBLw5IIp85NZMr91+qd1RvvENwg7jjRFw==} 1312 | engines: {node: '>= 0.8.0'} 1313 | dependencies: 1314 | deep-is: 0.1.4 1315 | fast-levenshtein: 2.0.6 1316 | levn: 0.4.1 1317 | prelude-ls: 1.2.1 1318 | type-check: 0.4.0 1319 | word-wrap: 1.2.3 1320 | dev: true 1321 | 1322 | /p-limit/3.1.0: 1323 | resolution: {integrity: sha512-TYOanM3wGwNGsZN2cVTYPArw454xnXj5qmWF1bEoAc4+cU/ol7GVh7odevjp1FNHduHc3KZMcFduxU5Xc6uJRQ==} 1324 | engines: {node: '>=10'} 1325 | dependencies: 1326 | yocto-queue: 0.1.0 1327 | dev: true 1328 | 1329 | /p-locate/5.0.0: 1330 | resolution: {integrity: sha512-LaNjtRWUBY++zB5nE/NwcaoMylSPk+S+ZHNB1TzdbMJMny6dynpAGt7X/tl/QYq3TIeE6nxHppbo2LGymrG5Pw==} 1331 | engines: {node: '>=10'} 1332 | dependencies: 1333 | p-limit: 3.1.0 1334 | dev: true 1335 | 1336 | /parent-module/1.0.1: 1337 | resolution: {integrity: sha512-GQ2EWRpQV8/o+Aw8YqtfZZPfNRWZYkbidE9k5rpl/hC3vtHHBfGm2Ifi6qWV+coDGkrUKZAxE3Lot5kcsRlh+g==} 1338 | engines: {node: '>=6'} 1339 | dependencies: 1340 | callsites: 3.1.0 1341 | dev: true 1342 | 1343 | /path-exists/4.0.0: 1344 | resolution: {integrity: sha512-ak9Qy5Q7jYb2Wwcey5Fpvg2KoAc/ZIhLSLOSBmRmygPsGwkVVt0fZa0qrtMz+m6tJTAHfZQ8FnmB4MG4LWy7/w==} 1345 | engines: {node: '>=8'} 1346 | dev: true 1347 | 1348 | /path-is-absolute/1.0.1: 1349 | resolution: {integrity: sha512-AVbw3UJ2e9bq64vSaS9Am0fje1Pa8pbGqTTsmXfaIiMpnr5DlDhfJOuLj9Sf95ZPVDAUerDfEk88MPmPe7UCQg==} 1350 | engines: {node: '>=0.10.0'} 1351 | dev: true 1352 | 1353 | /path-key/3.1.1: 1354 | resolution: {integrity: sha512-ojmeN0qd+y0jszEtoY48r0Peq5dwMEkIlCOu6Q5f41lfkswXuKtYrhgoTpLnyIcHm24Uhqx+5Tqm2InSwLhE6Q==} 1355 | engines: {node: '>=8'} 1356 | dev: true 1357 | 1358 | /path-parse/1.0.7: 1359 | resolution: {integrity: sha512-LDJzPVEEEPR+y48z93A0Ed0yXb8pAByGWo/k5YYdYgpY2/2EsOsksJrq7lOHxryrVOn1ejG6oAp8ahvOIQD8sw==} 1360 | dev: true 1361 | 1362 | /pathval/1.1.1: 1363 | resolution: {integrity: sha512-Dp6zGqpTdETdR63lehJYPeIOqpiNBNtc7BpWSLrOje7UaIsE5aY92r/AunQA7rsXvet3lrJ3JnZX29UPTKXyKQ==} 1364 | dev: true 1365 | 1366 | /picocolors/1.0.0: 1367 | resolution: {integrity: sha512-1fygroTLlHu66zi26VoTDv8yRgm0Fccecssto+MhsZ0D/DGW2sm8E8AjW7NU5VVTRt5GxbeZ5qBuJr+HyLYkjQ==} 1368 | dev: true 1369 | 1370 | /picomatch/2.3.1: 1371 | resolution: {integrity: sha512-JU3teHTNjmE2VCGFzuY8EXzCDVwEqB2a8fsIvwaStHhAWJEeVd1o1QD80CU6+ZdEXXSLbSsuLwJjkCBWqRQUVA==} 1372 | engines: {node: '>=8.6'} 1373 | dev: true 1374 | 1375 | /postcss/8.4.20: 1376 | resolution: {integrity: sha512-6Q04AXR1212bXr5fh03u8aAwbLxAQNGQ/Q1LNa0VfOI06ZAlhPHtQvE4OIdpj4kLThXilalPnmDSOD65DcHt+g==} 1377 | engines: {node: ^10 || ^12 || >=14} 1378 | dependencies: 1379 | nanoid: 3.3.4 1380 | picocolors: 1.0.0 1381 | source-map-js: 1.0.2 1382 | dev: true 1383 | 1384 | /prelude-ls/1.2.1: 1385 | resolution: {integrity: sha512-vkcDPrRZo1QZLbn5RLGPpg/WmIQ65qoWWhcGKf/b5eplkkarX0m9z8ppCat4mlOqUsWpyNuYgO3VRyrYHSzX5g==} 1386 | engines: {node: '>= 0.8.0'} 1387 | dev: true 1388 | 1389 | /prettier-plugin-svelte/2.9.0_ajxj753sv7dbwexjherrch25ta: 1390 | resolution: {integrity: sha512-3doBi5NO4IVgaNPtwewvrgPpqAcvNv0NwJNflr76PIGgi9nf1oguQV1Hpdm9TI2ALIQVn/9iIwLpBO5UcD2Jiw==} 1391 | peerDependencies: 1392 | prettier: ^1.16.4 || ^2.0.0 1393 | svelte: ^3.2.0 1394 | dependencies: 1395 | prettier: 2.8.1 1396 | svelte: 3.55.0 1397 | dev: true 1398 | 1399 | /prettier/2.8.1: 1400 | resolution: {integrity: sha512-lqGoSJBQNJidqCHE80vqZJHWHRFoNYsSpP9AjFhlhi9ODCJA541svILes/+/1GM3VaL/abZi7cpFzOpdR9UPKg==} 1401 | engines: {node: '>=10.13.0'} 1402 | hasBin: true 1403 | dev: true 1404 | 1405 | /punycode/2.1.1: 1406 | resolution: {integrity: sha512-XRsRjdf+j5ml+y/6GKHPZbrF/8p2Yga0JPtdqTIY2Xe5ohJPD9saDJJLPvp9+NSBprVvevdXZybnj2cv8OEd0A==} 1407 | engines: {node: '>=6'} 1408 | dev: true 1409 | 1410 | /queue-microtask/1.2.3: 1411 | resolution: {integrity: sha512-NuaNSa6flKT5JaSYQzJok04JzTL1CA6aGhv5rfLW3PgqA+M2ChpZQnAC8h8i4ZFkBS8X5RqkDBHA7r4hej3K9A==} 1412 | dev: true 1413 | 1414 | /readdirp/3.6.0: 1415 | resolution: {integrity: sha512-hOS089on8RduqdbhvQ5Z37A0ESjsqz6qnRcffsMU3495FuTdqSm+7bhJ29JvIOsBDEEnan5DPu9t3To9VRlMzA==} 1416 | engines: {node: '>=8.10.0'} 1417 | dependencies: 1418 | picomatch: 2.3.1 1419 | dev: true 1420 | 1421 | /regexpp/3.2.0: 1422 | resolution: {integrity: sha512-pq2bWo9mVD43nbts2wGv17XLiNLya+GklZ8kaDLV2Z08gDCsGpnKn9BFMepvWuHCbyVvY7J5o5+BVvoQbmlJLg==} 1423 | engines: {node: '>=8'} 1424 | dev: true 1425 | 1426 | /resolve-from/4.0.0: 1427 | resolution: {integrity: sha512-pb/MYmXstAkysRFx8piNI1tGFNQIFA3vkE3Gq4EuA1dF6gHp/+vgZqsCGJapvy8N3Q+4o7FwvquPJcnZ7RYy4g==} 1428 | engines: {node: '>=4'} 1429 | dev: true 1430 | 1431 | /resolve/1.22.1: 1432 | resolution: {integrity: sha512-nBpuuYuY5jFsli/JIs1oldw6fOQCBioohqWZg/2hiaOybXOft4lonv85uDOKXdf8rhyK159cxU5cDcK/NKk8zw==} 1433 | hasBin: true 1434 | dependencies: 1435 | is-core-module: 2.11.0 1436 | path-parse: 1.0.7 1437 | supports-preserve-symlinks-flag: 1.0.0 1438 | dev: true 1439 | 1440 | /reusify/1.0.4: 1441 | resolution: {integrity: sha512-U9nH88a3fc/ekCF1l0/UP1IosiuIjyTh7hBvXVMHYgVcfGvt897Xguj2UOLDeI5BG2m7/uwyaLVT6fbtCwTyzw==} 1442 | engines: {iojs: '>=1.0.0', node: '>=0.10.0'} 1443 | dev: true 1444 | 1445 | /rimraf/2.7.1: 1446 | resolution: {integrity: sha512-uWjbaKIK3T1OSVptzX7Nl6PvQ3qAGtKEtVRjRuazjfL3Bx5eI409VZSqgND+4UNnmzLVdPj9FqFJNPqBZFve4w==} 1447 | hasBin: true 1448 | dependencies: 1449 | glob: 7.2.3 1450 | dev: true 1451 | 1452 | /rimraf/3.0.2: 1453 | resolution: {integrity: sha512-JZkJMZkAGFFPP2YqXZXPbMlMBgsxzE8ILs4lMIX/2o0L9UBw9O/Y3o6wFw/i9YLapcUJWwqbi3kdxIPdC62TIA==} 1454 | hasBin: true 1455 | dependencies: 1456 | glob: 7.2.3 1457 | dev: true 1458 | 1459 | /rollup/3.9.0: 1460 | resolution: {integrity: sha512-nGGylpmblyjTpF4lEUPgmOw6OVxRvnI6Iuuh6Lz4O/X66cVOX1XJSsqP1YamxQ+mPuFE7qJxLFDSCk8rNv5dDw==} 1461 | engines: {node: '>=14.18.0', npm: '>=8.0.0'} 1462 | hasBin: true 1463 | optionalDependencies: 1464 | fsevents: 2.3.2 1465 | dev: true 1466 | 1467 | /run-parallel/1.2.0: 1468 | resolution: {integrity: sha512-5l4VyZR86LZ/lDxZTR6jqL8AFE2S0IFLMP26AbjsLVADxHdhB/c0GUsH+y39UfCi3dzz8OlQuPmnaJOMoDHQBA==} 1469 | dependencies: 1470 | queue-microtask: 1.2.3 1471 | dev: true 1472 | 1473 | /sade/1.8.1: 1474 | resolution: {integrity: sha512-xal3CZX1Xlo/k4ApwCFrHVACi9fBqJ7V+mwhBsuf/1IOKbBy098Fex+Wa/5QMubw09pSZ/u8EY8PWgevJsXp1A==} 1475 | engines: {node: '>=6'} 1476 | dependencies: 1477 | mri: 1.2.0 1478 | dev: true 1479 | 1480 | /sander/0.5.1: 1481 | resolution: {integrity: sha512-3lVqBir7WuKDHGrKRDn/1Ye3kwpXaDOMsiRP1wd6wpZW56gJhsbp5RqQpA6JG/P+pkXizygnr1dKR8vzWaVsfA==} 1482 | dependencies: 1483 | es6-promise: 3.3.1 1484 | graceful-fs: 4.2.10 1485 | mkdirp: 0.5.6 1486 | rimraf: 2.7.1 1487 | dev: true 1488 | 1489 | /set-cookie-parser/2.5.1: 1490 | resolution: {integrity: sha512-1jeBGaKNGdEq4FgIrORu/N570dwoPYio8lSoYLWmX7sQ//0JY08Xh9o5pBcgmHQ/MbsYp/aZnOe1s1lIsbLprQ==} 1491 | dev: true 1492 | 1493 | /shebang-command/2.0.0: 1494 | resolution: {integrity: sha512-kHxr2zZpYtdmrN1qDjrrX/Z1rR1kG8Dx+gkpK1G4eXmvXswmcE1hTWBWYUzlraYw1/yZp6YuDY77YtvbN0dmDA==} 1495 | engines: {node: '>=8'} 1496 | dependencies: 1497 | shebang-regex: 3.0.0 1498 | dev: true 1499 | 1500 | /shebang-regex/3.0.0: 1501 | resolution: {integrity: sha512-7++dFhtcx3353uBaq8DDR4NuxBetBzC7ZQOhmTQInHEd6bSrXdiEyzCvG07Z44UYdLShWUyXt5M/yhz8ekcb1A==} 1502 | engines: {node: '>=8'} 1503 | dev: true 1504 | 1505 | /sirv/2.0.2: 1506 | resolution: {integrity: sha512-4Qog6aE29nIjAOKe/wowFTxOdmbEZKb+3tsLljaBRzJwtqto0BChD2zzH0LhgCSXiI+V7X+Y45v14wBZQ1TK3w==} 1507 | engines: {node: '>= 10'} 1508 | dependencies: 1509 | '@polka/url': 1.0.0-next.21 1510 | mrmime: 1.0.1 1511 | totalist: 3.0.0 1512 | dev: true 1513 | 1514 | /sorcery/0.10.0: 1515 | resolution: {integrity: sha512-R5ocFmKZQFfSTstfOtHjJuAwbpGyf9qjQa1egyhvXSbM7emjrtLXtGdZsDJDABC85YBfVvrOiGWKSYXPKdvP1g==} 1516 | hasBin: true 1517 | dependencies: 1518 | buffer-crc32: 0.2.13 1519 | minimist: 1.2.7 1520 | sander: 0.5.1 1521 | sourcemap-codec: 1.4.8 1522 | dev: true 1523 | 1524 | /source-map-js/1.0.2: 1525 | resolution: {integrity: sha512-R0XvVJ9WusLiqTCEiGCmICCMplcCkIwwR11mOSD9CR5u+IXYdiseeEuXCVAjS54zqwkLcPNnmU4OeJ6tUrWhDw==} 1526 | engines: {node: '>=0.10.0'} 1527 | dev: true 1528 | 1529 | /source-map/0.6.1: 1530 | resolution: {integrity: sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g==} 1531 | engines: {node: '>=0.10.0'} 1532 | dev: true 1533 | 1534 | /sourcemap-codec/1.4.8: 1535 | resolution: {integrity: sha512-9NykojV5Uih4lgo5So5dtw+f0JgJX30KCNI8gwhz2J9A15wD0Ml6tjHKwf6fTSa6fAdVBdZeNOs9eJ71qCk8vA==} 1536 | deprecated: Please use @jridgewell/sourcemap-codec instead 1537 | dev: true 1538 | 1539 | /streamsearch/1.1.0: 1540 | resolution: {integrity: sha512-Mcc5wHehp9aXz1ax6bZUyY5afg9u2rv5cqQI3mRrYkGC8rW2hM02jWuwjtL++LS5qinSyhj2QfLyNsuc+VsExg==} 1541 | engines: {node: '>=10.0.0'} 1542 | dev: true 1543 | 1544 | /strip-ansi/6.0.1: 1545 | resolution: {integrity: sha512-Y38VPSHcqkFrCpFnQ9vuSXmquuv5oXOKpGeT6aGrr3o3Gc9AlVa6JBfUSOCnbxGGZF+/0ooI7KrPuUSztUdU5A==} 1546 | engines: {node: '>=8'} 1547 | dependencies: 1548 | ansi-regex: 5.0.1 1549 | dev: true 1550 | 1551 | /strip-indent/3.0.0: 1552 | resolution: {integrity: sha512-laJTa3Jb+VQpaC6DseHhF7dXVqHTfJPCRDaEbid/drOhgitgYku/letMUqOXFoWV0zIIUbjpdH2t+tYj4bQMRQ==} 1553 | engines: {node: '>=8'} 1554 | dependencies: 1555 | min-indent: 1.0.1 1556 | dev: true 1557 | 1558 | /strip-json-comments/3.1.1: 1559 | resolution: {integrity: sha512-6fPc+R4ihwqP6N/aIv2f1gMH8lOVtWQHoqC4yK6oSDVVocumAsfCqjkXnqiYMhmMwS/mEHLp7Vehlt3ql6lEig==} 1560 | engines: {node: '>=8'} 1561 | dev: true 1562 | 1563 | /strip-literal/1.0.0: 1564 | resolution: {integrity: sha512-5o4LsH1lzBzO9UFH63AJ2ad2/S2AVx6NtjOcaz+VTT2h1RiRvbipW72z8M/lxEhcPHDBQwpDrnTF7sXy/7OwCQ==} 1565 | dependencies: 1566 | acorn: 8.8.1 1567 | dev: true 1568 | 1569 | /supports-color/7.2.0: 1570 | resolution: {integrity: sha512-qpCAvRl9stuOHveKsn7HncJRvv501qIacKzQlO/+Lwxc9+0q2wLyv4Dfvt80/DPn2pqOBsJdDiogXGR9+OvwRw==} 1571 | engines: {node: '>=8'} 1572 | dependencies: 1573 | has-flag: 4.0.0 1574 | dev: true 1575 | 1576 | /supports-preserve-symlinks-flag/1.0.0: 1577 | resolution: {integrity: sha512-ot0WnXS9fgdkgIcePe6RHNk1WA8+muPa6cSjeR3V8K27q9BB1rTE3R1p7Hv0z1ZyAc8s6Vvv8DIyWf681MAt0w==} 1578 | engines: {node: '>= 0.4'} 1579 | dev: true 1580 | 1581 | /svelte-check/2.10.3_svelte@3.55.0: 1582 | resolution: {integrity: sha512-Nt1aWHTOKFReBpmJ1vPug0aGysqPwJh2seM1OvICfM2oeyaA62mOiy5EvkXhltGfhCcIQcq2LoE0l1CwcWPjlw==} 1583 | hasBin: true 1584 | peerDependencies: 1585 | svelte: ^3.24.0 1586 | dependencies: 1587 | '@jridgewell/trace-mapping': 0.3.17 1588 | chokidar: 3.5.3 1589 | fast-glob: 3.2.12 1590 | import-fresh: 3.3.0 1591 | picocolors: 1.0.0 1592 | sade: 1.8.1 1593 | svelte: 3.55.0 1594 | svelte-preprocess: 4.10.7_niwyv7xychq2ag6arq5eqxbomm 1595 | typescript: 4.9.4 1596 | transitivePeerDependencies: 1597 | - '@babel/core' 1598 | - coffeescript 1599 | - less 1600 | - node-sass 1601 | - postcss 1602 | - postcss-load-config 1603 | - pug 1604 | - sass 1605 | - stylus 1606 | - sugarss 1607 | dev: true 1608 | 1609 | /svelte-dnd-action/0.9.22_svelte@3.55.0: 1610 | resolution: {integrity: sha512-lOQJsNLM1QWv5mdxIkCVtk6k4lHCtLgfE59y8rs7iOM6erchbLC9hMEFYSveZz7biJV0mpg7yDSs4bj/RT/YkA==} 1611 | peerDependencies: 1612 | svelte: '>=3.23.0' 1613 | dependencies: 1614 | svelte: 3.55.0 1615 | dev: true 1616 | 1617 | /svelte-hmr/0.15.1_svelte@3.55.0: 1618 | resolution: {integrity: sha512-BiKB4RZ8YSwRKCNVdNxK/GfY+r4Kjgp9jCLEy0DuqAKfmQtpL38cQK3afdpjw4sqSs4PLi3jIPJIFp259NkZtA==} 1619 | engines: {node: ^12.20 || ^14.13.1 || >= 16} 1620 | peerDependencies: 1621 | svelte: '>=3.19.0' 1622 | dependencies: 1623 | svelte: 3.55.0 1624 | dev: true 1625 | 1626 | /svelte-preprocess/4.10.7_niwyv7xychq2ag6arq5eqxbomm: 1627 | resolution: {integrity: sha512-sNPBnqYD6FnmdBrUmBCaqS00RyCsCpj2BG58A1JBswNF7b0OKviwxqVrOL/CKyJrLSClrSeqQv5BXNg2RUbPOw==} 1628 | engines: {node: '>= 9.11.2'} 1629 | requiresBuild: true 1630 | peerDependencies: 1631 | '@babel/core': ^7.10.2 1632 | coffeescript: ^2.5.1 1633 | less: ^3.11.3 || ^4.0.0 1634 | node-sass: '*' 1635 | postcss: ^7 || ^8 1636 | postcss-load-config: ^2.1.0 || ^3.0.0 || ^4.0.0 1637 | pug: ^3.0.0 1638 | sass: ^1.26.8 1639 | stylus: ^0.55.0 1640 | sugarss: ^2.0.0 1641 | svelte: ^3.23.0 1642 | typescript: ^3.9.5 || ^4.0.0 1643 | peerDependenciesMeta: 1644 | '@babel/core': 1645 | optional: true 1646 | coffeescript: 1647 | optional: true 1648 | less: 1649 | optional: true 1650 | node-sass: 1651 | optional: true 1652 | postcss: 1653 | optional: true 1654 | postcss-load-config: 1655 | optional: true 1656 | pug: 1657 | optional: true 1658 | sass: 1659 | optional: true 1660 | stylus: 1661 | optional: true 1662 | sugarss: 1663 | optional: true 1664 | typescript: 1665 | optional: true 1666 | dependencies: 1667 | '@types/pug': 2.0.6 1668 | '@types/sass': 1.43.1 1669 | detect-indent: 6.1.0 1670 | magic-string: 0.25.9 1671 | sorcery: 0.10.0 1672 | strip-indent: 3.0.0 1673 | svelte: 3.55.0 1674 | typescript: 4.9.4 1675 | dev: true 1676 | 1677 | /svelte/3.55.0: 1678 | resolution: {integrity: sha512-uGu2FVMlOuey4JoKHKrpZFkoYyj0VLjJdz47zX5+gVK5odxHM40RVhar9/iK2YFRVxvfg9FkhfVlR0sjeIrOiA==} 1679 | engines: {node: '>= 8'} 1680 | dev: true 1681 | 1682 | /text-table/0.2.0: 1683 | resolution: {integrity: sha512-N+8UisAXDGk8PFXP4HAzVR9nbfmVJ3zYLAWiTIoqC5v5isinhr+r5uaO8+7r3BMfuNIufIsA7RdpVgacC2cSpw==} 1684 | dev: true 1685 | 1686 | /tiny-glob/0.2.9: 1687 | resolution: {integrity: sha512-g/55ssRPUjShh+xkfx9UPDXqhckHEsHr4Vd9zX55oSdGZc/MD0m3sferOkwWtp98bv+kcVfEHtRJgBVJzelrzg==} 1688 | dependencies: 1689 | globalyzer: 0.1.0 1690 | globrex: 0.1.2 1691 | dev: true 1692 | 1693 | /tinybench/2.3.1: 1694 | resolution: {integrity: sha512-hGYWYBMPr7p4g5IarQE7XhlyWveh1EKhy4wUBS1LrHXCKYgvz+4/jCqgmJqZxxldesn05vccrtME2RLLZNW7iA==} 1695 | dev: true 1696 | 1697 | /tinypool/0.3.0: 1698 | resolution: {integrity: sha512-NX5KeqHOBZU6Bc0xj9Vr5Szbb1j8tUHIeD18s41aDJaPeC5QTdEhK0SpdpUrZlj2nv5cctNcSjaKNanXlfcVEQ==} 1699 | engines: {node: '>=14.0.0'} 1700 | dev: true 1701 | 1702 | /tinyspy/1.0.2: 1703 | resolution: {integrity: sha512-bSGlgwLBYf7PnUsQ6WOc6SJ3pGOcd+d8AA6EUnLDDM0kWEstC1JIlSZA3UNliDXhd9ABoS7hiRBDCu+XP/sf1Q==} 1704 | engines: {node: '>=14.0.0'} 1705 | dev: true 1706 | 1707 | /to-regex-range/5.0.1: 1708 | resolution: {integrity: sha512-65P7iz6X5yEr1cwcgvQxbbIw7Uk3gOy5dIdtZ4rDveLqhrdJP+Li/Hx6tyK0NEb+2GCyneCMJiGqrADCSNk8sQ==} 1709 | engines: {node: '>=8.0'} 1710 | dependencies: 1711 | is-number: 7.0.0 1712 | dev: true 1713 | 1714 | /totalist/3.0.0: 1715 | resolution: {integrity: sha512-eM+pCBxXO/njtF7vdFsHuqb+ElbxqtI4r5EAvk6grfAFyJ6IvWlSkfZ5T9ozC6xWw3Fj1fGoSmrl0gUs46JVIw==} 1716 | engines: {node: '>=6'} 1717 | dev: true 1718 | 1719 | /tr46/0.0.3: 1720 | resolution: {integrity: sha512-N3WMsuqV66lT30CrXNbEjx4GEwlow3v6rr4mCcv6prnfwhS01rkgyFdjPNBYd9br7LpXV1+Emh01fHnq2Gdgrw==} 1721 | dev: false 1722 | 1723 | /type-check/0.4.0: 1724 | resolution: {integrity: sha512-XleUoc9uwGXqjWwXaUTZAmzMcFZ5858QA2vvx1Ur5xIcixXIP+8LnFDgRplU30us6teqdlskFfu+ae4K79Ooew==} 1725 | engines: {node: '>= 0.8.0'} 1726 | dependencies: 1727 | prelude-ls: 1.2.1 1728 | dev: true 1729 | 1730 | /type-detect/4.0.8: 1731 | resolution: {integrity: sha512-0fr/mIH1dlO+x7TlcMy+bIDqKPsw/70tVyeHW787goQjhmqaZe10uwLujubK9q9Lg6Fiho1KUKDYz0Z7k7g5/g==} 1732 | engines: {node: '>=4'} 1733 | dev: true 1734 | 1735 | /type-fest/0.20.2: 1736 | resolution: {integrity: sha512-Ne+eE4r0/iWnpAxD852z3A+N0Bt5RN//NjJwRd2VFHEmrywxf5vsZlh4R6lixl6B+wz/8d+maTSAkN1FIkI3LQ==} 1737 | engines: {node: '>=10'} 1738 | dev: true 1739 | 1740 | /type-fest/1.4.0: 1741 | resolution: {integrity: sha512-yGSza74xk0UG8k+pLh5oeoYirvIiWo5t0/o3zHHAO2tRDiZcxWP7fywNlXhqb6/r6sWvwi+RsyQMWhVLe4BVuA==} 1742 | engines: {node: '>=10'} 1743 | dev: true 1744 | 1745 | /type/1.2.0: 1746 | resolution: {integrity: sha512-+5nt5AAniqsCnu2cEQQdpzCAh33kVx8n0VoFidKpB1dVVLAN/F+bgVOqOJqOnEnrhp222clB5p3vUlD+1QAnfg==} 1747 | dev: false 1748 | 1749 | /type/2.7.2: 1750 | resolution: {integrity: sha512-dzlvlNlt6AXU7EBSfpAscydQ7gXB+pPGsPnfJnZpiNJBDj7IaJzQlBZYGdEi4R9HmPdBv2XmWJ6YUtoTa7lmCw==} 1751 | dev: false 1752 | 1753 | /typedarray-to-buffer/3.1.5: 1754 | resolution: {integrity: sha512-zdu8XMNEDepKKR+XYOXAVPtWui0ly0NtohUscw+UmaHiAWT8hrV1rr//H6V+0DvJ3OQ19S979M0laLfX8rm82Q==} 1755 | dependencies: 1756 | is-typedarray: 1.0.0 1757 | dev: false 1758 | 1759 | /typescript/4.9.4: 1760 | resolution: {integrity: sha512-Uz+dTXYzxXXbsFpM86Wh3dKCxrQqUcVMxwU54orwlJjOpO3ao8L7j5lH+dWfTwgCwIuM9GQ2kvVotzYJMXTBZg==} 1761 | engines: {node: '>=4.2.0'} 1762 | hasBin: true 1763 | dev: true 1764 | 1765 | /undici/5.14.0: 1766 | resolution: {integrity: sha512-yJlHYw6yXPPsuOH0x2Ib1Km61vu4hLiRRQoafs+WUgX1vO64vgnxiCEN9dpIrhZyHFsai3F0AEj4P9zy19enEQ==} 1767 | engines: {node: '>=12.18'} 1768 | dependencies: 1769 | busboy: 1.6.0 1770 | dev: true 1771 | 1772 | /uri-js/4.4.1: 1773 | resolution: {integrity: sha512-7rKUyy33Q1yc98pQ1DAmLtwX109F7TIfWlW1Ydo8Wl1ii1SeHieeh0HHfPeL2fMXK6z0s8ecKs9frCuLJvndBg==} 1774 | dependencies: 1775 | punycode: 2.1.1 1776 | dev: true 1777 | 1778 | /utf-8-validate/5.0.10: 1779 | resolution: {integrity: sha512-Z6czzLq4u8fPOyx7TU6X3dvUZVvoJmxSQ+IcrlmagKhilxlhZgxPK6C5Jqbkw1IDUmFTM+cz9QDnnLTwDz/2gQ==} 1780 | engines: {node: '>=6.14.2'} 1781 | requiresBuild: true 1782 | dependencies: 1783 | node-gyp-build: 4.5.0 1784 | dev: false 1785 | 1786 | /vite/4.0.3: 1787 | resolution: {integrity: sha512-HvuNv1RdE7deIfQb8mPk51UKjqptO/4RXZ5yXSAvurd5xOckwS/gg8h9Tky3uSbnjYTgUm0hVCet1cyhKd73ZA==} 1788 | engines: {node: ^14.18.0 || >=16.0.0} 1789 | hasBin: true 1790 | peerDependencies: 1791 | '@types/node': '>= 14' 1792 | less: '*' 1793 | sass: '*' 1794 | stylus: '*' 1795 | sugarss: '*' 1796 | terser: ^5.4.0 1797 | peerDependenciesMeta: 1798 | '@types/node': 1799 | optional: true 1800 | less: 1801 | optional: true 1802 | sass: 1803 | optional: true 1804 | stylus: 1805 | optional: true 1806 | sugarss: 1807 | optional: true 1808 | terser: 1809 | optional: true 1810 | dependencies: 1811 | esbuild: 0.16.12 1812 | postcss: 8.4.20 1813 | resolve: 1.22.1 1814 | rollup: 3.9.0 1815 | optionalDependencies: 1816 | fsevents: 2.3.2 1817 | dev: true 1818 | 1819 | /vite/4.0.3_@types+node@18.11.18: 1820 | resolution: {integrity: sha512-HvuNv1RdE7deIfQb8mPk51UKjqptO/4RXZ5yXSAvurd5xOckwS/gg8h9Tky3uSbnjYTgUm0hVCet1cyhKd73ZA==} 1821 | engines: {node: ^14.18.0 || >=16.0.0} 1822 | hasBin: true 1823 | peerDependencies: 1824 | '@types/node': '>= 14' 1825 | less: '*' 1826 | sass: '*' 1827 | stylus: '*' 1828 | sugarss: '*' 1829 | terser: ^5.4.0 1830 | peerDependenciesMeta: 1831 | '@types/node': 1832 | optional: true 1833 | less: 1834 | optional: true 1835 | sass: 1836 | optional: true 1837 | stylus: 1838 | optional: true 1839 | sugarss: 1840 | optional: true 1841 | terser: 1842 | optional: true 1843 | dependencies: 1844 | '@types/node': 18.11.18 1845 | esbuild: 0.16.12 1846 | postcss: 8.4.20 1847 | resolve: 1.22.1 1848 | rollup: 3.9.0 1849 | optionalDependencies: 1850 | fsevents: 2.3.2 1851 | dev: true 1852 | 1853 | /vitefu/0.2.4_vite@4.0.3: 1854 | resolution: {integrity: sha512-fanAXjSaf9xXtOOeno8wZXIhgia+CZury481LsDaV++lSvcU2R9Ch2bPh3PYFyoHW+w9LqAeYRISVQjUIew14g==} 1855 | peerDependencies: 1856 | vite: ^3.0.0 || ^4.0.0 1857 | peerDependenciesMeta: 1858 | vite: 1859 | optional: true 1860 | dependencies: 1861 | vite: 4.0.3 1862 | dev: true 1863 | 1864 | /vitest/0.25.8: 1865 | resolution: {integrity: sha512-X75TApG2wZTJn299E/TIYevr4E9/nBo1sUtZzn0Ci5oK8qnpZAZyhwg0qCeMSakGIWtc6oRwcQFyFfW14aOFWg==} 1866 | engines: {node: '>=v14.16.0'} 1867 | hasBin: true 1868 | peerDependencies: 1869 | '@edge-runtime/vm': '*' 1870 | '@vitest/browser': '*' 1871 | '@vitest/ui': '*' 1872 | happy-dom: '*' 1873 | jsdom: '*' 1874 | peerDependenciesMeta: 1875 | '@edge-runtime/vm': 1876 | optional: true 1877 | '@vitest/browser': 1878 | optional: true 1879 | '@vitest/ui': 1880 | optional: true 1881 | happy-dom: 1882 | optional: true 1883 | jsdom: 1884 | optional: true 1885 | dependencies: 1886 | '@types/chai': 4.3.4 1887 | '@types/chai-subset': 1.3.3 1888 | '@types/node': 18.11.18 1889 | acorn: 8.8.1 1890 | acorn-walk: 8.2.0 1891 | chai: 4.3.7 1892 | debug: 4.3.4 1893 | local-pkg: 0.4.2 1894 | source-map: 0.6.1 1895 | strip-literal: 1.0.0 1896 | tinybench: 2.3.1 1897 | tinypool: 0.3.0 1898 | tinyspy: 1.0.2 1899 | vite: 4.0.3_@types+node@18.11.18 1900 | transitivePeerDependencies: 1901 | - less 1902 | - sass 1903 | - stylus 1904 | - sugarss 1905 | - supports-color 1906 | - terser 1907 | dev: true 1908 | 1909 | /webidl-conversions/3.0.1: 1910 | resolution: {integrity: sha512-2JAn3z8AR6rjK8Sm8orRC0h/bcl/DqL7tRPdGZ4I1CjdF+EaMLmYxBHyXuKL849eucPFhvBoxMsflfOb8kxaeQ==} 1911 | dev: false 1912 | 1913 | /websocket/1.0.34: 1914 | resolution: {integrity: sha512-PRDso2sGwF6kM75QykIesBijKSVceR6jL2G8NGYyq2XrItNC2P5/qL5XeR056GhA+Ly7JMFvJb9I312mJfmqnQ==} 1915 | engines: {node: '>=4.0.0'} 1916 | dependencies: 1917 | bufferutil: 4.0.7 1918 | debug: 2.6.9 1919 | es5-ext: 0.10.62 1920 | typedarray-to-buffer: 3.1.5 1921 | utf-8-validate: 5.0.10 1922 | yaeti: 0.0.6 1923 | transitivePeerDependencies: 1924 | - supports-color 1925 | dev: false 1926 | 1927 | /whatwg-url/5.0.0: 1928 | resolution: {integrity: sha512-saE57nupxk6v3HY35+jzBwYa0rKSy0XR8JSxZPwgLr7ys0IBzhGviA1/TUGJLmSVqs8pb9AnvICXEuOHLprYTw==} 1929 | dependencies: 1930 | tr46: 0.0.3 1931 | webidl-conversions: 3.0.1 1932 | dev: false 1933 | 1934 | /which/2.0.2: 1935 | resolution: {integrity: sha512-BLI3Tl1TW3Pvl70l3yq3Y64i+awpwXqsGBYWkkqMtnbXgrMD+yj7rhW0kuEDxzJaYXGjEW5ogapKNMEKNMjibA==} 1936 | engines: {node: '>= 8'} 1937 | hasBin: true 1938 | dependencies: 1939 | isexe: 2.0.0 1940 | dev: true 1941 | 1942 | /word-wrap/1.2.3: 1943 | resolution: {integrity: sha512-Hz/mrNwitNRh/HUAtM/VT/5VH+ygD6DV7mYKZAtHOrbs8U7lvPS6xf7EJKMF0uW1KJCl0H701g3ZGus+muE5vQ==} 1944 | engines: {node: '>=0.10.0'} 1945 | dev: true 1946 | 1947 | /wrappy/1.0.2: 1948 | resolution: {integrity: sha512-l4Sp/DRseor9wL6EvV2+TuQn63dMkPjZ/sp9XkghTEbV9KlPS1xUsZ3u7/IQO4wxtcFB4bgpQPRcR3QCvezPcQ==} 1949 | dev: true 1950 | 1951 | /yaeti/0.0.6: 1952 | resolution: {integrity: sha512-MvQa//+KcZCUkBTIC9blM+CU9J2GzuTytsOUwf2lidtvkx/6gnEp1QvJv34t9vdjhFmha/mUiNDbN0D0mJWdug==} 1953 | engines: {node: '>=0.10.32'} 1954 | dev: false 1955 | 1956 | /yocto-queue/0.1.0: 1957 | resolution: {integrity: sha512-rVksvsnNCdJ/ohGc6xgPwyN8eheCxsiLM8mxuE/t/mOVqJewPuO1miLpTHQiRgTKCLexL4MeAFVagts7HmNZ2Q==} 1958 | engines: {node: '>=10'} 1959 | dev: true 1960 | -------------------------------------------------------------------------------- /screenshot.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/supabase-community/svelte-kanban/93d3c701aa8cf36472670dd88a6337140e000016/screenshot.png -------------------------------------------------------------------------------- /setup.sql: -------------------------------------------------------------------------------- 1 | drop table if exists cards; 2 | drop table if exists lists; 3 | drop table if exists boards; 4 | 5 | create table boards ( 6 | id bigint generated by default as identity primary key, 7 | user_id uuid references auth.users not null default auth.uid(), 8 | title text default '', 9 | position int not null default 0, 10 | inserted_at timestamp with time zone default timezone('utc'::text, now()) not null 11 | ); 12 | 13 | alter table boards enable row level security; 14 | 15 | create policy "Individuals can create boards." on boards for 16 | insert with check (auth.uid() = user_id); 17 | 18 | create policy "Individuals can view their own boards. " on boards for 19 | select using (auth.uid() = user_id); 20 | 21 | create policy "Individuals can update their own boards." on boards for 22 | update using (auth.uid() = user_id); 23 | 24 | create policy "Individuals can delete their own boards." on boards for 25 | delete using (auth.uid() = user_id); 26 | 27 | create table lists ( 28 | id bigint generated by default as identity primary key, 29 | user_id uuid references auth.users not null default auth.uid(), 30 | board_id bigint references boards not null, 31 | title text default '', 32 | position int not null default 0, 33 | inserted_at timestamp with time zone default timezone('utc'::text, now()) not null 34 | ); 35 | 36 | alter table lists enable row level security; 37 | 38 | create policy "Individuals can create lists." on lists for 39 | insert with check (auth.uid() = user_id); 40 | 41 | create policy "Individuals can view their own lists. " on lists for 42 | select using (auth.uid() = user_id); 43 | 44 | create policy "Individuals can update their own lists." on lists for 45 | update using (auth.uid() = user_id); 46 | 47 | create policy "Individuals can delete their own lists." on lists for 48 | delete using (auth.uid() = user_id); 49 | 50 | create table cards ( 51 | id bigint generated by default as identity primary key, 52 | user_id uuid references auth.users not null default auth.uid(), 53 | list_id bigint references lists not null, 54 | position int not null default 0, 55 | description text check (char_length(description) > 0), 56 | completed_at timestamp with time zone, 57 | inserted_at timestamp with time zone default timezone('utc'::text, now()) not null 58 | ); 59 | 60 | alter table cards enable row level security; 61 | 62 | create policy "Individuals can create cards." on cards for 63 | insert with check (auth.uid() = user_id); 64 | 65 | create policy "Individuals can view their own cards. " on cards for 66 | select using (auth.uid() = user_id); 67 | 68 | create policy "Individuals can update their own cards." on cards for 69 | update using (auth.uid() = user_id); 70 | 71 | create policy "Individuals can delete their own cards." on cards for 72 | delete using (auth.uid() = user_id); 73 | 74 | 75 | create or replace function sort_board(board_id bigint, list_ids bigint[]) returns boolean 76 | security invoker 77 | as 78 | $$ 79 | #variable_conflict use_variable 80 | declare 81 | list_id bigint; 82 | begin 83 | for i in 1 .. array_upper(list_ids, 1) 84 | loop 85 | list_id := list_ids[i]; 86 | 87 | update lists set position = i - 1 88 | where lists.board_id = board_id 89 | and lists.id = list_id; 90 | end loop; 91 | 92 | return true; 93 | end 94 | $$ language plpgsql; 95 | 96 | create or replace function sort_list(new_list_id bigint, card_ids bigint[]) returns boolean 97 | security invoker 98 | as 99 | $$ 100 | #variable_conflict use_variable 101 | declare 102 | card_id bigint; 103 | begin 104 | for i in 1 .. array_upper(card_ids, 1) 105 | loop 106 | card_id := card_ids[i]; 107 | 108 | update cards set position = i - 1, list_id = new_list_id 109 | where cards.id = card_id; 110 | end loop; 111 | 112 | return true; 113 | end 114 | $$ language plpgsql; 115 | -------------------------------------------------------------------------------- /src/app.d.ts: -------------------------------------------------------------------------------- 1 | // See https://kit.svelte.dev/docs/types#app 2 | // for information about these interfaces 3 | // and what to do when importing types 4 | declare namespace App { 5 | // interface Error {} 6 | // interface Locals {} 7 | // interface PageData {} 8 | // interface Platform {} 9 | } 10 | -------------------------------------------------------------------------------- /src/app.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | %sveltekit.head% 10 | 11 | 12 | 13 |
%sveltekit.body%
14 | 15 | 16 | -------------------------------------------------------------------------------- /src/index.test.js: -------------------------------------------------------------------------------- 1 | import { describe, it, expect } from 'vitest'; 2 | 3 | describe('sum test', () => { 4 | it('adds 1 + 2 to equal 3', () => { 5 | expect(1 + 2).toBe(3); 6 | }); 7 | }); 8 | -------------------------------------------------------------------------------- /src/routes/+layout.js: -------------------------------------------------------------------------------- 1 | export const ssr = false; 2 | -------------------------------------------------------------------------------- /src/routes/+page.svelte: -------------------------------------------------------------------------------- 1 | 8 | 9 | {#if $user} 10 | 11 | {:else} 12 | 13 | {/if} 14 | -------------------------------------------------------------------------------- /src/routes/BoardList.svelte: -------------------------------------------------------------------------------- 1 | 21 | 22 | 23 | Boards 24 | 25 | 26 |
Boards
27 | 28 |
29 |
    30 | {#each boards as board} 31 |
  • 32 | {board.title} 33 |
  • 34 | {/each} 35 | 36 |
  • 37 | 38 |
  • 39 |
40 |
41 | 42 | 79 | -------------------------------------------------------------------------------- /src/routes/Header.svelte: -------------------------------------------------------------------------------- 1 | 13 | 14 |
15 | 18 | 19 | 25 |
26 | 27 | 61 | -------------------------------------------------------------------------------- /src/routes/Login.svelte: -------------------------------------------------------------------------------- 1 | 17 | 18 | 19 | Kanban 20 | 21 | 22 |
23 | {#if sent} 24 |
25 |
26 | 34 | 40 | 41 |

Sent you a link, check your email

42 |
43 |
44 | {:else} 45 |
46 |

Sign in

47 | 48 |
49 | 53 | 71 |
72 |
73 | {/if} 74 |
75 | 76 | 143 | -------------------------------------------------------------------------------- /src/routes/boards/[id]/+page.js: -------------------------------------------------------------------------------- 1 | import { redirect } from '@sveltejs/kit'; 2 | import db, { supabase } from '../../db'; 3 | 4 | /** @type {import('./$types').PageLoad} */ 5 | export async function load({ params }) { 6 | const { 7 | data: { session } 8 | } = await supabase.auth.getSession(); 9 | 10 | if (session?.user && params.id) { 11 | const board = await db.boards.get(params.id); 12 | return { 13 | board 14 | }; 15 | } 16 | 17 | throw redirect(303, '/'); 18 | } 19 | -------------------------------------------------------------------------------- /src/routes/boards/[id]/+page.svelte: -------------------------------------------------------------------------------- 1 | 58 | 59 | 60 | {board?.title} 61 | 62 | 63 |
64 | {#if board} 65 | 66 | {/if} 67 |
68 | 69 |
70 | {#if loading} 71 | Loading... 72 | {:else} 73 |
84 | {#each board.lists as list (list.id)} 85 | 86 | 87 | {#if list[SHADOW_ITEM_MARKER_PROPERTY_NAME]} 88 |
89 | 90 |
91 | {/if} 92 | {/each} 93 |
94 | 95 | 96 | {/if} 97 |
98 | 99 | 124 | -------------------------------------------------------------------------------- /src/routes/boards/[id]/AddForm.svelte: -------------------------------------------------------------------------------- 1 | 35 | 36 |
37 | 38 | 39 |
40 | 41 | 46 |
47 |
48 | 49 | 87 | -------------------------------------------------------------------------------- /src/routes/boards/[id]/AddList.svelte: -------------------------------------------------------------------------------- 1 | 24 | 25 |
26 | {#if adding} 27 | 28 | {:else} 29 | 35 | {/if} 36 |
37 | 38 | 67 | -------------------------------------------------------------------------------- /src/routes/boards/[id]/InPlaceEdit.svelte: -------------------------------------------------------------------------------- 1 | 40 | 41 | {#if editing} 42 |
43 | 44 |
45 | {:else} 46 | 49 | {/if} 50 | 51 | 66 | -------------------------------------------------------------------------------- /src/routes/boards/[id]/List.svelte: -------------------------------------------------------------------------------- 1 | 62 | 63 |
64 |
65 |

66 | 67 |

68 | 69 | 85 |
86 | 87 |
    98 | {#each list.cards as card (card.id)} 99 |
  • 100 |
    101 | updateCard(e, card)} /> 102 |
    103 | 119 | 120 | {#if card[SHADOW_ITEM_MARKER_PROPERTY_NAME]} 121 |
    {card.title}
    122 | {/if} 123 |
  • 124 | {/each} 125 |
126 | 127 | {#if adding} 128 | 135 | {:else} 136 | 153 | {/if} 154 |
155 | 156 | 278 | -------------------------------------------------------------------------------- /src/routes/db.js: -------------------------------------------------------------------------------- 1 | import { createClient } from '@supabase/supabase-js'; 2 | import { writable } from 'svelte/store'; 3 | import { PUBLIC_SUPABASE_URL, PUBLIC_SUPABASE_KEY } from '$env/static/public'; 4 | 5 | export const supabase = createClient(PUBLIC_SUPABASE_URL, PUBLIC_SUPABASE_KEY); 6 | 7 | const userStore = writable(); 8 | 9 | supabase.auth.getSession().then(({ data }) => { 10 | userStore.set(data.session?.user); 11 | }); 12 | 13 | supabase.auth.onAuthStateChange((event, session) => { 14 | if (event == 'SIGNED_IN' && session) { 15 | userStore.set(session.user); 16 | } else if (event == 'SIGNED_OUT') { 17 | userStore.set(null); 18 | } 19 | }); 20 | 21 | export default { 22 | get user() { 23 | return userStore; 24 | }, 25 | signIn(email) { 26 | return supabase.auth.signInWithOtp({ email }); 27 | }, 28 | signOut() { 29 | return supabase.auth.signOut(); 30 | }, 31 | boards: { 32 | async all() { 33 | const { data } = await supabase.from('boards').select('*').order('position'); 34 | 35 | return data; 36 | }, 37 | 38 | async get(id) { 39 | const { data } = await supabase 40 | .from('boards') 41 | .select('id, title, lists ( id, title, position, cards ( id, description, position ))') 42 | .eq('id', id) 43 | .order('position') 44 | .order('position', { foreignTable: 'lists' }) 45 | .order('position', { foreignTable: 'lists.cards' }) 46 | .single(); 47 | 48 | return data; 49 | }, 50 | 51 | async create(board) { 52 | const { data } = await supabase.from('boards').insert(board).select().maybeSingle(); 53 | 54 | return data; 55 | }, 56 | 57 | async update(board) { 58 | const { data } = await supabase 59 | .from('boards') 60 | .update({ title: board.title }) 61 | .match({ id: board.id }) 62 | .select() 63 | .maybeSingle(); 64 | 65 | return data; 66 | }, 67 | 68 | async sort(board) { 69 | const { data } = await supabase.rpc('sort_board', { 70 | board_id: board.id, 71 | list_ids: board.lists.map((list) => list.id) 72 | }); 73 | 74 | return data; 75 | } 76 | }, 77 | 78 | lists: { 79 | async create(board, listData) { 80 | const { data } = await supabase 81 | .from('lists') 82 | .insert({ board_id: board.id, ...listData }) 83 | .select() 84 | .maybeSingle(); 85 | 86 | const list = data; 87 | 88 | return { ...list, cards: [] }; 89 | }, 90 | 91 | async update(list) { 92 | const { data } = await supabase 93 | .from('lists') 94 | .update({ title: list.title }) 95 | .match({ id: list.id }) 96 | .select() 97 | .maybeSingle(); 98 | 99 | return data; 100 | }, 101 | 102 | async sort(list) { 103 | const { data } = await supabase.rpc('sort_list', { 104 | new_list_id: list.id, 105 | card_ids: list.cards.map((card) => card.id) 106 | }); 107 | 108 | return data; 109 | } 110 | }, 111 | 112 | cards: { 113 | async create(list, listData) { 114 | const { data } = await supabase 115 | .from('cards') 116 | .insert({ list_id: list.id, ...listData }) 117 | .select() 118 | .maybeSingle(); 119 | 120 | return data; 121 | }, 122 | 123 | async update(card) { 124 | const { data } = await supabase 125 | .from('cards') 126 | .update({ description: card.description }) 127 | .match({ id: card.id }) 128 | .select() 129 | .maybeSingle(); 130 | 131 | return data; 132 | } 133 | } 134 | }; 135 | -------------------------------------------------------------------------------- /static/favicon.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/supabase-community/svelte-kanban/93d3c701aa8cf36472670dd88a6337140e000016/static/favicon.png -------------------------------------------------------------------------------- /static/global.css: -------------------------------------------------------------------------------- 1 | * { 2 | box-sizing: border-box; 3 | } 4 | 5 | button { 6 | border: none; 7 | background: none; 8 | cursor: pointer; 9 | } 10 | 11 | ul { 12 | list-style: none; 13 | padding: 0; 14 | } 15 | 16 | /* place global styles here */ 17 | body { 18 | font-family: Inter, Arial, sans; 19 | margin: 0; 20 | background: rgb(0, 174, 204); 21 | } 22 | 23 | input { 24 | padding: 0.5rem 0.5rem; 25 | border-radius: 3px; 26 | border: none; 27 | box-shadow: 0 1px #CCC; 28 | font-size: 0.9rem; 29 | } 30 | 31 | input:focus { 32 | outline: none; 33 | } 34 | 35 | ::-webkit-scrollbar { 36 | width: 22px; 37 | } 38 | 39 | ::-webkit-scrollbar-track { 40 | background: rgba(0,0,0,0.05); 41 | } 42 | 43 | ::-webkit-scrollbar-thumb { 44 | background: rgba(0,0,0,0.15); 45 | border-radius: 3px; 46 | } 47 | -------------------------------------------------------------------------------- /static/logo.svg: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | -------------------------------------------------------------------------------- /static/robots.txt: -------------------------------------------------------------------------------- 1 | # https://www.robotstxt.org/robotstxt.html 2 | User-agent: * 3 | Disallow: 4 | -------------------------------------------------------------------------------- /supabase/.branches/_current_branch: -------------------------------------------------------------------------------- 1 | main -------------------------------------------------------------------------------- /supabase/.branches/main/dump.sql: -------------------------------------------------------------------------------- 1 | -- 2 | -- PostgreSQL database dump 3 | -- 4 | 5 | -- Dumped from database version 15.1 (Debian 15.1-1.pgdg110+1) 6 | -- Dumped by pg_dump version 15.1 (Debian 15.1-1.pgdg110+1) 7 | 8 | SET statement_timeout = 0; 9 | SET lock_timeout = 0; 10 | SET idle_in_transaction_session_timeout = 0; 11 | SET client_encoding = 'UTF8'; 12 | SET standard_conforming_strings = on; 13 | SELECT pg_catalog.set_config('search_path', '', false); 14 | SET check_function_bodies = false; 15 | SET xmloption = content; 16 | SET client_min_messages = warning; 17 | SET row_security = off; 18 | 19 | -- 20 | -- Name: _realtime; Type: SCHEMA; Schema: -; Owner: supabase_admin 21 | -- 22 | 23 | CREATE SCHEMA "_realtime"; 24 | 25 | 26 | ALTER SCHEMA "_realtime" OWNER TO "supabase_admin"; 27 | 28 | -- 29 | -- Name: auth; Type: SCHEMA; Schema: -; Owner: supabase_admin 30 | -- 31 | 32 | CREATE SCHEMA "auth"; 33 | 34 | 35 | ALTER SCHEMA "auth" OWNER TO "supabase_admin"; 36 | 37 | -- 38 | -- Name: graphql; Type: SCHEMA; Schema: -; Owner: supabase_admin 39 | -- 40 | 41 | CREATE SCHEMA "graphql"; 42 | 43 | 44 | ALTER SCHEMA "graphql" OWNER TO "supabase_admin"; 45 | 46 | -- 47 | -- Name: graphql_public; Type: SCHEMA; Schema: -; Owner: supabase_admin 48 | -- 49 | 50 | CREATE SCHEMA "graphql_public"; 51 | 52 | 53 | ALTER SCHEMA "graphql_public" OWNER TO "supabase_admin"; 54 | 55 | -- 56 | -- Name: pgsodium; Type: EXTENSION; Schema: -; Owner: - 57 | -- 58 | CREATE SCHEMA "pgsodium"; 59 | 60 | ALTER SCHEMA "pgsodium" OWNER TO "supabase_admin"; 61 | 62 | CREATE EXTENSION IF NOT EXISTS "pgsodium" WITH SCHEMA "pgsodium"; 63 | 64 | 65 | -- 66 | -- Name: realtime; Type: SCHEMA; Schema: -; Owner: supabase_admin 67 | -- 68 | 69 | CREATE SCHEMA "realtime"; 70 | 71 | 72 | ALTER SCHEMA "realtime" OWNER TO "supabase_admin"; 73 | 74 | -- 75 | -- Name: storage; Type: SCHEMA; Schema: -; Owner: supabase_admin 76 | -- 77 | 78 | CREATE SCHEMA "storage"; 79 | 80 | 81 | ALTER SCHEMA "storage" OWNER TO "supabase_admin"; 82 | 83 | -- 84 | -- Name: vault; Type: SCHEMA; Schema: -; Owner: supabase_admin 85 | -- 86 | 87 | CREATE SCHEMA "vault"; 88 | 89 | 90 | ALTER SCHEMA "vault" OWNER TO "supabase_admin"; 91 | 92 | -- 93 | -- Name: pg_graphql; Type: EXTENSION; Schema: -; Owner: - 94 | -- 95 | 96 | CREATE EXTENSION IF NOT EXISTS "pg_graphql" WITH SCHEMA "graphql"; 97 | 98 | 99 | -- 100 | -- Name: pg_stat_statements; Type: EXTENSION; Schema: -; Owner: - 101 | -- 102 | 103 | CREATE EXTENSION IF NOT EXISTS "pg_stat_statements" WITH SCHEMA "extensions"; 104 | 105 | 106 | -- 107 | -- Name: pgcrypto; Type: EXTENSION; Schema: -; Owner: - 108 | -- 109 | 110 | CREATE EXTENSION IF NOT EXISTS "pgcrypto" WITH SCHEMA "extensions"; 111 | 112 | 113 | -- 114 | -- Name: pgjwt; Type: EXTENSION; Schema: -; Owner: - 115 | -- 116 | 117 | CREATE EXTENSION IF NOT EXISTS "pgjwt" WITH SCHEMA "extensions"; 118 | 119 | 120 | -- 121 | -- Name: supabase_vault; Type: EXTENSION; Schema: -; Owner: - 122 | -- 123 | 124 | CREATE EXTENSION IF NOT EXISTS "supabase_vault" WITH SCHEMA "vault"; 125 | 126 | 127 | -- 128 | -- Name: uuid-ossp; Type: EXTENSION; Schema: -; Owner: - 129 | -- 130 | 131 | CREATE EXTENSION IF NOT EXISTS "uuid-ossp" WITH SCHEMA "extensions"; 132 | 133 | 134 | -- 135 | -- Name: aal_level; Type: TYPE; Schema: auth; Owner: supabase_auth_admin 136 | -- 137 | 138 | CREATE TYPE "auth"."aal_level" AS ENUM ( 139 | 'aal1', 140 | 'aal2', 141 | 'aal3' 142 | ); 143 | 144 | 145 | ALTER TYPE "auth"."aal_level" OWNER TO "supabase_auth_admin"; 146 | 147 | -- 148 | -- Name: factor_status; Type: TYPE; Schema: auth; Owner: supabase_auth_admin 149 | -- 150 | 151 | CREATE TYPE "auth"."factor_status" AS ENUM ( 152 | 'unverified', 153 | 'verified' 154 | ); 155 | 156 | 157 | ALTER TYPE "auth"."factor_status" OWNER TO "supabase_auth_admin"; 158 | 159 | -- 160 | -- Name: factor_type; Type: TYPE; Schema: auth; Owner: supabase_auth_admin 161 | -- 162 | 163 | CREATE TYPE "auth"."factor_type" AS ENUM ( 164 | 'totp', 165 | 'webauthn' 166 | ); 167 | 168 | 169 | ALTER TYPE "auth"."factor_type" OWNER TO "supabase_auth_admin"; 170 | 171 | -- 172 | -- Name: email(); Type: FUNCTION; Schema: auth; Owner: supabase_auth_admin 173 | -- 174 | 175 | CREATE FUNCTION "auth"."email"() RETURNS "text" 176 | LANGUAGE "sql" STABLE 177 | AS $$ 178 | select 179 | coalesce( 180 | nullif(current_setting('request.jwt.claim.email', true), ''), 181 | (nullif(current_setting('request.jwt.claims', true), '')::jsonb ->> 'email') 182 | )::text 183 | $$; 184 | 185 | 186 | ALTER FUNCTION "auth"."email"() OWNER TO "supabase_auth_admin"; 187 | 188 | -- 189 | -- Name: jwt(); Type: FUNCTION; Schema: auth; Owner: supabase_auth_admin 190 | -- 191 | 192 | CREATE FUNCTION "auth"."jwt"() RETURNS "jsonb" 193 | LANGUAGE "sql" STABLE 194 | AS $$ 195 | select 196 | coalesce( 197 | nullif(current_setting('request.jwt.claim', true), ''), 198 | nullif(current_setting('request.jwt.claims', true), '') 199 | )::jsonb 200 | $$; 201 | 202 | 203 | ALTER FUNCTION "auth"."jwt"() OWNER TO "supabase_auth_admin"; 204 | 205 | -- 206 | -- Name: role(); Type: FUNCTION; Schema: auth; Owner: supabase_auth_admin 207 | -- 208 | 209 | CREATE FUNCTION "auth"."role"() RETURNS "text" 210 | LANGUAGE "sql" STABLE 211 | AS $$ 212 | select 213 | coalesce( 214 | nullif(current_setting('request.jwt.claim.role', true), ''), 215 | (nullif(current_setting('request.jwt.claims', true), '')::jsonb ->> 'role') 216 | )::text 217 | $$; 218 | 219 | 220 | ALTER FUNCTION "auth"."role"() OWNER TO "supabase_auth_admin"; 221 | 222 | -- 223 | -- Name: uid(); Type: FUNCTION; Schema: auth; Owner: supabase_auth_admin 224 | -- 225 | 226 | CREATE FUNCTION "auth"."uid"() RETURNS "uuid" 227 | LANGUAGE "sql" STABLE 228 | AS $$ 229 | select 230 | coalesce( 231 | nullif(current_setting('request.jwt.claim.sub', true), ''), 232 | (nullif(current_setting('request.jwt.claims', true), '')::jsonb ->> 'sub') 233 | )::uuid 234 | $$; 235 | 236 | 237 | ALTER FUNCTION "auth"."uid"() OWNER TO "supabase_auth_admin"; 238 | 239 | -- 240 | -- Name: sort_board(bigint, bigint[]); Type: FUNCTION; Schema: public; Owner: postgres 241 | -- 242 | 243 | CREATE FUNCTION "public"."sort_board"("board_id" bigint, "list_ids" bigint[]) RETURNS boolean 244 | LANGUAGE "plpgsql" 245 | AS $$ 246 | #variable_conflict use_variable 247 | declare 248 | list_id bigint; 249 | begin 250 | for i in 1 .. array_upper(list_ids, 1) 251 | loop 252 | list_id := list_ids[i]; 253 | 254 | update lists set position = i - 1 255 | where lists.board_id = board_id 256 | and lists.id = list_id; 257 | end loop; 258 | 259 | return true; 260 | end 261 | $$; 262 | 263 | 264 | ALTER FUNCTION "public"."sort_board"("board_id" bigint, "list_ids" bigint[]) OWNER TO "postgres"; 265 | 266 | -- 267 | -- Name: sort_list(bigint, bigint[]); Type: FUNCTION; Schema: public; Owner: postgres 268 | -- 269 | 270 | CREATE FUNCTION "public"."sort_list"("new_list_id" bigint, "card_ids" bigint[]) RETURNS boolean 271 | LANGUAGE "plpgsql" 272 | AS $$ 273 | #variable_conflict use_variable 274 | declare 275 | card_id bigint; 276 | begin 277 | for i in 1 .. array_upper(card_ids, 1) 278 | loop 279 | card_id := card_ids[i]; 280 | 281 | update cards set position = i - 1, list_id = new_list_id 282 | where cards.id = card_id; 283 | end loop; 284 | 285 | return true; 286 | end 287 | $$; 288 | 289 | 290 | ALTER FUNCTION "public"."sort_list"("new_list_id" bigint, "card_ids" bigint[]) OWNER TO "postgres"; 291 | 292 | -- 293 | -- Name: extension("text"); Type: FUNCTION; Schema: storage; Owner: supabase_storage_admin 294 | -- 295 | 296 | CREATE FUNCTION "storage"."extension"("name" "text") RETURNS "text" 297 | LANGUAGE "plpgsql" 298 | AS $$ 299 | DECLARE 300 | _parts text[]; 301 | _filename text; 302 | BEGIN 303 | select string_to_array(name, '/') into _parts; 304 | select _parts[array_length(_parts,1)] into _filename; 305 | -- @todo return the last part instead of 2 306 | return split_part(_filename, '.', 2); 307 | END 308 | $$; 309 | 310 | 311 | ALTER FUNCTION "storage"."extension"("name" "text") OWNER TO "supabase_storage_admin"; 312 | 313 | -- 314 | -- Name: filename("text"); Type: FUNCTION; Schema: storage; Owner: supabase_storage_admin 315 | -- 316 | 317 | CREATE FUNCTION "storage"."filename"("name" "text") RETURNS "text" 318 | LANGUAGE "plpgsql" 319 | AS $$ 320 | DECLARE 321 | _parts text[]; 322 | BEGIN 323 | select string_to_array(name, '/') into _parts; 324 | return _parts[array_length(_parts,1)]; 325 | END 326 | $$; 327 | 328 | 329 | ALTER FUNCTION "storage"."filename"("name" "text") OWNER TO "supabase_storage_admin"; 330 | 331 | -- 332 | -- Name: foldername("text"); Type: FUNCTION; Schema: storage; Owner: supabase_storage_admin 333 | -- 334 | 335 | CREATE FUNCTION "storage"."foldername"("name" "text") RETURNS "text"[] 336 | LANGUAGE "plpgsql" 337 | AS $$ 338 | DECLARE 339 | _parts text[]; 340 | BEGIN 341 | select string_to_array(name, '/') into _parts; 342 | return _parts[1:array_length(_parts,1)-1]; 343 | END 344 | $$; 345 | 346 | 347 | ALTER FUNCTION "storage"."foldername"("name" "text") OWNER TO "supabase_storage_admin"; 348 | 349 | -- 350 | -- Name: get_size_by_bucket(); Type: FUNCTION; Schema: storage; Owner: supabase_storage_admin 351 | -- 352 | 353 | CREATE FUNCTION "storage"."get_size_by_bucket"() RETURNS TABLE("size" bigint, "bucket_id" "text") 354 | LANGUAGE "plpgsql" 355 | AS $$ 356 | BEGIN 357 | return query 358 | select sum((metadata->>'size')::int) as size, obj.bucket_id 359 | from "storage".objects as obj 360 | group by obj.bucket_id; 361 | END 362 | $$; 363 | 364 | 365 | ALTER FUNCTION "storage"."get_size_by_bucket"() OWNER TO "supabase_storage_admin"; 366 | 367 | -- 368 | -- Name: search("text", "text", integer, integer, integer, "text", "text", "text"); Type: FUNCTION; Schema: storage; Owner: supabase_storage_admin 369 | -- 370 | 371 | CREATE FUNCTION "storage"."search"("prefix" "text", "bucketname" "text", "limits" integer DEFAULT 100, "levels" integer DEFAULT 1, "offsets" integer DEFAULT 0, "search" "text" DEFAULT ''::"text", "sortcolumn" "text" DEFAULT 'name'::"text", "sortorder" "text" DEFAULT 'asc'::"text") RETURNS TABLE("name" "text", "id" "uuid", "updated_at" timestamp with time zone, "created_at" timestamp with time zone, "last_accessed_at" timestamp with time zone, "metadata" "jsonb") 372 | LANGUAGE "plpgsql" STABLE 373 | AS $_$ 374 | declare 375 | v_order_by text; 376 | v_sort_order text; 377 | begin 378 | case 379 | when sortcolumn = 'name' then 380 | v_order_by = 'name'; 381 | when sortcolumn = 'updated_at' then 382 | v_order_by = 'updated_at'; 383 | when sortcolumn = 'created_at' then 384 | v_order_by = 'created_at'; 385 | when sortcolumn = 'last_accessed_at' then 386 | v_order_by = 'last_accessed_at'; 387 | else 388 | v_order_by = 'name'; 389 | end case; 390 | 391 | case 392 | when sortorder = 'asc' then 393 | v_sort_order = 'asc'; 394 | when sortorder = 'desc' then 395 | v_sort_order = 'desc'; 396 | else 397 | v_sort_order = 'asc'; 398 | end case; 399 | 400 | v_order_by = v_order_by || ' ' || v_sort_order; 401 | 402 | return query execute 403 | 'with folders as ( 404 | select path_tokens[$1] as folder 405 | from storage.objects 406 | where objects.name ilike $2 || $3 || ''%'' 407 | and bucket_id = $4 408 | and array_length(regexp_split_to_array(objects.name, ''/''), 1) <> $1 409 | group by folder 410 | order by folder ' || v_sort_order || ' 411 | ) 412 | (select folder as "name", 413 | null as id, 414 | null as updated_at, 415 | null as created_at, 416 | null as last_accessed_at, 417 | null as metadata from folders) 418 | union all 419 | (select path_tokens[$1] as "name", 420 | id, 421 | updated_at, 422 | created_at, 423 | last_accessed_at, 424 | metadata 425 | from storage.objects 426 | where objects.name ilike $2 || $3 || ''%'' 427 | and bucket_id = $4 428 | and array_length(regexp_split_to_array(objects.name, ''/''), 1) = $1 429 | order by ' || v_order_by || ') 430 | limit $5 431 | offset $6' using levels, prefix, search, bucketname, limits, offsets; 432 | end; 433 | $_$; 434 | 435 | 436 | ALTER FUNCTION "storage"."search"("prefix" "text", "bucketname" "text", "limits" integer, "levels" integer, "offsets" integer, "search" "text", "sortcolumn" "text", "sortorder" "text") OWNER TO "supabase_storage_admin"; 437 | 438 | -- 439 | -- Name: update_updated_at_column(); Type: FUNCTION; Schema: storage; Owner: supabase_storage_admin 440 | -- 441 | 442 | CREATE FUNCTION "storage"."update_updated_at_column"() RETURNS "trigger" 443 | LANGUAGE "plpgsql" 444 | AS $$ 445 | BEGIN 446 | NEW.updated_at = now(); 447 | RETURN NEW; 448 | END; 449 | $$; 450 | 451 | 452 | ALTER FUNCTION "storage"."update_updated_at_column"() OWNER TO "supabase_storage_admin"; 453 | 454 | -- 455 | -- Name: secrets_encrypt_secret_secret(); Type: FUNCTION; Schema: vault; Owner: postgres 456 | -- 457 | 458 | CREATE OR REPLACE FUNCTION "vault"."secrets_encrypt_secret_secret"() RETURNS "trigger" 459 | LANGUAGE "plpgsql" 460 | AS $$ 461 | BEGIN 462 | new.secret = CASE WHEN new.secret IS NULL THEN NULL ELSE 463 | CASE WHEN new.key_id IS NULL THEN NULL ELSE pg_catalog.encode( 464 | pgsodium.crypto_aead_det_encrypt( 465 | pg_catalog.convert_to(new.secret, 'utf8'), 466 | pg_catalog.convert_to((new.id::text || new.description::text || new.created_at::text || new.updated_at::text)::text, 'utf8'), 467 | new.key_id::uuid, 468 | new.nonce 469 | ), 470 | 'base64') END END; 471 | RETURN new; 472 | END; 473 | $$; 474 | 475 | 476 | ALTER FUNCTION "vault"."secrets_encrypt_secret_secret"() OWNER TO "postgres"; 477 | 478 | SET default_tablespace = ''; 479 | 480 | SET default_table_access_method = "heap"; 481 | 482 | -- 483 | -- Name: extensions; Type: TABLE; Schema: _realtime; Owner: postgres 484 | -- 485 | 486 | CREATE TABLE "_realtime"."extensions" ( 487 | "id" "uuid" NOT NULL, 488 | "type" character varying(255), 489 | "settings" "jsonb", 490 | "tenant_external_id" character varying(255), 491 | "inserted_at" timestamp(0) without time zone NOT NULL, 492 | "updated_at" timestamp(0) without time zone NOT NULL 493 | ); 494 | 495 | 496 | ALTER TABLE "_realtime"."extensions" OWNER TO "postgres"; 497 | 498 | -- 499 | -- Name: schema_migrations; Type: TABLE; Schema: _realtime; Owner: postgres 500 | -- 501 | 502 | CREATE TABLE "_realtime"."schema_migrations" ( 503 | "version" bigint NOT NULL, 504 | "inserted_at" timestamp(0) without time zone 505 | ); 506 | 507 | 508 | ALTER TABLE "_realtime"."schema_migrations" OWNER TO "postgres"; 509 | 510 | -- 511 | -- Name: tenants; Type: TABLE; Schema: _realtime; Owner: postgres 512 | -- 513 | 514 | CREATE TABLE "_realtime"."tenants" ( 515 | "id" "uuid" NOT NULL, 516 | "name" character varying(255), 517 | "external_id" character varying(255), 518 | "jwt_secret" character varying(500), 519 | "max_concurrent_users" integer DEFAULT 200 NOT NULL, 520 | "inserted_at" timestamp(0) without time zone NOT NULL, 521 | "updated_at" timestamp(0) without time zone NOT NULL, 522 | "max_events_per_second" integer DEFAULT 100 NOT NULL, 523 | "postgres_cdc_default" character varying(255) DEFAULT 'postgres_cdc_rls'::character varying 524 | ); 525 | 526 | 527 | ALTER TABLE "_realtime"."tenants" OWNER TO "postgres"; 528 | 529 | -- 530 | -- Name: audit_log_entries; Type: TABLE; Schema: auth; Owner: supabase_auth_admin 531 | -- 532 | 533 | CREATE TABLE "auth"."audit_log_entries" ( 534 | "instance_id" "uuid", 535 | "id" "uuid" NOT NULL, 536 | "payload" "json", 537 | "created_at" timestamp with time zone, 538 | "ip_address" character varying(64) DEFAULT ''::character varying NOT NULL 539 | ); 540 | 541 | 542 | ALTER TABLE "auth"."audit_log_entries" OWNER TO "supabase_auth_admin"; 543 | 544 | -- 545 | -- Name: identities; Type: TABLE; Schema: auth; Owner: supabase_auth_admin 546 | -- 547 | 548 | CREATE TABLE "auth"."identities" ( 549 | "id" "text" NOT NULL, 550 | "user_id" "uuid" NOT NULL, 551 | "identity_data" "jsonb" NOT NULL, 552 | "provider" "text" NOT NULL, 553 | "last_sign_in_at" timestamp with time zone, 554 | "created_at" timestamp with time zone, 555 | "updated_at" timestamp with time zone 556 | ); 557 | 558 | 559 | ALTER TABLE "auth"."identities" OWNER TO "supabase_auth_admin"; 560 | 561 | -- 562 | -- Name: instances; Type: TABLE; Schema: auth; Owner: supabase_auth_admin 563 | -- 564 | 565 | CREATE TABLE "auth"."instances" ( 566 | "id" "uuid" NOT NULL, 567 | "uuid" "uuid", 568 | "raw_base_config" "text", 569 | "created_at" timestamp with time zone, 570 | "updated_at" timestamp with time zone 571 | ); 572 | 573 | 574 | ALTER TABLE "auth"."instances" OWNER TO "supabase_auth_admin"; 575 | 576 | -- 577 | -- Name: mfa_amr_claims; Type: TABLE; Schema: auth; Owner: supabase_auth_admin 578 | -- 579 | 580 | CREATE TABLE "auth"."mfa_amr_claims" ( 581 | "session_id" "uuid" NOT NULL, 582 | "created_at" timestamp with time zone NOT NULL, 583 | "updated_at" timestamp with time zone NOT NULL, 584 | "authentication_method" "text" NOT NULL, 585 | "id" "uuid" NOT NULL 586 | ); 587 | 588 | 589 | ALTER TABLE "auth"."mfa_amr_claims" OWNER TO "supabase_auth_admin"; 590 | 591 | -- 592 | -- Name: mfa_challenges; Type: TABLE; Schema: auth; Owner: supabase_auth_admin 593 | -- 594 | 595 | CREATE TABLE "auth"."mfa_challenges" ( 596 | "id" "uuid" NOT NULL, 597 | "factor_id" "uuid" NOT NULL, 598 | "created_at" timestamp with time zone NOT NULL, 599 | "verified_at" timestamp with time zone, 600 | "ip_address" "inet" NOT NULL 601 | ); 602 | 603 | 604 | ALTER TABLE "auth"."mfa_challenges" OWNER TO "supabase_auth_admin"; 605 | 606 | -- 607 | -- Name: mfa_factors; Type: TABLE; Schema: auth; Owner: supabase_auth_admin 608 | -- 609 | 610 | CREATE TABLE "auth"."mfa_factors" ( 611 | "id" "uuid" NOT NULL, 612 | "user_id" "uuid" NOT NULL, 613 | "friendly_name" "text", 614 | "factor_type" "auth"."factor_type" NOT NULL, 615 | "status" "auth"."factor_status" NOT NULL, 616 | "created_at" timestamp with time zone NOT NULL, 617 | "updated_at" timestamp with time zone NOT NULL, 618 | "secret" "text" 619 | ); 620 | 621 | 622 | ALTER TABLE "auth"."mfa_factors" OWNER TO "supabase_auth_admin"; 623 | 624 | -- 625 | -- Name: refresh_tokens; Type: TABLE; Schema: auth; Owner: supabase_auth_admin 626 | -- 627 | 628 | CREATE TABLE "auth"."refresh_tokens" ( 629 | "instance_id" "uuid", 630 | "id" bigint NOT NULL, 631 | "token" character varying(255), 632 | "user_id" character varying(255), 633 | "revoked" boolean, 634 | "created_at" timestamp with time zone, 635 | "updated_at" timestamp with time zone, 636 | "parent" character varying(255), 637 | "session_id" "uuid" 638 | ); 639 | 640 | 641 | ALTER TABLE "auth"."refresh_tokens" OWNER TO "supabase_auth_admin"; 642 | 643 | -- 644 | -- Name: refresh_tokens_id_seq; Type: SEQUENCE; Schema: auth; Owner: supabase_auth_admin 645 | -- 646 | 647 | CREATE SEQUENCE "auth"."refresh_tokens_id_seq" 648 | START WITH 1 649 | INCREMENT BY 1 650 | NO MINVALUE 651 | NO MAXVALUE 652 | CACHE 1; 653 | 654 | 655 | ALTER TABLE "auth"."refresh_tokens_id_seq" OWNER TO "supabase_auth_admin"; 656 | 657 | -- 658 | -- Name: refresh_tokens_id_seq; Type: SEQUENCE OWNED BY; Schema: auth; Owner: supabase_auth_admin 659 | -- 660 | 661 | ALTER SEQUENCE "auth"."refresh_tokens_id_seq" OWNED BY "auth"."refresh_tokens"."id"; 662 | 663 | 664 | -- 665 | -- Name: saml_providers; Type: TABLE; Schema: auth; Owner: supabase_auth_admin 666 | -- 667 | 668 | CREATE TABLE "auth"."saml_providers" ( 669 | "id" "uuid" NOT NULL, 670 | "sso_provider_id" "uuid" NOT NULL, 671 | "entity_id" "text" NOT NULL, 672 | "metadata_xml" "text" NOT NULL, 673 | "metadata_url" "text", 674 | "attribute_mapping" "jsonb", 675 | "created_at" timestamp with time zone, 676 | "updated_at" timestamp with time zone, 677 | CONSTRAINT "entity_id not empty" CHECK (("char_length"("entity_id") > 0)), 678 | CONSTRAINT "metadata_url not empty" CHECK ((("metadata_url" = NULL::"text") OR ("char_length"("metadata_url") > 0))), 679 | CONSTRAINT "metadata_xml not empty" CHECK (("char_length"("metadata_xml") > 0)) 680 | ); 681 | 682 | 683 | ALTER TABLE "auth"."saml_providers" OWNER TO "supabase_auth_admin"; 684 | 685 | -- 686 | -- Name: saml_relay_states; Type: TABLE; Schema: auth; Owner: supabase_auth_admin 687 | -- 688 | 689 | CREATE TABLE "auth"."saml_relay_states" ( 690 | "id" "uuid" NOT NULL, 691 | "sso_provider_id" "uuid" NOT NULL, 692 | "request_id" "text" NOT NULL, 693 | "for_email" "text", 694 | "redirect_to" "text", 695 | "from_ip_address" "inet", 696 | "created_at" timestamp with time zone, 697 | "updated_at" timestamp with time zone, 698 | CONSTRAINT "request_id not empty" CHECK (("char_length"("request_id") > 0)) 699 | ); 700 | 701 | 702 | ALTER TABLE "auth"."saml_relay_states" OWNER TO "supabase_auth_admin"; 703 | 704 | -- 705 | -- Name: schema_migrations; Type: TABLE; Schema: auth; Owner: supabase_auth_admin 706 | -- 707 | 708 | CREATE TABLE "auth"."schema_migrations" ( 709 | "version" character varying(255) NOT NULL 710 | ); 711 | 712 | 713 | ALTER TABLE "auth"."schema_migrations" OWNER TO "supabase_auth_admin"; 714 | 715 | -- 716 | -- Name: sessions; Type: TABLE; Schema: auth; Owner: supabase_auth_admin 717 | -- 718 | 719 | CREATE TABLE "auth"."sessions" ( 720 | "id" "uuid" NOT NULL, 721 | "user_id" "uuid" NOT NULL, 722 | "created_at" timestamp with time zone, 723 | "updated_at" timestamp with time zone, 724 | "factor_id" "uuid", 725 | "aal" "auth"."aal_level" 726 | ); 727 | 728 | 729 | ALTER TABLE "auth"."sessions" OWNER TO "supabase_auth_admin"; 730 | 731 | -- 732 | -- Name: sso_domains; Type: TABLE; Schema: auth; Owner: supabase_auth_admin 733 | -- 734 | 735 | CREATE TABLE "auth"."sso_domains" ( 736 | "id" "uuid" NOT NULL, 737 | "sso_provider_id" "uuid" NOT NULL, 738 | "domain" "text" NOT NULL, 739 | "created_at" timestamp with time zone, 740 | "updated_at" timestamp with time zone, 741 | CONSTRAINT "domain not empty" CHECK (("char_length"("domain") > 0)) 742 | ); 743 | 744 | 745 | ALTER TABLE "auth"."sso_domains" OWNER TO "supabase_auth_admin"; 746 | 747 | -- 748 | -- Name: sso_providers; Type: TABLE; Schema: auth; Owner: supabase_auth_admin 749 | -- 750 | 751 | CREATE TABLE "auth"."sso_providers" ( 752 | "id" "uuid" NOT NULL, 753 | "resource_id" "text", 754 | "created_at" timestamp with time zone, 755 | "updated_at" timestamp with time zone, 756 | CONSTRAINT "resource_id not empty" CHECK ((("resource_id" = NULL::"text") OR ("char_length"("resource_id") > 0))) 757 | ); 758 | 759 | 760 | ALTER TABLE "auth"."sso_providers" OWNER TO "supabase_auth_admin"; 761 | 762 | -- 763 | -- Name: sso_sessions; Type: TABLE; Schema: auth; Owner: supabase_auth_admin 764 | -- 765 | 766 | CREATE TABLE "auth"."sso_sessions" ( 767 | "id" "uuid" NOT NULL, 768 | "session_id" "uuid" NOT NULL, 769 | "sso_provider_id" "uuid", 770 | "not_before" timestamp with time zone, 771 | "not_after" timestamp with time zone, 772 | "idp_initiated" boolean DEFAULT false, 773 | "created_at" timestamp with time zone, 774 | "updated_at" timestamp with time zone 775 | ); 776 | 777 | 778 | ALTER TABLE "auth"."sso_sessions" OWNER TO "supabase_auth_admin"; 779 | 780 | -- 781 | -- Name: users; Type: TABLE; Schema: auth; Owner: supabase_auth_admin 782 | -- 783 | 784 | CREATE TABLE "auth"."users" ( 785 | "instance_id" "uuid", 786 | "id" "uuid" NOT NULL, 787 | "aud" character varying(255), 788 | "role" character varying(255), 789 | "email" character varying(255), 790 | "encrypted_password" character varying(255), 791 | "email_confirmed_at" timestamp with time zone, 792 | "invited_at" timestamp with time zone, 793 | "confirmation_token" character varying(255), 794 | "confirmation_sent_at" timestamp with time zone, 795 | "recovery_token" character varying(255), 796 | "recovery_sent_at" timestamp with time zone, 797 | "email_change_token_new" character varying(255), 798 | "email_change" character varying(255), 799 | "email_change_sent_at" timestamp with time zone, 800 | "last_sign_in_at" timestamp with time zone, 801 | "raw_app_meta_data" "jsonb", 802 | "raw_user_meta_data" "jsonb", 803 | "is_super_admin" boolean, 804 | "created_at" timestamp with time zone, 805 | "updated_at" timestamp with time zone, 806 | "phone" character varying(15) DEFAULT NULL::character varying, 807 | "phone_confirmed_at" timestamp with time zone, 808 | "phone_change" character varying(15) DEFAULT ''::character varying, 809 | "phone_change_token" character varying(255) DEFAULT ''::character varying, 810 | "phone_change_sent_at" timestamp with time zone, 811 | "confirmed_at" timestamp with time zone GENERATED ALWAYS AS (LEAST("email_confirmed_at", "phone_confirmed_at")) STORED, 812 | "email_change_token_current" character varying(255) DEFAULT ''::character varying, 813 | "email_change_confirm_status" smallint DEFAULT 0, 814 | "banned_until" timestamp with time zone, 815 | "reauthentication_token" character varying(255) DEFAULT ''::character varying, 816 | "reauthentication_sent_at" timestamp with time zone, 817 | CONSTRAINT "users_email_change_confirm_status_check" CHECK ((("email_change_confirm_status" >= 0) AND ("email_change_confirm_status" <= 2))) 818 | ); 819 | 820 | 821 | ALTER TABLE "auth"."users" OWNER TO "supabase_auth_admin"; 822 | 823 | -- 824 | -- Name: boards; Type: TABLE; Schema: public; Owner: postgres 825 | -- 826 | 827 | CREATE TABLE "public"."boards" ( 828 | "id" bigint NOT NULL, 829 | "user_id" "uuid" DEFAULT "auth"."uid"() NOT NULL, 830 | "title" "text" DEFAULT ''::"text", 831 | "position" integer DEFAULT 0 NOT NULL, 832 | "inserted_at" timestamp with time zone DEFAULT "timezone"('utc'::"text", "now"()) NOT NULL 833 | ); 834 | 835 | 836 | ALTER TABLE "public"."boards" OWNER TO "postgres"; 837 | 838 | -- 839 | -- Name: boards_id_seq; Type: SEQUENCE; Schema: public; Owner: postgres 840 | -- 841 | 842 | ALTER TABLE "public"."boards" ALTER COLUMN "id" ADD GENERATED BY DEFAULT AS IDENTITY ( 843 | SEQUENCE NAME "public"."boards_id_seq" 844 | START WITH 1 845 | INCREMENT BY 1 846 | NO MINVALUE 847 | NO MAXVALUE 848 | CACHE 1 849 | ); 850 | 851 | 852 | -- 853 | -- Name: cards; Type: TABLE; Schema: public; Owner: postgres 854 | -- 855 | 856 | CREATE TABLE "public"."cards" ( 857 | "id" bigint NOT NULL, 858 | "user_id" "uuid" DEFAULT "auth"."uid"() NOT NULL, 859 | "list_id" bigint NOT NULL, 860 | "position" integer DEFAULT 0 NOT NULL, 861 | "description" "text", 862 | "completed_at" timestamp with time zone, 863 | "inserted_at" timestamp with time zone DEFAULT "timezone"('utc'::"text", "now"()) NOT NULL, 864 | CONSTRAINT "cards_description_check" CHECK (("char_length"("description") > 0)) 865 | ); 866 | 867 | 868 | ALTER TABLE "public"."cards" OWNER TO "postgres"; 869 | 870 | -- 871 | -- Name: cards_id_seq; Type: SEQUENCE; Schema: public; Owner: postgres 872 | -- 873 | 874 | ALTER TABLE "public"."cards" ALTER COLUMN "id" ADD GENERATED BY DEFAULT AS IDENTITY ( 875 | SEQUENCE NAME "public"."cards_id_seq" 876 | START WITH 1 877 | INCREMENT BY 1 878 | NO MINVALUE 879 | NO MAXVALUE 880 | CACHE 1 881 | ); 882 | 883 | 884 | -- 885 | -- Name: lists; Type: TABLE; Schema: public; Owner: postgres 886 | -- 887 | 888 | CREATE TABLE "public"."lists" ( 889 | "id" bigint NOT NULL, 890 | "user_id" "uuid" DEFAULT "auth"."uid"() NOT NULL, 891 | "board_id" bigint NOT NULL, 892 | "title" "text" DEFAULT ''::"text", 893 | "position" integer DEFAULT 0 NOT NULL, 894 | "inserted_at" timestamp with time zone DEFAULT "timezone"('utc'::"text", "now"()) NOT NULL 895 | ); 896 | 897 | 898 | ALTER TABLE "public"."lists" OWNER TO "postgres"; 899 | 900 | -- 901 | -- Name: lists_id_seq; Type: SEQUENCE; Schema: public; Owner: postgres 902 | -- 903 | 904 | ALTER TABLE "public"."lists" ALTER COLUMN "id" ADD GENERATED BY DEFAULT AS IDENTITY ( 905 | SEQUENCE NAME "public"."lists_id_seq" 906 | START WITH 1 907 | INCREMENT BY 1 908 | NO MINVALUE 909 | NO MAXVALUE 910 | CACHE 1 911 | ); 912 | 913 | 914 | -- 915 | -- Name: buckets; Type: TABLE; Schema: storage; Owner: supabase_storage_admin 916 | -- 917 | 918 | CREATE TABLE "storage"."buckets" ( 919 | "id" "text" NOT NULL, 920 | "name" "text" NOT NULL, 921 | "owner" "uuid", 922 | "created_at" timestamp with time zone DEFAULT "now"(), 923 | "updated_at" timestamp with time zone DEFAULT "now"(), 924 | "public" boolean DEFAULT false 925 | ); 926 | 927 | 928 | ALTER TABLE "storage"."buckets" OWNER TO "supabase_storage_admin"; 929 | 930 | -- 931 | -- Name: migrations; Type: TABLE; Schema: storage; Owner: supabase_storage_admin 932 | -- 933 | 934 | CREATE TABLE "storage"."migrations" ( 935 | "id" integer NOT NULL, 936 | "name" character varying(100) NOT NULL, 937 | "hash" character varying(40) NOT NULL, 938 | "executed_at" timestamp without time zone DEFAULT CURRENT_TIMESTAMP 939 | ); 940 | 941 | 942 | ALTER TABLE "storage"."migrations" OWNER TO "supabase_storage_admin"; 943 | 944 | -- 945 | -- Name: objects; Type: TABLE; Schema: storage; Owner: supabase_storage_admin 946 | -- 947 | 948 | CREATE TABLE "storage"."objects" ( 949 | "id" "uuid" DEFAULT "extensions"."uuid_generate_v4"() NOT NULL, 950 | "bucket_id" "text", 951 | "name" "text", 952 | "owner" "uuid", 953 | "created_at" timestamp with time zone DEFAULT "now"(), 954 | "updated_at" timestamp with time zone DEFAULT "now"(), 955 | "last_accessed_at" timestamp with time zone DEFAULT "now"(), 956 | "metadata" "jsonb", 957 | "path_tokens" "text"[] GENERATED ALWAYS AS ("string_to_array"("name", '/'::"text")) STORED 958 | ); 959 | 960 | 961 | ALTER TABLE "storage"."objects" OWNER TO "supabase_storage_admin"; 962 | 963 | -- 964 | -- Name: decrypted_secrets; Type: VIEW; Schema: vault; Owner: postgres 965 | -- 966 | 967 | CREATE OR REPLACE VIEW "vault"."decrypted_secrets" AS 968 | SELECT "secrets"."id", 969 | "secrets"."name", 970 | "secrets"."description", 971 | "secrets"."secret", 972 | CASE 973 | WHEN ("secrets"."secret" IS NULL) THEN NULL::"text" 974 | ELSE 975 | CASE 976 | WHEN ("secrets"."key_id" IS NULL) THEN NULL::"text" 977 | ELSE "convert_from"("pgsodium"."crypto_aead_det_decrypt"("decode"("secrets"."secret", 'base64'::"text"), "convert_to"((((("secrets"."id")::"text" || "secrets"."description") || ("secrets"."created_at")::"text") || ("secrets"."updated_at")::"text"), 'utf8'::"name"), "secrets"."key_id", "secrets"."nonce"), 'utf8'::"name") 978 | END 979 | END AS "decrypted_secret", 980 | "secrets"."key_id", 981 | "secrets"."nonce", 982 | "secrets"."created_at", 983 | "secrets"."updated_at" 984 | FROM "vault"."secrets"; 985 | 986 | 987 | ALTER TABLE "vault"."decrypted_secrets" OWNER TO "postgres"; 988 | 989 | -- 990 | -- Name: refresh_tokens id; Type: DEFAULT; Schema: auth; Owner: supabase_auth_admin 991 | -- 992 | 993 | ALTER TABLE ONLY "auth"."refresh_tokens" ALTER COLUMN "id" SET DEFAULT "nextval"('"auth"."refresh_tokens_id_seq"'::"regclass"); 994 | 995 | 996 | -- 997 | -- Data for Name: extensions; Type: TABLE DATA; Schema: _realtime; Owner: postgres 998 | -- 999 | 1000 | INSERT INTO "_realtime"."extensions" ("id", "type", "settings", "tenant_external_id", "inserted_at", "updated_at") VALUES ('935b3773-e37c-4b3e-baa1-2309ddb697cf', 'postgres_cdc_rls', '{"region": "us-east-1", "db_host": "I4YigNuoYSZbe+Xs4vInbw==", "db_name": "sWBpZNdjggEPTQVlI52Zfw==", "db_port": "MqmbZ5ZiXXFlSy8FeFYPAQ==", "db_user": "sWBpZNdjggEPTQVlI52Zfw==", "slot_name": "supabase_realtime_replication_slot", "ip_version": 4, "db_password": "sWBpZNdjggEPTQVlI52Zfw==", "publication": "supabase_realtime", "poll_interval_ms": 100, "poll_max_changes": 100, "poll_max_record_bytes": 1048576}', 'realtime-demo', '2022-11-14 23:04:49', '2022-11-14 23:04:49'); 1001 | 1002 | 1003 | -- 1004 | -- Data for Name: schema_migrations; Type: TABLE DATA; Schema: _realtime; Owner: postgres 1005 | -- 1006 | 1007 | INSERT INTO "_realtime"."schema_migrations" ("version", "inserted_at") VALUES (20210706140551, '2022-12-15 04:27:09'); 1008 | INSERT INTO "_realtime"."schema_migrations" ("version", "inserted_at") VALUES (20220329161857, '2022-12-15 04:27:09'); 1009 | INSERT INTO "_realtime"."schema_migrations" ("version", "inserted_at") VALUES (20220410212326, '2022-12-15 04:27:09'); 1010 | INSERT INTO "_realtime"."schema_migrations" ("version", "inserted_at") VALUES (20220506102948, '2022-12-15 04:27:09'); 1011 | INSERT INTO "_realtime"."schema_migrations" ("version", "inserted_at") VALUES (20220527210857, '2022-12-15 04:27:09'); 1012 | INSERT INTO "_realtime"."schema_migrations" ("version", "inserted_at") VALUES (20220815211129, '2022-12-15 04:27:09'); 1013 | INSERT INTO "_realtime"."schema_migrations" ("version", "inserted_at") VALUES (20220815215024, '2022-12-15 04:27:09'); 1014 | INSERT INTO "_realtime"."schema_migrations" ("version", "inserted_at") VALUES (20220818141501, '2022-12-15 04:27:09'); 1015 | INSERT INTO "_realtime"."schema_migrations" ("version", "inserted_at") VALUES (20221018173709, '2022-12-15 04:27:09'); 1016 | INSERT INTO "_realtime"."schema_migrations" ("version", "inserted_at") VALUES (20221102172703, '2022-12-15 04:27:09'); 1017 | 1018 | 1019 | -- 1020 | -- Data for Name: tenants; Type: TABLE DATA; Schema: _realtime; Owner: postgres 1021 | -- 1022 | 1023 | INSERT INTO "_realtime"."tenants" ("id", "name", "external_id", "jwt_secret", "max_concurrent_users", "inserted_at", "updated_at", "max_events_per_second", "postgres_cdc_default") VALUES ('98d09d90-612d-4a69-8c84-e8e5ecbaed6d', 'realtime-demo', 'realtime-demo', 'iNjicxc4+llvc9wovDvqymwfnj9teWMlyOIbJ8Fh6j2WNU8CIJ2ZgjR6MUIKqSmeDmvpsKLsZ9jgXJmQPpwL8w==', 300, '2022-11-14 23:04:49', '2022-11-14 23:04:49', 100, 'postgres_cdc_rls'); 1024 | 1025 | 1026 | -- 1027 | -- Data for Name: audit_log_entries; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin 1028 | -- 1029 | 1030 | 1031 | 1032 | -- 1033 | -- Data for Name: identities; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin 1034 | -- 1035 | 1036 | 1037 | 1038 | -- 1039 | -- Data for Name: instances; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin 1040 | -- 1041 | 1042 | 1043 | 1044 | -- 1045 | -- Data for Name: mfa_amr_claims; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin 1046 | -- 1047 | 1048 | 1049 | 1050 | -- 1051 | -- Data for Name: mfa_challenges; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin 1052 | -- 1053 | 1054 | 1055 | 1056 | -- 1057 | -- Data for Name: mfa_factors; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin 1058 | -- 1059 | 1060 | 1061 | 1062 | -- 1063 | -- Data for Name: refresh_tokens; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin 1064 | -- 1065 | 1066 | 1067 | 1068 | -- 1069 | -- Data for Name: saml_providers; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin 1070 | -- 1071 | 1072 | 1073 | 1074 | -- 1075 | -- Data for Name: saml_relay_states; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin 1076 | -- 1077 | 1078 | 1079 | 1080 | -- 1081 | -- Data for Name: schema_migrations; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin 1082 | -- 1083 | 1084 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20171026211738'); 1085 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20171026211808'); 1086 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20171026211834'); 1087 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20180103212743'); 1088 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20180108183307'); 1089 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20180119214651'); 1090 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20180125194653'); 1091 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('00'); 1092 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20210710035447'); 1093 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20210722035447'); 1094 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20210730183235'); 1095 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20210909172000'); 1096 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20210927181326'); 1097 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20211122151130'); 1098 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20211124214934'); 1099 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20211202183645'); 1100 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20220114185221'); 1101 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20220114185340'); 1102 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20220224000811'); 1103 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20220323170000'); 1104 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20220429102000'); 1105 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20220531120530'); 1106 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20220614074223'); 1107 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20220811173540'); 1108 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20221003041349'); 1109 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20221003041400'); 1110 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20221011041400'); 1111 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20221020193600'); 1112 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20221021073300'); 1113 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20221021082433'); 1114 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20221027105023'); 1115 | 1116 | 1117 | -- 1118 | -- Data for Name: sessions; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin 1119 | -- 1120 | 1121 | 1122 | 1123 | -- 1124 | -- Data for Name: sso_domains; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin 1125 | -- 1126 | 1127 | 1128 | 1129 | -- 1130 | -- Data for Name: sso_providers; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin 1131 | -- 1132 | 1133 | 1134 | 1135 | -- 1136 | -- Data for Name: sso_sessions; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin 1137 | -- 1138 | 1139 | 1140 | 1141 | -- 1142 | -- Data for Name: users; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin 1143 | -- 1144 | 1145 | 1146 | 1147 | -- 1148 | -- Data for Name: boards; Type: TABLE DATA; Schema: public; Owner: postgres 1149 | -- 1150 | 1151 | 1152 | 1153 | -- 1154 | -- Data for Name: cards; Type: TABLE DATA; Schema: public; Owner: postgres 1155 | -- 1156 | 1157 | 1158 | 1159 | -- 1160 | -- Data for Name: lists; Type: TABLE DATA; Schema: public; Owner: postgres 1161 | -- 1162 | 1163 | 1164 | 1165 | -- 1166 | -- Data for Name: buckets; Type: TABLE DATA; Schema: storage; Owner: supabase_storage_admin 1167 | -- 1168 | 1169 | 1170 | 1171 | -- 1172 | -- Data for Name: migrations; Type: TABLE DATA; Schema: storage; Owner: supabase_storage_admin 1173 | -- 1174 | 1175 | INSERT INTO "storage"."migrations" ("id", "name", "hash", "executed_at") VALUES (0, 'create-migrations-table', 'e18db593bcde2aca2a408c4d1100f6abba2195df', '2022-12-14 17:16:56.385073'); 1176 | INSERT INTO "storage"."migrations" ("id", "name", "hash", "executed_at") VALUES (1, 'initialmigration', '6ab16121fbaa08bbd11b712d05f358f9b555d777', '2022-12-14 17:16:56.393739'); 1177 | INSERT INTO "storage"."migrations" ("id", "name", "hash", "executed_at") VALUES (2, 'pathtoken-column', '49756be03be4c17bb85fe70d4a861f27de7e49ad', '2022-12-14 17:16:56.398583'); 1178 | INSERT INTO "storage"."migrations" ("id", "name", "hash", "executed_at") VALUES (3, 'add-migrations-rls', 'bb5d124c53d68635a883e399426c6a5a25fc893d', '2022-12-14 17:16:56.429952'); 1179 | INSERT INTO "storage"."migrations" ("id", "name", "hash", "executed_at") VALUES (4, 'add-size-functions', '6d79007d04f5acd288c9c250c42d2d5fd286c54d', '2022-12-14 17:16:56.443332'); 1180 | INSERT INTO "storage"."migrations" ("id", "name", "hash", "executed_at") VALUES (5, 'change-column-name-in-get-size', 'fd65688505d2ffa9fbdc58a944348dd8604d688c', '2022-12-14 17:16:56.452704'); 1181 | INSERT INTO "storage"."migrations" ("id", "name", "hash", "executed_at") VALUES (6, 'add-rls-to-buckets', '63e2bab75a2040fee8e3fb3f15a0d26f3380e9b6', '2022-12-14 17:16:56.459977'); 1182 | INSERT INTO "storage"."migrations" ("id", "name", "hash", "executed_at") VALUES (7, 'add-public-to-buckets', '82568934f8a4d9e0a85f126f6fb483ad8214c418', '2022-12-14 17:16:56.467924'); 1183 | INSERT INTO "storage"."migrations" ("id", "name", "hash", "executed_at") VALUES (8, 'fix-search-function', '1a43a40eddb525f2e2f26efd709e6c06e58e059c', '2022-12-14 17:16:56.472925'); 1184 | INSERT INTO "storage"."migrations" ("id", "name", "hash", "executed_at") VALUES (9, 'search-files-search-function', '34c096597eb8b9d077fdfdde9878c88501b2fafc', '2022-12-14 17:16:56.4773'); 1185 | INSERT INTO "storage"."migrations" ("id", "name", "hash", "executed_at") VALUES (10, 'add-trigger-to-auto-update-updated_at-column', '37d6bb964a70a822e6d37f22f457b9bca7885928', '2022-12-14 17:16:56.486363'); 1186 | 1187 | 1188 | -- 1189 | -- Data for Name: objects; Type: TABLE DATA; Schema: storage; Owner: supabase_storage_admin 1190 | -- 1191 | 1192 | 1193 | 1194 | -- 1195 | -- Data for Name: secrets; Type: TABLE DATA; Schema: vault; Owner: postgres 1196 | -- 1197 | 1198 | 1199 | 1200 | -- 1201 | -- Name: refresh_tokens_id_seq; Type: SEQUENCE SET; Schema: auth; Owner: supabase_auth_admin 1202 | -- 1203 | 1204 | SELECT pg_catalog.setval('"auth"."refresh_tokens_id_seq"', 1, false); 1205 | 1206 | 1207 | -- 1208 | -- Name: boards_id_seq; Type: SEQUENCE SET; Schema: public; Owner: postgres 1209 | -- 1210 | 1211 | SELECT pg_catalog.setval('"public"."boards_id_seq"', 1, false); 1212 | 1213 | 1214 | -- 1215 | -- Name: cards_id_seq; Type: SEQUENCE SET; Schema: public; Owner: postgres 1216 | -- 1217 | 1218 | SELECT pg_catalog.setval('"public"."cards_id_seq"', 1, false); 1219 | 1220 | 1221 | -- 1222 | -- Name: lists_id_seq; Type: SEQUENCE SET; Schema: public; Owner: postgres 1223 | -- 1224 | 1225 | SELECT pg_catalog.setval('"public"."lists_id_seq"', 1, false); 1226 | 1227 | 1228 | -- 1229 | -- Name: extensions extensions_pkey; Type: CONSTRAINT; Schema: _realtime; Owner: postgres 1230 | -- 1231 | 1232 | ALTER TABLE ONLY "_realtime"."extensions" 1233 | ADD CONSTRAINT "extensions_pkey" PRIMARY KEY ("id"); 1234 | 1235 | 1236 | -- 1237 | -- Name: schema_migrations schema_migrations_pkey; Type: CONSTRAINT; Schema: _realtime; Owner: postgres 1238 | -- 1239 | 1240 | ALTER TABLE ONLY "_realtime"."schema_migrations" 1241 | ADD CONSTRAINT "schema_migrations_pkey" PRIMARY KEY ("version"); 1242 | 1243 | 1244 | -- 1245 | -- Name: tenants tenants_pkey; Type: CONSTRAINT; Schema: _realtime; Owner: postgres 1246 | -- 1247 | 1248 | ALTER TABLE ONLY "_realtime"."tenants" 1249 | ADD CONSTRAINT "tenants_pkey" PRIMARY KEY ("id"); 1250 | 1251 | 1252 | -- 1253 | -- Name: tenants uniq_external_id; Type: CONSTRAINT; Schema: _realtime; Owner: postgres 1254 | -- 1255 | 1256 | ALTER TABLE ONLY "_realtime"."tenants" 1257 | ADD CONSTRAINT "uniq_external_id" UNIQUE ("external_id"); 1258 | 1259 | 1260 | -- 1261 | -- Name: mfa_amr_claims amr_id_pk; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1262 | -- 1263 | 1264 | ALTER TABLE ONLY "auth"."mfa_amr_claims" 1265 | ADD CONSTRAINT "amr_id_pk" PRIMARY KEY ("id"); 1266 | 1267 | 1268 | -- 1269 | -- Name: audit_log_entries audit_log_entries_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1270 | -- 1271 | 1272 | ALTER TABLE ONLY "auth"."audit_log_entries" 1273 | ADD CONSTRAINT "audit_log_entries_pkey" PRIMARY KEY ("id"); 1274 | 1275 | 1276 | -- 1277 | -- Name: identities identities_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1278 | -- 1279 | 1280 | ALTER TABLE ONLY "auth"."identities" 1281 | ADD CONSTRAINT "identities_pkey" PRIMARY KEY ("provider", "id"); 1282 | 1283 | 1284 | -- 1285 | -- Name: instances instances_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1286 | -- 1287 | 1288 | ALTER TABLE ONLY "auth"."instances" 1289 | ADD CONSTRAINT "instances_pkey" PRIMARY KEY ("id"); 1290 | 1291 | 1292 | -- 1293 | -- Name: mfa_amr_claims mfa_amr_claims_session_id_authentication_method_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1294 | -- 1295 | 1296 | ALTER TABLE ONLY "auth"."mfa_amr_claims" 1297 | ADD CONSTRAINT "mfa_amr_claims_session_id_authentication_method_pkey" UNIQUE ("session_id", "authentication_method"); 1298 | 1299 | 1300 | -- 1301 | -- Name: mfa_challenges mfa_challenges_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1302 | -- 1303 | 1304 | ALTER TABLE ONLY "auth"."mfa_challenges" 1305 | ADD CONSTRAINT "mfa_challenges_pkey" PRIMARY KEY ("id"); 1306 | 1307 | 1308 | -- 1309 | -- Name: mfa_factors mfa_factors_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1310 | -- 1311 | 1312 | ALTER TABLE ONLY "auth"."mfa_factors" 1313 | ADD CONSTRAINT "mfa_factors_pkey" PRIMARY KEY ("id"); 1314 | 1315 | 1316 | -- 1317 | -- Name: refresh_tokens refresh_tokens_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1318 | -- 1319 | 1320 | ALTER TABLE ONLY "auth"."refresh_tokens" 1321 | ADD CONSTRAINT "refresh_tokens_pkey" PRIMARY KEY ("id"); 1322 | 1323 | 1324 | -- 1325 | -- Name: refresh_tokens refresh_tokens_token_unique; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1326 | -- 1327 | 1328 | ALTER TABLE ONLY "auth"."refresh_tokens" 1329 | ADD CONSTRAINT "refresh_tokens_token_unique" UNIQUE ("token"); 1330 | 1331 | 1332 | -- 1333 | -- Name: saml_providers saml_providers_entity_id_key; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1334 | -- 1335 | 1336 | ALTER TABLE ONLY "auth"."saml_providers" 1337 | ADD CONSTRAINT "saml_providers_entity_id_key" UNIQUE ("entity_id"); 1338 | 1339 | 1340 | -- 1341 | -- Name: saml_providers saml_providers_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1342 | -- 1343 | 1344 | ALTER TABLE ONLY "auth"."saml_providers" 1345 | ADD CONSTRAINT "saml_providers_pkey" PRIMARY KEY ("id"); 1346 | 1347 | 1348 | -- 1349 | -- Name: saml_relay_states saml_relay_states_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1350 | -- 1351 | 1352 | ALTER TABLE ONLY "auth"."saml_relay_states" 1353 | ADD CONSTRAINT "saml_relay_states_pkey" PRIMARY KEY ("id"); 1354 | 1355 | 1356 | -- 1357 | -- Name: schema_migrations schema_migrations_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1358 | -- 1359 | 1360 | ALTER TABLE ONLY "auth"."schema_migrations" 1361 | ADD CONSTRAINT "schema_migrations_pkey" PRIMARY KEY ("version"); 1362 | 1363 | 1364 | -- 1365 | -- Name: sessions sessions_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1366 | -- 1367 | 1368 | ALTER TABLE ONLY "auth"."sessions" 1369 | ADD CONSTRAINT "sessions_pkey" PRIMARY KEY ("id"); 1370 | 1371 | 1372 | -- 1373 | -- Name: sso_domains sso_domains_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1374 | -- 1375 | 1376 | ALTER TABLE ONLY "auth"."sso_domains" 1377 | ADD CONSTRAINT "sso_domains_pkey" PRIMARY KEY ("id"); 1378 | 1379 | 1380 | -- 1381 | -- Name: sso_providers sso_providers_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1382 | -- 1383 | 1384 | ALTER TABLE ONLY "auth"."sso_providers" 1385 | ADD CONSTRAINT "sso_providers_pkey" PRIMARY KEY ("id"); 1386 | 1387 | 1388 | -- 1389 | -- Name: sso_sessions sso_sessions_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1390 | -- 1391 | 1392 | ALTER TABLE ONLY "auth"."sso_sessions" 1393 | ADD CONSTRAINT "sso_sessions_pkey" PRIMARY KEY ("id"); 1394 | 1395 | 1396 | -- 1397 | -- Name: users users_email_key; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1398 | -- 1399 | 1400 | ALTER TABLE ONLY "auth"."users" 1401 | ADD CONSTRAINT "users_email_key" UNIQUE ("email"); 1402 | 1403 | 1404 | -- 1405 | -- Name: users users_phone_key; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1406 | -- 1407 | 1408 | ALTER TABLE ONLY "auth"."users" 1409 | ADD CONSTRAINT "users_phone_key" UNIQUE ("phone"); 1410 | 1411 | 1412 | -- 1413 | -- Name: users users_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1414 | -- 1415 | 1416 | ALTER TABLE ONLY "auth"."users" 1417 | ADD CONSTRAINT "users_pkey" PRIMARY KEY ("id"); 1418 | 1419 | 1420 | -- 1421 | -- Name: boards boards_pkey; Type: CONSTRAINT; Schema: public; Owner: postgres 1422 | -- 1423 | 1424 | ALTER TABLE ONLY "public"."boards" 1425 | ADD CONSTRAINT "boards_pkey" PRIMARY KEY ("id"); 1426 | 1427 | 1428 | -- 1429 | -- Name: cards cards_pkey; Type: CONSTRAINT; Schema: public; Owner: postgres 1430 | -- 1431 | 1432 | ALTER TABLE ONLY "public"."cards" 1433 | ADD CONSTRAINT "cards_pkey" PRIMARY KEY ("id"); 1434 | 1435 | 1436 | -- 1437 | -- Name: lists lists_pkey; Type: CONSTRAINT; Schema: public; Owner: postgres 1438 | -- 1439 | 1440 | ALTER TABLE ONLY "public"."lists" 1441 | ADD CONSTRAINT "lists_pkey" PRIMARY KEY ("id"); 1442 | 1443 | 1444 | -- 1445 | -- Name: buckets buckets_pkey; Type: CONSTRAINT; Schema: storage; Owner: supabase_storage_admin 1446 | -- 1447 | 1448 | ALTER TABLE ONLY "storage"."buckets" 1449 | ADD CONSTRAINT "buckets_pkey" PRIMARY KEY ("id"); 1450 | 1451 | 1452 | -- 1453 | -- Name: migrations migrations_name_key; Type: CONSTRAINT; Schema: storage; Owner: supabase_storage_admin 1454 | -- 1455 | 1456 | ALTER TABLE ONLY "storage"."migrations" 1457 | ADD CONSTRAINT "migrations_name_key" UNIQUE ("name"); 1458 | 1459 | 1460 | -- 1461 | -- Name: migrations migrations_pkey; Type: CONSTRAINT; Schema: storage; Owner: supabase_storage_admin 1462 | -- 1463 | 1464 | ALTER TABLE ONLY "storage"."migrations" 1465 | ADD CONSTRAINT "migrations_pkey" PRIMARY KEY ("id"); 1466 | 1467 | 1468 | -- 1469 | -- Name: objects objects_pkey; Type: CONSTRAINT; Schema: storage; Owner: supabase_storage_admin 1470 | -- 1471 | 1472 | ALTER TABLE ONLY "storage"."objects" 1473 | ADD CONSTRAINT "objects_pkey" PRIMARY KEY ("id"); 1474 | 1475 | 1476 | -- 1477 | -- Name: extensions_tenant_external_id_type_index; Type: INDEX; Schema: _realtime; Owner: postgres 1478 | -- 1479 | 1480 | CREATE UNIQUE INDEX "extensions_tenant_external_id_type_index" ON "_realtime"."extensions" USING "btree" ("tenant_external_id", "type"); 1481 | 1482 | 1483 | -- 1484 | -- Name: tenants_external_id_index; Type: INDEX; Schema: _realtime; Owner: postgres 1485 | -- 1486 | 1487 | CREATE UNIQUE INDEX "tenants_external_id_index" ON "_realtime"."tenants" USING "btree" ("external_id"); 1488 | 1489 | 1490 | -- 1491 | -- Name: audit_logs_instance_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1492 | -- 1493 | 1494 | CREATE INDEX "audit_logs_instance_id_idx" ON "auth"."audit_log_entries" USING "btree" ("instance_id"); 1495 | 1496 | 1497 | -- 1498 | -- Name: confirmation_token_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1499 | -- 1500 | 1501 | CREATE UNIQUE INDEX "confirmation_token_idx" ON "auth"."users" USING "btree" ("confirmation_token") WHERE (("confirmation_token")::"text" !~ '^[0-9 ]*$'::"text"); 1502 | 1503 | 1504 | -- 1505 | -- Name: email_change_token_current_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1506 | -- 1507 | 1508 | CREATE UNIQUE INDEX "email_change_token_current_idx" ON "auth"."users" USING "btree" ("email_change_token_current") WHERE (("email_change_token_current")::"text" !~ '^[0-9 ]*$'::"text"); 1509 | 1510 | 1511 | -- 1512 | -- Name: email_change_token_new_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1513 | -- 1514 | 1515 | CREATE UNIQUE INDEX "email_change_token_new_idx" ON "auth"."users" USING "btree" ("email_change_token_new") WHERE (("email_change_token_new")::"text" !~ '^[0-9 ]*$'::"text"); 1516 | 1517 | 1518 | -- 1519 | -- Name: factor_id_created_at_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1520 | -- 1521 | 1522 | CREATE INDEX "factor_id_created_at_idx" ON "auth"."mfa_factors" USING "btree" ("user_id", "created_at"); 1523 | 1524 | 1525 | -- 1526 | -- Name: identities_user_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1527 | -- 1528 | 1529 | CREATE INDEX "identities_user_id_idx" ON "auth"."identities" USING "btree" ("user_id"); 1530 | 1531 | 1532 | -- 1533 | -- Name: mfa_factors_user_friendly_name_unique; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1534 | -- 1535 | 1536 | CREATE UNIQUE INDEX "mfa_factors_user_friendly_name_unique" ON "auth"."mfa_factors" USING "btree" ("friendly_name", "user_id") WHERE (TRIM(BOTH FROM "friendly_name") <> ''::"text"); 1537 | 1538 | 1539 | -- 1540 | -- Name: reauthentication_token_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1541 | -- 1542 | 1543 | CREATE UNIQUE INDEX "reauthentication_token_idx" ON "auth"."users" USING "btree" ("reauthentication_token") WHERE (("reauthentication_token")::"text" !~ '^[0-9 ]*$'::"text"); 1544 | 1545 | 1546 | -- 1547 | -- Name: recovery_token_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1548 | -- 1549 | 1550 | CREATE UNIQUE INDEX "recovery_token_idx" ON "auth"."users" USING "btree" ("recovery_token") WHERE (("recovery_token")::"text" !~ '^[0-9 ]*$'::"text"); 1551 | 1552 | 1553 | -- 1554 | -- Name: refresh_token_session_id; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1555 | -- 1556 | 1557 | CREATE INDEX "refresh_token_session_id" ON "auth"."refresh_tokens" USING "btree" ("session_id"); 1558 | 1559 | 1560 | -- 1561 | -- Name: refresh_tokens_instance_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1562 | -- 1563 | 1564 | CREATE INDEX "refresh_tokens_instance_id_idx" ON "auth"."refresh_tokens" USING "btree" ("instance_id"); 1565 | 1566 | 1567 | -- 1568 | -- Name: refresh_tokens_instance_id_user_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1569 | -- 1570 | 1571 | CREATE INDEX "refresh_tokens_instance_id_user_id_idx" ON "auth"."refresh_tokens" USING "btree" ("instance_id", "user_id"); 1572 | 1573 | 1574 | -- 1575 | -- Name: refresh_tokens_parent_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1576 | -- 1577 | 1578 | CREATE INDEX "refresh_tokens_parent_idx" ON "auth"."refresh_tokens" USING "btree" ("parent"); 1579 | 1580 | 1581 | -- 1582 | -- Name: refresh_tokens_session_id_revoked_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1583 | -- 1584 | 1585 | CREATE INDEX "refresh_tokens_session_id_revoked_idx" ON "auth"."refresh_tokens" USING "btree" ("session_id", "revoked"); 1586 | 1587 | 1588 | -- 1589 | -- Name: refresh_tokens_token_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1590 | -- 1591 | 1592 | CREATE INDEX "refresh_tokens_token_idx" ON "auth"."refresh_tokens" USING "btree" ("token"); 1593 | 1594 | 1595 | -- 1596 | -- Name: saml_providers_sso_provider_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1597 | -- 1598 | 1599 | CREATE INDEX "saml_providers_sso_provider_id_idx" ON "auth"."saml_providers" USING "btree" ("sso_provider_id"); 1600 | 1601 | 1602 | -- 1603 | -- Name: saml_relay_states_for_email_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1604 | -- 1605 | 1606 | CREATE INDEX "saml_relay_states_for_email_idx" ON "auth"."saml_relay_states" USING "btree" ("for_email"); 1607 | 1608 | 1609 | -- 1610 | -- Name: saml_relay_states_sso_provider_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1611 | -- 1612 | 1613 | CREATE INDEX "saml_relay_states_sso_provider_id_idx" ON "auth"."saml_relay_states" USING "btree" ("sso_provider_id"); 1614 | 1615 | 1616 | -- 1617 | -- Name: sessions_user_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1618 | -- 1619 | 1620 | CREATE INDEX "sessions_user_id_idx" ON "auth"."sessions" USING "btree" ("user_id"); 1621 | 1622 | 1623 | -- 1624 | -- Name: sso_domains_domain_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1625 | -- 1626 | 1627 | CREATE UNIQUE INDEX "sso_domains_domain_idx" ON "auth"."sso_domains" USING "btree" ("lower"("domain")); 1628 | 1629 | 1630 | -- 1631 | -- Name: sso_domains_sso_provider_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1632 | -- 1633 | 1634 | CREATE INDEX "sso_domains_sso_provider_id_idx" ON "auth"."sso_domains" USING "btree" ("sso_provider_id"); 1635 | 1636 | 1637 | -- 1638 | -- Name: sso_providers_resource_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1639 | -- 1640 | 1641 | CREATE UNIQUE INDEX "sso_providers_resource_id_idx" ON "auth"."sso_providers" USING "btree" ("lower"("resource_id")); 1642 | 1643 | 1644 | -- 1645 | -- Name: sso_sessions_session_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1646 | -- 1647 | 1648 | CREATE INDEX "sso_sessions_session_id_idx" ON "auth"."sso_sessions" USING "btree" ("session_id"); 1649 | 1650 | 1651 | -- 1652 | -- Name: sso_sessions_sso_provider_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1653 | -- 1654 | 1655 | CREATE INDEX "sso_sessions_sso_provider_id_idx" ON "auth"."sso_sessions" USING "btree" ("sso_provider_id"); 1656 | 1657 | 1658 | -- 1659 | -- Name: user_id_created_at_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1660 | -- 1661 | 1662 | CREATE INDEX "user_id_created_at_idx" ON "auth"."sessions" USING "btree" ("user_id", "created_at"); 1663 | 1664 | 1665 | -- 1666 | -- Name: users_instance_id_email_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1667 | -- 1668 | 1669 | CREATE INDEX "users_instance_id_email_idx" ON "auth"."users" USING "btree" ("instance_id", "lower"(("email")::"text")); 1670 | 1671 | 1672 | -- 1673 | -- Name: users_instance_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin 1674 | -- 1675 | 1676 | CREATE INDEX "users_instance_id_idx" ON "auth"."users" USING "btree" ("instance_id"); 1677 | 1678 | 1679 | -- 1680 | -- Name: bname; Type: INDEX; Schema: storage; Owner: supabase_storage_admin 1681 | -- 1682 | 1683 | CREATE UNIQUE INDEX "bname" ON "storage"."buckets" USING "btree" ("name"); 1684 | 1685 | 1686 | -- 1687 | -- Name: bucketid_objname; Type: INDEX; Schema: storage; Owner: supabase_storage_admin 1688 | -- 1689 | 1690 | CREATE UNIQUE INDEX "bucketid_objname" ON "storage"."objects" USING "btree" ("bucket_id", "name"); 1691 | 1692 | 1693 | -- 1694 | -- Name: name_prefix_search; Type: INDEX; Schema: storage; Owner: supabase_storage_admin 1695 | -- 1696 | 1697 | CREATE INDEX "name_prefix_search" ON "storage"."objects" USING "btree" ("name" "text_pattern_ops"); 1698 | 1699 | 1700 | -- 1701 | -- Name: objects update_objects_updated_at; Type: TRIGGER; Schema: storage; Owner: supabase_storage_admin 1702 | -- 1703 | 1704 | CREATE TRIGGER "update_objects_updated_at" BEFORE UPDATE ON "storage"."objects" FOR EACH ROW EXECUTE FUNCTION "storage"."update_updated_at_column"(); 1705 | 1706 | 1707 | -- 1708 | -- Name: extensions extensions_tenant_external_id_fkey; Type: FK CONSTRAINT; Schema: _realtime; Owner: postgres 1709 | -- 1710 | 1711 | ALTER TABLE ONLY "_realtime"."extensions" 1712 | ADD CONSTRAINT "extensions_tenant_external_id_fkey" FOREIGN KEY ("tenant_external_id") REFERENCES "_realtime"."tenants"("external_id") ON DELETE CASCADE; 1713 | 1714 | 1715 | -- 1716 | -- Name: identities identities_user_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1717 | -- 1718 | 1719 | ALTER TABLE ONLY "auth"."identities" 1720 | ADD CONSTRAINT "identities_user_id_fkey" FOREIGN KEY ("user_id") REFERENCES "auth"."users"("id") ON DELETE CASCADE; 1721 | 1722 | 1723 | -- 1724 | -- Name: mfa_amr_claims mfa_amr_claims_session_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1725 | -- 1726 | 1727 | ALTER TABLE ONLY "auth"."mfa_amr_claims" 1728 | ADD CONSTRAINT "mfa_amr_claims_session_id_fkey" FOREIGN KEY ("session_id") REFERENCES "auth"."sessions"("id") ON DELETE CASCADE; 1729 | 1730 | 1731 | -- 1732 | -- Name: mfa_challenges mfa_challenges_auth_factor_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1733 | -- 1734 | 1735 | ALTER TABLE ONLY "auth"."mfa_challenges" 1736 | ADD CONSTRAINT "mfa_challenges_auth_factor_id_fkey" FOREIGN KEY ("factor_id") REFERENCES "auth"."mfa_factors"("id") ON DELETE CASCADE; 1737 | 1738 | 1739 | -- 1740 | -- Name: mfa_factors mfa_factors_user_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1741 | -- 1742 | 1743 | ALTER TABLE ONLY "auth"."mfa_factors" 1744 | ADD CONSTRAINT "mfa_factors_user_id_fkey" FOREIGN KEY ("user_id") REFERENCES "auth"."users"("id") ON DELETE CASCADE; 1745 | 1746 | 1747 | -- 1748 | -- Name: refresh_tokens refresh_tokens_parent_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1749 | -- 1750 | 1751 | ALTER TABLE ONLY "auth"."refresh_tokens" 1752 | ADD CONSTRAINT "refresh_tokens_parent_fkey" FOREIGN KEY ("parent") REFERENCES "auth"."refresh_tokens"("token"); 1753 | 1754 | 1755 | -- 1756 | -- Name: refresh_tokens refresh_tokens_session_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1757 | -- 1758 | 1759 | ALTER TABLE ONLY "auth"."refresh_tokens" 1760 | ADD CONSTRAINT "refresh_tokens_session_id_fkey" FOREIGN KEY ("session_id") REFERENCES "auth"."sessions"("id") ON DELETE CASCADE; 1761 | 1762 | 1763 | -- 1764 | -- Name: saml_providers saml_providers_sso_provider_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1765 | -- 1766 | 1767 | ALTER TABLE ONLY "auth"."saml_providers" 1768 | ADD CONSTRAINT "saml_providers_sso_provider_id_fkey" FOREIGN KEY ("sso_provider_id") REFERENCES "auth"."sso_providers"("id") ON DELETE CASCADE; 1769 | 1770 | 1771 | -- 1772 | -- Name: saml_relay_states saml_relay_states_sso_provider_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1773 | -- 1774 | 1775 | ALTER TABLE ONLY "auth"."saml_relay_states" 1776 | ADD CONSTRAINT "saml_relay_states_sso_provider_id_fkey" FOREIGN KEY ("sso_provider_id") REFERENCES "auth"."sso_providers"("id") ON DELETE CASCADE; 1777 | 1778 | 1779 | -- 1780 | -- Name: sessions sessions_user_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1781 | -- 1782 | 1783 | ALTER TABLE ONLY "auth"."sessions" 1784 | ADD CONSTRAINT "sessions_user_id_fkey" FOREIGN KEY ("user_id") REFERENCES "auth"."users"("id") ON DELETE CASCADE; 1785 | 1786 | 1787 | -- 1788 | -- Name: sso_domains sso_domains_sso_provider_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1789 | -- 1790 | 1791 | ALTER TABLE ONLY "auth"."sso_domains" 1792 | ADD CONSTRAINT "sso_domains_sso_provider_id_fkey" FOREIGN KEY ("sso_provider_id") REFERENCES "auth"."sso_providers"("id") ON DELETE CASCADE; 1793 | 1794 | 1795 | -- 1796 | -- Name: sso_sessions sso_sessions_session_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1797 | -- 1798 | 1799 | ALTER TABLE ONLY "auth"."sso_sessions" 1800 | ADD CONSTRAINT "sso_sessions_session_id_fkey" FOREIGN KEY ("session_id") REFERENCES "auth"."sessions"("id") ON DELETE CASCADE; 1801 | 1802 | 1803 | -- 1804 | -- Name: sso_sessions sso_sessions_sso_provider_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin 1805 | -- 1806 | 1807 | ALTER TABLE ONLY "auth"."sso_sessions" 1808 | ADD CONSTRAINT "sso_sessions_sso_provider_id_fkey" FOREIGN KEY ("sso_provider_id") REFERENCES "auth"."sso_providers"("id") ON DELETE CASCADE; 1809 | 1810 | 1811 | -- 1812 | -- Name: boards boards_user_id_fkey; Type: FK CONSTRAINT; Schema: public; Owner: postgres 1813 | -- 1814 | 1815 | ALTER TABLE ONLY "public"."boards" 1816 | ADD CONSTRAINT "boards_user_id_fkey" FOREIGN KEY ("user_id") REFERENCES "auth"."users"("id"); 1817 | 1818 | 1819 | -- 1820 | -- Name: cards cards_list_id_fkey; Type: FK CONSTRAINT; Schema: public; Owner: postgres 1821 | -- 1822 | 1823 | ALTER TABLE ONLY "public"."cards" 1824 | ADD CONSTRAINT "cards_list_id_fkey" FOREIGN KEY ("list_id") REFERENCES "public"."lists"("id"); 1825 | 1826 | 1827 | -- 1828 | -- Name: cards cards_user_id_fkey; Type: FK CONSTRAINT; Schema: public; Owner: postgres 1829 | -- 1830 | 1831 | ALTER TABLE ONLY "public"."cards" 1832 | ADD CONSTRAINT "cards_user_id_fkey" FOREIGN KEY ("user_id") REFERENCES "auth"."users"("id"); 1833 | 1834 | 1835 | -- 1836 | -- Name: lists lists_board_id_fkey; Type: FK CONSTRAINT; Schema: public; Owner: postgres 1837 | -- 1838 | 1839 | ALTER TABLE ONLY "public"."lists" 1840 | ADD CONSTRAINT "lists_board_id_fkey" FOREIGN KEY ("board_id") REFERENCES "public"."boards"("id"); 1841 | 1842 | 1843 | -- 1844 | -- Name: lists lists_user_id_fkey; Type: FK CONSTRAINT; Schema: public; Owner: postgres 1845 | -- 1846 | 1847 | ALTER TABLE ONLY "public"."lists" 1848 | ADD CONSTRAINT "lists_user_id_fkey" FOREIGN KEY ("user_id") REFERENCES "auth"."users"("id"); 1849 | 1850 | 1851 | -- 1852 | -- Name: buckets buckets_owner_fkey; Type: FK CONSTRAINT; Schema: storage; Owner: supabase_storage_admin 1853 | -- 1854 | 1855 | ALTER TABLE ONLY "storage"."buckets" 1856 | ADD CONSTRAINT "buckets_owner_fkey" FOREIGN KEY ("owner") REFERENCES "auth"."users"("id"); 1857 | 1858 | 1859 | -- 1860 | -- Name: objects objects_bucketId_fkey; Type: FK CONSTRAINT; Schema: storage; Owner: supabase_storage_admin 1861 | -- 1862 | 1863 | ALTER TABLE ONLY "storage"."objects" 1864 | ADD CONSTRAINT "objects_bucketId_fkey" FOREIGN KEY ("bucket_id") REFERENCES "storage"."buckets"("id"); 1865 | 1866 | 1867 | -- 1868 | -- Name: objects objects_owner_fkey; Type: FK CONSTRAINT; Schema: storage; Owner: supabase_storage_admin 1869 | -- 1870 | 1871 | ALTER TABLE ONLY "storage"."objects" 1872 | ADD CONSTRAINT "objects_owner_fkey" FOREIGN KEY ("owner") REFERENCES "auth"."users"("id"); 1873 | 1874 | 1875 | -- 1876 | -- Name: boards Individuals can create boards.; Type: POLICY; Schema: public; Owner: postgres 1877 | -- 1878 | 1879 | CREATE POLICY "Individuals can create boards." ON "public"."boards" FOR INSERT WITH CHECK (("auth"."uid"() = "user_id")); 1880 | 1881 | 1882 | -- 1883 | -- Name: cards Individuals can create cards.; Type: POLICY; Schema: public; Owner: postgres 1884 | -- 1885 | 1886 | CREATE POLICY "Individuals can create cards." ON "public"."cards" FOR INSERT WITH CHECK (("auth"."uid"() = "user_id")); 1887 | 1888 | 1889 | -- 1890 | -- Name: lists Individuals can create lists.; Type: POLICY; Schema: public; Owner: postgres 1891 | -- 1892 | 1893 | CREATE POLICY "Individuals can create lists." ON "public"."lists" FOR INSERT WITH CHECK (("auth"."uid"() = "user_id")); 1894 | 1895 | 1896 | -- 1897 | -- Name: boards Individuals can delete their own boards.; Type: POLICY; Schema: public; Owner: postgres 1898 | -- 1899 | 1900 | CREATE POLICY "Individuals can delete their own boards." ON "public"."boards" FOR DELETE USING (("auth"."uid"() = "user_id")); 1901 | 1902 | 1903 | -- 1904 | -- Name: cards Individuals can delete their own cards.; Type: POLICY; Schema: public; Owner: postgres 1905 | -- 1906 | 1907 | CREATE POLICY "Individuals can delete their own cards." ON "public"."cards" FOR DELETE USING (("auth"."uid"() = "user_id")); 1908 | 1909 | 1910 | -- 1911 | -- Name: lists Individuals can delete their own lists.; Type: POLICY; Schema: public; Owner: postgres 1912 | -- 1913 | 1914 | CREATE POLICY "Individuals can delete their own lists." ON "public"."lists" FOR DELETE USING (("auth"."uid"() = "user_id")); 1915 | 1916 | 1917 | -- 1918 | -- Name: boards Individuals can update their own boards.; Type: POLICY; Schema: public; Owner: postgres 1919 | -- 1920 | 1921 | CREATE POLICY "Individuals can update their own boards." ON "public"."boards" FOR UPDATE USING (("auth"."uid"() = "user_id")); 1922 | 1923 | 1924 | -- 1925 | -- Name: cards Individuals can update their own cards.; Type: POLICY; Schema: public; Owner: postgres 1926 | -- 1927 | 1928 | CREATE POLICY "Individuals can update their own cards." ON "public"."cards" FOR UPDATE USING (("auth"."uid"() = "user_id")); 1929 | 1930 | 1931 | -- 1932 | -- Name: lists Individuals can update their own lists.; Type: POLICY; Schema: public; Owner: postgres 1933 | -- 1934 | 1935 | CREATE POLICY "Individuals can update their own lists." ON "public"."lists" FOR UPDATE USING (("auth"."uid"() = "user_id")); 1936 | 1937 | 1938 | -- 1939 | -- Name: boards Individuals can view their own boards. ; Type: POLICY; Schema: public; Owner: postgres 1940 | -- 1941 | 1942 | CREATE POLICY "Individuals can view their own boards. " ON "public"."boards" FOR SELECT USING (("auth"."uid"() = "user_id")); 1943 | 1944 | 1945 | -- 1946 | -- Name: cards Individuals can view their own cards. ; Type: POLICY; Schema: public; Owner: postgres 1947 | -- 1948 | 1949 | CREATE POLICY "Individuals can view their own cards. " ON "public"."cards" FOR SELECT USING (("auth"."uid"() = "user_id")); 1950 | 1951 | 1952 | -- 1953 | -- Name: lists Individuals can view their own lists. ; Type: POLICY; Schema: public; Owner: postgres 1954 | -- 1955 | 1956 | CREATE POLICY "Individuals can view their own lists. " ON "public"."lists" FOR SELECT USING (("auth"."uid"() = "user_id")); 1957 | 1958 | 1959 | -- 1960 | -- Name: boards; Type: ROW SECURITY; Schema: public; Owner: postgres 1961 | -- 1962 | 1963 | ALTER TABLE "public"."boards" ENABLE ROW LEVEL SECURITY; 1964 | 1965 | -- 1966 | -- Name: cards; Type: ROW SECURITY; Schema: public; Owner: postgres 1967 | -- 1968 | 1969 | ALTER TABLE "public"."cards" ENABLE ROW LEVEL SECURITY; 1970 | 1971 | -- 1972 | -- Name: lists; Type: ROW SECURITY; Schema: public; Owner: postgres 1973 | -- 1974 | 1975 | ALTER TABLE "public"."lists" ENABLE ROW LEVEL SECURITY; 1976 | 1977 | -- 1978 | -- Name: buckets; Type: ROW SECURITY; Schema: storage; Owner: supabase_storage_admin 1979 | -- 1980 | 1981 | ALTER TABLE "storage"."buckets" ENABLE ROW LEVEL SECURITY; 1982 | 1983 | -- 1984 | -- Name: migrations; Type: ROW SECURITY; Schema: storage; Owner: supabase_storage_admin 1985 | -- 1986 | 1987 | ALTER TABLE "storage"."migrations" ENABLE ROW LEVEL SECURITY; 1988 | 1989 | -- 1990 | -- Name: objects; Type: ROW SECURITY; Schema: storage; Owner: supabase_storage_admin 1991 | -- 1992 | 1993 | ALTER TABLE "storage"."objects" ENABLE ROW LEVEL SECURITY; 1994 | 1995 | -- 1996 | -- Name: SCHEMA "auth"; Type: ACL; Schema: -; Owner: supabase_admin 1997 | -- 1998 | 1999 | GRANT USAGE ON SCHEMA "auth" TO "anon"; 2000 | GRANT USAGE ON SCHEMA "auth" TO "authenticated"; 2001 | GRANT USAGE ON SCHEMA "auth" TO "service_role"; 2002 | GRANT ALL ON SCHEMA "auth" TO "supabase_auth_admin"; 2003 | GRANT ALL ON SCHEMA "auth" TO "dashboard_user"; 2004 | GRANT ALL ON SCHEMA "auth" TO "postgres"; 2005 | 2006 | 2007 | -- 2008 | -- Name: SCHEMA "graphql_public"; Type: ACL; Schema: -; Owner: supabase_admin 2009 | -- 2010 | 2011 | GRANT USAGE ON SCHEMA "graphql_public" TO "postgres"; 2012 | GRANT USAGE ON SCHEMA "graphql_public" TO "anon"; 2013 | GRANT USAGE ON SCHEMA "graphql_public" TO "authenticated"; 2014 | GRANT USAGE ON SCHEMA "graphql_public" TO "service_role"; 2015 | 2016 | 2017 | -- 2018 | -- Name: SCHEMA "public"; Type: ACL; Schema: -; Owner: pg_database_owner 2019 | -- 2020 | 2021 | GRANT USAGE ON SCHEMA "public" TO "postgres"; 2022 | GRANT USAGE ON SCHEMA "public" TO "anon"; 2023 | GRANT USAGE ON SCHEMA "public" TO "authenticated"; 2024 | GRANT USAGE ON SCHEMA "public" TO "service_role"; 2025 | 2026 | 2027 | -- 2028 | -- Name: SCHEMA "realtime"; Type: ACL; Schema: -; Owner: supabase_admin 2029 | -- 2030 | 2031 | GRANT USAGE ON SCHEMA "realtime" TO "postgres"; 2032 | 2033 | 2034 | -- 2035 | -- Name: SCHEMA "storage"; Type: ACL; Schema: -; Owner: supabase_admin 2036 | -- 2037 | 2038 | GRANT ALL ON SCHEMA "storage" TO "postgres"; 2039 | GRANT USAGE ON SCHEMA "storage" TO "anon"; 2040 | GRANT USAGE ON SCHEMA "storage" TO "authenticated"; 2041 | GRANT USAGE ON SCHEMA "storage" TO "service_role"; 2042 | GRANT ALL ON SCHEMA "storage" TO "supabase_storage_admin"; 2043 | GRANT ALL ON SCHEMA "storage" TO "dashboard_user"; 2044 | 2045 | 2046 | -- 2047 | -- Name: FUNCTION "email"(); Type: ACL; Schema: auth; Owner: supabase_auth_admin 2048 | -- 2049 | 2050 | GRANT ALL ON FUNCTION "auth"."email"() TO "dashboard_user"; 2051 | 2052 | 2053 | -- 2054 | -- Name: FUNCTION "jwt"(); Type: ACL; Schema: auth; Owner: supabase_auth_admin 2055 | -- 2056 | 2057 | GRANT ALL ON FUNCTION "auth"."jwt"() TO "postgres"; 2058 | GRANT ALL ON FUNCTION "auth"."jwt"() TO "dashboard_user"; 2059 | 2060 | 2061 | -- 2062 | -- Name: FUNCTION "role"(); Type: ACL; Schema: auth; Owner: supabase_auth_admin 2063 | -- 2064 | 2065 | GRANT ALL ON FUNCTION "auth"."role"() TO "dashboard_user"; 2066 | 2067 | 2068 | -- 2069 | -- Name: FUNCTION "uid"(); Type: ACL; Schema: auth; Owner: supabase_auth_admin 2070 | -- 2071 | 2072 | GRANT ALL ON FUNCTION "auth"."uid"() TO "dashboard_user"; 2073 | 2074 | 2075 | -- 2076 | -- Name: FUNCTION "algorithm_sign"("signables" "text", "secret" "text", "algorithm" "text"); Type: ACL; Schema: extensions; Owner: postgres 2077 | -- 2078 | 2079 | GRANT ALL ON FUNCTION "extensions"."algorithm_sign"("signables" "text", "secret" "text", "algorithm" "text") TO "dashboard_user"; 2080 | 2081 | 2082 | -- 2083 | -- Name: FUNCTION "armor"("bytea"); Type: ACL; Schema: extensions; Owner: postgres 2084 | -- 2085 | 2086 | GRANT ALL ON FUNCTION "extensions"."armor"("bytea") TO "dashboard_user"; 2087 | 2088 | 2089 | -- 2090 | -- Name: FUNCTION "armor"("bytea", "text"[], "text"[]); Type: ACL; Schema: extensions; Owner: postgres 2091 | -- 2092 | 2093 | GRANT ALL ON FUNCTION "extensions"."armor"("bytea", "text"[], "text"[]) TO "dashboard_user"; 2094 | 2095 | 2096 | -- 2097 | -- Name: FUNCTION "crypt"("text", "text"); Type: ACL; Schema: extensions; Owner: postgres 2098 | -- 2099 | 2100 | GRANT ALL ON FUNCTION "extensions"."crypt"("text", "text") TO "dashboard_user"; 2101 | 2102 | 2103 | -- 2104 | -- Name: FUNCTION "dearmor"("text"); Type: ACL; Schema: extensions; Owner: postgres 2105 | -- 2106 | 2107 | GRANT ALL ON FUNCTION "extensions"."dearmor"("text") TO "dashboard_user"; 2108 | 2109 | 2110 | -- 2111 | -- Name: FUNCTION "decrypt"("bytea", "bytea", "text"); Type: ACL; Schema: extensions; Owner: postgres 2112 | -- 2113 | 2114 | GRANT ALL ON FUNCTION "extensions"."decrypt"("bytea", "bytea", "text") TO "dashboard_user"; 2115 | 2116 | 2117 | -- 2118 | -- Name: FUNCTION "decrypt_iv"("bytea", "bytea", "bytea", "text"); Type: ACL; Schema: extensions; Owner: postgres 2119 | -- 2120 | 2121 | GRANT ALL ON FUNCTION "extensions"."decrypt_iv"("bytea", "bytea", "bytea", "text") TO "dashboard_user"; 2122 | 2123 | 2124 | -- 2125 | -- Name: FUNCTION "digest"("bytea", "text"); Type: ACL; Schema: extensions; Owner: postgres 2126 | -- 2127 | 2128 | GRANT ALL ON FUNCTION "extensions"."digest"("bytea", "text") TO "dashboard_user"; 2129 | 2130 | 2131 | -- 2132 | -- Name: FUNCTION "digest"("text", "text"); Type: ACL; Schema: extensions; Owner: postgres 2133 | -- 2134 | 2135 | GRANT ALL ON FUNCTION "extensions"."digest"("text", "text") TO "dashboard_user"; 2136 | 2137 | 2138 | -- 2139 | -- Name: FUNCTION "encrypt"("bytea", "bytea", "text"); Type: ACL; Schema: extensions; Owner: postgres 2140 | -- 2141 | 2142 | GRANT ALL ON FUNCTION "extensions"."encrypt"("bytea", "bytea", "text") TO "dashboard_user"; 2143 | 2144 | 2145 | -- 2146 | -- Name: FUNCTION "encrypt_iv"("bytea", "bytea", "bytea", "text"); Type: ACL; Schema: extensions; Owner: postgres 2147 | -- 2148 | 2149 | GRANT ALL ON FUNCTION "extensions"."encrypt_iv"("bytea", "bytea", "bytea", "text") TO "dashboard_user"; 2150 | 2151 | 2152 | -- 2153 | -- Name: FUNCTION "gen_random_bytes"(integer); Type: ACL; Schema: extensions; Owner: postgres 2154 | -- 2155 | 2156 | GRANT ALL ON FUNCTION "extensions"."gen_random_bytes"(integer) TO "dashboard_user"; 2157 | 2158 | 2159 | -- 2160 | -- Name: FUNCTION "gen_random_uuid"(); Type: ACL; Schema: extensions; Owner: postgres 2161 | -- 2162 | 2163 | GRANT ALL ON FUNCTION "extensions"."gen_random_uuid"() TO "dashboard_user"; 2164 | 2165 | 2166 | -- 2167 | -- Name: FUNCTION "gen_salt"("text"); Type: ACL; Schema: extensions; Owner: postgres 2168 | -- 2169 | 2170 | GRANT ALL ON FUNCTION "extensions"."gen_salt"("text") TO "dashboard_user"; 2171 | 2172 | 2173 | -- 2174 | -- Name: FUNCTION "gen_salt"("text", integer); Type: ACL; Schema: extensions; Owner: postgres 2175 | -- 2176 | 2177 | GRANT ALL ON FUNCTION "extensions"."gen_salt"("text", integer) TO "dashboard_user"; 2178 | 2179 | 2180 | -- 2181 | -- Name: FUNCTION "hmac"("bytea", "bytea", "text"); Type: ACL; Schema: extensions; Owner: postgres 2182 | -- 2183 | 2184 | GRANT ALL ON FUNCTION "extensions"."hmac"("bytea", "bytea", "text") TO "dashboard_user"; 2185 | 2186 | 2187 | -- 2188 | -- Name: FUNCTION "hmac"("text", "text", "text"); Type: ACL; Schema: extensions; Owner: postgres 2189 | -- 2190 | 2191 | GRANT ALL ON FUNCTION "extensions"."hmac"("text", "text", "text") TO "dashboard_user"; 2192 | 2193 | 2194 | -- 2195 | -- Name: FUNCTION "pg_stat_statements"("showtext" boolean, OUT "userid" "oid", OUT "dbid" "oid", OUT "toplevel" boolean, OUT "queryid" bigint, OUT "query" "text", OUT "plans" bigint, OUT "total_plan_time" double precision, OUT "min_plan_time" double precision, OUT "max_plan_time" double precision, OUT "mean_plan_time" double precision, OUT "stddev_plan_time" double precision, OUT "calls" bigint, OUT "total_exec_time" double precision, OUT "min_exec_time" double precision, OUT "max_exec_time" double precision, OUT "mean_exec_time" double precision, OUT "stddev_exec_time" double precision, OUT "rows" bigint, OUT "shared_blks_hit" bigint, OUT "shared_blks_read" bigint, OUT "shared_blks_dirtied" bigint, OUT "shared_blks_written" bigint, OUT "local_blks_hit" bigint, OUT "local_blks_read" bigint, OUT "local_blks_dirtied" bigint, OUT "local_blks_written" bigint, OUT "temp_blks_read" bigint, OUT "temp_blks_written" bigint, OUT "blk_read_time" double precision, OUT "blk_write_time" double precision, OUT "temp_blk_read_time" double precision, OUT "temp_blk_write_time" double precision, OUT "wal_records" bigint, OUT "wal_fpi" bigint, OUT "wal_bytes" numeric, OUT "jit_functions" bigint, OUT "jit_generation_time" double precision, OUT "jit_inlining_count" bigint, OUT "jit_inlining_time" double precision, OUT "jit_optimization_count" bigint, OUT "jit_optimization_time" double precision, OUT "jit_emission_count" bigint, OUT "jit_emission_time" double precision); Type: ACL; Schema: extensions; Owner: postgres 2196 | -- 2197 | 2198 | GRANT ALL ON FUNCTION "extensions"."pg_stat_statements"("showtext" boolean, OUT "userid" "oid", OUT "dbid" "oid", OUT "toplevel" boolean, OUT "queryid" bigint, OUT "query" "text", OUT "plans" bigint, OUT "total_plan_time" double precision, OUT "min_plan_time" double precision, OUT "max_plan_time" double precision, OUT "mean_plan_time" double precision, OUT "stddev_plan_time" double precision, OUT "calls" bigint, OUT "total_exec_time" double precision, OUT "min_exec_time" double precision, OUT "max_exec_time" double precision, OUT "mean_exec_time" double precision, OUT "stddev_exec_time" double precision, OUT "rows" bigint, OUT "shared_blks_hit" bigint, OUT "shared_blks_read" bigint, OUT "shared_blks_dirtied" bigint, OUT "shared_blks_written" bigint, OUT "local_blks_hit" bigint, OUT "local_blks_read" bigint, OUT "local_blks_dirtied" bigint, OUT "local_blks_written" bigint, OUT "temp_blks_read" bigint, OUT "temp_blks_written" bigint, OUT "blk_read_time" double precision, OUT "blk_write_time" double precision, OUT "temp_blk_read_time" double precision, OUT "temp_blk_write_time" double precision, OUT "wal_records" bigint, OUT "wal_fpi" bigint, OUT "wal_bytes" numeric, OUT "jit_functions" bigint, OUT "jit_generation_time" double precision, OUT "jit_inlining_count" bigint, OUT "jit_inlining_time" double precision, OUT "jit_optimization_count" bigint, OUT "jit_optimization_time" double precision, OUT "jit_emission_count" bigint, OUT "jit_emission_time" double precision) TO "dashboard_user"; 2199 | 2200 | 2201 | -- 2202 | -- Name: FUNCTION "pg_stat_statements_info"(OUT "dealloc" bigint, OUT "stats_reset" timestamp with time zone); Type: ACL; Schema: extensions; Owner: postgres 2203 | -- 2204 | 2205 | GRANT ALL ON FUNCTION "extensions"."pg_stat_statements_info"(OUT "dealloc" bigint, OUT "stats_reset" timestamp with time zone) TO "dashboard_user"; 2206 | 2207 | 2208 | -- 2209 | -- Name: FUNCTION "pg_stat_statements_reset"("userid" "oid", "dbid" "oid", "queryid" bigint); Type: ACL; Schema: extensions; Owner: postgres 2210 | -- 2211 | 2212 | GRANT ALL ON FUNCTION "extensions"."pg_stat_statements_reset"("userid" "oid", "dbid" "oid", "queryid" bigint) TO "dashboard_user"; 2213 | 2214 | 2215 | -- 2216 | -- Name: FUNCTION "pgp_armor_headers"("text", OUT "key" "text", OUT "value" "text"); Type: ACL; Schema: extensions; Owner: postgres 2217 | -- 2218 | 2219 | GRANT ALL ON FUNCTION "extensions"."pgp_armor_headers"("text", OUT "key" "text", OUT "value" "text") TO "dashboard_user"; 2220 | 2221 | 2222 | -- 2223 | -- Name: FUNCTION "pgp_key_id"("bytea"); Type: ACL; Schema: extensions; Owner: postgres 2224 | -- 2225 | 2226 | GRANT ALL ON FUNCTION "extensions"."pgp_key_id"("bytea") TO "dashboard_user"; 2227 | 2228 | 2229 | -- 2230 | -- Name: FUNCTION "pgp_pub_decrypt"("bytea", "bytea"); Type: ACL; Schema: extensions; Owner: postgres 2231 | -- 2232 | 2233 | GRANT ALL ON FUNCTION "extensions"."pgp_pub_decrypt"("bytea", "bytea") TO "dashboard_user"; 2234 | 2235 | 2236 | -- 2237 | -- Name: FUNCTION "pgp_pub_decrypt"("bytea", "bytea", "text"); Type: ACL; Schema: extensions; Owner: postgres 2238 | -- 2239 | 2240 | GRANT ALL ON FUNCTION "extensions"."pgp_pub_decrypt"("bytea", "bytea", "text") TO "dashboard_user"; 2241 | 2242 | 2243 | -- 2244 | -- Name: FUNCTION "pgp_pub_decrypt"("bytea", "bytea", "text", "text"); Type: ACL; Schema: extensions; Owner: postgres 2245 | -- 2246 | 2247 | GRANT ALL ON FUNCTION "extensions"."pgp_pub_decrypt"("bytea", "bytea", "text", "text") TO "dashboard_user"; 2248 | 2249 | 2250 | -- 2251 | -- Name: FUNCTION "pgp_pub_decrypt_bytea"("bytea", "bytea"); Type: ACL; Schema: extensions; Owner: postgres 2252 | -- 2253 | 2254 | GRANT ALL ON FUNCTION "extensions"."pgp_pub_decrypt_bytea"("bytea", "bytea") TO "dashboard_user"; 2255 | 2256 | 2257 | -- 2258 | -- Name: FUNCTION "pgp_pub_decrypt_bytea"("bytea", "bytea", "text"); Type: ACL; Schema: extensions; Owner: postgres 2259 | -- 2260 | 2261 | GRANT ALL ON FUNCTION "extensions"."pgp_pub_decrypt_bytea"("bytea", "bytea", "text") TO "dashboard_user"; 2262 | 2263 | 2264 | -- 2265 | -- Name: FUNCTION "pgp_pub_decrypt_bytea"("bytea", "bytea", "text", "text"); Type: ACL; Schema: extensions; Owner: postgres 2266 | -- 2267 | 2268 | GRANT ALL ON FUNCTION "extensions"."pgp_pub_decrypt_bytea"("bytea", "bytea", "text", "text") TO "dashboard_user"; 2269 | 2270 | 2271 | -- 2272 | -- Name: FUNCTION "pgp_pub_encrypt"("text", "bytea"); Type: ACL; Schema: extensions; Owner: postgres 2273 | -- 2274 | 2275 | GRANT ALL ON FUNCTION "extensions"."pgp_pub_encrypt"("text", "bytea") TO "dashboard_user"; 2276 | 2277 | 2278 | -- 2279 | -- Name: FUNCTION "pgp_pub_encrypt"("text", "bytea", "text"); Type: ACL; Schema: extensions; Owner: postgres 2280 | -- 2281 | 2282 | GRANT ALL ON FUNCTION "extensions"."pgp_pub_encrypt"("text", "bytea", "text") TO "dashboard_user"; 2283 | 2284 | 2285 | -- 2286 | -- Name: FUNCTION "pgp_pub_encrypt_bytea"("bytea", "bytea"); Type: ACL; Schema: extensions; Owner: postgres 2287 | -- 2288 | 2289 | GRANT ALL ON FUNCTION "extensions"."pgp_pub_encrypt_bytea"("bytea", "bytea") TO "dashboard_user"; 2290 | 2291 | 2292 | -- 2293 | -- Name: FUNCTION "pgp_pub_encrypt_bytea"("bytea", "bytea", "text"); Type: ACL; Schema: extensions; Owner: postgres 2294 | -- 2295 | 2296 | GRANT ALL ON FUNCTION "extensions"."pgp_pub_encrypt_bytea"("bytea", "bytea", "text") TO "dashboard_user"; 2297 | 2298 | 2299 | -- 2300 | -- Name: FUNCTION "pgp_sym_decrypt"("bytea", "text"); Type: ACL; Schema: extensions; Owner: postgres 2301 | -- 2302 | 2303 | GRANT ALL ON FUNCTION "extensions"."pgp_sym_decrypt"("bytea", "text") TO "dashboard_user"; 2304 | 2305 | 2306 | -- 2307 | -- Name: FUNCTION "pgp_sym_decrypt"("bytea", "text", "text"); Type: ACL; Schema: extensions; Owner: postgres 2308 | -- 2309 | 2310 | GRANT ALL ON FUNCTION "extensions"."pgp_sym_decrypt"("bytea", "text", "text") TO "dashboard_user"; 2311 | 2312 | 2313 | -- 2314 | -- Name: FUNCTION "pgp_sym_decrypt_bytea"("bytea", "text"); Type: ACL; Schema: extensions; Owner: postgres 2315 | -- 2316 | 2317 | GRANT ALL ON FUNCTION "extensions"."pgp_sym_decrypt_bytea"("bytea", "text") TO "dashboard_user"; 2318 | 2319 | 2320 | -- 2321 | -- Name: FUNCTION "pgp_sym_decrypt_bytea"("bytea", "text", "text"); Type: ACL; Schema: extensions; Owner: postgres 2322 | -- 2323 | 2324 | GRANT ALL ON FUNCTION "extensions"."pgp_sym_decrypt_bytea"("bytea", "text", "text") TO "dashboard_user"; 2325 | 2326 | 2327 | -- 2328 | -- Name: FUNCTION "pgp_sym_encrypt"("text", "text"); Type: ACL; Schema: extensions; Owner: postgres 2329 | -- 2330 | 2331 | GRANT ALL ON FUNCTION "extensions"."pgp_sym_encrypt"("text", "text") TO "dashboard_user"; 2332 | 2333 | 2334 | -- 2335 | -- Name: FUNCTION "pgp_sym_encrypt"("text", "text", "text"); Type: ACL; Schema: extensions; Owner: postgres 2336 | -- 2337 | 2338 | GRANT ALL ON FUNCTION "extensions"."pgp_sym_encrypt"("text", "text", "text") TO "dashboard_user"; 2339 | 2340 | 2341 | -- 2342 | -- Name: FUNCTION "pgp_sym_encrypt_bytea"("bytea", "text"); Type: ACL; Schema: extensions; Owner: postgres 2343 | -- 2344 | 2345 | GRANT ALL ON FUNCTION "extensions"."pgp_sym_encrypt_bytea"("bytea", "text") TO "dashboard_user"; 2346 | 2347 | 2348 | -- 2349 | -- Name: FUNCTION "pgp_sym_encrypt_bytea"("bytea", "text", "text"); Type: ACL; Schema: extensions; Owner: postgres 2350 | -- 2351 | 2352 | GRANT ALL ON FUNCTION "extensions"."pgp_sym_encrypt_bytea"("bytea", "text", "text") TO "dashboard_user"; 2353 | 2354 | 2355 | -- 2356 | -- Name: FUNCTION "sign"("payload" "json", "secret" "text", "algorithm" "text"); Type: ACL; Schema: extensions; Owner: postgres 2357 | -- 2358 | 2359 | GRANT ALL ON FUNCTION "extensions"."sign"("payload" "json", "secret" "text", "algorithm" "text") TO "dashboard_user"; 2360 | 2361 | 2362 | -- 2363 | -- Name: FUNCTION "try_cast_double"("inp" "text"); Type: ACL; Schema: extensions; Owner: postgres 2364 | -- 2365 | 2366 | GRANT ALL ON FUNCTION "extensions"."try_cast_double"("inp" "text") TO "dashboard_user"; 2367 | 2368 | 2369 | -- 2370 | -- Name: FUNCTION "url_decode"("data" "text"); Type: ACL; Schema: extensions; Owner: postgres 2371 | -- 2372 | 2373 | GRANT ALL ON FUNCTION "extensions"."url_decode"("data" "text") TO "dashboard_user"; 2374 | 2375 | 2376 | -- 2377 | -- Name: FUNCTION "url_encode"("data" "bytea"); Type: ACL; Schema: extensions; Owner: postgres 2378 | -- 2379 | 2380 | GRANT ALL ON FUNCTION "extensions"."url_encode"("data" "bytea") TO "dashboard_user"; 2381 | 2382 | 2383 | -- 2384 | -- Name: FUNCTION "uuid_generate_v1"(); Type: ACL; Schema: extensions; Owner: postgres 2385 | -- 2386 | 2387 | GRANT ALL ON FUNCTION "extensions"."uuid_generate_v1"() TO "dashboard_user"; 2388 | 2389 | 2390 | -- 2391 | -- Name: FUNCTION "uuid_generate_v1mc"(); Type: ACL; Schema: extensions; Owner: postgres 2392 | -- 2393 | 2394 | GRANT ALL ON FUNCTION "extensions"."uuid_generate_v1mc"() TO "dashboard_user"; 2395 | 2396 | 2397 | -- 2398 | -- Name: FUNCTION "uuid_generate_v3"("namespace" "uuid", "name" "text"); Type: ACL; Schema: extensions; Owner: postgres 2399 | -- 2400 | 2401 | GRANT ALL ON FUNCTION "extensions"."uuid_generate_v3"("namespace" "uuid", "name" "text") TO "dashboard_user"; 2402 | 2403 | 2404 | -- 2405 | -- Name: FUNCTION "uuid_generate_v4"(); Type: ACL; Schema: extensions; Owner: postgres 2406 | -- 2407 | 2408 | GRANT ALL ON FUNCTION "extensions"."uuid_generate_v4"() TO "dashboard_user"; 2409 | 2410 | 2411 | -- 2412 | -- Name: FUNCTION "uuid_generate_v5"("namespace" "uuid", "name" "text"); Type: ACL; Schema: extensions; Owner: postgres 2413 | -- 2414 | 2415 | GRANT ALL ON FUNCTION "extensions"."uuid_generate_v5"("namespace" "uuid", "name" "text") TO "dashboard_user"; 2416 | 2417 | 2418 | -- 2419 | -- Name: FUNCTION "uuid_nil"(); Type: ACL; Schema: extensions; Owner: postgres 2420 | -- 2421 | 2422 | GRANT ALL ON FUNCTION "extensions"."uuid_nil"() TO "dashboard_user"; 2423 | 2424 | 2425 | -- 2426 | -- Name: FUNCTION "uuid_ns_dns"(); Type: ACL; Schema: extensions; Owner: postgres 2427 | -- 2428 | 2429 | GRANT ALL ON FUNCTION "extensions"."uuid_ns_dns"() TO "dashboard_user"; 2430 | 2431 | 2432 | -- 2433 | -- Name: FUNCTION "uuid_ns_oid"(); Type: ACL; Schema: extensions; Owner: postgres 2434 | -- 2435 | 2436 | GRANT ALL ON FUNCTION "extensions"."uuid_ns_oid"() TO "dashboard_user"; 2437 | 2438 | 2439 | -- 2440 | -- Name: FUNCTION "uuid_ns_url"(); Type: ACL; Schema: extensions; Owner: postgres 2441 | -- 2442 | 2443 | GRANT ALL ON FUNCTION "extensions"."uuid_ns_url"() TO "dashboard_user"; 2444 | 2445 | 2446 | -- 2447 | -- Name: FUNCTION "uuid_ns_x500"(); Type: ACL; Schema: extensions; Owner: postgres 2448 | -- 2449 | 2450 | GRANT ALL ON FUNCTION "extensions"."uuid_ns_x500"() TO "dashboard_user"; 2451 | 2452 | 2453 | -- 2454 | -- Name: FUNCTION "verify"("token" "text", "secret" "text", "algorithm" "text"); Type: ACL; Schema: extensions; Owner: postgres 2455 | -- 2456 | 2457 | GRANT ALL ON FUNCTION "extensions"."verify"("token" "text", "secret" "text", "algorithm" "text") TO "dashboard_user"; 2458 | 2459 | 2460 | -- 2461 | -- Name: FUNCTION "comment_directive"("comment_" "text"); Type: ACL; Schema: graphql; Owner: postgres 2462 | -- 2463 | 2464 | GRANT ALL ON FUNCTION "graphql"."comment_directive"("comment_" "text") TO "anon"; 2465 | GRANT ALL ON FUNCTION "graphql"."comment_directive"("comment_" "text") TO "authenticated"; 2466 | GRANT ALL ON FUNCTION "graphql"."comment_directive"("comment_" "text") TO "service_role"; 2467 | 2468 | 2469 | -- 2470 | -- Name: FUNCTION "exception"("message" "text"); Type: ACL; Schema: graphql; Owner: postgres 2471 | -- 2472 | 2473 | GRANT ALL ON FUNCTION "graphql"."exception"("message" "text") TO "anon"; 2474 | GRANT ALL ON FUNCTION "graphql"."exception"("message" "text") TO "authenticated"; 2475 | GRANT ALL ON FUNCTION "graphql"."exception"("message" "text") TO "service_role"; 2476 | 2477 | 2478 | -- 2479 | -- Name: FUNCTION "get_schema_version"(); Type: ACL; Schema: graphql; Owner: postgres 2480 | -- 2481 | 2482 | GRANT ALL ON FUNCTION "graphql"."get_schema_version"() TO "anon"; 2483 | GRANT ALL ON FUNCTION "graphql"."get_schema_version"() TO "authenticated"; 2484 | GRANT ALL ON FUNCTION "graphql"."get_schema_version"() TO "service_role"; 2485 | 2486 | 2487 | -- 2488 | -- Name: FUNCTION "increment_schema_version"(); Type: ACL; Schema: graphql; Owner: postgres 2489 | -- 2490 | 2491 | GRANT ALL ON FUNCTION "graphql"."increment_schema_version"() TO "anon"; 2492 | GRANT ALL ON FUNCTION "graphql"."increment_schema_version"() TO "authenticated"; 2493 | GRANT ALL ON FUNCTION "graphql"."increment_schema_version"() TO "service_role"; 2494 | 2495 | 2496 | -- 2497 | -- Name: FUNCTION "sort_board"("board_id" bigint, "list_ids" bigint[]); Type: ACL; Schema: public; Owner: postgres 2498 | -- 2499 | 2500 | GRANT ALL ON FUNCTION "public"."sort_board"("board_id" bigint, "list_ids" bigint[]) TO "anon"; 2501 | GRANT ALL ON FUNCTION "public"."sort_board"("board_id" bigint, "list_ids" bigint[]) TO "authenticated"; 2502 | GRANT ALL ON FUNCTION "public"."sort_board"("board_id" bigint, "list_ids" bigint[]) TO "service_role"; 2503 | 2504 | 2505 | -- 2506 | -- Name: FUNCTION "sort_list"("new_list_id" bigint, "card_ids" bigint[]); Type: ACL; Schema: public; Owner: postgres 2507 | -- 2508 | 2509 | GRANT ALL ON FUNCTION "public"."sort_list"("new_list_id" bigint, "card_ids" bigint[]) TO "anon"; 2510 | GRANT ALL ON FUNCTION "public"."sort_list"("new_list_id" bigint, "card_ids" bigint[]) TO "authenticated"; 2511 | GRANT ALL ON FUNCTION "public"."sort_list"("new_list_id" bigint, "card_ids" bigint[]) TO "service_role"; 2512 | 2513 | 2514 | -- 2515 | -- Name: FUNCTION "extension"("name" "text"); Type: ACL; Schema: storage; Owner: supabase_storage_admin 2516 | -- 2517 | 2518 | GRANT ALL ON FUNCTION "storage"."extension"("name" "text") TO "anon"; 2519 | GRANT ALL ON FUNCTION "storage"."extension"("name" "text") TO "authenticated"; 2520 | GRANT ALL ON FUNCTION "storage"."extension"("name" "text") TO "service_role"; 2521 | GRANT ALL ON FUNCTION "storage"."extension"("name" "text") TO "dashboard_user"; 2522 | GRANT ALL ON FUNCTION "storage"."extension"("name" "text") TO "postgres"; 2523 | 2524 | 2525 | -- 2526 | -- Name: FUNCTION "filename"("name" "text"); Type: ACL; Schema: storage; Owner: supabase_storage_admin 2527 | -- 2528 | 2529 | GRANT ALL ON FUNCTION "storage"."filename"("name" "text") TO "anon"; 2530 | GRANT ALL ON FUNCTION "storage"."filename"("name" "text") TO "authenticated"; 2531 | GRANT ALL ON FUNCTION "storage"."filename"("name" "text") TO "service_role"; 2532 | GRANT ALL ON FUNCTION "storage"."filename"("name" "text") TO "dashboard_user"; 2533 | GRANT ALL ON FUNCTION "storage"."filename"("name" "text") TO "postgres"; 2534 | 2535 | 2536 | -- 2537 | -- Name: FUNCTION "foldername"("name" "text"); Type: ACL; Schema: storage; Owner: supabase_storage_admin 2538 | -- 2539 | 2540 | GRANT ALL ON FUNCTION "storage"."foldername"("name" "text") TO "anon"; 2541 | GRANT ALL ON FUNCTION "storage"."foldername"("name" "text") TO "authenticated"; 2542 | GRANT ALL ON FUNCTION "storage"."foldername"("name" "text") TO "service_role"; 2543 | GRANT ALL ON FUNCTION "storage"."foldername"("name" "text") TO "dashboard_user"; 2544 | GRANT ALL ON FUNCTION "storage"."foldername"("name" "text") TO "postgres"; 2545 | 2546 | 2547 | -- 2548 | -- Name: TABLE "audit_log_entries"; Type: ACL; Schema: auth; Owner: supabase_auth_admin 2549 | -- 2550 | 2551 | GRANT ALL ON TABLE "auth"."audit_log_entries" TO "dashboard_user"; 2552 | GRANT ALL ON TABLE "auth"."audit_log_entries" TO "postgres"; 2553 | 2554 | 2555 | -- 2556 | -- Name: TABLE "identities"; Type: ACL; Schema: auth; Owner: supabase_auth_admin 2557 | -- 2558 | 2559 | GRANT ALL ON TABLE "auth"."identities" TO "postgres"; 2560 | GRANT ALL ON TABLE "auth"."identities" TO "dashboard_user"; 2561 | 2562 | 2563 | -- 2564 | -- Name: TABLE "instances"; Type: ACL; Schema: auth; Owner: supabase_auth_admin 2565 | -- 2566 | 2567 | GRANT ALL ON TABLE "auth"."instances" TO "dashboard_user"; 2568 | GRANT ALL ON TABLE "auth"."instances" TO "postgres"; 2569 | 2570 | 2571 | -- 2572 | -- Name: TABLE "mfa_amr_claims"; Type: ACL; Schema: auth; Owner: supabase_auth_admin 2573 | -- 2574 | 2575 | GRANT ALL ON TABLE "auth"."mfa_amr_claims" TO "postgres"; 2576 | GRANT ALL ON TABLE "auth"."mfa_amr_claims" TO "dashboard_user"; 2577 | 2578 | 2579 | -- 2580 | -- Name: TABLE "mfa_challenges"; Type: ACL; Schema: auth; Owner: supabase_auth_admin 2581 | -- 2582 | 2583 | GRANT ALL ON TABLE "auth"."mfa_challenges" TO "postgres"; 2584 | GRANT ALL ON TABLE "auth"."mfa_challenges" TO "dashboard_user"; 2585 | 2586 | 2587 | -- 2588 | -- Name: TABLE "mfa_factors"; Type: ACL; Schema: auth; Owner: supabase_auth_admin 2589 | -- 2590 | 2591 | GRANT ALL ON TABLE "auth"."mfa_factors" TO "postgres"; 2592 | GRANT ALL ON TABLE "auth"."mfa_factors" TO "dashboard_user"; 2593 | 2594 | 2595 | -- 2596 | -- Name: TABLE "refresh_tokens"; Type: ACL; Schema: auth; Owner: supabase_auth_admin 2597 | -- 2598 | 2599 | GRANT ALL ON TABLE "auth"."refresh_tokens" TO "dashboard_user"; 2600 | GRANT ALL ON TABLE "auth"."refresh_tokens" TO "postgres"; 2601 | 2602 | 2603 | -- 2604 | -- Name: SEQUENCE "refresh_tokens_id_seq"; Type: ACL; Schema: auth; Owner: supabase_auth_admin 2605 | -- 2606 | 2607 | GRANT ALL ON SEQUENCE "auth"."refresh_tokens_id_seq" TO "dashboard_user"; 2608 | GRANT ALL ON SEQUENCE "auth"."refresh_tokens_id_seq" TO "postgres"; 2609 | 2610 | 2611 | -- 2612 | -- Name: TABLE "saml_providers"; Type: ACL; Schema: auth; Owner: supabase_auth_admin 2613 | -- 2614 | 2615 | GRANT ALL ON TABLE "auth"."saml_providers" TO "postgres"; 2616 | GRANT ALL ON TABLE "auth"."saml_providers" TO "dashboard_user"; 2617 | 2618 | 2619 | -- 2620 | -- Name: TABLE "saml_relay_states"; Type: ACL; Schema: auth; Owner: supabase_auth_admin 2621 | -- 2622 | 2623 | GRANT ALL ON TABLE "auth"."saml_relay_states" TO "postgres"; 2624 | GRANT ALL ON TABLE "auth"."saml_relay_states" TO "dashboard_user"; 2625 | 2626 | 2627 | -- 2628 | -- Name: TABLE "schema_migrations"; Type: ACL; Schema: auth; Owner: supabase_auth_admin 2629 | -- 2630 | 2631 | GRANT ALL ON TABLE "auth"."schema_migrations" TO "dashboard_user"; 2632 | GRANT ALL ON TABLE "auth"."schema_migrations" TO "postgres"; 2633 | 2634 | 2635 | -- 2636 | -- Name: TABLE "sessions"; Type: ACL; Schema: auth; Owner: supabase_auth_admin 2637 | -- 2638 | 2639 | GRANT ALL ON TABLE "auth"."sessions" TO "postgres"; 2640 | GRANT ALL ON TABLE "auth"."sessions" TO "dashboard_user"; 2641 | 2642 | 2643 | -- 2644 | -- Name: TABLE "sso_domains"; Type: ACL; Schema: auth; Owner: supabase_auth_admin 2645 | -- 2646 | 2647 | GRANT ALL ON TABLE "auth"."sso_domains" TO "postgres"; 2648 | GRANT ALL ON TABLE "auth"."sso_domains" TO "dashboard_user"; 2649 | 2650 | 2651 | -- 2652 | -- Name: TABLE "sso_providers"; Type: ACL; Schema: auth; Owner: supabase_auth_admin 2653 | -- 2654 | 2655 | GRANT ALL ON TABLE "auth"."sso_providers" TO "postgres"; 2656 | GRANT ALL ON TABLE "auth"."sso_providers" TO "dashboard_user"; 2657 | 2658 | 2659 | -- 2660 | -- Name: TABLE "sso_sessions"; Type: ACL; Schema: auth; Owner: supabase_auth_admin 2661 | -- 2662 | 2663 | GRANT ALL ON TABLE "auth"."sso_sessions" TO "postgres"; 2664 | GRANT ALL ON TABLE "auth"."sso_sessions" TO "dashboard_user"; 2665 | 2666 | 2667 | -- 2668 | -- Name: TABLE "users"; Type: ACL; Schema: auth; Owner: supabase_auth_admin 2669 | -- 2670 | 2671 | GRANT ALL ON TABLE "auth"."users" TO "dashboard_user"; 2672 | GRANT ALL ON TABLE "auth"."users" TO "postgres"; 2673 | 2674 | 2675 | -- 2676 | -- Name: TABLE "pg_stat_statements"; Type: ACL; Schema: extensions; Owner: postgres 2677 | -- 2678 | 2679 | GRANT ALL ON TABLE "extensions"."pg_stat_statements" TO "dashboard_user"; 2680 | 2681 | 2682 | -- 2683 | -- Name: TABLE "pg_stat_statements_info"; Type: ACL; Schema: extensions; Owner: postgres 2684 | -- 2685 | 2686 | GRANT ALL ON TABLE "extensions"."pg_stat_statements_info" TO "dashboard_user"; 2687 | 2688 | 2689 | -- 2690 | -- Name: SEQUENCE "seq_schema_version"; Type: ACL; Schema: graphql; Owner: postgres 2691 | -- 2692 | 2693 | GRANT ALL ON SEQUENCE "graphql"."seq_schema_version" TO "anon"; 2694 | GRANT ALL ON SEQUENCE "graphql"."seq_schema_version" TO "authenticated"; 2695 | GRANT ALL ON SEQUENCE "graphql"."seq_schema_version" TO "service_role"; 2696 | 2697 | 2698 | -- 2699 | -- Name: TABLE "decrypted_key"; Type: ACL; Schema: pgsodium; Owner: postgres 2700 | -- 2701 | 2702 | GRANT ALL ON TABLE "pgsodium"."decrypted_key" TO "pgsodium_keyholder"; 2703 | 2704 | 2705 | -- 2706 | -- Name: TABLE "masking_rule"; Type: ACL; Schema: pgsodium; Owner: postgres 2707 | -- 2708 | 2709 | GRANT ALL ON TABLE "pgsodium"."masking_rule" TO "pgsodium_keyholder"; 2710 | 2711 | 2712 | -- 2713 | -- Name: TABLE "mask_columns"; Type: ACL; Schema: pgsodium; Owner: postgres 2714 | -- 2715 | 2716 | GRANT ALL ON TABLE "pgsodium"."mask_columns" TO "pgsodium_keyholder"; 2717 | 2718 | 2719 | -- 2720 | -- Name: TABLE "boards"; Type: ACL; Schema: public; Owner: postgres 2721 | -- 2722 | 2723 | GRANT ALL ON TABLE "public"."boards" TO "anon"; 2724 | GRANT ALL ON TABLE "public"."boards" TO "authenticated"; 2725 | GRANT ALL ON TABLE "public"."boards" TO "service_role"; 2726 | 2727 | 2728 | -- 2729 | -- Name: SEQUENCE "boards_id_seq"; Type: ACL; Schema: public; Owner: postgres 2730 | -- 2731 | 2732 | GRANT ALL ON SEQUENCE "public"."boards_id_seq" TO "anon"; 2733 | GRANT ALL ON SEQUENCE "public"."boards_id_seq" TO "authenticated"; 2734 | GRANT ALL ON SEQUENCE "public"."boards_id_seq" TO "service_role"; 2735 | 2736 | 2737 | -- 2738 | -- Name: TABLE "cards"; Type: ACL; Schema: public; Owner: postgres 2739 | -- 2740 | 2741 | GRANT ALL ON TABLE "public"."cards" TO "anon"; 2742 | GRANT ALL ON TABLE "public"."cards" TO "authenticated"; 2743 | GRANT ALL ON TABLE "public"."cards" TO "service_role"; 2744 | 2745 | 2746 | -- 2747 | -- Name: SEQUENCE "cards_id_seq"; Type: ACL; Schema: public; Owner: postgres 2748 | -- 2749 | 2750 | GRANT ALL ON SEQUENCE "public"."cards_id_seq" TO "anon"; 2751 | GRANT ALL ON SEQUENCE "public"."cards_id_seq" TO "authenticated"; 2752 | GRANT ALL ON SEQUENCE "public"."cards_id_seq" TO "service_role"; 2753 | 2754 | 2755 | -- 2756 | -- Name: TABLE "lists"; Type: ACL; Schema: public; Owner: postgres 2757 | -- 2758 | 2759 | GRANT ALL ON TABLE "public"."lists" TO "anon"; 2760 | GRANT ALL ON TABLE "public"."lists" TO "authenticated"; 2761 | GRANT ALL ON TABLE "public"."lists" TO "service_role"; 2762 | 2763 | 2764 | -- 2765 | -- Name: SEQUENCE "lists_id_seq"; Type: ACL; Schema: public; Owner: postgres 2766 | -- 2767 | 2768 | GRANT ALL ON SEQUENCE "public"."lists_id_seq" TO "anon"; 2769 | GRANT ALL ON SEQUENCE "public"."lists_id_seq" TO "authenticated"; 2770 | GRANT ALL ON SEQUENCE "public"."lists_id_seq" TO "service_role"; 2771 | 2772 | 2773 | -- 2774 | -- Name: TABLE "buckets"; Type: ACL; Schema: storage; Owner: supabase_storage_admin 2775 | -- 2776 | 2777 | GRANT ALL ON TABLE "storage"."buckets" TO "anon"; 2778 | GRANT ALL ON TABLE "storage"."buckets" TO "authenticated"; 2779 | GRANT ALL ON TABLE "storage"."buckets" TO "service_role"; 2780 | GRANT ALL ON TABLE "storage"."buckets" TO "postgres"; 2781 | 2782 | 2783 | -- 2784 | -- Name: TABLE "migrations"; Type: ACL; Schema: storage; Owner: supabase_storage_admin 2785 | -- 2786 | 2787 | GRANT ALL ON TABLE "storage"."migrations" TO "anon"; 2788 | GRANT ALL ON TABLE "storage"."migrations" TO "authenticated"; 2789 | GRANT ALL ON TABLE "storage"."migrations" TO "service_role"; 2790 | GRANT ALL ON TABLE "storage"."migrations" TO "postgres"; 2791 | 2792 | 2793 | -- 2794 | -- Name: TABLE "objects"; Type: ACL; Schema: storage; Owner: supabase_storage_admin 2795 | -- 2796 | 2797 | GRANT ALL ON TABLE "storage"."objects" TO "anon"; 2798 | GRANT ALL ON TABLE "storage"."objects" TO "authenticated"; 2799 | GRANT ALL ON TABLE "storage"."objects" TO "service_role"; 2800 | GRANT ALL ON TABLE "storage"."objects" TO "postgres"; 2801 | 2802 | 2803 | -- 2804 | -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: auth; Owner: supabase_auth_admin 2805 | -- 2806 | 2807 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_auth_admin" IN SCHEMA "auth" GRANT ALL ON SEQUENCES TO "postgres"; 2808 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_auth_admin" IN SCHEMA "auth" GRANT ALL ON SEQUENCES TO "dashboard_user"; 2809 | 2810 | 2811 | -- 2812 | -- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: auth; Owner: supabase_auth_admin 2813 | -- 2814 | 2815 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_auth_admin" IN SCHEMA "auth" GRANT ALL ON FUNCTIONS TO "postgres"; 2816 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_auth_admin" IN SCHEMA "auth" GRANT ALL ON FUNCTIONS TO "dashboard_user"; 2817 | 2818 | 2819 | -- 2820 | -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: auth; Owner: supabase_auth_admin 2821 | -- 2822 | 2823 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_auth_admin" IN SCHEMA "auth" GRANT ALL ON TABLES TO "postgres"; 2824 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_auth_admin" IN SCHEMA "auth" GRANT ALL ON TABLES TO "dashboard_user"; 2825 | 2826 | 2827 | -- 2828 | -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: graphql; Owner: supabase_admin 2829 | -- 2830 | 2831 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql" GRANT ALL ON SEQUENCES TO "postgres"; 2832 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql" GRANT ALL ON SEQUENCES TO "anon"; 2833 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql" GRANT ALL ON SEQUENCES TO "authenticated"; 2834 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql" GRANT ALL ON SEQUENCES TO "service_role"; 2835 | 2836 | 2837 | -- 2838 | -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: graphql; Owner: postgres 2839 | -- 2840 | 2841 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "graphql" GRANT ALL ON SEQUENCES TO "postgres"; 2842 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "graphql" GRANT ALL ON SEQUENCES TO "anon"; 2843 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "graphql" GRANT ALL ON SEQUENCES TO "authenticated"; 2844 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "graphql" GRANT ALL ON SEQUENCES TO "service_role"; 2845 | 2846 | 2847 | -- 2848 | -- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: graphql; Owner: supabase_admin 2849 | -- 2850 | 2851 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql" GRANT ALL ON FUNCTIONS TO "postgres"; 2852 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql" GRANT ALL ON FUNCTIONS TO "anon"; 2853 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql" GRANT ALL ON FUNCTIONS TO "authenticated"; 2854 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql" GRANT ALL ON FUNCTIONS TO "service_role"; 2855 | 2856 | 2857 | -- 2858 | -- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: graphql; Owner: postgres 2859 | -- 2860 | 2861 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "graphql" GRANT ALL ON FUNCTIONS TO "postgres"; 2862 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "graphql" GRANT ALL ON FUNCTIONS TO "anon"; 2863 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "graphql" GRANT ALL ON FUNCTIONS TO "authenticated"; 2864 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "graphql" GRANT ALL ON FUNCTIONS TO "service_role"; 2865 | 2866 | 2867 | -- 2868 | -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: graphql; Owner: supabase_admin 2869 | -- 2870 | 2871 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql" GRANT ALL ON TABLES TO "postgres"; 2872 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql" GRANT ALL ON TABLES TO "anon"; 2873 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql" GRANT ALL ON TABLES TO "authenticated"; 2874 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql" GRANT ALL ON TABLES TO "service_role"; 2875 | 2876 | 2877 | -- 2878 | -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: graphql; Owner: postgres 2879 | -- 2880 | 2881 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "graphql" GRANT ALL ON TABLES TO "postgres"; 2882 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "graphql" GRANT ALL ON TABLES TO "anon"; 2883 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "graphql" GRANT ALL ON TABLES TO "authenticated"; 2884 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "graphql" GRANT ALL ON TABLES TO "service_role"; 2885 | 2886 | 2887 | -- 2888 | -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: graphql_public; Owner: supabase_admin 2889 | -- 2890 | 2891 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql_public" GRANT ALL ON SEQUENCES TO "postgres"; 2892 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql_public" GRANT ALL ON SEQUENCES TO "anon"; 2893 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql_public" GRANT ALL ON SEQUENCES TO "authenticated"; 2894 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql_public" GRANT ALL ON SEQUENCES TO "service_role"; 2895 | 2896 | 2897 | -- 2898 | -- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: graphql_public; Owner: supabase_admin 2899 | -- 2900 | 2901 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql_public" GRANT ALL ON FUNCTIONS TO "postgres"; 2902 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql_public" GRANT ALL ON FUNCTIONS TO "anon"; 2903 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql_public" GRANT ALL ON FUNCTIONS TO "authenticated"; 2904 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql_public" GRANT ALL ON FUNCTIONS TO "service_role"; 2905 | 2906 | 2907 | -- 2908 | -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: graphql_public; Owner: supabase_admin 2909 | -- 2910 | 2911 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql_public" GRANT ALL ON TABLES TO "postgres"; 2912 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql_public" GRANT ALL ON TABLES TO "anon"; 2913 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql_public" GRANT ALL ON TABLES TO "authenticated"; 2914 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql_public" GRANT ALL ON TABLES TO "service_role"; 2915 | 2916 | 2917 | -- 2918 | -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: public; Owner: postgres 2919 | -- 2920 | 2921 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "public" GRANT ALL ON SEQUENCES TO "postgres"; 2922 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "public" GRANT ALL ON SEQUENCES TO "anon"; 2923 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "public" GRANT ALL ON SEQUENCES TO "authenticated"; 2924 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "public" GRANT ALL ON SEQUENCES TO "service_role"; 2925 | 2926 | 2927 | -- 2928 | -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: public; Owner: supabase_admin 2929 | -- 2930 | 2931 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "public" GRANT ALL ON SEQUENCES TO "postgres"; 2932 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "public" GRANT ALL ON SEQUENCES TO "anon"; 2933 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "public" GRANT ALL ON SEQUENCES TO "authenticated"; 2934 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "public" GRANT ALL ON SEQUENCES TO "service_role"; 2935 | 2936 | 2937 | -- 2938 | -- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: public; Owner: postgres 2939 | -- 2940 | 2941 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "public" GRANT ALL ON FUNCTIONS TO "postgres"; 2942 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "public" GRANT ALL ON FUNCTIONS TO "anon"; 2943 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "public" GRANT ALL ON FUNCTIONS TO "authenticated"; 2944 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "public" GRANT ALL ON FUNCTIONS TO "service_role"; 2945 | 2946 | 2947 | -- 2948 | -- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: public; Owner: supabase_admin 2949 | -- 2950 | 2951 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "public" GRANT ALL ON FUNCTIONS TO "postgres"; 2952 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "public" GRANT ALL ON FUNCTIONS TO "anon"; 2953 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "public" GRANT ALL ON FUNCTIONS TO "authenticated"; 2954 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "public" GRANT ALL ON FUNCTIONS TO "service_role"; 2955 | 2956 | 2957 | -- 2958 | -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: public; Owner: postgres 2959 | -- 2960 | 2961 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "public" GRANT ALL ON TABLES TO "postgres"; 2962 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "public" GRANT ALL ON TABLES TO "anon"; 2963 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "public" GRANT ALL ON TABLES TO "authenticated"; 2964 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "public" GRANT ALL ON TABLES TO "service_role"; 2965 | 2966 | 2967 | -- 2968 | -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: public; Owner: supabase_admin 2969 | -- 2970 | 2971 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "public" GRANT ALL ON TABLES TO "postgres"; 2972 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "public" GRANT ALL ON TABLES TO "anon"; 2973 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "public" GRANT ALL ON TABLES TO "authenticated"; 2974 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "public" GRANT ALL ON TABLES TO "service_role"; 2975 | 2976 | 2977 | -- 2978 | -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: realtime; Owner: supabase_admin 2979 | -- 2980 | 2981 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "realtime" GRANT ALL ON SEQUENCES TO "postgres"; 2982 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "realtime" GRANT ALL ON SEQUENCES TO "dashboard_user"; 2983 | 2984 | 2985 | -- 2986 | -- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: realtime; Owner: supabase_admin 2987 | -- 2988 | 2989 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "realtime" GRANT ALL ON FUNCTIONS TO "postgres"; 2990 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "realtime" GRANT ALL ON FUNCTIONS TO "dashboard_user"; 2991 | 2992 | 2993 | -- 2994 | -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: realtime; Owner: supabase_admin 2995 | -- 2996 | 2997 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "realtime" GRANT ALL ON TABLES TO "postgres"; 2998 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "realtime" GRANT ALL ON TABLES TO "dashboard_user"; 2999 | 3000 | 3001 | -- 3002 | -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: storage; Owner: postgres 3003 | -- 3004 | 3005 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "storage" GRANT ALL ON SEQUENCES TO "postgres"; 3006 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "storage" GRANT ALL ON SEQUENCES TO "anon"; 3007 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "storage" GRANT ALL ON SEQUENCES TO "authenticated"; 3008 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "storage" GRANT ALL ON SEQUENCES TO "service_role"; 3009 | 3010 | 3011 | -- 3012 | -- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: storage; Owner: postgres 3013 | -- 3014 | 3015 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "storage" GRANT ALL ON FUNCTIONS TO "postgres"; 3016 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "storage" GRANT ALL ON FUNCTIONS TO "anon"; 3017 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "storage" GRANT ALL ON FUNCTIONS TO "authenticated"; 3018 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "storage" GRANT ALL ON FUNCTIONS TO "service_role"; 3019 | 3020 | 3021 | -- 3022 | -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: storage; Owner: postgres 3023 | -- 3024 | 3025 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "storage" GRANT ALL ON TABLES TO "postgres"; 3026 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "storage" GRANT ALL ON TABLES TO "anon"; 3027 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "storage" GRANT ALL ON TABLES TO "authenticated"; 3028 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "storage" GRANT ALL ON TABLES TO "service_role"; 3029 | 3030 | 3031 | -- 3032 | -- PostgreSQL database dump complete 3033 | -- 3034 | 3035 | RESET ALL; 3036 | -------------------------------------------------------------------------------- /supabase/config.toml: -------------------------------------------------------------------------------- 1 | # A string used to distinguish different Supabase projects on the same host. Defaults to the working 2 | # directory name when running `supabase init`. 3 | project_id = "svelte-kanban" 4 | 5 | [api] 6 | # Port to use for the API URL. 7 | port = 54321 8 | # Schemas to expose in your API. Tables, views and stored procedures in this schema will get API 9 | # endpoints. public and storage are always included. 10 | schemas = [] 11 | # Extra schemas to add to the search_path of every request. 12 | extra_search_path = ["extensions"] 13 | # The maximum number of rows returns from a view, table, or stored procedure. Limits payload size 14 | # for accidental or malicious requests. 15 | max_rows = 1000 16 | 17 | [db] 18 | # Port to use for the local database URL. 19 | port = 54322 20 | # The database major version to use. This has to be the same as your remote database's. Run `SHOW 21 | # server_version;` on the remote database to check. 22 | major_version = 15 23 | 24 | [studio] 25 | # Port to use for Supabase Studio. 26 | port = 54323 27 | 28 | # Email testing server. Emails sent with the local dev setup are not actually sent - rather, they 29 | # are monitored, and you can view the emails that would have been sent from the web interface. 30 | [inbucket] 31 | # Port to use for the email testing server web interface. 32 | port = 54324 33 | smtp_port = 54325 34 | pop3_port = 54326 35 | 36 | [storage] 37 | # The maximum file size allowed (e.g. "5MB", "500KB"). 38 | file_size_limit = "50MiB" 39 | 40 | [auth] 41 | # The base URL of your website. Used as an allow-list for redirects and for constructing URLs used 42 | # in emails. 43 | site_url = "http://localhost:5173" 44 | # A list of *exact* URLs that auth providers are permitted to redirect to post authentication. 45 | additional_redirect_urls = ["https://localhost:5173"] 46 | # How long tokens are valid for, in seconds. Defaults to 3600 (1 hour), maximum 604,800 seconds (one 47 | # week). 48 | jwt_expiry = 3600 49 | # Allow/disallow new user signups to your project. 50 | enable_signup = true 51 | 52 | [auth.email] 53 | # Allow/disallow new user signups via email to your project. 54 | enable_signup = true 55 | # If enabled, a user will be required to confirm any email change on both the old, and new email 56 | # addresses. If disabled, only the new email is required to confirm. 57 | double_confirm_changes = true 58 | # If enabled, users need to confirm their email address before signing in. 59 | enable_confirmations = false 60 | 61 | # Use an external OAuth provider. The full list of providers are: `apple`, `azure`, `bitbucket`, 62 | # `discord`, `facebook`, `github`, `gitlab`, `google`, `twitch`, `twitter`, `slack`, `spotify`. 63 | [auth.external.apple] 64 | enabled = false 65 | client_id = "" 66 | secret = "" 67 | # Overrides the default auth redirectUrl. 68 | redirect_uri = "" 69 | # Overrides the default auth provider URL. Used to support self-hosted gitlab, single-tenant Azure, 70 | # or any other third-party OIDC providers. 71 | url = "" 72 | -------------------------------------------------------------------------------- /supabase/seed.sql: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/supabase-community/svelte-kanban/93d3c701aa8cf36472670dd88a6337140e000016/supabase/seed.sql -------------------------------------------------------------------------------- /svelte.config.js: -------------------------------------------------------------------------------- 1 | import adapter from '@sveltejs/adapter-auto'; 2 | 3 | /** @type {import('@sveltejs/kit').Config} */ 4 | const config = { 5 | kit: { 6 | adapter: adapter() 7 | } 8 | }; 9 | 10 | export default config; 11 | -------------------------------------------------------------------------------- /vite.config.js: -------------------------------------------------------------------------------- 1 | import { sveltekit } from '@sveltejs/kit/vite'; 2 | 3 | /** @type {import('vite').UserConfig} */ 4 | const config = { 5 | plugins: [sveltekit()], 6 | test: { 7 | include: ['src/**/*.{test,spec}.{js,ts}'] 8 | } 9 | }; 10 | 11 | export default config; 12 | --------------------------------------------------------------------------------