├── .env.example
├── .eslintignore
├── .eslintrc.cjs
├── .gitignore
├── .npmrc
├── .prettierignore
├── .prettierrc
├── LICENSE
├── README.md
├── index.html
├── jsconfig.json
├── package.json
├── pnpm-lock.yaml
├── screenshot.png
├── setup.sql
├── src
├── app.d.ts
├── app.html
├── index.test.js
└── routes
│ ├── +layout.js
│ ├── +page.svelte
│ ├── BoardList.svelte
│ ├── Header.svelte
│ ├── Login.svelte
│ ├── boards
│ └── [id]
│ │ ├── +page.js
│ │ ├── +page.svelte
│ │ ├── AddForm.svelte
│ │ ├── AddList.svelte
│ │ ├── InPlaceEdit.svelte
│ │ └── List.svelte
│ └── db.js
├── static
├── favicon.png
├── global.css
├── logo.svg
└── robots.txt
├── supabase
├── .branches
│ ├── _current_branch
│ └── main
│ │ └── dump.sql
├── config.toml
└── seed.sql
├── svelte.config.js
└── vite.config.js
/.env.example:
--------------------------------------------------------------------------------
1 | PUBLIC_SUPABASE_URL="supabase_url"
2 | PUBLIC_SUPABASE_KEY="supabase_anon_key"
3 |
--------------------------------------------------------------------------------
/.eslintignore:
--------------------------------------------------------------------------------
1 | .DS_Store
2 | node_modules
3 | /build
4 | /.svelte-kit
5 | /package
6 | .env
7 | .env.*
8 | !.env.example
9 |
10 | # Ignore files for PNPM, NPM and YARN
11 | pnpm-lock.yaml
12 | package-lock.json
13 | yarn.lock
14 |
--------------------------------------------------------------------------------
/.eslintrc.cjs:
--------------------------------------------------------------------------------
1 | module.exports = {
2 | root: true,
3 | extends: ['eslint:recommended', 'prettier'],
4 | plugins: ['svelte3'],
5 | overrides: [{ files: ['*.svelte'], processor: 'svelte3/svelte3' }],
6 | parserOptions: {
7 | sourceType: 'module',
8 | ecmaVersion: 2020
9 | },
10 | env: {
11 | browser: true,
12 | es2017: true,
13 | node: true
14 | }
15 | };
16 |
--------------------------------------------------------------------------------
/.gitignore:
--------------------------------------------------------------------------------
1 | .DS_Store
2 | node_modules
3 | /build
4 | /.svelte-kit
5 | /package
6 | .env
7 | .env.*
8 | !.env.example
9 | vite.config.js.timestamp-*
10 | vite.config.ts.timestamp-*
--------------------------------------------------------------------------------
/.npmrc:
--------------------------------------------------------------------------------
1 | auto-install-peers=true
--------------------------------------------------------------------------------
/.prettierignore:
--------------------------------------------------------------------------------
1 | .DS_Store
2 | node_modules
3 | /build
4 | /.svelte-kit
5 | /package
6 | .env
7 | .env.*
8 | !.env.example
9 |
10 | # Ignore files for PNPM, NPM and YARN
11 | pnpm-lock.yaml
12 | package-lock.json
13 | yarn.lock
14 |
--------------------------------------------------------------------------------
/.prettierrc:
--------------------------------------------------------------------------------
1 | {
2 | "useTabs": true,
3 | "singleQuote": true,
4 | "trailingComma": "none",
5 | "printWidth": 100,
6 | "plugins": ["prettier-plugin-svelte"],
7 | "pluginSearchDirs": ["."],
8 | "overrides": [{ "files": "*.svelte", "options": { "parser": "svelte" } }]
9 | }
10 |
--------------------------------------------------------------------------------
/LICENSE:
--------------------------------------------------------------------------------
1 | MIT License
2 |
3 | Copyright (c) 2019 Fred K. Schott
4 |
5 | Permission is hereby granted, free of charge, to any person obtaining a copy
6 | of this software and associated documentation files (the "Software"), to deal
7 | in the Software without restriction, including without limitation the rights
8 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9 | copies of the Software, and to permit persons to whom the Software is
10 | furnished to do so, subject to the following conditions:
11 |
12 | The above copyright notice and this permission notice shall be included in all
13 | copies or substantial portions of the Software.
14 |
15 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
21 | SOFTWARE.
22 |
--------------------------------------------------------------------------------
/README.md:
--------------------------------------------------------------------------------
1 | # Supabase/Svelte Kanban
2 |
3 | A [Trello](https://trello.com) clone using [Supabase](https://supabase.io) as the storage system.
4 |
5 | ## [Live Demo](https://supabase-kanban.vercel.app/)
6 |
7 | ### Screenshot
8 |
9 | 
10 |
11 | # Setup locally
12 |
13 | 1. Clone the repo with `gh repo clone supabase-community/supabase-kanban` and install dependencies with `pnpm install`
14 | 2. Setup the database on [supabase](https://supabase.io) and run the commands in [`setup.sql`](https://github.com/supabase-community/supabase-kanban/blob/main/setup.sql)
15 | 3. Rename `.env.example` to `.env` and update the credentials
16 | 4. Start development server with `pnpm dev`
17 | 5. Done!
18 |
19 | ## Developing
20 |
21 | Once you've created a project and installed dependencies with `npm install` (or `pnpm install` or `yarn`), start a development server:
22 |
23 | ```bash
24 | npm run dev
25 |
26 | # or start the server and open the app in a new browser tab
27 | npm run dev -- --open
28 | ```
29 |
30 | ## Building
31 |
32 | To create a production version of your app:
33 |
34 | ```bash
35 | npm run build
36 | ```
37 |
38 | You can preview the production build with `npm run preview`.
39 |
40 | > To deploy your app, you may need to install an [adapter](https://kit.svelte.dev/docs/adapters) for your target environment.
41 |
42 | # License
43 |
44 | MIT
--------------------------------------------------------------------------------
/index.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 | Svelte Kanban
9 |
10 |
11 |
12 |
13 |
14 |
24 |
25 |
26 |
--------------------------------------------------------------------------------
/jsconfig.json:
--------------------------------------------------------------------------------
1 | {
2 | "extends": "./.svelte-kit/tsconfig.json",
3 | "compilerOptions": {
4 | "allowJs": true,
5 | "checkJs": false,
6 | "esModuleInterop": true,
7 | "forceConsistentCasingInFileNames": true,
8 | "resolveJsonModule": true,
9 | "skipLibCheck": true,
10 | "sourceMap": true,
11 | "strict": false
12 | }
13 | // Path aliases are handled by https://kit.svelte.dev/docs/configuration#alias and https://kit.svelte.dev/docs/configuration#files
14 | //
15 | // If you want to overwrite includes/excludes, make sure to copy over the relevant includes/excludes
16 | // from the referenced tsconfig.json - TypeScript does not merge them in
17 | }
18 |
--------------------------------------------------------------------------------
/package.json:
--------------------------------------------------------------------------------
1 | {
2 | "name": "svelte-kanban",
3 | "version": "0.3.0",
4 | "private": true,
5 | "scripts": {
6 | "dev": "vite dev",
7 | "build": "vite build",
8 | "preview": "vite preview",
9 | "check": "svelte-kit sync && svelte-check --tsconfig ./jsconfig.json",
10 | "check:watch": "svelte-kit sync && svelte-check --tsconfig ./jsconfig.json --watch",
11 | "test:unit": "vitest",
12 | "lint": "prettier --plugin-search-dir . --check . && eslint .",
13 | "format": "prettier --plugin-search-dir . --write ."
14 | },
15 | "devDependencies": {
16 | "@sveltejs/adapter-auto": "^1.0.0",
17 | "@sveltejs/kit": "^1.0.0",
18 | "eslint": "^8.28.0",
19 | "eslint-config-prettier": "^8.5.0",
20 | "eslint-plugin-svelte3": "^4.0.0",
21 | "gravatar-url": "^4.0.1",
22 | "prettier": "^2.8.0",
23 | "prettier-plugin-svelte": "^2.8.1",
24 | "svelte": "^3.54.0",
25 | "svelte-check": "^2.9.2",
26 | "svelte-dnd-action": "^0.9.22",
27 | "typescript": "^4.9.3",
28 | "vite": "^4.0.0",
29 | "vitest": "^0.25.3"
30 | },
31 | "type": "module",
32 | "dependencies": {
33 | "@supabase/supabase-js": "2.2.3"
34 | }
35 | }
36 |
--------------------------------------------------------------------------------
/pnpm-lock.yaml:
--------------------------------------------------------------------------------
1 | lockfileVersion: 5.4
2 |
3 | specifiers:
4 | '@supabase/supabase-js': 2.2.3
5 | '@sveltejs/adapter-auto': ^1.0.0
6 | '@sveltejs/kit': ^1.0.0
7 | eslint: ^8.28.0
8 | eslint-config-prettier: ^8.5.0
9 | eslint-plugin-svelte3: ^4.0.0
10 | gravatar-url: ^4.0.1
11 | prettier: ^2.8.0
12 | prettier-plugin-svelte: ^2.8.1
13 | svelte: ^3.54.0
14 | svelte-check: ^2.9.2
15 | svelte-dnd-action: ^0.9.22
16 | typescript: ^4.9.3
17 | vite: ^4.0.0
18 | vitest: ^0.25.3
19 |
20 | dependencies:
21 | '@supabase/supabase-js': 2.2.3
22 |
23 | devDependencies:
24 | '@sveltejs/adapter-auto': 1.0.0_@sveltejs+kit@1.0.1
25 | '@sveltejs/kit': 1.0.1_svelte@3.55.0+vite@4.0.3
26 | eslint: 8.30.0
27 | eslint-config-prettier: 8.5.0_eslint@8.30.0
28 | eslint-plugin-svelte3: 4.0.0_khrjkzzv5v2x7orkj5o7sxbz3a
29 | gravatar-url: 4.0.1
30 | prettier: 2.8.1
31 | prettier-plugin-svelte: 2.9.0_ajxj753sv7dbwexjherrch25ta
32 | svelte: 3.55.0
33 | svelte-check: 2.10.3_svelte@3.55.0
34 | svelte-dnd-action: 0.9.22_svelte@3.55.0
35 | typescript: 4.9.4
36 | vite: 4.0.3
37 | vitest: 0.25.8
38 |
39 | packages:
40 |
41 | /@esbuild/android-arm/0.16.12:
42 | resolution: {integrity: sha512-CTWgMJtpCyCltrvipZrrcjjRu+rzm6pf9V8muCsJqtKujR3kPmU4ffbckvugNNaRmhxAF1ZI3J+0FUIFLFg8KA==}
43 | engines: {node: '>=12'}
44 | cpu: [arm]
45 | os: [android]
46 | requiresBuild: true
47 | dev: true
48 | optional: true
49 |
50 | /@esbuild/android-arm64/0.16.12:
51 | resolution: {integrity: sha512-0LacmiIW+X0/LOLMZqYtZ7d4uY9fxYABAYhSSOu+OGQVBqH4N5eIYgkT7bBFnR4Nm3qo6qS3RpHKVrDASqj/uQ==}
52 | engines: {node: '>=12'}
53 | cpu: [arm64]
54 | os: [android]
55 | requiresBuild: true
56 | dev: true
57 | optional: true
58 |
59 | /@esbuild/android-x64/0.16.12:
60 | resolution: {integrity: sha512-sS5CR3XBKQXYpSGMM28VuiUnbX83Z+aWPZzClW+OB2JquKqxoiwdqucJ5qvXS8pM6Up3RtJfDnRQZkz3en2z5g==}
61 | engines: {node: '>=12'}
62 | cpu: [x64]
63 | os: [android]
64 | requiresBuild: true
65 | dev: true
66 | optional: true
67 |
68 | /@esbuild/darwin-arm64/0.16.12:
69 | resolution: {integrity: sha512-Dpe5hOAQiQRH20YkFAg+wOpcd4PEuXud+aGgKBQa/VriPJA8zuVlgCOSTwna1CgYl05lf6o5els4dtuyk1qJxQ==}
70 | engines: {node: '>=12'}
71 | cpu: [arm64]
72 | os: [darwin]
73 | requiresBuild: true
74 | dev: true
75 | optional: true
76 |
77 | /@esbuild/darwin-x64/0.16.12:
78 | resolution: {integrity: sha512-ApGRA6X5txIcxV0095X4e4KKv87HAEXfuDRcGTniDWUUN+qPia8sl/BqG/0IomytQWajnUn4C7TOwHduk/FXBQ==}
79 | engines: {node: '>=12'}
80 | cpu: [x64]
81 | os: [darwin]
82 | requiresBuild: true
83 | dev: true
84 | optional: true
85 |
86 | /@esbuild/freebsd-arm64/0.16.12:
87 | resolution: {integrity: sha512-AMdK2gA9EU83ccXCWS1B/KcWYZCj4P3vDofZZkl/F/sBv/fphi2oUqUTox/g5GMcIxk8CF1CVYTC82+iBSyiUg==}
88 | engines: {node: '>=12'}
89 | cpu: [arm64]
90 | os: [freebsd]
91 | requiresBuild: true
92 | dev: true
93 | optional: true
94 |
95 | /@esbuild/freebsd-x64/0.16.12:
96 | resolution: {integrity: sha512-KUKB9w8G/xaAbD39t6gnRBuhQ8vIYYlxGT2I+mT6UGRnCGRr1+ePFIGBQmf5V16nxylgUuuWVW1zU2ktKkf6WQ==}
97 | engines: {node: '>=12'}
98 | cpu: [x64]
99 | os: [freebsd]
100 | requiresBuild: true
101 | dev: true
102 | optional: true
103 |
104 | /@esbuild/linux-arm/0.16.12:
105 | resolution: {integrity: sha512-vhDdIv6z4eL0FJyNVfdr3C/vdd/Wc6h1683GJsFoJzfKb92dU/v88FhWdigg0i6+3TsbSDeWbsPUXb4dif2abg==}
106 | engines: {node: '>=12'}
107 | cpu: [arm]
108 | os: [linux]
109 | requiresBuild: true
110 | dev: true
111 | optional: true
112 |
113 | /@esbuild/linux-arm64/0.16.12:
114 | resolution: {integrity: sha512-29HXMLpLklDfmw7T2buGqq3HImSUaZ1ArmrPOMaNiZZQptOSZs32SQtOHEl8xWX5vfdwZqrBfNf8Te4nArVzKQ==}
115 | engines: {node: '>=12'}
116 | cpu: [arm64]
117 | os: [linux]
118 | requiresBuild: true
119 | dev: true
120 | optional: true
121 |
122 | /@esbuild/linux-ia32/0.16.12:
123 | resolution: {integrity: sha512-JFDuNDTTfgD1LJg7wHA42o2uAO/9VzHYK0leAVnCQE/FdMB599YMH73ux+nS0xGr79pv/BK+hrmdRin3iLgQjg==}
124 | engines: {node: '>=12'}
125 | cpu: [ia32]
126 | os: [linux]
127 | requiresBuild: true
128 | dev: true
129 | optional: true
130 |
131 | /@esbuild/linux-loong64/0.16.12:
132 | resolution: {integrity: sha512-xTGzVPqm6WKfCC0iuj1fryIWr1NWEM8DMhAIo+4rFgUtwy/lfHl+Obvus4oddzRDbBetLLmojfVZGmt/g/g+Rw==}
133 | engines: {node: '>=12'}
134 | cpu: [loong64]
135 | os: [linux]
136 | requiresBuild: true
137 | dev: true
138 | optional: true
139 |
140 | /@esbuild/linux-mips64el/0.16.12:
141 | resolution: {integrity: sha512-zI1cNgHa3Gol+vPYjIYHzKhU6qMyOQrvZ82REr5Fv7rlh5PG6SkkuCoH7IryPqR+BK2c/7oISGsvPJPGnO2bHQ==}
142 | engines: {node: '>=12'}
143 | cpu: [mips64el]
144 | os: [linux]
145 | requiresBuild: true
146 | dev: true
147 | optional: true
148 |
149 | /@esbuild/linux-ppc64/0.16.12:
150 | resolution: {integrity: sha512-/C8OFXExoMmvTDIOAM54AhtmmuDHKoedUd0Otpfw3+AuuVGemA1nQK99oN909uZbLEU6Bi+7JheFMG3xGfZluQ==}
151 | engines: {node: '>=12'}
152 | cpu: [ppc64]
153 | os: [linux]
154 | requiresBuild: true
155 | dev: true
156 | optional: true
157 |
158 | /@esbuild/linux-riscv64/0.16.12:
159 | resolution: {integrity: sha512-qeouyyc8kAGV6Ni6Isz8hUsKMr00EHgVwUKWNp1r4l88fHEoNTDB8mmestvykW6MrstoGI7g2EAsgr0nxmuGYg==}
160 | engines: {node: '>=12'}
161 | cpu: [riscv64]
162 | os: [linux]
163 | requiresBuild: true
164 | dev: true
165 | optional: true
166 |
167 | /@esbuild/linux-s390x/0.16.12:
168 | resolution: {integrity: sha512-s9AyI/5vz1U4NNqnacEGFElqwnHusWa81pskAf8JNDM2eb6b2E6PpBmT8RzeZv6/TxE6/TADn2g9bb0jOUmXwQ==}
169 | engines: {node: '>=12'}
170 | cpu: [s390x]
171 | os: [linux]
172 | requiresBuild: true
173 | dev: true
174 | optional: true
175 |
176 | /@esbuild/linux-x64/0.16.12:
177 | resolution: {integrity: sha512-e8YA7GQGLWhvakBecLptUiKxOk4E/EPtSckS1i0MGYctW8ouvNUoh7xnU15PGO2jz7BYl8q1R6g0gE5HFtzpqQ==}
178 | engines: {node: '>=12'}
179 | cpu: [x64]
180 | os: [linux]
181 | requiresBuild: true
182 | dev: true
183 | optional: true
184 |
185 | /@esbuild/netbsd-x64/0.16.12:
186 | resolution: {integrity: sha512-z2+kUxmOqBS+6SRVd57iOLIHE8oGOoEnGVAmwjm2aENSP35HPS+5cK+FL1l+rhrsJOFIPrNHqDUNechpuG96Sg==}
187 | engines: {node: '>=12'}
188 | cpu: [x64]
189 | os: [netbsd]
190 | requiresBuild: true
191 | dev: true
192 | optional: true
193 |
194 | /@esbuild/openbsd-x64/0.16.12:
195 | resolution: {integrity: sha512-PAonw4LqIybwn2/vJujhbg1N9W2W8lw9RtXIvvZoyzoA/4rA4CpiuahVbASmQohiytRsixbNoIOUSjRygKXpyA==}
196 | engines: {node: '>=12'}
197 | cpu: [x64]
198 | os: [openbsd]
199 | requiresBuild: true
200 | dev: true
201 | optional: true
202 |
203 | /@esbuild/sunos-x64/0.16.12:
204 | resolution: {integrity: sha512-+wr1tkt1RERi+Zi/iQtkzmMH4nS8+7UIRxjcyRz7lur84wCkAITT50Olq/HiT4JN2X2bjtlOV6vt7ptW5Gw60Q==}
205 | engines: {node: '>=12'}
206 | cpu: [x64]
207 | os: [sunos]
208 | requiresBuild: true
209 | dev: true
210 | optional: true
211 |
212 | /@esbuild/win32-arm64/0.16.12:
213 | resolution: {integrity: sha512-XEjeUSHmjsAOJk8+pXJu9pFY2O5KKQbHXZWQylJzQuIBeiGrpMeq9sTVrHefHxMOyxUgoKQTcaTS+VK/K5SviA==}
214 | engines: {node: '>=12'}
215 | cpu: [arm64]
216 | os: [win32]
217 | requiresBuild: true
218 | dev: true
219 | optional: true
220 |
221 | /@esbuild/win32-ia32/0.16.12:
222 | resolution: {integrity: sha512-eRKPM7e0IecUAUYr2alW7JGDejrFJXmpjt4MlfonmQ5Rz9HWpKFGCjuuIRgKO7W9C/CWVFXdJ2GjddsBXqQI4A==}
223 | engines: {node: '>=12'}
224 | cpu: [ia32]
225 | os: [win32]
226 | requiresBuild: true
227 | dev: true
228 | optional: true
229 |
230 | /@esbuild/win32-x64/0.16.12:
231 | resolution: {integrity: sha512-iPYKN78t3op2+erv2frW568j1q0RpqX6JOLZ7oPPaAV1VaF7dDstOrNw37PVOYoTWE11pV4A1XUitpdEFNIsPg==}
232 | engines: {node: '>=12'}
233 | cpu: [x64]
234 | os: [win32]
235 | requiresBuild: true
236 | dev: true
237 | optional: true
238 |
239 | /@eslint/eslintrc/1.4.0:
240 | resolution: {integrity: sha512-7yfvXy6MWLgWSFsLhz5yH3iQ52St8cdUY6FoGieKkRDVxuxmrNuUetIuu6cmjNWwniUHiWXjxCr5tTXDrbYS5A==}
241 | engines: {node: ^12.22.0 || ^14.17.0 || >=16.0.0}
242 | dependencies:
243 | ajv: 6.12.6
244 | debug: 4.3.4
245 | espree: 9.4.1
246 | globals: 13.19.0
247 | ignore: 5.2.4
248 | import-fresh: 3.3.0
249 | js-yaml: 4.1.0
250 | minimatch: 3.1.2
251 | strip-json-comments: 3.1.1
252 | transitivePeerDependencies:
253 | - supports-color
254 | dev: true
255 |
256 | /@humanwhocodes/config-array/0.11.8:
257 | resolution: {integrity: sha512-UybHIJzJnR5Qc/MsD9Kr+RpO2h+/P1GhOwdiLPXK5TWk5sgTdu88bTD9UP+CKbPPh5Rni1u0GjAdYQLemG8g+g==}
258 | engines: {node: '>=10.10.0'}
259 | dependencies:
260 | '@humanwhocodes/object-schema': 1.2.1
261 | debug: 4.3.4
262 | minimatch: 3.1.2
263 | transitivePeerDependencies:
264 | - supports-color
265 | dev: true
266 |
267 | /@humanwhocodes/module-importer/1.0.1:
268 | resolution: {integrity: sha512-bxveV4V8v5Yb4ncFTT3rPSgZBOpCkjfK0y4oVVVJwIuDVBRMDXrPyXRL988i5ap9m9bnyEEjWfm5WkBmtffLfA==}
269 | engines: {node: '>=12.22'}
270 | dev: true
271 |
272 | /@humanwhocodes/object-schema/1.2.1:
273 | resolution: {integrity: sha512-ZnQMnLV4e7hDlUvw8H+U8ASL02SS2Gn6+9Ac3wGGLIe7+je2AeAOxPY+izIPJDfFDb7eDjev0Us8MO1iFRN8hA==}
274 | dev: true
275 |
276 | /@jridgewell/resolve-uri/3.1.0:
277 | resolution: {integrity: sha512-F2msla3tad+Mfht5cJq7LSXcdudKTWCVYUgw6pLFOOHSTtZlj6SWNYAp+AhuqLmWdBO2X5hPrLcu8cVP8fy28w==}
278 | engines: {node: '>=6.0.0'}
279 | dev: true
280 |
281 | /@jridgewell/sourcemap-codec/1.4.14:
282 | resolution: {integrity: sha512-XPSJHWmi394fuUuzDnGz1wiKqWfo1yXecHQMRf2l6hztTO+nPru658AyDngaBe7isIxEkRsPR3FZh+s7iVa4Uw==}
283 | dev: true
284 |
285 | /@jridgewell/trace-mapping/0.3.17:
286 | resolution: {integrity: sha512-MCNzAp77qzKca9+W/+I0+sEpaUnZoeasnghNeVc41VZCEKaCH73Vq3BZZ/SzWIgrqE4H4ceI+p+b6C0mHf9T4g==}
287 | dependencies:
288 | '@jridgewell/resolve-uri': 3.1.0
289 | '@jridgewell/sourcemap-codec': 1.4.14
290 | dev: true
291 |
292 | /@nodelib/fs.scandir/2.1.5:
293 | resolution: {integrity: sha512-vq24Bq3ym5HEQm2NKCr3yXDwjc7vTsEThRDnkp2DK9p1uqLR+DHurm/NOTo0KG7HYHU7eppKZj3MyqYuMBf62g==}
294 | engines: {node: '>= 8'}
295 | dependencies:
296 | '@nodelib/fs.stat': 2.0.5
297 | run-parallel: 1.2.0
298 | dev: true
299 |
300 | /@nodelib/fs.stat/2.0.5:
301 | resolution: {integrity: sha512-RkhPPp2zrqDAQA/2jNhnztcPAlv64XdhIp7a7454A5ovI7Bukxgt7MX7udwAu3zg1DcpPU0rz3VV1SeaqvY4+A==}
302 | engines: {node: '>= 8'}
303 | dev: true
304 |
305 | /@nodelib/fs.walk/1.2.8:
306 | resolution: {integrity: sha512-oGB+UxlgWcgQkgwo8GcEGwemoTFt3FIO9ababBmaGwXIoBKZ+GTy0pP185beGg7Llih/NSHSV2XAs1lnznocSg==}
307 | engines: {node: '>= 8'}
308 | dependencies:
309 | '@nodelib/fs.scandir': 2.1.5
310 | fastq: 1.14.0
311 | dev: true
312 |
313 | /@polka/url/1.0.0-next.21:
314 | resolution: {integrity: sha512-a5Sab1C4/icpTZVzZc5Ghpz88yQtGOyNqYXcZgOssB2uuAr+wF/MvN6bgtW32q7HHrvBki+BsZ0OuNv6EV3K9g==}
315 | dev: true
316 |
317 | /@supabase/functions-js/2.0.0:
318 | resolution: {integrity: sha512-ozb7bds2yvf5k7NM2ZzUkxvsx4S4i2eRKFSJetdTADV91T65g4gCzEs9L3LUXSrghcGIkUaon03VPzOrFredqg==}
319 | dependencies:
320 | cross-fetch: 3.1.5
321 | transitivePeerDependencies:
322 | - encoding
323 | dev: false
324 |
325 | /@supabase/gotrue-js/2.6.1:
326 | resolution: {integrity: sha512-ez40a1TORJIlF6xlA8oALx8W8vneyInz77+Hmlt2qJvKGF4LhhbBN/YI7FYmxJ8KMUaDZeWJzUwTNNOIQhE6Vg==}
327 | dependencies:
328 | cross-fetch: 3.1.5
329 | transitivePeerDependencies:
330 | - encoding
331 | dev: false
332 |
333 | /@supabase/postgrest-js/1.1.1:
334 | resolution: {integrity: sha512-jhdBah1JIxkZUp+5QH5JS7Uq9teGwh0Bs3FzbhnVlH619FSUFquTpHuNDxLsJmqEe8r3Wcnw19Dz0t3wEpkfug==}
335 | dependencies:
336 | cross-fetch: 3.1.5
337 | transitivePeerDependencies:
338 | - encoding
339 | dev: false
340 |
341 | /@supabase/realtime-js/2.1.0:
342 | resolution: {integrity: sha512-iplLCofTeYjnx9FIOsIwHLhMp0+7UVyiA4/sCeq40VdOgN9eTIhjEno9Tgh4dJARi4aaXoKfRX1DTxgZaOpPAw==}
343 | dependencies:
344 | '@types/phoenix': 1.5.4
345 | websocket: 1.0.34
346 | transitivePeerDependencies:
347 | - supports-color
348 | dev: false
349 |
350 | /@supabase/storage-js/2.1.0:
351 | resolution: {integrity: sha512-bRMLWCbkkx84WDAtHAAMN7FAWuayrGZtTHj/WMUK6PsAWuonovvEa5s34a5iux61qJSn+ls3tFkyQgqxunl5ww==}
352 | dependencies:
353 | cross-fetch: 3.1.5
354 | transitivePeerDependencies:
355 | - encoding
356 | dev: false
357 |
358 | /@supabase/supabase-js/2.2.3:
359 | resolution: {integrity: sha512-UOKnbkwtCGpI/yoW5FbiDqV1tvtP+kJkYROosCGS7M+EAaNhklNYaU3l3wNfxpR5LW7wOO1O17cb+5CSRjv/zg==}
360 | dependencies:
361 | '@supabase/functions-js': 2.0.0
362 | '@supabase/gotrue-js': 2.6.1
363 | '@supabase/postgrest-js': 1.1.1
364 | '@supabase/realtime-js': 2.1.0
365 | '@supabase/storage-js': 2.1.0
366 | cross-fetch: 3.1.5
367 | transitivePeerDependencies:
368 | - encoding
369 | - supports-color
370 | dev: false
371 |
372 | /@sveltejs/adapter-auto/1.0.0_@sveltejs+kit@1.0.1:
373 | resolution: {integrity: sha512-yKyPvlLVua1bJ/42FrR3X041mFGdB4GzTZOAEoHUcNBRE5Mhx94+eqHpC3hNvAOiLEDcKfVO0ObyKSu7qldU+w==}
374 | peerDependencies:
375 | '@sveltejs/kit': ^1.0.0
376 | dependencies:
377 | '@sveltejs/kit': 1.0.1_svelte@3.55.0+vite@4.0.3
378 | import-meta-resolve: 2.2.0
379 | dev: true
380 |
381 | /@sveltejs/kit/1.0.1_svelte@3.55.0+vite@4.0.3:
382 | resolution: {integrity: sha512-C41aCaDjA7xoUdsrc/lSdU1059UdLPIRE1vEIRRynzpMujNgp82bTMHkDosb6vykH6LrLf3tT2w2/5NYQhKYGQ==}
383 | engines: {node: ^16.14 || >=18}
384 | hasBin: true
385 | requiresBuild: true
386 | peerDependencies:
387 | svelte: ^3.54.0
388 | vite: ^4.0.0
389 | dependencies:
390 | '@sveltejs/vite-plugin-svelte': 2.0.2_svelte@3.55.0+vite@4.0.3
391 | '@types/cookie': 0.5.1
392 | cookie: 0.5.0
393 | devalue: 4.2.0
394 | esm-env: 1.0.0
395 | kleur: 4.1.5
396 | magic-string: 0.27.0
397 | mime: 3.0.0
398 | sade: 1.8.1
399 | set-cookie-parser: 2.5.1
400 | sirv: 2.0.2
401 | svelte: 3.55.0
402 | tiny-glob: 0.2.9
403 | undici: 5.14.0
404 | vite: 4.0.3
405 | transitivePeerDependencies:
406 | - supports-color
407 | dev: true
408 |
409 | /@sveltejs/vite-plugin-svelte/2.0.2_svelte@3.55.0+vite@4.0.3:
410 | resolution: {integrity: sha512-xCEan0/NNpQuL0l5aS42FjwQ6wwskdxC3pW1OeFtEKNZwRg7Evro9lac9HesGP6TdFsTv2xMes5ASQVKbCacxg==}
411 | engines: {node: ^14.18.0 || >= 16}
412 | peerDependencies:
413 | svelte: ^3.54.0
414 | vite: ^4.0.0
415 | dependencies:
416 | debug: 4.3.4
417 | deepmerge: 4.2.2
418 | kleur: 4.1.5
419 | magic-string: 0.27.0
420 | svelte: 3.55.0
421 | svelte-hmr: 0.15.1_svelte@3.55.0
422 | vite: 4.0.3
423 | vitefu: 0.2.4_vite@4.0.3
424 | transitivePeerDependencies:
425 | - supports-color
426 | dev: true
427 |
428 | /@types/chai-subset/1.3.3:
429 | resolution: {integrity: sha512-frBecisrNGz+F4T6bcc+NLeolfiojh5FxW2klu669+8BARtyQv2C/GkNW6FUodVe4BroGMP/wER/YDGc7rEllw==}
430 | dependencies:
431 | '@types/chai': 4.3.4
432 | dev: true
433 |
434 | /@types/chai/4.3.4:
435 | resolution: {integrity: sha512-KnRanxnpfpjUTqTCXslZSEdLfXExwgNxYPdiO2WGUj8+HDjFi8R3k5RVKPeSCzLjCcshCAtVO2QBbVuAV4kTnw==}
436 | dev: true
437 |
438 | /@types/cookie/0.5.1:
439 | resolution: {integrity: sha512-COUnqfB2+ckwXXSFInsFdOAWQzCCx+a5hq2ruyj+Vjund94RJQd4LG2u9hnvJrTgunKAaax7ancBYlDrNYxA0g==}
440 | dev: true
441 |
442 | /@types/node/18.11.18:
443 | resolution: {integrity: sha512-DHQpWGjyQKSHj3ebjFI/wRKcqQcdR+MoFBygntYOZytCqNfkd2ZC4ARDJ2DQqhjH5p85Nnd3jhUJIXrszFX/JA==}
444 | dev: true
445 |
446 | /@types/phoenix/1.5.4:
447 | resolution: {integrity: sha512-L5eZmzw89eXBKkiqVBcJfU1QGx9y+wurRIEgt0cuLH0hwNtVUxtx+6cu0R2STwWj468sjXyBYPYDtGclUd1kjQ==}
448 | dev: false
449 |
450 | /@types/pug/2.0.6:
451 | resolution: {integrity: sha512-SnHmG9wN1UVmagJOnyo/qkk0Z7gejYxOYYmaAwr5u2yFYfsupN3sg10kyzN8Hep/2zbHxCnsumxOoRIRMBwKCg==}
452 | dev: true
453 |
454 | /@types/sass/1.43.1:
455 | resolution: {integrity: sha512-BPdoIt1lfJ6B7rw35ncdwBZrAssjcwzI5LByIrYs+tpXlj/CAkuVdRsgZDdP4lq5EjyWzwxZCqAoFyHKFwp32g==}
456 | dependencies:
457 | '@types/node': 18.11.18
458 | dev: true
459 |
460 | /acorn-jsx/5.3.2_acorn@8.8.1:
461 | resolution: {integrity: sha512-rq9s+JNhf0IChjtDXxllJ7g41oZk5SlXtp0LHwyA5cejwn7vKmKp4pPri6YEePv2PU65sAsegbXtIinmDFDXgQ==}
462 | peerDependencies:
463 | acorn: ^6.0.0 || ^7.0.0 || ^8.0.0
464 | dependencies:
465 | acorn: 8.8.1
466 | dev: true
467 |
468 | /acorn-walk/8.2.0:
469 | resolution: {integrity: sha512-k+iyHEuPgSw6SbuDpGQM+06HQUa04DZ3o+F6CSzXMvvI5KMvnaEqXe+YVe555R9nn6GPt404fos4wcgpw12SDA==}
470 | engines: {node: '>=0.4.0'}
471 | dev: true
472 |
473 | /acorn/8.8.1:
474 | resolution: {integrity: sha512-7zFpHzhnqYKrkYdUjF1HI1bzd0VygEGX8lFk4k5zVMqHEoES+P+7TKI+EvLO9WVMJ8eekdO0aDEK044xTXwPPA==}
475 | engines: {node: '>=0.4.0'}
476 | hasBin: true
477 | dev: true
478 |
479 | /ajv/6.12.6:
480 | resolution: {integrity: sha512-j3fVLgvTo527anyYyJOGTYJbG+vnnQYvE0m5mmkc1TK+nxAppkCLMIL0aZ4dblVCNoGShhm+kzE4ZUykBoMg4g==}
481 | dependencies:
482 | fast-deep-equal: 3.1.3
483 | fast-json-stable-stringify: 2.1.0
484 | json-schema-traverse: 0.4.1
485 | uri-js: 4.4.1
486 | dev: true
487 |
488 | /ansi-regex/5.0.1:
489 | resolution: {integrity: sha512-quJQXlTSUGL2LH9SUXo8VwsY4soanhgo6LNSm84E1LBcE8s3O0wpdiRzyR9z/ZZJMlMWv37qOOb9pdJlMUEKFQ==}
490 | engines: {node: '>=8'}
491 | dev: true
492 |
493 | /ansi-styles/4.3.0:
494 | resolution: {integrity: sha512-zbB9rCJAT1rbjiVDb2hqKFHNYLxgtk8NURxZ3IZwD3F6NtxbXZQCnnSi1Lkx+IDohdPlFp222wVALIheZJQSEg==}
495 | engines: {node: '>=8'}
496 | dependencies:
497 | color-convert: 2.0.1
498 | dev: true
499 |
500 | /anymatch/3.1.3:
501 | resolution: {integrity: sha512-KMReFUr0B4t+D+OBkjR3KYqvocp2XaSzO55UcB6mgQMd3KbcE+mWTyvVV7D/zsdEbNnV6acZUutkiHQXvTr1Rw==}
502 | engines: {node: '>= 8'}
503 | dependencies:
504 | normalize-path: 3.0.0
505 | picomatch: 2.3.1
506 | dev: true
507 |
508 | /argparse/2.0.1:
509 | resolution: {integrity: sha512-8+9WqebbFzpX9OR+Wa6O29asIogeRMzcGtAINdpMHHyAg10f05aSFVBbcEqGf/PXw1EjAZ+q2/bEBg3DvurK3Q==}
510 | dev: true
511 |
512 | /assertion-error/1.1.0:
513 | resolution: {integrity: sha512-jgsaNduz+ndvGyFt3uSuWqvy4lCnIJiovtouQN5JZHOKCS2QuhEdbcQHFhVksz2N2U9hXJo8odG7ETyWlEeuDw==}
514 | dev: true
515 |
516 | /balanced-match/1.0.2:
517 | resolution: {integrity: sha512-3oSeUO0TMV67hN1AmbXsK4yaqU7tjiHlbxRDZOpH0KW9+CeX4bRAaX0Anxt0tx2MrpRpWwQaPwIlISEJhYU5Pw==}
518 | dev: true
519 |
520 | /binary-extensions/2.2.0:
521 | resolution: {integrity: sha512-jDctJ/IVQbZoJykoeHbhXpOlNBqGNcwXJKJog42E5HDPUwQTSdjCHdihjj0DlnheQ7blbT6dHOafNAiS8ooQKA==}
522 | engines: {node: '>=8'}
523 | dev: true
524 |
525 | /blueimp-md5/2.19.0:
526 | resolution: {integrity: sha512-DRQrD6gJyy8FbiE4s+bDoXS9hiW3Vbx5uCdwvcCf3zLHL+Iv7LtGHLpr+GZV8rHG8tK766FGYBwRbu8pELTt+w==}
527 | dev: true
528 |
529 | /brace-expansion/1.1.11:
530 | resolution: {integrity: sha512-iCuPHDFgrHX7H2vEI/5xpz07zSHB00TpugqhmYtVmMO6518mCuRMoOYFldEBl0g187ufozdaHgWKcYFb61qGiA==}
531 | dependencies:
532 | balanced-match: 1.0.2
533 | concat-map: 0.0.1
534 | dev: true
535 |
536 | /braces/3.0.2:
537 | resolution: {integrity: sha512-b8um+L1RzM3WDSzvhm6gIz1yfTbBt6YTlcEKAvsmqCZZFw46z626lVj9j1yEPW33H5H+lBQpZMP1k8l+78Ha0A==}
538 | engines: {node: '>=8'}
539 | dependencies:
540 | fill-range: 7.0.1
541 | dev: true
542 |
543 | /buffer-crc32/0.2.13:
544 | resolution: {integrity: sha512-VO9Ht/+p3SN7SKWqcrgEzjGbRSJYTx+Q1pTQC0wrWqHx0vpJraQ6GtHx8tvcg1rlK1byhU5gccxgOgj7B0TDkQ==}
545 | dev: true
546 |
547 | /bufferutil/4.0.7:
548 | resolution: {integrity: sha512-kukuqc39WOHtdxtw4UScxF/WVnMFVSQVKhtx3AjZJzhd0RGZZldcrfSEbVsWWe6KNH253574cq5F+wpv0G9pJw==}
549 | engines: {node: '>=6.14.2'}
550 | requiresBuild: true
551 | dependencies:
552 | node-gyp-build: 4.5.0
553 | dev: false
554 |
555 | /busboy/1.6.0:
556 | resolution: {integrity: sha512-8SFQbg/0hQ9xy3UNTB0YEnsNBbWfhf7RtnzpL7TkBiTBRfrQ9Fxcnz7VJsleJpyp6rVLvXiuORqjlHi5q+PYuA==}
557 | engines: {node: '>=10.16.0'}
558 | dependencies:
559 | streamsearch: 1.1.0
560 | dev: true
561 |
562 | /callsites/3.1.0:
563 | resolution: {integrity: sha512-P8BjAsXvZS+VIDUI11hHCQEv74YT67YUi5JJFNWIqL235sBmjX4+qx9Muvls5ivyNENctx46xQLQ3aTuE7ssaQ==}
564 | engines: {node: '>=6'}
565 | dev: true
566 |
567 | /chai/4.3.7:
568 | resolution: {integrity: sha512-HLnAzZ2iupm25PlN0xFreAlBA5zaBSv3og0DdeGA4Ar6h6rJ3A0rolRUKJhSF2V10GZKDgWF/VmAEsNWjCRB+A==}
569 | engines: {node: '>=4'}
570 | dependencies:
571 | assertion-error: 1.1.0
572 | check-error: 1.0.2
573 | deep-eql: 4.1.3
574 | get-func-name: 2.0.0
575 | loupe: 2.3.6
576 | pathval: 1.1.1
577 | type-detect: 4.0.8
578 | dev: true
579 |
580 | /chalk/4.1.2:
581 | resolution: {integrity: sha512-oKnbhFyRIXpUuez8iBMmyEa4nbj4IOQyuhc/wy9kY7/WVPcwIO9VA668Pu8RkO7+0G76SLROeyw9CpQ061i4mA==}
582 | engines: {node: '>=10'}
583 | dependencies:
584 | ansi-styles: 4.3.0
585 | supports-color: 7.2.0
586 | dev: true
587 |
588 | /check-error/1.0.2:
589 | resolution: {integrity: sha512-BrgHpW9NURQgzoNyjfq0Wu6VFO6D7IZEmJNdtgNqpzGG8RuNFHt2jQxWlAs4HMe119chBnv+34syEZtc6IhLtA==}
590 | dev: true
591 |
592 | /chokidar/3.5.3:
593 | resolution: {integrity: sha512-Dr3sfKRP6oTcjf2JmUmFJfeVMvXBdegxB0iVQ5eb2V10uFJUCAS8OByZdVAyVb8xXNz3GjjTgj9kLWsZTqE6kw==}
594 | engines: {node: '>= 8.10.0'}
595 | dependencies:
596 | anymatch: 3.1.3
597 | braces: 3.0.2
598 | glob-parent: 5.1.2
599 | is-binary-path: 2.1.0
600 | is-glob: 4.0.3
601 | normalize-path: 3.0.0
602 | readdirp: 3.6.0
603 | optionalDependencies:
604 | fsevents: 2.3.2
605 | dev: true
606 |
607 | /color-convert/2.0.1:
608 | resolution: {integrity: sha512-RRECPsj7iu/xb5oKYcsFHSppFNnsj/52OVTRKb4zP5onXwVF3zVmmToNcOfGC+CRDpfK/U584fMg38ZHCaElKQ==}
609 | engines: {node: '>=7.0.0'}
610 | dependencies:
611 | color-name: 1.1.4
612 | dev: true
613 |
614 | /color-name/1.1.4:
615 | resolution: {integrity: sha512-dOy+3AuW3a2wNbZHIuMZpTcgjGuLU/uBL/ubcZF9OXbDo8ff4O8yVp5Bf0efS8uEoYo5q4Fx7dY9OgQGXgAsQA==}
616 | dev: true
617 |
618 | /concat-map/0.0.1:
619 | resolution: {integrity: sha1-2Klr13/Wjfd5OnMDajug1UBdR3s=}
620 | dev: true
621 |
622 | /cookie/0.5.0:
623 | resolution: {integrity: sha512-YZ3GUyn/o8gfKJlnlX7g7xq4gyO6OSuhGPKaaGssGB2qgDUS0gPgtTvoyZLTt9Ab6dC4hfc9dV5arkvc/OCmrw==}
624 | engines: {node: '>= 0.6'}
625 | dev: true
626 |
627 | /cross-fetch/3.1.5:
628 | resolution: {integrity: sha512-lvb1SBsI0Z7GDwmuid+mU3kWVBwTVUbe7S0H52yaaAdQOXq2YktTCZdlAcNKFzE6QtRz0snpw9bNiPeOIkkQvw==}
629 | dependencies:
630 | node-fetch: 2.6.7
631 | transitivePeerDependencies:
632 | - encoding
633 | dev: false
634 |
635 | /cross-spawn/7.0.3:
636 | resolution: {integrity: sha512-iRDPJKUPVEND7dHPO8rkbOnPpyDygcDFtWjpeWNCgy8WP2rXcxXL8TskReQl6OrB2G7+UJrags1q15Fudc7G6w==}
637 | engines: {node: '>= 8'}
638 | dependencies:
639 | path-key: 3.1.1
640 | shebang-command: 2.0.0
641 | which: 2.0.2
642 | dev: true
643 |
644 | /d/1.0.1:
645 | resolution: {integrity: sha512-m62ShEObQ39CfralilEQRjH6oAMtNCV1xJyEx5LpRYUVN+EviphDgUc/F3hnYbADmkiNs67Y+3ylmlG7Lnu+FA==}
646 | dependencies:
647 | es5-ext: 0.10.62
648 | type: 1.2.0
649 | dev: false
650 |
651 | /debug/2.6.9:
652 | resolution: {integrity: sha512-bC7ElrdJaJnPbAP+1EotYvqZsb3ecl5wi6Bfi6BJTUcNowp6cvspg0jXznRTKDjm/E7AdgFBVeAPVMNcKGsHMA==}
653 | peerDependencies:
654 | supports-color: '*'
655 | peerDependenciesMeta:
656 | supports-color:
657 | optional: true
658 | dependencies:
659 | ms: 2.0.0
660 | dev: false
661 |
662 | /debug/4.3.4:
663 | resolution: {integrity: sha512-PRWFHuSU3eDtQJPvnNY7Jcket1j0t5OuOsFzPPzsekD52Zl8qUfFIPEiswXqIvHWGVHOgX+7G/vCNNhehwxfkQ==}
664 | engines: {node: '>=6.0'}
665 | peerDependencies:
666 | supports-color: '*'
667 | peerDependenciesMeta:
668 | supports-color:
669 | optional: true
670 | dependencies:
671 | ms: 2.1.2
672 | dev: true
673 |
674 | /deep-eql/4.1.3:
675 | resolution: {integrity: sha512-WaEtAOpRA1MQ0eohqZjpGD8zdI0Ovsm8mmFhaDN8dvDZzyoUMcYDnf5Y6iu7HTXxf8JDS23qWa4a+hKCDyOPzw==}
676 | engines: {node: '>=6'}
677 | dependencies:
678 | type-detect: 4.0.8
679 | dev: true
680 |
681 | /deep-is/0.1.4:
682 | resolution: {integrity: sha512-oIPzksmTg4/MriiaYGO+okXDT7ztn/w3Eptv/+gSIdMdKsJo0u4CfYNFJPy+4SKMuCqGw2wxnA+URMg3t8a/bQ==}
683 | dev: true
684 |
685 | /deepmerge/4.2.2:
686 | resolution: {integrity: sha512-FJ3UgI4gIl+PHZm53knsuSFpE+nESMr7M4v9QcgB7S63Kj/6WqMiFQJpBBYz1Pt+66bZpP3Q7Lye0Oo9MPKEdg==}
687 | engines: {node: '>=0.10.0'}
688 | dev: true
689 |
690 | /detect-indent/6.1.0:
691 | resolution: {integrity: sha512-reYkTUJAZb9gUuZ2RvVCNhVHdg62RHnJ7WJl8ftMi4diZ6NWlciOzQN88pUhSELEwflJht4oQDv0F0BMlwaYtA==}
692 | engines: {node: '>=8'}
693 | dev: true
694 |
695 | /devalue/4.2.0:
696 | resolution: {integrity: sha512-mbjoAaCL2qogBKgeFxFPOXAUsZchircF+B/79LD4sHH0+NHfYm8gZpQrskKDn5gENGt35+5OI1GUF7hLVnkPDw==}
697 | dev: true
698 |
699 | /doctrine/3.0.0:
700 | resolution: {integrity: sha512-yS+Q5i3hBf7GBkd4KG8a7eBNNWNGLTaEwwYWUijIYM7zrlYDM0BFXHjjPWlWZ1Rg7UaddZeIDmi9jF3HmqiQ2w==}
701 | engines: {node: '>=6.0.0'}
702 | dependencies:
703 | esutils: 2.0.3
704 | dev: true
705 |
706 | /es5-ext/0.10.62:
707 | resolution: {integrity: sha512-BHLqn0klhEpnOKSrzn/Xsz2UIW8j+cGmo9JLzr8BiUapV8hPL9+FliFqjwr9ngW7jWdnxv6eO+/LqyhJVqgrjA==}
708 | engines: {node: '>=0.10'}
709 | requiresBuild: true
710 | dependencies:
711 | es6-iterator: 2.0.3
712 | es6-symbol: 3.1.3
713 | next-tick: 1.1.0
714 | dev: false
715 |
716 | /es6-iterator/2.0.3:
717 | resolution: {integrity: sha512-zw4SRzoUkd+cl+ZoE15A9o1oQd920Bb0iOJMQkQhl3jNc03YqVjAhG7scf9C5KWRU/R13Orf588uCC6525o02g==}
718 | dependencies:
719 | d: 1.0.1
720 | es5-ext: 0.10.62
721 | es6-symbol: 3.1.3
722 | dev: false
723 |
724 | /es6-promise/3.3.1:
725 | resolution: {integrity: sha512-SOp9Phqvqn7jtEUxPWdWfWoLmyt2VaJ6MpvP9Comy1MceMXqE6bxvaTu4iaxpYYPzhny28Lc+M87/c2cPK6lDg==}
726 | dev: true
727 |
728 | /es6-symbol/3.1.3:
729 | resolution: {integrity: sha512-NJ6Yn3FuDinBaBRWl/q5X/s4koRHBrgKAu+yGI6JCBeiu3qrcbJhwT2GeR/EXVfylRk8dpQVJoLEFhK+Mu31NA==}
730 | dependencies:
731 | d: 1.0.1
732 | ext: 1.7.0
733 | dev: false
734 |
735 | /esbuild/0.16.12:
736 | resolution: {integrity: sha512-eq5KcuXajf2OmivCl4e89AD3j8fbV+UTE9vczEzq5haA07U9oOTzBWlh3+6ZdjJR7Rz2QfWZ2uxZyhZxBgJ4+g==}
737 | engines: {node: '>=12'}
738 | hasBin: true
739 | requiresBuild: true
740 | optionalDependencies:
741 | '@esbuild/android-arm': 0.16.12
742 | '@esbuild/android-arm64': 0.16.12
743 | '@esbuild/android-x64': 0.16.12
744 | '@esbuild/darwin-arm64': 0.16.12
745 | '@esbuild/darwin-x64': 0.16.12
746 | '@esbuild/freebsd-arm64': 0.16.12
747 | '@esbuild/freebsd-x64': 0.16.12
748 | '@esbuild/linux-arm': 0.16.12
749 | '@esbuild/linux-arm64': 0.16.12
750 | '@esbuild/linux-ia32': 0.16.12
751 | '@esbuild/linux-loong64': 0.16.12
752 | '@esbuild/linux-mips64el': 0.16.12
753 | '@esbuild/linux-ppc64': 0.16.12
754 | '@esbuild/linux-riscv64': 0.16.12
755 | '@esbuild/linux-s390x': 0.16.12
756 | '@esbuild/linux-x64': 0.16.12
757 | '@esbuild/netbsd-x64': 0.16.12
758 | '@esbuild/openbsd-x64': 0.16.12
759 | '@esbuild/sunos-x64': 0.16.12
760 | '@esbuild/win32-arm64': 0.16.12
761 | '@esbuild/win32-ia32': 0.16.12
762 | '@esbuild/win32-x64': 0.16.12
763 | dev: true
764 |
765 | /escape-string-regexp/4.0.0:
766 | resolution: {integrity: sha512-TtpcNJ3XAzx3Gq8sWRzJaVajRs0uVxA2YAkdb1jm2YkPz4G6egUFAyA3n5vtEIZefPk5Wa4UXbKuS5fKkJWdgA==}
767 | engines: {node: '>=10'}
768 | dev: true
769 |
770 | /eslint-config-prettier/8.5.0_eslint@8.30.0:
771 | resolution: {integrity: sha512-obmWKLUNCnhtQRKc+tmnYuQl0pFU1ibYJQ5BGhTVB08bHe9wC8qUeG7c08dj9XX+AuPj1YSGSQIHl1pnDHZR0Q==}
772 | hasBin: true
773 | peerDependencies:
774 | eslint: '>=7.0.0'
775 | dependencies:
776 | eslint: 8.30.0
777 | dev: true
778 |
779 | /eslint-plugin-svelte3/4.0.0_khrjkzzv5v2x7orkj5o7sxbz3a:
780 | resolution: {integrity: sha512-OIx9lgaNzD02+MDFNLw0GEUbuovNcglg+wnd/UY0fbZmlQSz7GlQiQ1f+yX0XvC07XPcDOnFcichqI3xCwp71g==}
781 | peerDependencies:
782 | eslint: '>=8.0.0'
783 | svelte: ^3.2.0
784 | dependencies:
785 | eslint: 8.30.0
786 | svelte: 3.55.0
787 | dev: true
788 |
789 | /eslint-scope/7.1.1:
790 | resolution: {integrity: sha512-QKQM/UXpIiHcLqJ5AOyIW7XZmzjkzQXYE54n1++wb0u9V/abW3l9uQnxX8Z5Xd18xyKIMTUAyQ0k1e8pz6LUrw==}
791 | engines: {node: ^12.22.0 || ^14.17.0 || >=16.0.0}
792 | dependencies:
793 | esrecurse: 4.3.0
794 | estraverse: 5.3.0
795 | dev: true
796 |
797 | /eslint-utils/3.0.0_eslint@8.30.0:
798 | resolution: {integrity: sha512-uuQC43IGctw68pJA1RgbQS8/NP7rch6Cwd4j3ZBtgo4/8Flj4eGE7ZYSZRN3iq5pVUv6GPdW5Z1RFleo84uLDA==}
799 | engines: {node: ^10.0.0 || ^12.0.0 || >= 14.0.0}
800 | peerDependencies:
801 | eslint: '>=5'
802 | dependencies:
803 | eslint: 8.30.0
804 | eslint-visitor-keys: 2.1.0
805 | dev: true
806 |
807 | /eslint-visitor-keys/2.1.0:
808 | resolution: {integrity: sha512-0rSmRBzXgDzIsD6mGdJgevzgezI534Cer5L/vyMX0kHzT/jiB43jRhd9YUlMGYLQy2zprNmoT8qasCGtY+QaKw==}
809 | engines: {node: '>=10'}
810 | dev: true
811 |
812 | /eslint-visitor-keys/3.3.0:
813 | resolution: {integrity: sha512-mQ+suqKJVyeuwGYHAdjMFqjCyfl8+Ldnxuyp3ldiMBFKkvytrXUZWaiPCEav8qDHKty44bD+qV1IP4T+w+xXRA==}
814 | engines: {node: ^12.22.0 || ^14.17.0 || >=16.0.0}
815 | dev: true
816 |
817 | /eslint/8.30.0:
818 | resolution: {integrity: sha512-MGADB39QqYuzEGov+F/qb18r4i7DohCDOfatHaxI2iGlPuC65bwG2gxgO+7DkyL38dRFaRH7RaRAgU6JKL9rMQ==}
819 | engines: {node: ^12.22.0 || ^14.17.0 || >=16.0.0}
820 | hasBin: true
821 | dependencies:
822 | '@eslint/eslintrc': 1.4.0
823 | '@humanwhocodes/config-array': 0.11.8
824 | '@humanwhocodes/module-importer': 1.0.1
825 | '@nodelib/fs.walk': 1.2.8
826 | ajv: 6.12.6
827 | chalk: 4.1.2
828 | cross-spawn: 7.0.3
829 | debug: 4.3.4
830 | doctrine: 3.0.0
831 | escape-string-regexp: 4.0.0
832 | eslint-scope: 7.1.1
833 | eslint-utils: 3.0.0_eslint@8.30.0
834 | eslint-visitor-keys: 3.3.0
835 | espree: 9.4.1
836 | esquery: 1.4.0
837 | esutils: 2.0.3
838 | fast-deep-equal: 3.1.3
839 | file-entry-cache: 6.0.1
840 | find-up: 5.0.0
841 | glob-parent: 6.0.2
842 | globals: 13.19.0
843 | grapheme-splitter: 1.0.4
844 | ignore: 5.2.4
845 | import-fresh: 3.3.0
846 | imurmurhash: 0.1.4
847 | is-glob: 4.0.3
848 | is-path-inside: 3.0.3
849 | js-sdsl: 4.2.0
850 | js-yaml: 4.1.0
851 | json-stable-stringify-without-jsonify: 1.0.1
852 | levn: 0.4.1
853 | lodash.merge: 4.6.2
854 | minimatch: 3.1.2
855 | natural-compare: 1.4.0
856 | optionator: 0.9.1
857 | regexpp: 3.2.0
858 | strip-ansi: 6.0.1
859 | strip-json-comments: 3.1.1
860 | text-table: 0.2.0
861 | transitivePeerDependencies:
862 | - supports-color
863 | dev: true
864 |
865 | /esm-env/1.0.0:
866 | resolution: {integrity: sha512-Cf6VksWPsTuW01vU9Mk/3vRue91Zevka5SjyNf3nEpokFRuqt/KjUQoGAwq9qMmhpLTHmXzSIrFRw8zxWzmFBA==}
867 | dev: true
868 |
869 | /espree/9.4.1:
870 | resolution: {integrity: sha512-XwctdmTO6SIvCzd9810yyNzIrOrqNYV9Koizx4C/mRhf9uq0o4yHoCEU/670pOxOL/MSraektvSAji79kX90Vg==}
871 | engines: {node: ^12.22.0 || ^14.17.0 || >=16.0.0}
872 | dependencies:
873 | acorn: 8.8.1
874 | acorn-jsx: 5.3.2_acorn@8.8.1
875 | eslint-visitor-keys: 3.3.0
876 | dev: true
877 |
878 | /esquery/1.4.0:
879 | resolution: {integrity: sha512-cCDispWt5vHHtwMY2YrAQ4ibFkAL8RbH5YGBnZBc90MolvvfkkQcJro/aZiAQUlQ3qgrYS6D6v8Gc5G5CQsc9w==}
880 | engines: {node: '>=0.10'}
881 | dependencies:
882 | estraverse: 5.3.0
883 | dev: true
884 |
885 | /esrecurse/4.3.0:
886 | resolution: {integrity: sha512-KmfKL3b6G+RXvP8N1vr3Tq1kL/oCFgn2NYXEtqP8/L3pKapUA4G8cFVaoF3SU323CD4XypR/ffioHmkti6/Tag==}
887 | engines: {node: '>=4.0'}
888 | dependencies:
889 | estraverse: 5.3.0
890 | dev: true
891 |
892 | /estraverse/5.3.0:
893 | resolution: {integrity: sha512-MMdARuVEQziNTeJD8DgMqmhwR11BRQ/cBP+pLtYdSTnf3MIO8fFeiINEbX36ZdNlfU/7A9f3gUw49B3oQsvwBA==}
894 | engines: {node: '>=4.0'}
895 | dev: true
896 |
897 | /esutils/2.0.3:
898 | resolution: {integrity: sha512-kVscqXk4OCp68SZ0dkgEKVi6/8ij300KBWTJq32P/dYeWTSwK41WyTxalN1eRmA5Z9UU/LX9D7FWSmV9SAYx6g==}
899 | engines: {node: '>=0.10.0'}
900 | dev: true
901 |
902 | /ext/1.7.0:
903 | resolution: {integrity: sha512-6hxeJYaL110a9b5TEJSj0gojyHQAmA2ch5Os+ySCiA1QGdS697XWY1pzsrSjqA9LDEEgdB/KypIlR59RcLuHYw==}
904 | dependencies:
905 | type: 2.7.2
906 | dev: false
907 |
908 | /fast-deep-equal/3.1.3:
909 | resolution: {integrity: sha512-f3qQ9oQy9j2AhBe/H9VC91wLmKBCCU/gDOnKNAYG5hswO7BLKj09Hc5HYNz9cGI++xlpDCIgDaitVs03ATR84Q==}
910 | dev: true
911 |
912 | /fast-glob/3.2.12:
913 | resolution: {integrity: sha512-DVj4CQIYYow0BlaelwK1pHl5n5cRSJfM60UA0zK891sVInoPri2Ekj7+e1CT3/3qxXenpI+nBBmQAcJPJgaj4w==}
914 | engines: {node: '>=8.6.0'}
915 | dependencies:
916 | '@nodelib/fs.stat': 2.0.5
917 | '@nodelib/fs.walk': 1.2.8
918 | glob-parent: 5.1.2
919 | merge2: 1.4.1
920 | micromatch: 4.0.5
921 | dev: true
922 |
923 | /fast-json-stable-stringify/2.1.0:
924 | resolution: {integrity: sha512-lhd/wF+Lk98HZoTCtlVraHtfh5XYijIjalXck7saUtuanSDyLMxnHhSXEDJqHxD7msR8D0uCmqlkwjCV8xvwHw==}
925 | dev: true
926 |
927 | /fast-levenshtein/2.0.6:
928 | resolution: {integrity: sha512-DCXu6Ifhqcks7TZKY3Hxp3y6qphY5SJZmrWMDrKcERSOXWQdMhU9Ig/PYrzyw/ul9jOIyh0N4M0tbC5hodg8dw==}
929 | dev: true
930 |
931 | /fastq/1.14.0:
932 | resolution: {integrity: sha512-eR2D+V9/ExcbF9ls441yIuN6TI2ED1Y2ZcA5BmMtJsOkWOFRJQ0Jt0g1UwqXJJVAb+V+umH5Dfr8oh4EVP7VVg==}
933 | dependencies:
934 | reusify: 1.0.4
935 | dev: true
936 |
937 | /file-entry-cache/6.0.1:
938 | resolution: {integrity: sha512-7Gps/XWymbLk2QLYK4NzpMOrYjMhdIxXuIvy2QBsLE6ljuodKvdkWs/cpyJJ3CVIVpH0Oi1Hvg1ovbMzLdFBBg==}
939 | engines: {node: ^10.12.0 || >=12.0.0}
940 | dependencies:
941 | flat-cache: 3.0.4
942 | dev: true
943 |
944 | /fill-range/7.0.1:
945 | resolution: {integrity: sha512-qOo9F+dMUmC2Lcb4BbVvnKJxTPjCm+RRpe4gDuGrzkL7mEVl/djYSu2OdQ2Pa302N4oqkSg9ir6jaLWJ2USVpQ==}
946 | engines: {node: '>=8'}
947 | dependencies:
948 | to-regex-range: 5.0.1
949 | dev: true
950 |
951 | /find-up/5.0.0:
952 | resolution: {integrity: sha512-78/PXT1wlLLDgTzDs7sjq9hzz0vXD+zn+7wypEe4fXQxCmdmqfGsEPQxmiCSQI3ajFV91bVSsvNtrJRiW6nGng==}
953 | engines: {node: '>=10'}
954 | dependencies:
955 | locate-path: 6.0.0
956 | path-exists: 4.0.0
957 | dev: true
958 |
959 | /flat-cache/3.0.4:
960 | resolution: {integrity: sha512-dm9s5Pw7Jc0GvMYbshN6zchCA9RgQlzzEZX3vylR9IqFfS8XciblUXOKfW6SiuJ0e13eDYZoZV5wdrev7P3Nwg==}
961 | engines: {node: ^10.12.0 || >=12.0.0}
962 | dependencies:
963 | flatted: 3.2.7
964 | rimraf: 3.0.2
965 | dev: true
966 |
967 | /flatted/3.2.7:
968 | resolution: {integrity: sha512-5nqDSxl8nn5BSNxyR3n4I6eDmbolI6WT+QqR547RwxQapgjQBmtktdP+HTBb/a/zLsbzERTONyUB5pefh5TtjQ==}
969 | dev: true
970 |
971 | /fs.realpath/1.0.0:
972 | resolution: {integrity: sha512-OO0pH2lK6a0hZnAdau5ItzHPI6pUlvI7jMVnxUQRtw4owF2wk8lOSabtGDCTP4Ggrg2MbGnWO9X8K1t4+fGMDw==}
973 | dev: true
974 |
975 | /fsevents/2.3.2:
976 | resolution: {integrity: sha512-xiqMQR4xAeHTuB9uWm+fFRcIOgKBMiOBP+eXiyT7jsgVCq1bkVygt00oASowB7EdtpOHaaPgKt812P9ab+DDKA==}
977 | engines: {node: ^8.16.0 || ^10.6.0 || >=11.0.0}
978 | os: [darwin]
979 | requiresBuild: true
980 | dev: true
981 | optional: true
982 |
983 | /function-bind/1.1.1:
984 | resolution: {integrity: sha512-yIovAzMX49sF8Yl58fSCWJ5svSLuaibPxXQJFLmBObTuCr0Mf1KiPopGM9NiFjiYBCbfaa2Fh6breQ6ANVTI0A==}
985 | dev: true
986 |
987 | /get-func-name/2.0.0:
988 | resolution: {integrity: sha512-Hm0ixYtaSZ/V7C8FJrtZIuBBI+iSgL+1Aq82zSu8VQNB4S3Gk8e7Qs3VwBDJAhmRZcFqkl3tQu36g/Foh5I5ig==}
989 | dev: true
990 |
991 | /glob-parent/5.1.2:
992 | resolution: {integrity: sha512-AOIgSQCepiJYwP3ARnGx+5VnTu2HBYdzbGP45eLw1vr3zB3vZLeyed1sC9hnbcOc9/SrMyM5RPQrkGz4aS9Zow==}
993 | engines: {node: '>= 6'}
994 | dependencies:
995 | is-glob: 4.0.3
996 | dev: true
997 |
998 | /glob-parent/6.0.2:
999 | resolution: {integrity: sha512-XxwI8EOhVQgWp6iDL+3b0r86f4d6AX6zSU55HfB4ydCEuXLXc5FcYeOu+nnGftS4TEju/11rt4KJPTMgbfmv4A==}
1000 | engines: {node: '>=10.13.0'}
1001 | dependencies:
1002 | is-glob: 4.0.3
1003 | dev: true
1004 |
1005 | /glob/7.2.3:
1006 | resolution: {integrity: sha512-nFR0zLpU2YCaRxwoCJvL6UvCH2JFyFVIvwTLsIf21AuHlMskA1hhTdk+LlYJtOlYt9v6dvszD2BGRqBL+iQK9Q==}
1007 | dependencies:
1008 | fs.realpath: 1.0.0
1009 | inflight: 1.0.6
1010 | inherits: 2.0.4
1011 | minimatch: 3.1.2
1012 | once: 1.4.0
1013 | path-is-absolute: 1.0.1
1014 | dev: true
1015 |
1016 | /globals/13.19.0:
1017 | resolution: {integrity: sha512-dkQ957uSRWHw7CFXLUtUHQI3g3aWApYhfNR2O6jn/907riyTYKVBmxYVROkBcY614FSSeSJh7Xm7SrUWCxvJMQ==}
1018 | engines: {node: '>=8'}
1019 | dependencies:
1020 | type-fest: 0.20.2
1021 | dev: true
1022 |
1023 | /globalyzer/0.1.0:
1024 | resolution: {integrity: sha512-40oNTM9UfG6aBmuKxk/giHn5nQ8RVz/SS4Ir6zgzOv9/qC3kKZ9v4etGTcJbEl/NyVQH7FGU7d+X1egr57Md2Q==}
1025 | dev: true
1026 |
1027 | /globrex/0.1.2:
1028 | resolution: {integrity: sha512-uHJgbwAMwNFf5mLst7IWLNg14x1CkeqglJb/K3doi4dw6q2IvAAmM/Y81kevy83wP+Sst+nutFTYOGg3d1lsxg==}
1029 | dev: true
1030 |
1031 | /graceful-fs/4.2.10:
1032 | resolution: {integrity: sha512-9ByhssR2fPVsNZj478qUUbKfmL0+t5BDVyjShtyZZLiK7ZDAArFFfopyOTj0M05wE2tJPisA4iTnnXl2YoPvOA==}
1033 | dev: true
1034 |
1035 | /grapheme-splitter/1.0.4:
1036 | resolution: {integrity: sha512-bzh50DW9kTPM00T8y4o8vQg89Di9oLJVLW/KaOGIXJWP/iqCN6WKYkbNOF04vFLJhwcpYUh9ydh/+5vpOqV4YQ==}
1037 | dev: true
1038 |
1039 | /gravatar-url/4.0.1:
1040 | resolution: {integrity: sha512-AiU83cghGg2D8vAUwrMXCByejkkm4RtLwMNGmPU7VhqBYhsxcBCV0SAzRpYNbUCpTci5v46J/KFKPmDYaG2oyA==}
1041 | engines: {node: '>=12'}
1042 | dependencies:
1043 | md5-hex: 4.0.0
1044 | type-fest: 1.4.0
1045 | dev: true
1046 |
1047 | /has-flag/4.0.0:
1048 | resolution: {integrity: sha512-EykJT/Q1KjTWctppgIAgfSO0tKVuZUjhgMr17kqTumMl6Afv3EISleU7qZUzoXDFTAHTDC4NOoG/ZxU3EvlMPQ==}
1049 | engines: {node: '>=8'}
1050 | dev: true
1051 |
1052 | /has/1.0.3:
1053 | resolution: {integrity: sha512-f2dvO0VU6Oej7RkWJGrehjbzMAjFp5/VKPp5tTpWIV4JHHZK1/BxbFRtf/siA2SWTe09caDmVtYYzWEIbBS4zw==}
1054 | engines: {node: '>= 0.4.0'}
1055 | dependencies:
1056 | function-bind: 1.1.1
1057 | dev: true
1058 |
1059 | /ignore/5.2.4:
1060 | resolution: {integrity: sha512-MAb38BcSbH0eHNBxn7ql2NH/kX33OkB3lZ1BNdh7ENeRChHTYsTvWrMubiIAMNS2llXEEgZ1MUOBtXChP3kaFQ==}
1061 | engines: {node: '>= 4'}
1062 | dev: true
1063 |
1064 | /import-fresh/3.3.0:
1065 | resolution: {integrity: sha512-veYYhQa+D1QBKznvhUHxb8faxlrwUnxseDAbAp457E0wLNio2bOSKnjYDhMj+YiAq61xrMGhQk9iXVk5FzgQMw==}
1066 | engines: {node: '>=6'}
1067 | dependencies:
1068 | parent-module: 1.0.1
1069 | resolve-from: 4.0.0
1070 | dev: true
1071 |
1072 | /import-meta-resolve/2.2.0:
1073 | resolution: {integrity: sha512-CpPOtiCHxP9HdtDM5F45tNiAe66Cqlv3f5uHoJjt+KlaLrUh9/Wz9vepADZ78SlqEo62aDWZtj9ydMGXV+CPnw==}
1074 | dev: true
1075 |
1076 | /imurmurhash/0.1.4:
1077 | resolution: {integrity: sha512-JmXMZ6wuvDmLiHEml9ykzqO6lwFbof0GG4IkcGaENdCRDDmMVnny7s5HsIgHCbaq0w2MyPhDqkhTUgS2LU2PHA==}
1078 | engines: {node: '>=0.8.19'}
1079 | dev: true
1080 |
1081 | /inflight/1.0.6:
1082 | resolution: {integrity: sha512-k92I/b08q4wvFscXCLvqfsHCrjrF7yiXsQuIVvVE7N82W3+aqpzuUdBbfhWcy/FZR3/4IgflMgKLOsvPDrGCJA==}
1083 | dependencies:
1084 | once: 1.4.0
1085 | wrappy: 1.0.2
1086 | dev: true
1087 |
1088 | /inherits/2.0.4:
1089 | resolution: {integrity: sha512-k/vGaX4/Yla3WzyMCvTQOXYeIHvqOKtnqBduzTHpzpQZzAskKMhZ2K+EnBiSM9zGSoIFeMpXKxa4dYeZIQqewQ==}
1090 | dev: true
1091 |
1092 | /is-binary-path/2.1.0:
1093 | resolution: {integrity: sha512-ZMERYes6pDydyuGidse7OsHxtbI7WVeUEozgR/g7rd0xUimYNlvZRE/K2MgZTjWy725IfelLeVcEM97mmtRGXw==}
1094 | engines: {node: '>=8'}
1095 | dependencies:
1096 | binary-extensions: 2.2.0
1097 | dev: true
1098 |
1099 | /is-core-module/2.11.0:
1100 | resolution: {integrity: sha512-RRjxlvLDkD1YJwDbroBHMb+cukurkDWNyHx7D3oNB5x9rb5ogcksMC5wHCadcXoo67gVr/+3GFySh3134zi6rw==}
1101 | dependencies:
1102 | has: 1.0.3
1103 | dev: true
1104 |
1105 | /is-extglob/2.1.1:
1106 | resolution: {integrity: sha512-SbKbANkN603Vi4jEZv49LeVJMn4yGwsbzZworEoyEiutsN3nJYdbO36zfhGJ6QEDpOZIFkDtnq5JRxmvl3jsoQ==}
1107 | engines: {node: '>=0.10.0'}
1108 | dev: true
1109 |
1110 | /is-glob/4.0.3:
1111 | resolution: {integrity: sha512-xelSayHH36ZgE7ZWhli7pW34hNbNl8Ojv5KVmkJD4hBdD3th8Tfk9vYasLM+mXWOZhFkgZfxhLSnrwRr4elSSg==}
1112 | engines: {node: '>=0.10.0'}
1113 | dependencies:
1114 | is-extglob: 2.1.1
1115 | dev: true
1116 |
1117 | /is-number/7.0.0:
1118 | resolution: {integrity: sha512-41Cifkg6e8TylSpdtTpeLVMqvSBEVzTttHvERD741+pnZ8ANv0004MRL43QKPDlK9cGvNp6NZWZUBlbGXYxxng==}
1119 | engines: {node: '>=0.12.0'}
1120 | dev: true
1121 |
1122 | /is-path-inside/3.0.3:
1123 | resolution: {integrity: sha512-Fd4gABb+ycGAmKou8eMftCupSir5lRxqf4aD/vd0cD2qc4HL07OjCeuHMr8Ro4CoMaeCKDB0/ECBOVWjTwUvPQ==}
1124 | engines: {node: '>=8'}
1125 | dev: true
1126 |
1127 | /is-typedarray/1.0.0:
1128 | resolution: {integrity: sha512-cyA56iCMHAh5CdzjJIa4aohJyeO1YbwLi3Jc35MmRU6poroFjIGZzUzupGiRPOjgHg9TLu43xbpwXk523fMxKA==}
1129 | dev: false
1130 |
1131 | /isexe/2.0.0:
1132 | resolution: {integrity: sha512-RHxMLp9lnKHGHRng9QFhRCMbYAcVpn69smSGcq3f36xjgVVWThj4qqLbTLlq7Ssj8B+fIQ1EuCEGI2lKsyQeIw==}
1133 | dev: true
1134 |
1135 | /js-sdsl/4.2.0:
1136 | resolution: {integrity: sha512-dyBIzQBDkCqCu+0upx25Y2jGdbTGxE9fshMsCdK0ViOongpV+n5tXRcZY9v7CaVQ79AGS9KA1KHtojxiM7aXSQ==}
1137 | dev: true
1138 |
1139 | /js-yaml/4.1.0:
1140 | resolution: {integrity: sha512-wpxZs9NoxZaJESJGIZTyDEaYpl0FKSA+FB9aJiyemKhMwkxQg63h4T1KJgUGHpTqPDNRcmmYLugrRjJlBtWvRA==}
1141 | hasBin: true
1142 | dependencies:
1143 | argparse: 2.0.1
1144 | dev: true
1145 |
1146 | /json-schema-traverse/0.4.1:
1147 | resolution: {integrity: sha512-xbbCH5dCYU5T8LcEhhuh7HJ88HXuW3qsI3Y0zOZFKfZEHcpWiHU/Jxzk629Brsab/mMiHQti9wMP+845RPe3Vg==}
1148 | dev: true
1149 |
1150 | /json-stable-stringify-without-jsonify/1.0.1:
1151 | resolution: {integrity: sha512-Bdboy+l7tA3OGW6FjyFHWkP5LuByj1Tk33Ljyq0axyzdk9//JSi2u3fP1QSmd1KNwq6VOKYGlAu87CisVir6Pw==}
1152 | dev: true
1153 |
1154 | /kleur/4.1.5:
1155 | resolution: {integrity: sha512-o+NO+8WrRiQEE4/7nwRJhN1HWpVmJm511pBHUxPLtp0BUISzlBplORYSmTclCnJvQq2tKu/sgl3xVpkc7ZWuQQ==}
1156 | engines: {node: '>=6'}
1157 | dev: true
1158 |
1159 | /levn/0.4.1:
1160 | resolution: {integrity: sha512-+bT2uH4E5LGE7h/n3evcS/sQlJXCpIp6ym8OWJ5eV6+67Dsql/LaaT7qJBAt2rzfoa/5QBGBhxDix1dMt2kQKQ==}
1161 | engines: {node: '>= 0.8.0'}
1162 | dependencies:
1163 | prelude-ls: 1.2.1
1164 | type-check: 0.4.0
1165 | dev: true
1166 |
1167 | /local-pkg/0.4.2:
1168 | resolution: {integrity: sha512-mlERgSPrbxU3BP4qBqAvvwlgW4MTg78iwJdGGnv7kibKjWcJksrG3t6LB5lXI93wXRDvG4NpUgJFmTG4T6rdrg==}
1169 | engines: {node: '>=14'}
1170 | dev: true
1171 |
1172 | /locate-path/6.0.0:
1173 | resolution: {integrity: sha512-iPZK6eYjbxRu3uB4/WZ3EsEIMJFMqAoopl3R+zuq0UjcAm/MO6KCweDgPfP3elTztoKP3KtnVHxTn2NHBSDVUw==}
1174 | engines: {node: '>=10'}
1175 | dependencies:
1176 | p-locate: 5.0.0
1177 | dev: true
1178 |
1179 | /lodash.merge/4.6.2:
1180 | resolution: {integrity: sha512-0KpjqXRVvrYyCsX1swR/XTK0va6VQkQM6MNo7PqW77ByjAhoARA8EfrP1N4+KlKj8YS0ZUCtRT/YUuhyYDujIQ==}
1181 | dev: true
1182 |
1183 | /loupe/2.3.6:
1184 | resolution: {integrity: sha512-RaPMZKiMy8/JruncMU5Bt6na1eftNoo++R4Y+N2FrxkDVTrGvcyzFTsaGif4QTeKESheMGegbhw6iUAq+5A8zA==}
1185 | dependencies:
1186 | get-func-name: 2.0.0
1187 | dev: true
1188 |
1189 | /magic-string/0.25.9:
1190 | resolution: {integrity: sha512-RmF0AsMzgt25qzqqLc1+MbHmhdx0ojF2Fvs4XnOqz2ZOBXzzkEwc/dJQZCYHAn7v1jbVOjAZfK8msRn4BxO4VQ==}
1191 | dependencies:
1192 | sourcemap-codec: 1.4.8
1193 | dev: true
1194 |
1195 | /magic-string/0.27.0:
1196 | resolution: {integrity: sha512-8UnnX2PeRAPZuN12svgR9j7M1uWMovg/CEnIwIG0LFkXSJJe4PdfUGiTGl8V9bsBHFUtfVINcSyYxd7q+kx9fA==}
1197 | engines: {node: '>=12'}
1198 | dependencies:
1199 | '@jridgewell/sourcemap-codec': 1.4.14
1200 | dev: true
1201 |
1202 | /md5-hex/4.0.0:
1203 | resolution: {integrity: sha512-di38zHPn4Tz8LCb5Lz8SpLb/20Hv23aPXpF4Bq1mR5r9JuCZQ/JpcDUxFfZF9Ur5GiUvqS5NQOkR+fm5cYZ0IQ==}
1204 | engines: {node: '>=12'}
1205 | dependencies:
1206 | blueimp-md5: 2.19.0
1207 | dev: true
1208 |
1209 | /merge2/1.4.1:
1210 | resolution: {integrity: sha512-8q7VEgMJW4J8tcfVPy8g09NcQwZdbwFEqhe/WZkoIzjn/3TGDwtOCYtXGxA3O8tPzpczCCDgv+P2P5y00ZJOOg==}
1211 | engines: {node: '>= 8'}
1212 | dev: true
1213 |
1214 | /micromatch/4.0.5:
1215 | resolution: {integrity: sha512-DMy+ERcEW2q8Z2Po+WNXuw3c5YaUSFjAO5GsJqfEl7UjvtIuFKO6ZrKvcItdy98dwFI2N1tg3zNIdKaQT+aNdA==}
1216 | engines: {node: '>=8.6'}
1217 | dependencies:
1218 | braces: 3.0.2
1219 | picomatch: 2.3.1
1220 | dev: true
1221 |
1222 | /mime/3.0.0:
1223 | resolution: {integrity: sha512-jSCU7/VB1loIWBZe14aEYHU/+1UMEHoaO7qxCOVJOw9GgH72VAWppxNcjU+x9a2k3GSIBXNKxXQFqRvvZ7vr3A==}
1224 | engines: {node: '>=10.0.0'}
1225 | hasBin: true
1226 | dev: true
1227 |
1228 | /min-indent/1.0.1:
1229 | resolution: {integrity: sha512-I9jwMn07Sy/IwOj3zVkVik2JTvgpaykDZEigL6Rx6N9LbMywwUSMtxET+7lVoDLLd3O3IXwJwvuuns8UB/HeAg==}
1230 | engines: {node: '>=4'}
1231 | dev: true
1232 |
1233 | /minimatch/3.1.2:
1234 | resolution: {integrity: sha512-J7p63hRiAjw1NDEww1W7i37+ByIrOWO5XQQAzZ3VOcL0PNybwpfmV/N05zFAzwQ9USyEcX6t3UO+K5aqBQOIHw==}
1235 | dependencies:
1236 | brace-expansion: 1.1.11
1237 | dev: true
1238 |
1239 | /minimist/1.2.7:
1240 | resolution: {integrity: sha512-bzfL1YUZsP41gmu/qjrEk0Q6i2ix/cVeAhbCbqH9u3zYutS1cLg00qhrD0M2MVdCcx4Sc0UpP2eBWo9rotpq6g==}
1241 | dev: true
1242 |
1243 | /mkdirp/0.5.6:
1244 | resolution: {integrity: sha512-FP+p8RB8OWpF3YZBCrP5gtADmtXApB5AMLn+vdyA+PyxCjrCs00mjyUozssO33cwDeT3wNGdLxJ5M//YqtHAJw==}
1245 | hasBin: true
1246 | dependencies:
1247 | minimist: 1.2.7
1248 | dev: true
1249 |
1250 | /mri/1.2.0:
1251 | resolution: {integrity: sha512-tzzskb3bG8LvYGFF/mDTpq3jpI6Q9wc3LEmBaghu+DdCssd1FakN7Bc0hVNmEyGq1bq3RgfkCb3cmQLpNPOroA==}
1252 | engines: {node: '>=4'}
1253 | dev: true
1254 |
1255 | /mrmime/1.0.1:
1256 | resolution: {integrity: sha512-hzzEagAgDyoU1Q6yg5uI+AorQgdvMCur3FcKf7NhMKWsaYg+RnbTyHRa/9IlLF9rf455MOCtcqqrQQ83pPP7Uw==}
1257 | engines: {node: '>=10'}
1258 | dev: true
1259 |
1260 | /ms/2.0.0:
1261 | resolution: {integrity: sha512-Tpp60P6IUJDTuOq/5Z8cdskzJujfwqfOTkrwIwj7IRISpnkJnT6SyJ4PCPnGMoFjC9ddhal5KVIYtAt97ix05A==}
1262 | dev: false
1263 |
1264 | /ms/2.1.2:
1265 | resolution: {integrity: sha512-sGkPx+VjMtmA6MX27oA4FBFELFCZZ4S4XqeGOXCv68tT+jb3vk/RyaKWP0PTKyWtmLSM0b+adUTEvbs1PEaH2w==}
1266 | dev: true
1267 |
1268 | /nanoid/3.3.4:
1269 | resolution: {integrity: sha512-MqBkQh/OHTS2egovRtLk45wEyNXwF+cokD+1YPf9u5VfJiRdAiRwB2froX5Co9Rh20xs4siNPm8naNotSD6RBw==}
1270 | engines: {node: ^10 || ^12 || ^13.7 || ^14 || >=15.0.1}
1271 | hasBin: true
1272 | dev: true
1273 |
1274 | /natural-compare/1.4.0:
1275 | resolution: {integrity: sha512-OWND8ei3VtNC9h7V60qff3SVobHr996CTwgxubgyQYEpg290h9J0buyECNNJexkFm5sOajh5G116RYA1c8ZMSw==}
1276 | dev: true
1277 |
1278 | /next-tick/1.1.0:
1279 | resolution: {integrity: sha512-CXdUiJembsNjuToQvxayPZF9Vqht7hewsvy2sOWafLvi2awflj9mOC6bHIg50orX8IJvWKY9wYQ/zB2kogPslQ==}
1280 | dev: false
1281 |
1282 | /node-fetch/2.6.7:
1283 | resolution: {integrity: sha512-ZjMPFEfVx5j+y2yF35Kzx5sF7kDzxuDj6ziH4FFbOp87zKDZNx8yExJIb05OGF4Nlt9IHFIMBkRl41VdvcNdbQ==}
1284 | engines: {node: 4.x || >=6.0.0}
1285 | peerDependencies:
1286 | encoding: ^0.1.0
1287 | peerDependenciesMeta:
1288 | encoding:
1289 | optional: true
1290 | dependencies:
1291 | whatwg-url: 5.0.0
1292 | dev: false
1293 |
1294 | /node-gyp-build/4.5.0:
1295 | resolution: {integrity: sha512-2iGbaQBV+ITgCz76ZEjmhUKAKVf7xfY1sRl4UiKQspfZMH2h06SyhNsnSVy50cwkFQDGLyif6m/6uFXHkOZ6rg==}
1296 | hasBin: true
1297 | dev: false
1298 |
1299 | /normalize-path/3.0.0:
1300 | resolution: {integrity: sha512-6eZs5Ls3WtCisHWp9S2GUy8dqkpGi4BVSz3GaqiE6ezub0512ESztXUwUB6C6IKbQkY2Pnb/mD4WYojCRwcwLA==}
1301 | engines: {node: '>=0.10.0'}
1302 | dev: true
1303 |
1304 | /once/1.4.0:
1305 | resolution: {integrity: sha512-lNaJgI+2Q5URQBkccEKHTQOPaXdUxnZZElQTZY0MFUAuaEqe1E+Nyvgdz/aIyNi6Z9MzO5dv1H8n58/GELp3+w==}
1306 | dependencies:
1307 | wrappy: 1.0.2
1308 | dev: true
1309 |
1310 | /optionator/0.9.1:
1311 | resolution: {integrity: sha512-74RlY5FCnhq4jRxVUPKDaRwrVNXMqsGsiW6AJw4XK8hmtm10wC0ypZBLw5IIp85NZMr91+qd1RvvENwg7jjRFw==}
1312 | engines: {node: '>= 0.8.0'}
1313 | dependencies:
1314 | deep-is: 0.1.4
1315 | fast-levenshtein: 2.0.6
1316 | levn: 0.4.1
1317 | prelude-ls: 1.2.1
1318 | type-check: 0.4.0
1319 | word-wrap: 1.2.3
1320 | dev: true
1321 |
1322 | /p-limit/3.1.0:
1323 | resolution: {integrity: sha512-TYOanM3wGwNGsZN2cVTYPArw454xnXj5qmWF1bEoAc4+cU/ol7GVh7odevjp1FNHduHc3KZMcFduxU5Xc6uJRQ==}
1324 | engines: {node: '>=10'}
1325 | dependencies:
1326 | yocto-queue: 0.1.0
1327 | dev: true
1328 |
1329 | /p-locate/5.0.0:
1330 | resolution: {integrity: sha512-LaNjtRWUBY++zB5nE/NwcaoMylSPk+S+ZHNB1TzdbMJMny6dynpAGt7X/tl/QYq3TIeE6nxHppbo2LGymrG5Pw==}
1331 | engines: {node: '>=10'}
1332 | dependencies:
1333 | p-limit: 3.1.0
1334 | dev: true
1335 |
1336 | /parent-module/1.0.1:
1337 | resolution: {integrity: sha512-GQ2EWRpQV8/o+Aw8YqtfZZPfNRWZYkbidE9k5rpl/hC3vtHHBfGm2Ifi6qWV+coDGkrUKZAxE3Lot5kcsRlh+g==}
1338 | engines: {node: '>=6'}
1339 | dependencies:
1340 | callsites: 3.1.0
1341 | dev: true
1342 |
1343 | /path-exists/4.0.0:
1344 | resolution: {integrity: sha512-ak9Qy5Q7jYb2Wwcey5Fpvg2KoAc/ZIhLSLOSBmRmygPsGwkVVt0fZa0qrtMz+m6tJTAHfZQ8FnmB4MG4LWy7/w==}
1345 | engines: {node: '>=8'}
1346 | dev: true
1347 |
1348 | /path-is-absolute/1.0.1:
1349 | resolution: {integrity: sha512-AVbw3UJ2e9bq64vSaS9Am0fje1Pa8pbGqTTsmXfaIiMpnr5DlDhfJOuLj9Sf95ZPVDAUerDfEk88MPmPe7UCQg==}
1350 | engines: {node: '>=0.10.0'}
1351 | dev: true
1352 |
1353 | /path-key/3.1.1:
1354 | resolution: {integrity: sha512-ojmeN0qd+y0jszEtoY48r0Peq5dwMEkIlCOu6Q5f41lfkswXuKtYrhgoTpLnyIcHm24Uhqx+5Tqm2InSwLhE6Q==}
1355 | engines: {node: '>=8'}
1356 | dev: true
1357 |
1358 | /path-parse/1.0.7:
1359 | resolution: {integrity: sha512-LDJzPVEEEPR+y48z93A0Ed0yXb8pAByGWo/k5YYdYgpY2/2EsOsksJrq7lOHxryrVOn1ejG6oAp8ahvOIQD8sw==}
1360 | dev: true
1361 |
1362 | /pathval/1.1.1:
1363 | resolution: {integrity: sha512-Dp6zGqpTdETdR63lehJYPeIOqpiNBNtc7BpWSLrOje7UaIsE5aY92r/AunQA7rsXvet3lrJ3JnZX29UPTKXyKQ==}
1364 | dev: true
1365 |
1366 | /picocolors/1.0.0:
1367 | resolution: {integrity: sha512-1fygroTLlHu66zi26VoTDv8yRgm0Fccecssto+MhsZ0D/DGW2sm8E8AjW7NU5VVTRt5GxbeZ5qBuJr+HyLYkjQ==}
1368 | dev: true
1369 |
1370 | /picomatch/2.3.1:
1371 | resolution: {integrity: sha512-JU3teHTNjmE2VCGFzuY8EXzCDVwEqB2a8fsIvwaStHhAWJEeVd1o1QD80CU6+ZdEXXSLbSsuLwJjkCBWqRQUVA==}
1372 | engines: {node: '>=8.6'}
1373 | dev: true
1374 |
1375 | /postcss/8.4.20:
1376 | resolution: {integrity: sha512-6Q04AXR1212bXr5fh03u8aAwbLxAQNGQ/Q1LNa0VfOI06ZAlhPHtQvE4OIdpj4kLThXilalPnmDSOD65DcHt+g==}
1377 | engines: {node: ^10 || ^12 || >=14}
1378 | dependencies:
1379 | nanoid: 3.3.4
1380 | picocolors: 1.0.0
1381 | source-map-js: 1.0.2
1382 | dev: true
1383 |
1384 | /prelude-ls/1.2.1:
1385 | resolution: {integrity: sha512-vkcDPrRZo1QZLbn5RLGPpg/WmIQ65qoWWhcGKf/b5eplkkarX0m9z8ppCat4mlOqUsWpyNuYgO3VRyrYHSzX5g==}
1386 | engines: {node: '>= 0.8.0'}
1387 | dev: true
1388 |
1389 | /prettier-plugin-svelte/2.9.0_ajxj753sv7dbwexjherrch25ta:
1390 | resolution: {integrity: sha512-3doBi5NO4IVgaNPtwewvrgPpqAcvNv0NwJNflr76PIGgi9nf1oguQV1Hpdm9TI2ALIQVn/9iIwLpBO5UcD2Jiw==}
1391 | peerDependencies:
1392 | prettier: ^1.16.4 || ^2.0.0
1393 | svelte: ^3.2.0
1394 | dependencies:
1395 | prettier: 2.8.1
1396 | svelte: 3.55.0
1397 | dev: true
1398 |
1399 | /prettier/2.8.1:
1400 | resolution: {integrity: sha512-lqGoSJBQNJidqCHE80vqZJHWHRFoNYsSpP9AjFhlhi9ODCJA541svILes/+/1GM3VaL/abZi7cpFzOpdR9UPKg==}
1401 | engines: {node: '>=10.13.0'}
1402 | hasBin: true
1403 | dev: true
1404 |
1405 | /punycode/2.1.1:
1406 | resolution: {integrity: sha512-XRsRjdf+j5ml+y/6GKHPZbrF/8p2Yga0JPtdqTIY2Xe5ohJPD9saDJJLPvp9+NSBprVvevdXZybnj2cv8OEd0A==}
1407 | engines: {node: '>=6'}
1408 | dev: true
1409 |
1410 | /queue-microtask/1.2.3:
1411 | resolution: {integrity: sha512-NuaNSa6flKT5JaSYQzJok04JzTL1CA6aGhv5rfLW3PgqA+M2ChpZQnAC8h8i4ZFkBS8X5RqkDBHA7r4hej3K9A==}
1412 | dev: true
1413 |
1414 | /readdirp/3.6.0:
1415 | resolution: {integrity: sha512-hOS089on8RduqdbhvQ5Z37A0ESjsqz6qnRcffsMU3495FuTdqSm+7bhJ29JvIOsBDEEnan5DPu9t3To9VRlMzA==}
1416 | engines: {node: '>=8.10.0'}
1417 | dependencies:
1418 | picomatch: 2.3.1
1419 | dev: true
1420 |
1421 | /regexpp/3.2.0:
1422 | resolution: {integrity: sha512-pq2bWo9mVD43nbts2wGv17XLiNLya+GklZ8kaDLV2Z08gDCsGpnKn9BFMepvWuHCbyVvY7J5o5+BVvoQbmlJLg==}
1423 | engines: {node: '>=8'}
1424 | dev: true
1425 |
1426 | /resolve-from/4.0.0:
1427 | resolution: {integrity: sha512-pb/MYmXstAkysRFx8piNI1tGFNQIFA3vkE3Gq4EuA1dF6gHp/+vgZqsCGJapvy8N3Q+4o7FwvquPJcnZ7RYy4g==}
1428 | engines: {node: '>=4'}
1429 | dev: true
1430 |
1431 | /resolve/1.22.1:
1432 | resolution: {integrity: sha512-nBpuuYuY5jFsli/JIs1oldw6fOQCBioohqWZg/2hiaOybXOft4lonv85uDOKXdf8rhyK159cxU5cDcK/NKk8zw==}
1433 | hasBin: true
1434 | dependencies:
1435 | is-core-module: 2.11.0
1436 | path-parse: 1.0.7
1437 | supports-preserve-symlinks-flag: 1.0.0
1438 | dev: true
1439 |
1440 | /reusify/1.0.4:
1441 | resolution: {integrity: sha512-U9nH88a3fc/ekCF1l0/UP1IosiuIjyTh7hBvXVMHYgVcfGvt897Xguj2UOLDeI5BG2m7/uwyaLVT6fbtCwTyzw==}
1442 | engines: {iojs: '>=1.0.0', node: '>=0.10.0'}
1443 | dev: true
1444 |
1445 | /rimraf/2.7.1:
1446 | resolution: {integrity: sha512-uWjbaKIK3T1OSVptzX7Nl6PvQ3qAGtKEtVRjRuazjfL3Bx5eI409VZSqgND+4UNnmzLVdPj9FqFJNPqBZFve4w==}
1447 | hasBin: true
1448 | dependencies:
1449 | glob: 7.2.3
1450 | dev: true
1451 |
1452 | /rimraf/3.0.2:
1453 | resolution: {integrity: sha512-JZkJMZkAGFFPP2YqXZXPbMlMBgsxzE8ILs4lMIX/2o0L9UBw9O/Y3o6wFw/i9YLapcUJWwqbi3kdxIPdC62TIA==}
1454 | hasBin: true
1455 | dependencies:
1456 | glob: 7.2.3
1457 | dev: true
1458 |
1459 | /rollup/3.9.0:
1460 | resolution: {integrity: sha512-nGGylpmblyjTpF4lEUPgmOw6OVxRvnI6Iuuh6Lz4O/X66cVOX1XJSsqP1YamxQ+mPuFE7qJxLFDSCk8rNv5dDw==}
1461 | engines: {node: '>=14.18.0', npm: '>=8.0.0'}
1462 | hasBin: true
1463 | optionalDependencies:
1464 | fsevents: 2.3.2
1465 | dev: true
1466 |
1467 | /run-parallel/1.2.0:
1468 | resolution: {integrity: sha512-5l4VyZR86LZ/lDxZTR6jqL8AFE2S0IFLMP26AbjsLVADxHdhB/c0GUsH+y39UfCi3dzz8OlQuPmnaJOMoDHQBA==}
1469 | dependencies:
1470 | queue-microtask: 1.2.3
1471 | dev: true
1472 |
1473 | /sade/1.8.1:
1474 | resolution: {integrity: sha512-xal3CZX1Xlo/k4ApwCFrHVACi9fBqJ7V+mwhBsuf/1IOKbBy098Fex+Wa/5QMubw09pSZ/u8EY8PWgevJsXp1A==}
1475 | engines: {node: '>=6'}
1476 | dependencies:
1477 | mri: 1.2.0
1478 | dev: true
1479 |
1480 | /sander/0.5.1:
1481 | resolution: {integrity: sha512-3lVqBir7WuKDHGrKRDn/1Ye3kwpXaDOMsiRP1wd6wpZW56gJhsbp5RqQpA6JG/P+pkXizygnr1dKR8vzWaVsfA==}
1482 | dependencies:
1483 | es6-promise: 3.3.1
1484 | graceful-fs: 4.2.10
1485 | mkdirp: 0.5.6
1486 | rimraf: 2.7.1
1487 | dev: true
1488 |
1489 | /set-cookie-parser/2.5.1:
1490 | resolution: {integrity: sha512-1jeBGaKNGdEq4FgIrORu/N570dwoPYio8lSoYLWmX7sQ//0JY08Xh9o5pBcgmHQ/MbsYp/aZnOe1s1lIsbLprQ==}
1491 | dev: true
1492 |
1493 | /shebang-command/2.0.0:
1494 | resolution: {integrity: sha512-kHxr2zZpYtdmrN1qDjrrX/Z1rR1kG8Dx+gkpK1G4eXmvXswmcE1hTWBWYUzlraYw1/yZp6YuDY77YtvbN0dmDA==}
1495 | engines: {node: '>=8'}
1496 | dependencies:
1497 | shebang-regex: 3.0.0
1498 | dev: true
1499 |
1500 | /shebang-regex/3.0.0:
1501 | resolution: {integrity: sha512-7++dFhtcx3353uBaq8DDR4NuxBetBzC7ZQOhmTQInHEd6bSrXdiEyzCvG07Z44UYdLShWUyXt5M/yhz8ekcb1A==}
1502 | engines: {node: '>=8'}
1503 | dev: true
1504 |
1505 | /sirv/2.0.2:
1506 | resolution: {integrity: sha512-4Qog6aE29nIjAOKe/wowFTxOdmbEZKb+3tsLljaBRzJwtqto0BChD2zzH0LhgCSXiI+V7X+Y45v14wBZQ1TK3w==}
1507 | engines: {node: '>= 10'}
1508 | dependencies:
1509 | '@polka/url': 1.0.0-next.21
1510 | mrmime: 1.0.1
1511 | totalist: 3.0.0
1512 | dev: true
1513 |
1514 | /sorcery/0.10.0:
1515 | resolution: {integrity: sha512-R5ocFmKZQFfSTstfOtHjJuAwbpGyf9qjQa1egyhvXSbM7emjrtLXtGdZsDJDABC85YBfVvrOiGWKSYXPKdvP1g==}
1516 | hasBin: true
1517 | dependencies:
1518 | buffer-crc32: 0.2.13
1519 | minimist: 1.2.7
1520 | sander: 0.5.1
1521 | sourcemap-codec: 1.4.8
1522 | dev: true
1523 |
1524 | /source-map-js/1.0.2:
1525 | resolution: {integrity: sha512-R0XvVJ9WusLiqTCEiGCmICCMplcCkIwwR11mOSD9CR5u+IXYdiseeEuXCVAjS54zqwkLcPNnmU4OeJ6tUrWhDw==}
1526 | engines: {node: '>=0.10.0'}
1527 | dev: true
1528 |
1529 | /source-map/0.6.1:
1530 | resolution: {integrity: sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g==}
1531 | engines: {node: '>=0.10.0'}
1532 | dev: true
1533 |
1534 | /sourcemap-codec/1.4.8:
1535 | resolution: {integrity: sha512-9NykojV5Uih4lgo5So5dtw+f0JgJX30KCNI8gwhz2J9A15wD0Ml6tjHKwf6fTSa6fAdVBdZeNOs9eJ71qCk8vA==}
1536 | deprecated: Please use @jridgewell/sourcemap-codec instead
1537 | dev: true
1538 |
1539 | /streamsearch/1.1.0:
1540 | resolution: {integrity: sha512-Mcc5wHehp9aXz1ax6bZUyY5afg9u2rv5cqQI3mRrYkGC8rW2hM02jWuwjtL++LS5qinSyhj2QfLyNsuc+VsExg==}
1541 | engines: {node: '>=10.0.0'}
1542 | dev: true
1543 |
1544 | /strip-ansi/6.0.1:
1545 | resolution: {integrity: sha512-Y38VPSHcqkFrCpFnQ9vuSXmquuv5oXOKpGeT6aGrr3o3Gc9AlVa6JBfUSOCnbxGGZF+/0ooI7KrPuUSztUdU5A==}
1546 | engines: {node: '>=8'}
1547 | dependencies:
1548 | ansi-regex: 5.0.1
1549 | dev: true
1550 |
1551 | /strip-indent/3.0.0:
1552 | resolution: {integrity: sha512-laJTa3Jb+VQpaC6DseHhF7dXVqHTfJPCRDaEbid/drOhgitgYku/letMUqOXFoWV0zIIUbjpdH2t+tYj4bQMRQ==}
1553 | engines: {node: '>=8'}
1554 | dependencies:
1555 | min-indent: 1.0.1
1556 | dev: true
1557 |
1558 | /strip-json-comments/3.1.1:
1559 | resolution: {integrity: sha512-6fPc+R4ihwqP6N/aIv2f1gMH8lOVtWQHoqC4yK6oSDVVocumAsfCqjkXnqiYMhmMwS/mEHLp7Vehlt3ql6lEig==}
1560 | engines: {node: '>=8'}
1561 | dev: true
1562 |
1563 | /strip-literal/1.0.0:
1564 | resolution: {integrity: sha512-5o4LsH1lzBzO9UFH63AJ2ad2/S2AVx6NtjOcaz+VTT2h1RiRvbipW72z8M/lxEhcPHDBQwpDrnTF7sXy/7OwCQ==}
1565 | dependencies:
1566 | acorn: 8.8.1
1567 | dev: true
1568 |
1569 | /supports-color/7.2.0:
1570 | resolution: {integrity: sha512-qpCAvRl9stuOHveKsn7HncJRvv501qIacKzQlO/+Lwxc9+0q2wLyv4Dfvt80/DPn2pqOBsJdDiogXGR9+OvwRw==}
1571 | engines: {node: '>=8'}
1572 | dependencies:
1573 | has-flag: 4.0.0
1574 | dev: true
1575 |
1576 | /supports-preserve-symlinks-flag/1.0.0:
1577 | resolution: {integrity: sha512-ot0WnXS9fgdkgIcePe6RHNk1WA8+muPa6cSjeR3V8K27q9BB1rTE3R1p7Hv0z1ZyAc8s6Vvv8DIyWf681MAt0w==}
1578 | engines: {node: '>= 0.4'}
1579 | dev: true
1580 |
1581 | /svelte-check/2.10.3_svelte@3.55.0:
1582 | resolution: {integrity: sha512-Nt1aWHTOKFReBpmJ1vPug0aGysqPwJh2seM1OvICfM2oeyaA62mOiy5EvkXhltGfhCcIQcq2LoE0l1CwcWPjlw==}
1583 | hasBin: true
1584 | peerDependencies:
1585 | svelte: ^3.24.0
1586 | dependencies:
1587 | '@jridgewell/trace-mapping': 0.3.17
1588 | chokidar: 3.5.3
1589 | fast-glob: 3.2.12
1590 | import-fresh: 3.3.0
1591 | picocolors: 1.0.0
1592 | sade: 1.8.1
1593 | svelte: 3.55.0
1594 | svelte-preprocess: 4.10.7_niwyv7xychq2ag6arq5eqxbomm
1595 | typescript: 4.9.4
1596 | transitivePeerDependencies:
1597 | - '@babel/core'
1598 | - coffeescript
1599 | - less
1600 | - node-sass
1601 | - postcss
1602 | - postcss-load-config
1603 | - pug
1604 | - sass
1605 | - stylus
1606 | - sugarss
1607 | dev: true
1608 |
1609 | /svelte-dnd-action/0.9.22_svelte@3.55.0:
1610 | resolution: {integrity: sha512-lOQJsNLM1QWv5mdxIkCVtk6k4lHCtLgfE59y8rs7iOM6erchbLC9hMEFYSveZz7biJV0mpg7yDSs4bj/RT/YkA==}
1611 | peerDependencies:
1612 | svelte: '>=3.23.0'
1613 | dependencies:
1614 | svelte: 3.55.0
1615 | dev: true
1616 |
1617 | /svelte-hmr/0.15.1_svelte@3.55.0:
1618 | resolution: {integrity: sha512-BiKB4RZ8YSwRKCNVdNxK/GfY+r4Kjgp9jCLEy0DuqAKfmQtpL38cQK3afdpjw4sqSs4PLi3jIPJIFp259NkZtA==}
1619 | engines: {node: ^12.20 || ^14.13.1 || >= 16}
1620 | peerDependencies:
1621 | svelte: '>=3.19.0'
1622 | dependencies:
1623 | svelte: 3.55.0
1624 | dev: true
1625 |
1626 | /svelte-preprocess/4.10.7_niwyv7xychq2ag6arq5eqxbomm:
1627 | resolution: {integrity: sha512-sNPBnqYD6FnmdBrUmBCaqS00RyCsCpj2BG58A1JBswNF7b0OKviwxqVrOL/CKyJrLSClrSeqQv5BXNg2RUbPOw==}
1628 | engines: {node: '>= 9.11.2'}
1629 | requiresBuild: true
1630 | peerDependencies:
1631 | '@babel/core': ^7.10.2
1632 | coffeescript: ^2.5.1
1633 | less: ^3.11.3 || ^4.0.0
1634 | node-sass: '*'
1635 | postcss: ^7 || ^8
1636 | postcss-load-config: ^2.1.0 || ^3.0.0 || ^4.0.0
1637 | pug: ^3.0.0
1638 | sass: ^1.26.8
1639 | stylus: ^0.55.0
1640 | sugarss: ^2.0.0
1641 | svelte: ^3.23.0
1642 | typescript: ^3.9.5 || ^4.0.0
1643 | peerDependenciesMeta:
1644 | '@babel/core':
1645 | optional: true
1646 | coffeescript:
1647 | optional: true
1648 | less:
1649 | optional: true
1650 | node-sass:
1651 | optional: true
1652 | postcss:
1653 | optional: true
1654 | postcss-load-config:
1655 | optional: true
1656 | pug:
1657 | optional: true
1658 | sass:
1659 | optional: true
1660 | stylus:
1661 | optional: true
1662 | sugarss:
1663 | optional: true
1664 | typescript:
1665 | optional: true
1666 | dependencies:
1667 | '@types/pug': 2.0.6
1668 | '@types/sass': 1.43.1
1669 | detect-indent: 6.1.0
1670 | magic-string: 0.25.9
1671 | sorcery: 0.10.0
1672 | strip-indent: 3.0.0
1673 | svelte: 3.55.0
1674 | typescript: 4.9.4
1675 | dev: true
1676 |
1677 | /svelte/3.55.0:
1678 | resolution: {integrity: sha512-uGu2FVMlOuey4JoKHKrpZFkoYyj0VLjJdz47zX5+gVK5odxHM40RVhar9/iK2YFRVxvfg9FkhfVlR0sjeIrOiA==}
1679 | engines: {node: '>= 8'}
1680 | dev: true
1681 |
1682 | /text-table/0.2.0:
1683 | resolution: {integrity: sha512-N+8UisAXDGk8PFXP4HAzVR9nbfmVJ3zYLAWiTIoqC5v5isinhr+r5uaO8+7r3BMfuNIufIsA7RdpVgacC2cSpw==}
1684 | dev: true
1685 |
1686 | /tiny-glob/0.2.9:
1687 | resolution: {integrity: sha512-g/55ssRPUjShh+xkfx9UPDXqhckHEsHr4Vd9zX55oSdGZc/MD0m3sferOkwWtp98bv+kcVfEHtRJgBVJzelrzg==}
1688 | dependencies:
1689 | globalyzer: 0.1.0
1690 | globrex: 0.1.2
1691 | dev: true
1692 |
1693 | /tinybench/2.3.1:
1694 | resolution: {integrity: sha512-hGYWYBMPr7p4g5IarQE7XhlyWveh1EKhy4wUBS1LrHXCKYgvz+4/jCqgmJqZxxldesn05vccrtME2RLLZNW7iA==}
1695 | dev: true
1696 |
1697 | /tinypool/0.3.0:
1698 | resolution: {integrity: sha512-NX5KeqHOBZU6Bc0xj9Vr5Szbb1j8tUHIeD18s41aDJaPeC5QTdEhK0SpdpUrZlj2nv5cctNcSjaKNanXlfcVEQ==}
1699 | engines: {node: '>=14.0.0'}
1700 | dev: true
1701 |
1702 | /tinyspy/1.0.2:
1703 | resolution: {integrity: sha512-bSGlgwLBYf7PnUsQ6WOc6SJ3pGOcd+d8AA6EUnLDDM0kWEstC1JIlSZA3UNliDXhd9ABoS7hiRBDCu+XP/sf1Q==}
1704 | engines: {node: '>=14.0.0'}
1705 | dev: true
1706 |
1707 | /to-regex-range/5.0.1:
1708 | resolution: {integrity: sha512-65P7iz6X5yEr1cwcgvQxbbIw7Uk3gOy5dIdtZ4rDveLqhrdJP+Li/Hx6tyK0NEb+2GCyneCMJiGqrADCSNk8sQ==}
1709 | engines: {node: '>=8.0'}
1710 | dependencies:
1711 | is-number: 7.0.0
1712 | dev: true
1713 |
1714 | /totalist/3.0.0:
1715 | resolution: {integrity: sha512-eM+pCBxXO/njtF7vdFsHuqb+ElbxqtI4r5EAvk6grfAFyJ6IvWlSkfZ5T9ozC6xWw3Fj1fGoSmrl0gUs46JVIw==}
1716 | engines: {node: '>=6'}
1717 | dev: true
1718 |
1719 | /tr46/0.0.3:
1720 | resolution: {integrity: sha512-N3WMsuqV66lT30CrXNbEjx4GEwlow3v6rr4mCcv6prnfwhS01rkgyFdjPNBYd9br7LpXV1+Emh01fHnq2Gdgrw==}
1721 | dev: false
1722 |
1723 | /type-check/0.4.0:
1724 | resolution: {integrity: sha512-XleUoc9uwGXqjWwXaUTZAmzMcFZ5858QA2vvx1Ur5xIcixXIP+8LnFDgRplU30us6teqdlskFfu+ae4K79Ooew==}
1725 | engines: {node: '>= 0.8.0'}
1726 | dependencies:
1727 | prelude-ls: 1.2.1
1728 | dev: true
1729 |
1730 | /type-detect/4.0.8:
1731 | resolution: {integrity: sha512-0fr/mIH1dlO+x7TlcMy+bIDqKPsw/70tVyeHW787goQjhmqaZe10uwLujubK9q9Lg6Fiho1KUKDYz0Z7k7g5/g==}
1732 | engines: {node: '>=4'}
1733 | dev: true
1734 |
1735 | /type-fest/0.20.2:
1736 | resolution: {integrity: sha512-Ne+eE4r0/iWnpAxD852z3A+N0Bt5RN//NjJwRd2VFHEmrywxf5vsZlh4R6lixl6B+wz/8d+maTSAkN1FIkI3LQ==}
1737 | engines: {node: '>=10'}
1738 | dev: true
1739 |
1740 | /type-fest/1.4.0:
1741 | resolution: {integrity: sha512-yGSza74xk0UG8k+pLh5oeoYirvIiWo5t0/o3zHHAO2tRDiZcxWP7fywNlXhqb6/r6sWvwi+RsyQMWhVLe4BVuA==}
1742 | engines: {node: '>=10'}
1743 | dev: true
1744 |
1745 | /type/1.2.0:
1746 | resolution: {integrity: sha512-+5nt5AAniqsCnu2cEQQdpzCAh33kVx8n0VoFidKpB1dVVLAN/F+bgVOqOJqOnEnrhp222clB5p3vUlD+1QAnfg==}
1747 | dev: false
1748 |
1749 | /type/2.7.2:
1750 | resolution: {integrity: sha512-dzlvlNlt6AXU7EBSfpAscydQ7gXB+pPGsPnfJnZpiNJBDj7IaJzQlBZYGdEi4R9HmPdBv2XmWJ6YUtoTa7lmCw==}
1751 | dev: false
1752 |
1753 | /typedarray-to-buffer/3.1.5:
1754 | resolution: {integrity: sha512-zdu8XMNEDepKKR+XYOXAVPtWui0ly0NtohUscw+UmaHiAWT8hrV1rr//H6V+0DvJ3OQ19S979M0laLfX8rm82Q==}
1755 | dependencies:
1756 | is-typedarray: 1.0.0
1757 | dev: false
1758 |
1759 | /typescript/4.9.4:
1760 | resolution: {integrity: sha512-Uz+dTXYzxXXbsFpM86Wh3dKCxrQqUcVMxwU54orwlJjOpO3ao8L7j5lH+dWfTwgCwIuM9GQ2kvVotzYJMXTBZg==}
1761 | engines: {node: '>=4.2.0'}
1762 | hasBin: true
1763 | dev: true
1764 |
1765 | /undici/5.14.0:
1766 | resolution: {integrity: sha512-yJlHYw6yXPPsuOH0x2Ib1Km61vu4hLiRRQoafs+WUgX1vO64vgnxiCEN9dpIrhZyHFsai3F0AEj4P9zy19enEQ==}
1767 | engines: {node: '>=12.18'}
1768 | dependencies:
1769 | busboy: 1.6.0
1770 | dev: true
1771 |
1772 | /uri-js/4.4.1:
1773 | resolution: {integrity: sha512-7rKUyy33Q1yc98pQ1DAmLtwX109F7TIfWlW1Ydo8Wl1ii1SeHieeh0HHfPeL2fMXK6z0s8ecKs9frCuLJvndBg==}
1774 | dependencies:
1775 | punycode: 2.1.1
1776 | dev: true
1777 |
1778 | /utf-8-validate/5.0.10:
1779 | resolution: {integrity: sha512-Z6czzLq4u8fPOyx7TU6X3dvUZVvoJmxSQ+IcrlmagKhilxlhZgxPK6C5Jqbkw1IDUmFTM+cz9QDnnLTwDz/2gQ==}
1780 | engines: {node: '>=6.14.2'}
1781 | requiresBuild: true
1782 | dependencies:
1783 | node-gyp-build: 4.5.0
1784 | dev: false
1785 |
1786 | /vite/4.0.3:
1787 | resolution: {integrity: sha512-HvuNv1RdE7deIfQb8mPk51UKjqptO/4RXZ5yXSAvurd5xOckwS/gg8h9Tky3uSbnjYTgUm0hVCet1cyhKd73ZA==}
1788 | engines: {node: ^14.18.0 || >=16.0.0}
1789 | hasBin: true
1790 | peerDependencies:
1791 | '@types/node': '>= 14'
1792 | less: '*'
1793 | sass: '*'
1794 | stylus: '*'
1795 | sugarss: '*'
1796 | terser: ^5.4.0
1797 | peerDependenciesMeta:
1798 | '@types/node':
1799 | optional: true
1800 | less:
1801 | optional: true
1802 | sass:
1803 | optional: true
1804 | stylus:
1805 | optional: true
1806 | sugarss:
1807 | optional: true
1808 | terser:
1809 | optional: true
1810 | dependencies:
1811 | esbuild: 0.16.12
1812 | postcss: 8.4.20
1813 | resolve: 1.22.1
1814 | rollup: 3.9.0
1815 | optionalDependencies:
1816 | fsevents: 2.3.2
1817 | dev: true
1818 |
1819 | /vite/4.0.3_@types+node@18.11.18:
1820 | resolution: {integrity: sha512-HvuNv1RdE7deIfQb8mPk51UKjqptO/4RXZ5yXSAvurd5xOckwS/gg8h9Tky3uSbnjYTgUm0hVCet1cyhKd73ZA==}
1821 | engines: {node: ^14.18.0 || >=16.0.0}
1822 | hasBin: true
1823 | peerDependencies:
1824 | '@types/node': '>= 14'
1825 | less: '*'
1826 | sass: '*'
1827 | stylus: '*'
1828 | sugarss: '*'
1829 | terser: ^5.4.0
1830 | peerDependenciesMeta:
1831 | '@types/node':
1832 | optional: true
1833 | less:
1834 | optional: true
1835 | sass:
1836 | optional: true
1837 | stylus:
1838 | optional: true
1839 | sugarss:
1840 | optional: true
1841 | terser:
1842 | optional: true
1843 | dependencies:
1844 | '@types/node': 18.11.18
1845 | esbuild: 0.16.12
1846 | postcss: 8.4.20
1847 | resolve: 1.22.1
1848 | rollup: 3.9.0
1849 | optionalDependencies:
1850 | fsevents: 2.3.2
1851 | dev: true
1852 |
1853 | /vitefu/0.2.4_vite@4.0.3:
1854 | resolution: {integrity: sha512-fanAXjSaf9xXtOOeno8wZXIhgia+CZury481LsDaV++lSvcU2R9Ch2bPh3PYFyoHW+w9LqAeYRISVQjUIew14g==}
1855 | peerDependencies:
1856 | vite: ^3.0.0 || ^4.0.0
1857 | peerDependenciesMeta:
1858 | vite:
1859 | optional: true
1860 | dependencies:
1861 | vite: 4.0.3
1862 | dev: true
1863 |
1864 | /vitest/0.25.8:
1865 | resolution: {integrity: sha512-X75TApG2wZTJn299E/TIYevr4E9/nBo1sUtZzn0Ci5oK8qnpZAZyhwg0qCeMSakGIWtc6oRwcQFyFfW14aOFWg==}
1866 | engines: {node: '>=v14.16.0'}
1867 | hasBin: true
1868 | peerDependencies:
1869 | '@edge-runtime/vm': '*'
1870 | '@vitest/browser': '*'
1871 | '@vitest/ui': '*'
1872 | happy-dom: '*'
1873 | jsdom: '*'
1874 | peerDependenciesMeta:
1875 | '@edge-runtime/vm':
1876 | optional: true
1877 | '@vitest/browser':
1878 | optional: true
1879 | '@vitest/ui':
1880 | optional: true
1881 | happy-dom:
1882 | optional: true
1883 | jsdom:
1884 | optional: true
1885 | dependencies:
1886 | '@types/chai': 4.3.4
1887 | '@types/chai-subset': 1.3.3
1888 | '@types/node': 18.11.18
1889 | acorn: 8.8.1
1890 | acorn-walk: 8.2.0
1891 | chai: 4.3.7
1892 | debug: 4.3.4
1893 | local-pkg: 0.4.2
1894 | source-map: 0.6.1
1895 | strip-literal: 1.0.0
1896 | tinybench: 2.3.1
1897 | tinypool: 0.3.0
1898 | tinyspy: 1.0.2
1899 | vite: 4.0.3_@types+node@18.11.18
1900 | transitivePeerDependencies:
1901 | - less
1902 | - sass
1903 | - stylus
1904 | - sugarss
1905 | - supports-color
1906 | - terser
1907 | dev: true
1908 |
1909 | /webidl-conversions/3.0.1:
1910 | resolution: {integrity: sha512-2JAn3z8AR6rjK8Sm8orRC0h/bcl/DqL7tRPdGZ4I1CjdF+EaMLmYxBHyXuKL849eucPFhvBoxMsflfOb8kxaeQ==}
1911 | dev: false
1912 |
1913 | /websocket/1.0.34:
1914 | resolution: {integrity: sha512-PRDso2sGwF6kM75QykIesBijKSVceR6jL2G8NGYyq2XrItNC2P5/qL5XeR056GhA+Ly7JMFvJb9I312mJfmqnQ==}
1915 | engines: {node: '>=4.0.0'}
1916 | dependencies:
1917 | bufferutil: 4.0.7
1918 | debug: 2.6.9
1919 | es5-ext: 0.10.62
1920 | typedarray-to-buffer: 3.1.5
1921 | utf-8-validate: 5.0.10
1922 | yaeti: 0.0.6
1923 | transitivePeerDependencies:
1924 | - supports-color
1925 | dev: false
1926 |
1927 | /whatwg-url/5.0.0:
1928 | resolution: {integrity: sha512-saE57nupxk6v3HY35+jzBwYa0rKSy0XR8JSxZPwgLr7ys0IBzhGviA1/TUGJLmSVqs8pb9AnvICXEuOHLprYTw==}
1929 | dependencies:
1930 | tr46: 0.0.3
1931 | webidl-conversions: 3.0.1
1932 | dev: false
1933 |
1934 | /which/2.0.2:
1935 | resolution: {integrity: sha512-BLI3Tl1TW3Pvl70l3yq3Y64i+awpwXqsGBYWkkqMtnbXgrMD+yj7rhW0kuEDxzJaYXGjEW5ogapKNMEKNMjibA==}
1936 | engines: {node: '>= 8'}
1937 | hasBin: true
1938 | dependencies:
1939 | isexe: 2.0.0
1940 | dev: true
1941 |
1942 | /word-wrap/1.2.3:
1943 | resolution: {integrity: sha512-Hz/mrNwitNRh/HUAtM/VT/5VH+ygD6DV7mYKZAtHOrbs8U7lvPS6xf7EJKMF0uW1KJCl0H701g3ZGus+muE5vQ==}
1944 | engines: {node: '>=0.10.0'}
1945 | dev: true
1946 |
1947 | /wrappy/1.0.2:
1948 | resolution: {integrity: sha512-l4Sp/DRseor9wL6EvV2+TuQn63dMkPjZ/sp9XkghTEbV9KlPS1xUsZ3u7/IQO4wxtcFB4bgpQPRcR3QCvezPcQ==}
1949 | dev: true
1950 |
1951 | /yaeti/0.0.6:
1952 | resolution: {integrity: sha512-MvQa//+KcZCUkBTIC9blM+CU9J2GzuTytsOUwf2lidtvkx/6gnEp1QvJv34t9vdjhFmha/mUiNDbN0D0mJWdug==}
1953 | engines: {node: '>=0.10.32'}
1954 | dev: false
1955 |
1956 | /yocto-queue/0.1.0:
1957 | resolution: {integrity: sha512-rVksvsnNCdJ/ohGc6xgPwyN8eheCxsiLM8mxuE/t/mOVqJewPuO1miLpTHQiRgTKCLexL4MeAFVagts7HmNZ2Q==}
1958 | engines: {node: '>=10'}
1959 | dev: true
1960 |
--------------------------------------------------------------------------------
/screenshot.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/supabase-community/svelte-kanban/93d3c701aa8cf36472670dd88a6337140e000016/screenshot.png
--------------------------------------------------------------------------------
/setup.sql:
--------------------------------------------------------------------------------
1 | drop table if exists cards;
2 | drop table if exists lists;
3 | drop table if exists boards;
4 |
5 | create table boards (
6 | id bigint generated by default as identity primary key,
7 | user_id uuid references auth.users not null default auth.uid(),
8 | title text default '',
9 | position int not null default 0,
10 | inserted_at timestamp with time zone default timezone('utc'::text, now()) not null
11 | );
12 |
13 | alter table boards enable row level security;
14 |
15 | create policy "Individuals can create boards." on boards for
16 | insert with check (auth.uid() = user_id);
17 |
18 | create policy "Individuals can view their own boards. " on boards for
19 | select using (auth.uid() = user_id);
20 |
21 | create policy "Individuals can update their own boards." on boards for
22 | update using (auth.uid() = user_id);
23 |
24 | create policy "Individuals can delete their own boards." on boards for
25 | delete using (auth.uid() = user_id);
26 |
27 | create table lists (
28 | id bigint generated by default as identity primary key,
29 | user_id uuid references auth.users not null default auth.uid(),
30 | board_id bigint references boards not null,
31 | title text default '',
32 | position int not null default 0,
33 | inserted_at timestamp with time zone default timezone('utc'::text, now()) not null
34 | );
35 |
36 | alter table lists enable row level security;
37 |
38 | create policy "Individuals can create lists." on lists for
39 | insert with check (auth.uid() = user_id);
40 |
41 | create policy "Individuals can view their own lists. " on lists for
42 | select using (auth.uid() = user_id);
43 |
44 | create policy "Individuals can update their own lists." on lists for
45 | update using (auth.uid() = user_id);
46 |
47 | create policy "Individuals can delete their own lists." on lists for
48 | delete using (auth.uid() = user_id);
49 |
50 | create table cards (
51 | id bigint generated by default as identity primary key,
52 | user_id uuid references auth.users not null default auth.uid(),
53 | list_id bigint references lists not null,
54 | position int not null default 0,
55 | description text check (char_length(description) > 0),
56 | completed_at timestamp with time zone,
57 | inserted_at timestamp with time zone default timezone('utc'::text, now()) not null
58 | );
59 |
60 | alter table cards enable row level security;
61 |
62 | create policy "Individuals can create cards." on cards for
63 | insert with check (auth.uid() = user_id);
64 |
65 | create policy "Individuals can view their own cards. " on cards for
66 | select using (auth.uid() = user_id);
67 |
68 | create policy "Individuals can update their own cards." on cards for
69 | update using (auth.uid() = user_id);
70 |
71 | create policy "Individuals can delete their own cards." on cards for
72 | delete using (auth.uid() = user_id);
73 |
74 |
75 | create or replace function sort_board(board_id bigint, list_ids bigint[]) returns boolean
76 | security invoker
77 | as
78 | $$
79 | #variable_conflict use_variable
80 | declare
81 | list_id bigint;
82 | begin
83 | for i in 1 .. array_upper(list_ids, 1)
84 | loop
85 | list_id := list_ids[i];
86 |
87 | update lists set position = i - 1
88 | where lists.board_id = board_id
89 | and lists.id = list_id;
90 | end loop;
91 |
92 | return true;
93 | end
94 | $$ language plpgsql;
95 |
96 | create or replace function sort_list(new_list_id bigint, card_ids bigint[]) returns boolean
97 | security invoker
98 | as
99 | $$
100 | #variable_conflict use_variable
101 | declare
102 | card_id bigint;
103 | begin
104 | for i in 1 .. array_upper(card_ids, 1)
105 | loop
106 | card_id := card_ids[i];
107 |
108 | update cards set position = i - 1, list_id = new_list_id
109 | where cards.id = card_id;
110 | end loop;
111 |
112 | return true;
113 | end
114 | $$ language plpgsql;
115 |
--------------------------------------------------------------------------------
/src/app.d.ts:
--------------------------------------------------------------------------------
1 | // See https://kit.svelte.dev/docs/types#app
2 | // for information about these interfaces
3 | // and what to do when importing types
4 | declare namespace App {
5 | // interface Error {}
6 | // interface Locals {}
7 | // interface PageData {}
8 | // interface Platform {}
9 | }
10 |
--------------------------------------------------------------------------------
/src/app.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 | %sveltekit.head%
10 |
11 |
12 |
13 | %sveltekit.body%
14 |
15 |
16 |
--------------------------------------------------------------------------------
/src/index.test.js:
--------------------------------------------------------------------------------
1 | import { describe, it, expect } from 'vitest';
2 |
3 | describe('sum test', () => {
4 | it('adds 1 + 2 to equal 3', () => {
5 | expect(1 + 2).toBe(3);
6 | });
7 | });
8 |
--------------------------------------------------------------------------------
/src/routes/+layout.js:
--------------------------------------------------------------------------------
1 | export const ssr = false;
2 |
--------------------------------------------------------------------------------
/src/routes/+page.svelte:
--------------------------------------------------------------------------------
1 |
8 |
9 | {#if $user}
10 |
11 | {:else}
12 |
13 | {/if}
14 |
--------------------------------------------------------------------------------
/src/routes/BoardList.svelte:
--------------------------------------------------------------------------------
1 |
21 |
22 |
23 | Boards
24 |
25 |
26 |
27 |
28 |
29 |
30 | {#each boards as board}
31 | -
32 | {board.title}
33 |
34 | {/each}
35 |
36 | -
37 |
38 |
39 |
40 |
41 |
42 |
79 |
--------------------------------------------------------------------------------
/src/routes/Header.svelte:
--------------------------------------------------------------------------------
1 |
13 |
14 |
15 |
18 |
19 |
20 |
21 | {#if $user}
22 |

23 | {/if}
24 |
25 |
26 |
27 |
61 |
--------------------------------------------------------------------------------
/src/routes/Login.svelte:
--------------------------------------------------------------------------------
1 |
17 |
18 |
19 | Kanban
20 |
21 |
22 |
23 | {#if sent}
24 |
25 |
26 |
41 |
Sent you a link, check your email
42 |
43 |
44 | {:else}
45 |
46 |
Sign in
47 |
48 |
72 |
73 | {/if}
74 |
75 |
76 |
143 |
--------------------------------------------------------------------------------
/src/routes/boards/[id]/+page.js:
--------------------------------------------------------------------------------
1 | import { redirect } from '@sveltejs/kit';
2 | import db, { supabase } from '../../db';
3 |
4 | /** @type {import('./$types').PageLoad} */
5 | export async function load({ params }) {
6 | const {
7 | data: { session }
8 | } = await supabase.auth.getSession();
9 |
10 | if (session?.user && params.id) {
11 | const board = await db.boards.get(params.id);
12 | return {
13 | board
14 | };
15 | }
16 |
17 | throw redirect(303, '/');
18 | }
19 |
--------------------------------------------------------------------------------
/src/routes/boards/[id]/+page.svelte:
--------------------------------------------------------------------------------
1 |
58 |
59 |
60 | {board?.title}
61 |
62 |
63 |
64 | {#if board}
65 |
66 | {/if}
67 |
68 |
69 |
70 | {#if loading}
71 | Loading...
72 | {:else}
73 |
84 | {#each board.lists as list (list.id)}
85 |
86 |
87 | {#if list[SHADOW_ITEM_MARKER_PROPERTY_NAME]}
88 |
89 |
90 |
91 | {/if}
92 | {/each}
93 |
94 |
95 |
96 | {/if}
97 |
98 |
99 |
124 |
--------------------------------------------------------------------------------
/src/routes/boards/[id]/AddForm.svelte:
--------------------------------------------------------------------------------
1 |
35 |
36 |
48 |
49 |
87 |
--------------------------------------------------------------------------------
/src/routes/boards/[id]/AddList.svelte:
--------------------------------------------------------------------------------
1 |
24 |
25 |
26 | {#if adding}
27 |
28 | {:else}
29 |
35 | {/if}
36 |
37 |
38 |
67 |
--------------------------------------------------------------------------------
/src/routes/boards/[id]/InPlaceEdit.svelte:
--------------------------------------------------------------------------------
1 |
40 |
41 | {#if editing}
42 |
45 | {:else}
46 |
49 | {/if}
50 |
51 |
66 |
--------------------------------------------------------------------------------
/src/routes/boards/[id]/List.svelte:
--------------------------------------------------------------------------------
1 |
62 |
63 |
64 |
86 |
87 |
126 |
127 | {#if adding}
128 |
135 | {:else}
136 |
153 | {/if}
154 |
155 |
156 |
278 |
--------------------------------------------------------------------------------
/src/routes/db.js:
--------------------------------------------------------------------------------
1 | import { createClient } from '@supabase/supabase-js';
2 | import { writable } from 'svelte/store';
3 | import { PUBLIC_SUPABASE_URL, PUBLIC_SUPABASE_KEY } from '$env/static/public';
4 |
5 | export const supabase = createClient(PUBLIC_SUPABASE_URL, PUBLIC_SUPABASE_KEY);
6 |
7 | const userStore = writable();
8 |
9 | supabase.auth.getSession().then(({ data }) => {
10 | userStore.set(data.session?.user);
11 | });
12 |
13 | supabase.auth.onAuthStateChange((event, session) => {
14 | if (event == 'SIGNED_IN' && session) {
15 | userStore.set(session.user);
16 | } else if (event == 'SIGNED_OUT') {
17 | userStore.set(null);
18 | }
19 | });
20 |
21 | export default {
22 | get user() {
23 | return userStore;
24 | },
25 | signIn(email) {
26 | return supabase.auth.signInWithOtp({ email });
27 | },
28 | signOut() {
29 | return supabase.auth.signOut();
30 | },
31 | boards: {
32 | async all() {
33 | const { data } = await supabase.from('boards').select('*').order('position');
34 |
35 | return data;
36 | },
37 |
38 | async get(id) {
39 | const { data } = await supabase
40 | .from('boards')
41 | .select('id, title, lists ( id, title, position, cards ( id, description, position ))')
42 | .eq('id', id)
43 | .order('position')
44 | .order('position', { foreignTable: 'lists' })
45 | .order('position', { foreignTable: 'lists.cards' })
46 | .single();
47 |
48 | return data;
49 | },
50 |
51 | async create(board) {
52 | const { data } = await supabase.from('boards').insert(board).select().maybeSingle();
53 |
54 | return data;
55 | },
56 |
57 | async update(board) {
58 | const { data } = await supabase
59 | .from('boards')
60 | .update({ title: board.title })
61 | .match({ id: board.id })
62 | .select()
63 | .maybeSingle();
64 |
65 | return data;
66 | },
67 |
68 | async sort(board) {
69 | const { data } = await supabase.rpc('sort_board', {
70 | board_id: board.id,
71 | list_ids: board.lists.map((list) => list.id)
72 | });
73 |
74 | return data;
75 | }
76 | },
77 |
78 | lists: {
79 | async create(board, listData) {
80 | const { data } = await supabase
81 | .from('lists')
82 | .insert({ board_id: board.id, ...listData })
83 | .select()
84 | .maybeSingle();
85 |
86 | const list = data;
87 |
88 | return { ...list, cards: [] };
89 | },
90 |
91 | async update(list) {
92 | const { data } = await supabase
93 | .from('lists')
94 | .update({ title: list.title })
95 | .match({ id: list.id })
96 | .select()
97 | .maybeSingle();
98 |
99 | return data;
100 | },
101 |
102 | async sort(list) {
103 | const { data } = await supabase.rpc('sort_list', {
104 | new_list_id: list.id,
105 | card_ids: list.cards.map((card) => card.id)
106 | });
107 |
108 | return data;
109 | }
110 | },
111 |
112 | cards: {
113 | async create(list, listData) {
114 | const { data } = await supabase
115 | .from('cards')
116 | .insert({ list_id: list.id, ...listData })
117 | .select()
118 | .maybeSingle();
119 |
120 | return data;
121 | },
122 |
123 | async update(card) {
124 | const { data } = await supabase
125 | .from('cards')
126 | .update({ description: card.description })
127 | .match({ id: card.id })
128 | .select()
129 | .maybeSingle();
130 |
131 | return data;
132 | }
133 | }
134 | };
135 |
--------------------------------------------------------------------------------
/static/favicon.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/supabase-community/svelte-kanban/93d3c701aa8cf36472670dd88a6337140e000016/static/favicon.png
--------------------------------------------------------------------------------
/static/global.css:
--------------------------------------------------------------------------------
1 | * {
2 | box-sizing: border-box;
3 | }
4 |
5 | button {
6 | border: none;
7 | background: none;
8 | cursor: pointer;
9 | }
10 |
11 | ul {
12 | list-style: none;
13 | padding: 0;
14 | }
15 |
16 | /* place global styles here */
17 | body {
18 | font-family: Inter, Arial, sans;
19 | margin: 0;
20 | background: rgb(0, 174, 204);
21 | }
22 |
23 | input {
24 | padding: 0.5rem 0.5rem;
25 | border-radius: 3px;
26 | border: none;
27 | box-shadow: 0 1px #CCC;
28 | font-size: 0.9rem;
29 | }
30 |
31 | input:focus {
32 | outline: none;
33 | }
34 |
35 | ::-webkit-scrollbar {
36 | width: 22px;
37 | }
38 |
39 | ::-webkit-scrollbar-track {
40 | background: rgba(0,0,0,0.05);
41 | }
42 |
43 | ::-webkit-scrollbar-thumb {
44 | background: rgba(0,0,0,0.15);
45 | border-radius: 3px;
46 | }
47 |
--------------------------------------------------------------------------------
/static/logo.svg:
--------------------------------------------------------------------------------
1 |
5 |
--------------------------------------------------------------------------------
/static/robots.txt:
--------------------------------------------------------------------------------
1 | # https://www.robotstxt.org/robotstxt.html
2 | User-agent: *
3 | Disallow:
4 |
--------------------------------------------------------------------------------
/supabase/.branches/_current_branch:
--------------------------------------------------------------------------------
1 | main
--------------------------------------------------------------------------------
/supabase/.branches/main/dump.sql:
--------------------------------------------------------------------------------
1 | --
2 | -- PostgreSQL database dump
3 | --
4 |
5 | -- Dumped from database version 15.1 (Debian 15.1-1.pgdg110+1)
6 | -- Dumped by pg_dump version 15.1 (Debian 15.1-1.pgdg110+1)
7 |
8 | SET statement_timeout = 0;
9 | SET lock_timeout = 0;
10 | SET idle_in_transaction_session_timeout = 0;
11 | SET client_encoding = 'UTF8';
12 | SET standard_conforming_strings = on;
13 | SELECT pg_catalog.set_config('search_path', '', false);
14 | SET check_function_bodies = false;
15 | SET xmloption = content;
16 | SET client_min_messages = warning;
17 | SET row_security = off;
18 |
19 | --
20 | -- Name: _realtime; Type: SCHEMA; Schema: -; Owner: supabase_admin
21 | --
22 |
23 | CREATE SCHEMA "_realtime";
24 |
25 |
26 | ALTER SCHEMA "_realtime" OWNER TO "supabase_admin";
27 |
28 | --
29 | -- Name: auth; Type: SCHEMA; Schema: -; Owner: supabase_admin
30 | --
31 |
32 | CREATE SCHEMA "auth";
33 |
34 |
35 | ALTER SCHEMA "auth" OWNER TO "supabase_admin";
36 |
37 | --
38 | -- Name: graphql; Type: SCHEMA; Schema: -; Owner: supabase_admin
39 | --
40 |
41 | CREATE SCHEMA "graphql";
42 |
43 |
44 | ALTER SCHEMA "graphql" OWNER TO "supabase_admin";
45 |
46 | --
47 | -- Name: graphql_public; Type: SCHEMA; Schema: -; Owner: supabase_admin
48 | --
49 |
50 | CREATE SCHEMA "graphql_public";
51 |
52 |
53 | ALTER SCHEMA "graphql_public" OWNER TO "supabase_admin";
54 |
55 | --
56 | -- Name: pgsodium; Type: EXTENSION; Schema: -; Owner: -
57 | --
58 | CREATE SCHEMA "pgsodium";
59 |
60 | ALTER SCHEMA "pgsodium" OWNER TO "supabase_admin";
61 |
62 | CREATE EXTENSION IF NOT EXISTS "pgsodium" WITH SCHEMA "pgsodium";
63 |
64 |
65 | --
66 | -- Name: realtime; Type: SCHEMA; Schema: -; Owner: supabase_admin
67 | --
68 |
69 | CREATE SCHEMA "realtime";
70 |
71 |
72 | ALTER SCHEMA "realtime" OWNER TO "supabase_admin";
73 |
74 | --
75 | -- Name: storage; Type: SCHEMA; Schema: -; Owner: supabase_admin
76 | --
77 |
78 | CREATE SCHEMA "storage";
79 |
80 |
81 | ALTER SCHEMA "storage" OWNER TO "supabase_admin";
82 |
83 | --
84 | -- Name: vault; Type: SCHEMA; Schema: -; Owner: supabase_admin
85 | --
86 |
87 | CREATE SCHEMA "vault";
88 |
89 |
90 | ALTER SCHEMA "vault" OWNER TO "supabase_admin";
91 |
92 | --
93 | -- Name: pg_graphql; Type: EXTENSION; Schema: -; Owner: -
94 | --
95 |
96 | CREATE EXTENSION IF NOT EXISTS "pg_graphql" WITH SCHEMA "graphql";
97 |
98 |
99 | --
100 | -- Name: pg_stat_statements; Type: EXTENSION; Schema: -; Owner: -
101 | --
102 |
103 | CREATE EXTENSION IF NOT EXISTS "pg_stat_statements" WITH SCHEMA "extensions";
104 |
105 |
106 | --
107 | -- Name: pgcrypto; Type: EXTENSION; Schema: -; Owner: -
108 | --
109 |
110 | CREATE EXTENSION IF NOT EXISTS "pgcrypto" WITH SCHEMA "extensions";
111 |
112 |
113 | --
114 | -- Name: pgjwt; Type: EXTENSION; Schema: -; Owner: -
115 | --
116 |
117 | CREATE EXTENSION IF NOT EXISTS "pgjwt" WITH SCHEMA "extensions";
118 |
119 |
120 | --
121 | -- Name: supabase_vault; Type: EXTENSION; Schema: -; Owner: -
122 | --
123 |
124 | CREATE EXTENSION IF NOT EXISTS "supabase_vault" WITH SCHEMA "vault";
125 |
126 |
127 | --
128 | -- Name: uuid-ossp; Type: EXTENSION; Schema: -; Owner: -
129 | --
130 |
131 | CREATE EXTENSION IF NOT EXISTS "uuid-ossp" WITH SCHEMA "extensions";
132 |
133 |
134 | --
135 | -- Name: aal_level; Type: TYPE; Schema: auth; Owner: supabase_auth_admin
136 | --
137 |
138 | CREATE TYPE "auth"."aal_level" AS ENUM (
139 | 'aal1',
140 | 'aal2',
141 | 'aal3'
142 | );
143 |
144 |
145 | ALTER TYPE "auth"."aal_level" OWNER TO "supabase_auth_admin";
146 |
147 | --
148 | -- Name: factor_status; Type: TYPE; Schema: auth; Owner: supabase_auth_admin
149 | --
150 |
151 | CREATE TYPE "auth"."factor_status" AS ENUM (
152 | 'unverified',
153 | 'verified'
154 | );
155 |
156 |
157 | ALTER TYPE "auth"."factor_status" OWNER TO "supabase_auth_admin";
158 |
159 | --
160 | -- Name: factor_type; Type: TYPE; Schema: auth; Owner: supabase_auth_admin
161 | --
162 |
163 | CREATE TYPE "auth"."factor_type" AS ENUM (
164 | 'totp',
165 | 'webauthn'
166 | );
167 |
168 |
169 | ALTER TYPE "auth"."factor_type" OWNER TO "supabase_auth_admin";
170 |
171 | --
172 | -- Name: email(); Type: FUNCTION; Schema: auth; Owner: supabase_auth_admin
173 | --
174 |
175 | CREATE FUNCTION "auth"."email"() RETURNS "text"
176 | LANGUAGE "sql" STABLE
177 | AS $$
178 | select
179 | coalesce(
180 | nullif(current_setting('request.jwt.claim.email', true), ''),
181 | (nullif(current_setting('request.jwt.claims', true), '')::jsonb ->> 'email')
182 | )::text
183 | $$;
184 |
185 |
186 | ALTER FUNCTION "auth"."email"() OWNER TO "supabase_auth_admin";
187 |
188 | --
189 | -- Name: jwt(); Type: FUNCTION; Schema: auth; Owner: supabase_auth_admin
190 | --
191 |
192 | CREATE FUNCTION "auth"."jwt"() RETURNS "jsonb"
193 | LANGUAGE "sql" STABLE
194 | AS $$
195 | select
196 | coalesce(
197 | nullif(current_setting('request.jwt.claim', true), ''),
198 | nullif(current_setting('request.jwt.claims', true), '')
199 | )::jsonb
200 | $$;
201 |
202 |
203 | ALTER FUNCTION "auth"."jwt"() OWNER TO "supabase_auth_admin";
204 |
205 | --
206 | -- Name: role(); Type: FUNCTION; Schema: auth; Owner: supabase_auth_admin
207 | --
208 |
209 | CREATE FUNCTION "auth"."role"() RETURNS "text"
210 | LANGUAGE "sql" STABLE
211 | AS $$
212 | select
213 | coalesce(
214 | nullif(current_setting('request.jwt.claim.role', true), ''),
215 | (nullif(current_setting('request.jwt.claims', true), '')::jsonb ->> 'role')
216 | )::text
217 | $$;
218 |
219 |
220 | ALTER FUNCTION "auth"."role"() OWNER TO "supabase_auth_admin";
221 |
222 | --
223 | -- Name: uid(); Type: FUNCTION; Schema: auth; Owner: supabase_auth_admin
224 | --
225 |
226 | CREATE FUNCTION "auth"."uid"() RETURNS "uuid"
227 | LANGUAGE "sql" STABLE
228 | AS $$
229 | select
230 | coalesce(
231 | nullif(current_setting('request.jwt.claim.sub', true), ''),
232 | (nullif(current_setting('request.jwt.claims', true), '')::jsonb ->> 'sub')
233 | )::uuid
234 | $$;
235 |
236 |
237 | ALTER FUNCTION "auth"."uid"() OWNER TO "supabase_auth_admin";
238 |
239 | --
240 | -- Name: sort_board(bigint, bigint[]); Type: FUNCTION; Schema: public; Owner: postgres
241 | --
242 |
243 | CREATE FUNCTION "public"."sort_board"("board_id" bigint, "list_ids" bigint[]) RETURNS boolean
244 | LANGUAGE "plpgsql"
245 | AS $$
246 | #variable_conflict use_variable
247 | declare
248 | list_id bigint;
249 | begin
250 | for i in 1 .. array_upper(list_ids, 1)
251 | loop
252 | list_id := list_ids[i];
253 |
254 | update lists set position = i - 1
255 | where lists.board_id = board_id
256 | and lists.id = list_id;
257 | end loop;
258 |
259 | return true;
260 | end
261 | $$;
262 |
263 |
264 | ALTER FUNCTION "public"."sort_board"("board_id" bigint, "list_ids" bigint[]) OWNER TO "postgres";
265 |
266 | --
267 | -- Name: sort_list(bigint, bigint[]); Type: FUNCTION; Schema: public; Owner: postgres
268 | --
269 |
270 | CREATE FUNCTION "public"."sort_list"("new_list_id" bigint, "card_ids" bigint[]) RETURNS boolean
271 | LANGUAGE "plpgsql"
272 | AS $$
273 | #variable_conflict use_variable
274 | declare
275 | card_id bigint;
276 | begin
277 | for i in 1 .. array_upper(card_ids, 1)
278 | loop
279 | card_id := card_ids[i];
280 |
281 | update cards set position = i - 1, list_id = new_list_id
282 | where cards.id = card_id;
283 | end loop;
284 |
285 | return true;
286 | end
287 | $$;
288 |
289 |
290 | ALTER FUNCTION "public"."sort_list"("new_list_id" bigint, "card_ids" bigint[]) OWNER TO "postgres";
291 |
292 | --
293 | -- Name: extension("text"); Type: FUNCTION; Schema: storage; Owner: supabase_storage_admin
294 | --
295 |
296 | CREATE FUNCTION "storage"."extension"("name" "text") RETURNS "text"
297 | LANGUAGE "plpgsql"
298 | AS $$
299 | DECLARE
300 | _parts text[];
301 | _filename text;
302 | BEGIN
303 | select string_to_array(name, '/') into _parts;
304 | select _parts[array_length(_parts,1)] into _filename;
305 | -- @todo return the last part instead of 2
306 | return split_part(_filename, '.', 2);
307 | END
308 | $$;
309 |
310 |
311 | ALTER FUNCTION "storage"."extension"("name" "text") OWNER TO "supabase_storage_admin";
312 |
313 | --
314 | -- Name: filename("text"); Type: FUNCTION; Schema: storage; Owner: supabase_storage_admin
315 | --
316 |
317 | CREATE FUNCTION "storage"."filename"("name" "text") RETURNS "text"
318 | LANGUAGE "plpgsql"
319 | AS $$
320 | DECLARE
321 | _parts text[];
322 | BEGIN
323 | select string_to_array(name, '/') into _parts;
324 | return _parts[array_length(_parts,1)];
325 | END
326 | $$;
327 |
328 |
329 | ALTER FUNCTION "storage"."filename"("name" "text") OWNER TO "supabase_storage_admin";
330 |
331 | --
332 | -- Name: foldername("text"); Type: FUNCTION; Schema: storage; Owner: supabase_storage_admin
333 | --
334 |
335 | CREATE FUNCTION "storage"."foldername"("name" "text") RETURNS "text"[]
336 | LANGUAGE "plpgsql"
337 | AS $$
338 | DECLARE
339 | _parts text[];
340 | BEGIN
341 | select string_to_array(name, '/') into _parts;
342 | return _parts[1:array_length(_parts,1)-1];
343 | END
344 | $$;
345 |
346 |
347 | ALTER FUNCTION "storage"."foldername"("name" "text") OWNER TO "supabase_storage_admin";
348 |
349 | --
350 | -- Name: get_size_by_bucket(); Type: FUNCTION; Schema: storage; Owner: supabase_storage_admin
351 | --
352 |
353 | CREATE FUNCTION "storage"."get_size_by_bucket"() RETURNS TABLE("size" bigint, "bucket_id" "text")
354 | LANGUAGE "plpgsql"
355 | AS $$
356 | BEGIN
357 | return query
358 | select sum((metadata->>'size')::int) as size, obj.bucket_id
359 | from "storage".objects as obj
360 | group by obj.bucket_id;
361 | END
362 | $$;
363 |
364 |
365 | ALTER FUNCTION "storage"."get_size_by_bucket"() OWNER TO "supabase_storage_admin";
366 |
367 | --
368 | -- Name: search("text", "text", integer, integer, integer, "text", "text", "text"); Type: FUNCTION; Schema: storage; Owner: supabase_storage_admin
369 | --
370 |
371 | CREATE FUNCTION "storage"."search"("prefix" "text", "bucketname" "text", "limits" integer DEFAULT 100, "levels" integer DEFAULT 1, "offsets" integer DEFAULT 0, "search" "text" DEFAULT ''::"text", "sortcolumn" "text" DEFAULT 'name'::"text", "sortorder" "text" DEFAULT 'asc'::"text") RETURNS TABLE("name" "text", "id" "uuid", "updated_at" timestamp with time zone, "created_at" timestamp with time zone, "last_accessed_at" timestamp with time zone, "metadata" "jsonb")
372 | LANGUAGE "plpgsql" STABLE
373 | AS $_$
374 | declare
375 | v_order_by text;
376 | v_sort_order text;
377 | begin
378 | case
379 | when sortcolumn = 'name' then
380 | v_order_by = 'name';
381 | when sortcolumn = 'updated_at' then
382 | v_order_by = 'updated_at';
383 | when sortcolumn = 'created_at' then
384 | v_order_by = 'created_at';
385 | when sortcolumn = 'last_accessed_at' then
386 | v_order_by = 'last_accessed_at';
387 | else
388 | v_order_by = 'name';
389 | end case;
390 |
391 | case
392 | when sortorder = 'asc' then
393 | v_sort_order = 'asc';
394 | when sortorder = 'desc' then
395 | v_sort_order = 'desc';
396 | else
397 | v_sort_order = 'asc';
398 | end case;
399 |
400 | v_order_by = v_order_by || ' ' || v_sort_order;
401 |
402 | return query execute
403 | 'with folders as (
404 | select path_tokens[$1] as folder
405 | from storage.objects
406 | where objects.name ilike $2 || $3 || ''%''
407 | and bucket_id = $4
408 | and array_length(regexp_split_to_array(objects.name, ''/''), 1) <> $1
409 | group by folder
410 | order by folder ' || v_sort_order || '
411 | )
412 | (select folder as "name",
413 | null as id,
414 | null as updated_at,
415 | null as created_at,
416 | null as last_accessed_at,
417 | null as metadata from folders)
418 | union all
419 | (select path_tokens[$1] as "name",
420 | id,
421 | updated_at,
422 | created_at,
423 | last_accessed_at,
424 | metadata
425 | from storage.objects
426 | where objects.name ilike $2 || $3 || ''%''
427 | and bucket_id = $4
428 | and array_length(regexp_split_to_array(objects.name, ''/''), 1) = $1
429 | order by ' || v_order_by || ')
430 | limit $5
431 | offset $6' using levels, prefix, search, bucketname, limits, offsets;
432 | end;
433 | $_$;
434 |
435 |
436 | ALTER FUNCTION "storage"."search"("prefix" "text", "bucketname" "text", "limits" integer, "levels" integer, "offsets" integer, "search" "text", "sortcolumn" "text", "sortorder" "text") OWNER TO "supabase_storage_admin";
437 |
438 | --
439 | -- Name: update_updated_at_column(); Type: FUNCTION; Schema: storage; Owner: supabase_storage_admin
440 | --
441 |
442 | CREATE FUNCTION "storage"."update_updated_at_column"() RETURNS "trigger"
443 | LANGUAGE "plpgsql"
444 | AS $$
445 | BEGIN
446 | NEW.updated_at = now();
447 | RETURN NEW;
448 | END;
449 | $$;
450 |
451 |
452 | ALTER FUNCTION "storage"."update_updated_at_column"() OWNER TO "supabase_storage_admin";
453 |
454 | --
455 | -- Name: secrets_encrypt_secret_secret(); Type: FUNCTION; Schema: vault; Owner: postgres
456 | --
457 |
458 | CREATE OR REPLACE FUNCTION "vault"."secrets_encrypt_secret_secret"() RETURNS "trigger"
459 | LANGUAGE "plpgsql"
460 | AS $$
461 | BEGIN
462 | new.secret = CASE WHEN new.secret IS NULL THEN NULL ELSE
463 | CASE WHEN new.key_id IS NULL THEN NULL ELSE pg_catalog.encode(
464 | pgsodium.crypto_aead_det_encrypt(
465 | pg_catalog.convert_to(new.secret, 'utf8'),
466 | pg_catalog.convert_to((new.id::text || new.description::text || new.created_at::text || new.updated_at::text)::text, 'utf8'),
467 | new.key_id::uuid,
468 | new.nonce
469 | ),
470 | 'base64') END END;
471 | RETURN new;
472 | END;
473 | $$;
474 |
475 |
476 | ALTER FUNCTION "vault"."secrets_encrypt_secret_secret"() OWNER TO "postgres";
477 |
478 | SET default_tablespace = '';
479 |
480 | SET default_table_access_method = "heap";
481 |
482 | --
483 | -- Name: extensions; Type: TABLE; Schema: _realtime; Owner: postgres
484 | --
485 |
486 | CREATE TABLE "_realtime"."extensions" (
487 | "id" "uuid" NOT NULL,
488 | "type" character varying(255),
489 | "settings" "jsonb",
490 | "tenant_external_id" character varying(255),
491 | "inserted_at" timestamp(0) without time zone NOT NULL,
492 | "updated_at" timestamp(0) without time zone NOT NULL
493 | );
494 |
495 |
496 | ALTER TABLE "_realtime"."extensions" OWNER TO "postgres";
497 |
498 | --
499 | -- Name: schema_migrations; Type: TABLE; Schema: _realtime; Owner: postgres
500 | --
501 |
502 | CREATE TABLE "_realtime"."schema_migrations" (
503 | "version" bigint NOT NULL,
504 | "inserted_at" timestamp(0) without time zone
505 | );
506 |
507 |
508 | ALTER TABLE "_realtime"."schema_migrations" OWNER TO "postgres";
509 |
510 | --
511 | -- Name: tenants; Type: TABLE; Schema: _realtime; Owner: postgres
512 | --
513 |
514 | CREATE TABLE "_realtime"."tenants" (
515 | "id" "uuid" NOT NULL,
516 | "name" character varying(255),
517 | "external_id" character varying(255),
518 | "jwt_secret" character varying(500),
519 | "max_concurrent_users" integer DEFAULT 200 NOT NULL,
520 | "inserted_at" timestamp(0) without time zone NOT NULL,
521 | "updated_at" timestamp(0) without time zone NOT NULL,
522 | "max_events_per_second" integer DEFAULT 100 NOT NULL,
523 | "postgres_cdc_default" character varying(255) DEFAULT 'postgres_cdc_rls'::character varying
524 | );
525 |
526 |
527 | ALTER TABLE "_realtime"."tenants" OWNER TO "postgres";
528 |
529 | --
530 | -- Name: audit_log_entries; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
531 | --
532 |
533 | CREATE TABLE "auth"."audit_log_entries" (
534 | "instance_id" "uuid",
535 | "id" "uuid" NOT NULL,
536 | "payload" "json",
537 | "created_at" timestamp with time zone,
538 | "ip_address" character varying(64) DEFAULT ''::character varying NOT NULL
539 | );
540 |
541 |
542 | ALTER TABLE "auth"."audit_log_entries" OWNER TO "supabase_auth_admin";
543 |
544 | --
545 | -- Name: identities; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
546 | --
547 |
548 | CREATE TABLE "auth"."identities" (
549 | "id" "text" NOT NULL,
550 | "user_id" "uuid" NOT NULL,
551 | "identity_data" "jsonb" NOT NULL,
552 | "provider" "text" NOT NULL,
553 | "last_sign_in_at" timestamp with time zone,
554 | "created_at" timestamp with time zone,
555 | "updated_at" timestamp with time zone
556 | );
557 |
558 |
559 | ALTER TABLE "auth"."identities" OWNER TO "supabase_auth_admin";
560 |
561 | --
562 | -- Name: instances; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
563 | --
564 |
565 | CREATE TABLE "auth"."instances" (
566 | "id" "uuid" NOT NULL,
567 | "uuid" "uuid",
568 | "raw_base_config" "text",
569 | "created_at" timestamp with time zone,
570 | "updated_at" timestamp with time zone
571 | );
572 |
573 |
574 | ALTER TABLE "auth"."instances" OWNER TO "supabase_auth_admin";
575 |
576 | --
577 | -- Name: mfa_amr_claims; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
578 | --
579 |
580 | CREATE TABLE "auth"."mfa_amr_claims" (
581 | "session_id" "uuid" NOT NULL,
582 | "created_at" timestamp with time zone NOT NULL,
583 | "updated_at" timestamp with time zone NOT NULL,
584 | "authentication_method" "text" NOT NULL,
585 | "id" "uuid" NOT NULL
586 | );
587 |
588 |
589 | ALTER TABLE "auth"."mfa_amr_claims" OWNER TO "supabase_auth_admin";
590 |
591 | --
592 | -- Name: mfa_challenges; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
593 | --
594 |
595 | CREATE TABLE "auth"."mfa_challenges" (
596 | "id" "uuid" NOT NULL,
597 | "factor_id" "uuid" NOT NULL,
598 | "created_at" timestamp with time zone NOT NULL,
599 | "verified_at" timestamp with time zone,
600 | "ip_address" "inet" NOT NULL
601 | );
602 |
603 |
604 | ALTER TABLE "auth"."mfa_challenges" OWNER TO "supabase_auth_admin";
605 |
606 | --
607 | -- Name: mfa_factors; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
608 | --
609 |
610 | CREATE TABLE "auth"."mfa_factors" (
611 | "id" "uuid" NOT NULL,
612 | "user_id" "uuid" NOT NULL,
613 | "friendly_name" "text",
614 | "factor_type" "auth"."factor_type" NOT NULL,
615 | "status" "auth"."factor_status" NOT NULL,
616 | "created_at" timestamp with time zone NOT NULL,
617 | "updated_at" timestamp with time zone NOT NULL,
618 | "secret" "text"
619 | );
620 |
621 |
622 | ALTER TABLE "auth"."mfa_factors" OWNER TO "supabase_auth_admin";
623 |
624 | --
625 | -- Name: refresh_tokens; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
626 | --
627 |
628 | CREATE TABLE "auth"."refresh_tokens" (
629 | "instance_id" "uuid",
630 | "id" bigint NOT NULL,
631 | "token" character varying(255),
632 | "user_id" character varying(255),
633 | "revoked" boolean,
634 | "created_at" timestamp with time zone,
635 | "updated_at" timestamp with time zone,
636 | "parent" character varying(255),
637 | "session_id" "uuid"
638 | );
639 |
640 |
641 | ALTER TABLE "auth"."refresh_tokens" OWNER TO "supabase_auth_admin";
642 |
643 | --
644 | -- Name: refresh_tokens_id_seq; Type: SEQUENCE; Schema: auth; Owner: supabase_auth_admin
645 | --
646 |
647 | CREATE SEQUENCE "auth"."refresh_tokens_id_seq"
648 | START WITH 1
649 | INCREMENT BY 1
650 | NO MINVALUE
651 | NO MAXVALUE
652 | CACHE 1;
653 |
654 |
655 | ALTER TABLE "auth"."refresh_tokens_id_seq" OWNER TO "supabase_auth_admin";
656 |
657 | --
658 | -- Name: refresh_tokens_id_seq; Type: SEQUENCE OWNED BY; Schema: auth; Owner: supabase_auth_admin
659 | --
660 |
661 | ALTER SEQUENCE "auth"."refresh_tokens_id_seq" OWNED BY "auth"."refresh_tokens"."id";
662 |
663 |
664 | --
665 | -- Name: saml_providers; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
666 | --
667 |
668 | CREATE TABLE "auth"."saml_providers" (
669 | "id" "uuid" NOT NULL,
670 | "sso_provider_id" "uuid" NOT NULL,
671 | "entity_id" "text" NOT NULL,
672 | "metadata_xml" "text" NOT NULL,
673 | "metadata_url" "text",
674 | "attribute_mapping" "jsonb",
675 | "created_at" timestamp with time zone,
676 | "updated_at" timestamp with time zone,
677 | CONSTRAINT "entity_id not empty" CHECK (("char_length"("entity_id") > 0)),
678 | CONSTRAINT "metadata_url not empty" CHECK ((("metadata_url" = NULL::"text") OR ("char_length"("metadata_url") > 0))),
679 | CONSTRAINT "metadata_xml not empty" CHECK (("char_length"("metadata_xml") > 0))
680 | );
681 |
682 |
683 | ALTER TABLE "auth"."saml_providers" OWNER TO "supabase_auth_admin";
684 |
685 | --
686 | -- Name: saml_relay_states; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
687 | --
688 |
689 | CREATE TABLE "auth"."saml_relay_states" (
690 | "id" "uuid" NOT NULL,
691 | "sso_provider_id" "uuid" NOT NULL,
692 | "request_id" "text" NOT NULL,
693 | "for_email" "text",
694 | "redirect_to" "text",
695 | "from_ip_address" "inet",
696 | "created_at" timestamp with time zone,
697 | "updated_at" timestamp with time zone,
698 | CONSTRAINT "request_id not empty" CHECK (("char_length"("request_id") > 0))
699 | );
700 |
701 |
702 | ALTER TABLE "auth"."saml_relay_states" OWNER TO "supabase_auth_admin";
703 |
704 | --
705 | -- Name: schema_migrations; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
706 | --
707 |
708 | CREATE TABLE "auth"."schema_migrations" (
709 | "version" character varying(255) NOT NULL
710 | );
711 |
712 |
713 | ALTER TABLE "auth"."schema_migrations" OWNER TO "supabase_auth_admin";
714 |
715 | --
716 | -- Name: sessions; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
717 | --
718 |
719 | CREATE TABLE "auth"."sessions" (
720 | "id" "uuid" NOT NULL,
721 | "user_id" "uuid" NOT NULL,
722 | "created_at" timestamp with time zone,
723 | "updated_at" timestamp with time zone,
724 | "factor_id" "uuid",
725 | "aal" "auth"."aal_level"
726 | );
727 |
728 |
729 | ALTER TABLE "auth"."sessions" OWNER TO "supabase_auth_admin";
730 |
731 | --
732 | -- Name: sso_domains; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
733 | --
734 |
735 | CREATE TABLE "auth"."sso_domains" (
736 | "id" "uuid" NOT NULL,
737 | "sso_provider_id" "uuid" NOT NULL,
738 | "domain" "text" NOT NULL,
739 | "created_at" timestamp with time zone,
740 | "updated_at" timestamp with time zone,
741 | CONSTRAINT "domain not empty" CHECK (("char_length"("domain") > 0))
742 | );
743 |
744 |
745 | ALTER TABLE "auth"."sso_domains" OWNER TO "supabase_auth_admin";
746 |
747 | --
748 | -- Name: sso_providers; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
749 | --
750 |
751 | CREATE TABLE "auth"."sso_providers" (
752 | "id" "uuid" NOT NULL,
753 | "resource_id" "text",
754 | "created_at" timestamp with time zone,
755 | "updated_at" timestamp with time zone,
756 | CONSTRAINT "resource_id not empty" CHECK ((("resource_id" = NULL::"text") OR ("char_length"("resource_id") > 0)))
757 | );
758 |
759 |
760 | ALTER TABLE "auth"."sso_providers" OWNER TO "supabase_auth_admin";
761 |
762 | --
763 | -- Name: sso_sessions; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
764 | --
765 |
766 | CREATE TABLE "auth"."sso_sessions" (
767 | "id" "uuid" NOT NULL,
768 | "session_id" "uuid" NOT NULL,
769 | "sso_provider_id" "uuid",
770 | "not_before" timestamp with time zone,
771 | "not_after" timestamp with time zone,
772 | "idp_initiated" boolean DEFAULT false,
773 | "created_at" timestamp with time zone,
774 | "updated_at" timestamp with time zone
775 | );
776 |
777 |
778 | ALTER TABLE "auth"."sso_sessions" OWNER TO "supabase_auth_admin";
779 |
780 | --
781 | -- Name: users; Type: TABLE; Schema: auth; Owner: supabase_auth_admin
782 | --
783 |
784 | CREATE TABLE "auth"."users" (
785 | "instance_id" "uuid",
786 | "id" "uuid" NOT NULL,
787 | "aud" character varying(255),
788 | "role" character varying(255),
789 | "email" character varying(255),
790 | "encrypted_password" character varying(255),
791 | "email_confirmed_at" timestamp with time zone,
792 | "invited_at" timestamp with time zone,
793 | "confirmation_token" character varying(255),
794 | "confirmation_sent_at" timestamp with time zone,
795 | "recovery_token" character varying(255),
796 | "recovery_sent_at" timestamp with time zone,
797 | "email_change_token_new" character varying(255),
798 | "email_change" character varying(255),
799 | "email_change_sent_at" timestamp with time zone,
800 | "last_sign_in_at" timestamp with time zone,
801 | "raw_app_meta_data" "jsonb",
802 | "raw_user_meta_data" "jsonb",
803 | "is_super_admin" boolean,
804 | "created_at" timestamp with time zone,
805 | "updated_at" timestamp with time zone,
806 | "phone" character varying(15) DEFAULT NULL::character varying,
807 | "phone_confirmed_at" timestamp with time zone,
808 | "phone_change" character varying(15) DEFAULT ''::character varying,
809 | "phone_change_token" character varying(255) DEFAULT ''::character varying,
810 | "phone_change_sent_at" timestamp with time zone,
811 | "confirmed_at" timestamp with time zone GENERATED ALWAYS AS (LEAST("email_confirmed_at", "phone_confirmed_at")) STORED,
812 | "email_change_token_current" character varying(255) DEFAULT ''::character varying,
813 | "email_change_confirm_status" smallint DEFAULT 0,
814 | "banned_until" timestamp with time zone,
815 | "reauthentication_token" character varying(255) DEFAULT ''::character varying,
816 | "reauthentication_sent_at" timestamp with time zone,
817 | CONSTRAINT "users_email_change_confirm_status_check" CHECK ((("email_change_confirm_status" >= 0) AND ("email_change_confirm_status" <= 2)))
818 | );
819 |
820 |
821 | ALTER TABLE "auth"."users" OWNER TO "supabase_auth_admin";
822 |
823 | --
824 | -- Name: boards; Type: TABLE; Schema: public; Owner: postgres
825 | --
826 |
827 | CREATE TABLE "public"."boards" (
828 | "id" bigint NOT NULL,
829 | "user_id" "uuid" DEFAULT "auth"."uid"() NOT NULL,
830 | "title" "text" DEFAULT ''::"text",
831 | "position" integer DEFAULT 0 NOT NULL,
832 | "inserted_at" timestamp with time zone DEFAULT "timezone"('utc'::"text", "now"()) NOT NULL
833 | );
834 |
835 |
836 | ALTER TABLE "public"."boards" OWNER TO "postgres";
837 |
838 | --
839 | -- Name: boards_id_seq; Type: SEQUENCE; Schema: public; Owner: postgres
840 | --
841 |
842 | ALTER TABLE "public"."boards" ALTER COLUMN "id" ADD GENERATED BY DEFAULT AS IDENTITY (
843 | SEQUENCE NAME "public"."boards_id_seq"
844 | START WITH 1
845 | INCREMENT BY 1
846 | NO MINVALUE
847 | NO MAXVALUE
848 | CACHE 1
849 | );
850 |
851 |
852 | --
853 | -- Name: cards; Type: TABLE; Schema: public; Owner: postgres
854 | --
855 |
856 | CREATE TABLE "public"."cards" (
857 | "id" bigint NOT NULL,
858 | "user_id" "uuid" DEFAULT "auth"."uid"() NOT NULL,
859 | "list_id" bigint NOT NULL,
860 | "position" integer DEFAULT 0 NOT NULL,
861 | "description" "text",
862 | "completed_at" timestamp with time zone,
863 | "inserted_at" timestamp with time zone DEFAULT "timezone"('utc'::"text", "now"()) NOT NULL,
864 | CONSTRAINT "cards_description_check" CHECK (("char_length"("description") > 0))
865 | );
866 |
867 |
868 | ALTER TABLE "public"."cards" OWNER TO "postgres";
869 |
870 | --
871 | -- Name: cards_id_seq; Type: SEQUENCE; Schema: public; Owner: postgres
872 | --
873 |
874 | ALTER TABLE "public"."cards" ALTER COLUMN "id" ADD GENERATED BY DEFAULT AS IDENTITY (
875 | SEQUENCE NAME "public"."cards_id_seq"
876 | START WITH 1
877 | INCREMENT BY 1
878 | NO MINVALUE
879 | NO MAXVALUE
880 | CACHE 1
881 | );
882 |
883 |
884 | --
885 | -- Name: lists; Type: TABLE; Schema: public; Owner: postgres
886 | --
887 |
888 | CREATE TABLE "public"."lists" (
889 | "id" bigint NOT NULL,
890 | "user_id" "uuid" DEFAULT "auth"."uid"() NOT NULL,
891 | "board_id" bigint NOT NULL,
892 | "title" "text" DEFAULT ''::"text",
893 | "position" integer DEFAULT 0 NOT NULL,
894 | "inserted_at" timestamp with time zone DEFAULT "timezone"('utc'::"text", "now"()) NOT NULL
895 | );
896 |
897 |
898 | ALTER TABLE "public"."lists" OWNER TO "postgres";
899 |
900 | --
901 | -- Name: lists_id_seq; Type: SEQUENCE; Schema: public; Owner: postgres
902 | --
903 |
904 | ALTER TABLE "public"."lists" ALTER COLUMN "id" ADD GENERATED BY DEFAULT AS IDENTITY (
905 | SEQUENCE NAME "public"."lists_id_seq"
906 | START WITH 1
907 | INCREMENT BY 1
908 | NO MINVALUE
909 | NO MAXVALUE
910 | CACHE 1
911 | );
912 |
913 |
914 | --
915 | -- Name: buckets; Type: TABLE; Schema: storage; Owner: supabase_storage_admin
916 | --
917 |
918 | CREATE TABLE "storage"."buckets" (
919 | "id" "text" NOT NULL,
920 | "name" "text" NOT NULL,
921 | "owner" "uuid",
922 | "created_at" timestamp with time zone DEFAULT "now"(),
923 | "updated_at" timestamp with time zone DEFAULT "now"(),
924 | "public" boolean DEFAULT false
925 | );
926 |
927 |
928 | ALTER TABLE "storage"."buckets" OWNER TO "supabase_storage_admin";
929 |
930 | --
931 | -- Name: migrations; Type: TABLE; Schema: storage; Owner: supabase_storage_admin
932 | --
933 |
934 | CREATE TABLE "storage"."migrations" (
935 | "id" integer NOT NULL,
936 | "name" character varying(100) NOT NULL,
937 | "hash" character varying(40) NOT NULL,
938 | "executed_at" timestamp without time zone DEFAULT CURRENT_TIMESTAMP
939 | );
940 |
941 |
942 | ALTER TABLE "storage"."migrations" OWNER TO "supabase_storage_admin";
943 |
944 | --
945 | -- Name: objects; Type: TABLE; Schema: storage; Owner: supabase_storage_admin
946 | --
947 |
948 | CREATE TABLE "storage"."objects" (
949 | "id" "uuid" DEFAULT "extensions"."uuid_generate_v4"() NOT NULL,
950 | "bucket_id" "text",
951 | "name" "text",
952 | "owner" "uuid",
953 | "created_at" timestamp with time zone DEFAULT "now"(),
954 | "updated_at" timestamp with time zone DEFAULT "now"(),
955 | "last_accessed_at" timestamp with time zone DEFAULT "now"(),
956 | "metadata" "jsonb",
957 | "path_tokens" "text"[] GENERATED ALWAYS AS ("string_to_array"("name", '/'::"text")) STORED
958 | );
959 |
960 |
961 | ALTER TABLE "storage"."objects" OWNER TO "supabase_storage_admin";
962 |
963 | --
964 | -- Name: decrypted_secrets; Type: VIEW; Schema: vault; Owner: postgres
965 | --
966 |
967 | CREATE OR REPLACE VIEW "vault"."decrypted_secrets" AS
968 | SELECT "secrets"."id",
969 | "secrets"."name",
970 | "secrets"."description",
971 | "secrets"."secret",
972 | CASE
973 | WHEN ("secrets"."secret" IS NULL) THEN NULL::"text"
974 | ELSE
975 | CASE
976 | WHEN ("secrets"."key_id" IS NULL) THEN NULL::"text"
977 | ELSE "convert_from"("pgsodium"."crypto_aead_det_decrypt"("decode"("secrets"."secret", 'base64'::"text"), "convert_to"((((("secrets"."id")::"text" || "secrets"."description") || ("secrets"."created_at")::"text") || ("secrets"."updated_at")::"text"), 'utf8'::"name"), "secrets"."key_id", "secrets"."nonce"), 'utf8'::"name")
978 | END
979 | END AS "decrypted_secret",
980 | "secrets"."key_id",
981 | "secrets"."nonce",
982 | "secrets"."created_at",
983 | "secrets"."updated_at"
984 | FROM "vault"."secrets";
985 |
986 |
987 | ALTER TABLE "vault"."decrypted_secrets" OWNER TO "postgres";
988 |
989 | --
990 | -- Name: refresh_tokens id; Type: DEFAULT; Schema: auth; Owner: supabase_auth_admin
991 | --
992 |
993 | ALTER TABLE ONLY "auth"."refresh_tokens" ALTER COLUMN "id" SET DEFAULT "nextval"('"auth"."refresh_tokens_id_seq"'::"regclass");
994 |
995 |
996 | --
997 | -- Data for Name: extensions; Type: TABLE DATA; Schema: _realtime; Owner: postgres
998 | --
999 |
1000 | INSERT INTO "_realtime"."extensions" ("id", "type", "settings", "tenant_external_id", "inserted_at", "updated_at") VALUES ('935b3773-e37c-4b3e-baa1-2309ddb697cf', 'postgres_cdc_rls', '{"region": "us-east-1", "db_host": "I4YigNuoYSZbe+Xs4vInbw==", "db_name": "sWBpZNdjggEPTQVlI52Zfw==", "db_port": "MqmbZ5ZiXXFlSy8FeFYPAQ==", "db_user": "sWBpZNdjggEPTQVlI52Zfw==", "slot_name": "supabase_realtime_replication_slot", "ip_version": 4, "db_password": "sWBpZNdjggEPTQVlI52Zfw==", "publication": "supabase_realtime", "poll_interval_ms": 100, "poll_max_changes": 100, "poll_max_record_bytes": 1048576}', 'realtime-demo', '2022-11-14 23:04:49', '2022-11-14 23:04:49');
1001 |
1002 |
1003 | --
1004 | -- Data for Name: schema_migrations; Type: TABLE DATA; Schema: _realtime; Owner: postgres
1005 | --
1006 |
1007 | INSERT INTO "_realtime"."schema_migrations" ("version", "inserted_at") VALUES (20210706140551, '2022-12-15 04:27:09');
1008 | INSERT INTO "_realtime"."schema_migrations" ("version", "inserted_at") VALUES (20220329161857, '2022-12-15 04:27:09');
1009 | INSERT INTO "_realtime"."schema_migrations" ("version", "inserted_at") VALUES (20220410212326, '2022-12-15 04:27:09');
1010 | INSERT INTO "_realtime"."schema_migrations" ("version", "inserted_at") VALUES (20220506102948, '2022-12-15 04:27:09');
1011 | INSERT INTO "_realtime"."schema_migrations" ("version", "inserted_at") VALUES (20220527210857, '2022-12-15 04:27:09');
1012 | INSERT INTO "_realtime"."schema_migrations" ("version", "inserted_at") VALUES (20220815211129, '2022-12-15 04:27:09');
1013 | INSERT INTO "_realtime"."schema_migrations" ("version", "inserted_at") VALUES (20220815215024, '2022-12-15 04:27:09');
1014 | INSERT INTO "_realtime"."schema_migrations" ("version", "inserted_at") VALUES (20220818141501, '2022-12-15 04:27:09');
1015 | INSERT INTO "_realtime"."schema_migrations" ("version", "inserted_at") VALUES (20221018173709, '2022-12-15 04:27:09');
1016 | INSERT INTO "_realtime"."schema_migrations" ("version", "inserted_at") VALUES (20221102172703, '2022-12-15 04:27:09');
1017 |
1018 |
1019 | --
1020 | -- Data for Name: tenants; Type: TABLE DATA; Schema: _realtime; Owner: postgres
1021 | --
1022 |
1023 | INSERT INTO "_realtime"."tenants" ("id", "name", "external_id", "jwt_secret", "max_concurrent_users", "inserted_at", "updated_at", "max_events_per_second", "postgres_cdc_default") VALUES ('98d09d90-612d-4a69-8c84-e8e5ecbaed6d', 'realtime-demo', 'realtime-demo', 'iNjicxc4+llvc9wovDvqymwfnj9teWMlyOIbJ8Fh6j2WNU8CIJ2ZgjR6MUIKqSmeDmvpsKLsZ9jgXJmQPpwL8w==', 300, '2022-11-14 23:04:49', '2022-11-14 23:04:49', 100, 'postgres_cdc_rls');
1024 |
1025 |
1026 | --
1027 | -- Data for Name: audit_log_entries; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
1028 | --
1029 |
1030 |
1031 |
1032 | --
1033 | -- Data for Name: identities; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
1034 | --
1035 |
1036 |
1037 |
1038 | --
1039 | -- Data for Name: instances; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
1040 | --
1041 |
1042 |
1043 |
1044 | --
1045 | -- Data for Name: mfa_amr_claims; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
1046 | --
1047 |
1048 |
1049 |
1050 | --
1051 | -- Data for Name: mfa_challenges; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
1052 | --
1053 |
1054 |
1055 |
1056 | --
1057 | -- Data for Name: mfa_factors; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
1058 | --
1059 |
1060 |
1061 |
1062 | --
1063 | -- Data for Name: refresh_tokens; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
1064 | --
1065 |
1066 |
1067 |
1068 | --
1069 | -- Data for Name: saml_providers; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
1070 | --
1071 |
1072 |
1073 |
1074 | --
1075 | -- Data for Name: saml_relay_states; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
1076 | --
1077 |
1078 |
1079 |
1080 | --
1081 | -- Data for Name: schema_migrations; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
1082 | --
1083 |
1084 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20171026211738');
1085 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20171026211808');
1086 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20171026211834');
1087 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20180103212743');
1088 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20180108183307');
1089 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20180119214651');
1090 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20180125194653');
1091 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('00');
1092 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20210710035447');
1093 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20210722035447');
1094 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20210730183235');
1095 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20210909172000');
1096 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20210927181326');
1097 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20211122151130');
1098 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20211124214934');
1099 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20211202183645');
1100 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20220114185221');
1101 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20220114185340');
1102 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20220224000811');
1103 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20220323170000');
1104 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20220429102000');
1105 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20220531120530');
1106 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20220614074223');
1107 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20220811173540');
1108 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20221003041349');
1109 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20221003041400');
1110 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20221011041400');
1111 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20221020193600');
1112 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20221021073300');
1113 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20221021082433');
1114 | INSERT INTO "auth"."schema_migrations" ("version") VALUES ('20221027105023');
1115 |
1116 |
1117 | --
1118 | -- Data for Name: sessions; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
1119 | --
1120 |
1121 |
1122 |
1123 | --
1124 | -- Data for Name: sso_domains; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
1125 | --
1126 |
1127 |
1128 |
1129 | --
1130 | -- Data for Name: sso_providers; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
1131 | --
1132 |
1133 |
1134 |
1135 | --
1136 | -- Data for Name: sso_sessions; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
1137 | --
1138 |
1139 |
1140 |
1141 | --
1142 | -- Data for Name: users; Type: TABLE DATA; Schema: auth; Owner: supabase_auth_admin
1143 | --
1144 |
1145 |
1146 |
1147 | --
1148 | -- Data for Name: boards; Type: TABLE DATA; Schema: public; Owner: postgres
1149 | --
1150 |
1151 |
1152 |
1153 | --
1154 | -- Data for Name: cards; Type: TABLE DATA; Schema: public; Owner: postgres
1155 | --
1156 |
1157 |
1158 |
1159 | --
1160 | -- Data for Name: lists; Type: TABLE DATA; Schema: public; Owner: postgres
1161 | --
1162 |
1163 |
1164 |
1165 | --
1166 | -- Data for Name: buckets; Type: TABLE DATA; Schema: storage; Owner: supabase_storage_admin
1167 | --
1168 |
1169 |
1170 |
1171 | --
1172 | -- Data for Name: migrations; Type: TABLE DATA; Schema: storage; Owner: supabase_storage_admin
1173 | --
1174 |
1175 | INSERT INTO "storage"."migrations" ("id", "name", "hash", "executed_at") VALUES (0, 'create-migrations-table', 'e18db593bcde2aca2a408c4d1100f6abba2195df', '2022-12-14 17:16:56.385073');
1176 | INSERT INTO "storage"."migrations" ("id", "name", "hash", "executed_at") VALUES (1, 'initialmigration', '6ab16121fbaa08bbd11b712d05f358f9b555d777', '2022-12-14 17:16:56.393739');
1177 | INSERT INTO "storage"."migrations" ("id", "name", "hash", "executed_at") VALUES (2, 'pathtoken-column', '49756be03be4c17bb85fe70d4a861f27de7e49ad', '2022-12-14 17:16:56.398583');
1178 | INSERT INTO "storage"."migrations" ("id", "name", "hash", "executed_at") VALUES (3, 'add-migrations-rls', 'bb5d124c53d68635a883e399426c6a5a25fc893d', '2022-12-14 17:16:56.429952');
1179 | INSERT INTO "storage"."migrations" ("id", "name", "hash", "executed_at") VALUES (4, 'add-size-functions', '6d79007d04f5acd288c9c250c42d2d5fd286c54d', '2022-12-14 17:16:56.443332');
1180 | INSERT INTO "storage"."migrations" ("id", "name", "hash", "executed_at") VALUES (5, 'change-column-name-in-get-size', 'fd65688505d2ffa9fbdc58a944348dd8604d688c', '2022-12-14 17:16:56.452704');
1181 | INSERT INTO "storage"."migrations" ("id", "name", "hash", "executed_at") VALUES (6, 'add-rls-to-buckets', '63e2bab75a2040fee8e3fb3f15a0d26f3380e9b6', '2022-12-14 17:16:56.459977');
1182 | INSERT INTO "storage"."migrations" ("id", "name", "hash", "executed_at") VALUES (7, 'add-public-to-buckets', '82568934f8a4d9e0a85f126f6fb483ad8214c418', '2022-12-14 17:16:56.467924');
1183 | INSERT INTO "storage"."migrations" ("id", "name", "hash", "executed_at") VALUES (8, 'fix-search-function', '1a43a40eddb525f2e2f26efd709e6c06e58e059c', '2022-12-14 17:16:56.472925');
1184 | INSERT INTO "storage"."migrations" ("id", "name", "hash", "executed_at") VALUES (9, 'search-files-search-function', '34c096597eb8b9d077fdfdde9878c88501b2fafc', '2022-12-14 17:16:56.4773');
1185 | INSERT INTO "storage"."migrations" ("id", "name", "hash", "executed_at") VALUES (10, 'add-trigger-to-auto-update-updated_at-column', '37d6bb964a70a822e6d37f22f457b9bca7885928', '2022-12-14 17:16:56.486363');
1186 |
1187 |
1188 | --
1189 | -- Data for Name: objects; Type: TABLE DATA; Schema: storage; Owner: supabase_storage_admin
1190 | --
1191 |
1192 |
1193 |
1194 | --
1195 | -- Data for Name: secrets; Type: TABLE DATA; Schema: vault; Owner: postgres
1196 | --
1197 |
1198 |
1199 |
1200 | --
1201 | -- Name: refresh_tokens_id_seq; Type: SEQUENCE SET; Schema: auth; Owner: supabase_auth_admin
1202 | --
1203 |
1204 | SELECT pg_catalog.setval('"auth"."refresh_tokens_id_seq"', 1, false);
1205 |
1206 |
1207 | --
1208 | -- Name: boards_id_seq; Type: SEQUENCE SET; Schema: public; Owner: postgres
1209 | --
1210 |
1211 | SELECT pg_catalog.setval('"public"."boards_id_seq"', 1, false);
1212 |
1213 |
1214 | --
1215 | -- Name: cards_id_seq; Type: SEQUENCE SET; Schema: public; Owner: postgres
1216 | --
1217 |
1218 | SELECT pg_catalog.setval('"public"."cards_id_seq"', 1, false);
1219 |
1220 |
1221 | --
1222 | -- Name: lists_id_seq; Type: SEQUENCE SET; Schema: public; Owner: postgres
1223 | --
1224 |
1225 | SELECT pg_catalog.setval('"public"."lists_id_seq"', 1, false);
1226 |
1227 |
1228 | --
1229 | -- Name: extensions extensions_pkey; Type: CONSTRAINT; Schema: _realtime; Owner: postgres
1230 | --
1231 |
1232 | ALTER TABLE ONLY "_realtime"."extensions"
1233 | ADD CONSTRAINT "extensions_pkey" PRIMARY KEY ("id");
1234 |
1235 |
1236 | --
1237 | -- Name: schema_migrations schema_migrations_pkey; Type: CONSTRAINT; Schema: _realtime; Owner: postgres
1238 | --
1239 |
1240 | ALTER TABLE ONLY "_realtime"."schema_migrations"
1241 | ADD CONSTRAINT "schema_migrations_pkey" PRIMARY KEY ("version");
1242 |
1243 |
1244 | --
1245 | -- Name: tenants tenants_pkey; Type: CONSTRAINT; Schema: _realtime; Owner: postgres
1246 | --
1247 |
1248 | ALTER TABLE ONLY "_realtime"."tenants"
1249 | ADD CONSTRAINT "tenants_pkey" PRIMARY KEY ("id");
1250 |
1251 |
1252 | --
1253 | -- Name: tenants uniq_external_id; Type: CONSTRAINT; Schema: _realtime; Owner: postgres
1254 | --
1255 |
1256 | ALTER TABLE ONLY "_realtime"."tenants"
1257 | ADD CONSTRAINT "uniq_external_id" UNIQUE ("external_id");
1258 |
1259 |
1260 | --
1261 | -- Name: mfa_amr_claims amr_id_pk; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
1262 | --
1263 |
1264 | ALTER TABLE ONLY "auth"."mfa_amr_claims"
1265 | ADD CONSTRAINT "amr_id_pk" PRIMARY KEY ("id");
1266 |
1267 |
1268 | --
1269 | -- Name: audit_log_entries audit_log_entries_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
1270 | --
1271 |
1272 | ALTER TABLE ONLY "auth"."audit_log_entries"
1273 | ADD CONSTRAINT "audit_log_entries_pkey" PRIMARY KEY ("id");
1274 |
1275 |
1276 | --
1277 | -- Name: identities identities_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
1278 | --
1279 |
1280 | ALTER TABLE ONLY "auth"."identities"
1281 | ADD CONSTRAINT "identities_pkey" PRIMARY KEY ("provider", "id");
1282 |
1283 |
1284 | --
1285 | -- Name: instances instances_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
1286 | --
1287 |
1288 | ALTER TABLE ONLY "auth"."instances"
1289 | ADD CONSTRAINT "instances_pkey" PRIMARY KEY ("id");
1290 |
1291 |
1292 | --
1293 | -- Name: mfa_amr_claims mfa_amr_claims_session_id_authentication_method_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
1294 | --
1295 |
1296 | ALTER TABLE ONLY "auth"."mfa_amr_claims"
1297 | ADD CONSTRAINT "mfa_amr_claims_session_id_authentication_method_pkey" UNIQUE ("session_id", "authentication_method");
1298 |
1299 |
1300 | --
1301 | -- Name: mfa_challenges mfa_challenges_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
1302 | --
1303 |
1304 | ALTER TABLE ONLY "auth"."mfa_challenges"
1305 | ADD CONSTRAINT "mfa_challenges_pkey" PRIMARY KEY ("id");
1306 |
1307 |
1308 | --
1309 | -- Name: mfa_factors mfa_factors_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
1310 | --
1311 |
1312 | ALTER TABLE ONLY "auth"."mfa_factors"
1313 | ADD CONSTRAINT "mfa_factors_pkey" PRIMARY KEY ("id");
1314 |
1315 |
1316 | --
1317 | -- Name: refresh_tokens refresh_tokens_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
1318 | --
1319 |
1320 | ALTER TABLE ONLY "auth"."refresh_tokens"
1321 | ADD CONSTRAINT "refresh_tokens_pkey" PRIMARY KEY ("id");
1322 |
1323 |
1324 | --
1325 | -- Name: refresh_tokens refresh_tokens_token_unique; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
1326 | --
1327 |
1328 | ALTER TABLE ONLY "auth"."refresh_tokens"
1329 | ADD CONSTRAINT "refresh_tokens_token_unique" UNIQUE ("token");
1330 |
1331 |
1332 | --
1333 | -- Name: saml_providers saml_providers_entity_id_key; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
1334 | --
1335 |
1336 | ALTER TABLE ONLY "auth"."saml_providers"
1337 | ADD CONSTRAINT "saml_providers_entity_id_key" UNIQUE ("entity_id");
1338 |
1339 |
1340 | --
1341 | -- Name: saml_providers saml_providers_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
1342 | --
1343 |
1344 | ALTER TABLE ONLY "auth"."saml_providers"
1345 | ADD CONSTRAINT "saml_providers_pkey" PRIMARY KEY ("id");
1346 |
1347 |
1348 | --
1349 | -- Name: saml_relay_states saml_relay_states_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
1350 | --
1351 |
1352 | ALTER TABLE ONLY "auth"."saml_relay_states"
1353 | ADD CONSTRAINT "saml_relay_states_pkey" PRIMARY KEY ("id");
1354 |
1355 |
1356 | --
1357 | -- Name: schema_migrations schema_migrations_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
1358 | --
1359 |
1360 | ALTER TABLE ONLY "auth"."schema_migrations"
1361 | ADD CONSTRAINT "schema_migrations_pkey" PRIMARY KEY ("version");
1362 |
1363 |
1364 | --
1365 | -- Name: sessions sessions_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
1366 | --
1367 |
1368 | ALTER TABLE ONLY "auth"."sessions"
1369 | ADD CONSTRAINT "sessions_pkey" PRIMARY KEY ("id");
1370 |
1371 |
1372 | --
1373 | -- Name: sso_domains sso_domains_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
1374 | --
1375 |
1376 | ALTER TABLE ONLY "auth"."sso_domains"
1377 | ADD CONSTRAINT "sso_domains_pkey" PRIMARY KEY ("id");
1378 |
1379 |
1380 | --
1381 | -- Name: sso_providers sso_providers_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
1382 | --
1383 |
1384 | ALTER TABLE ONLY "auth"."sso_providers"
1385 | ADD CONSTRAINT "sso_providers_pkey" PRIMARY KEY ("id");
1386 |
1387 |
1388 | --
1389 | -- Name: sso_sessions sso_sessions_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
1390 | --
1391 |
1392 | ALTER TABLE ONLY "auth"."sso_sessions"
1393 | ADD CONSTRAINT "sso_sessions_pkey" PRIMARY KEY ("id");
1394 |
1395 |
1396 | --
1397 | -- Name: users users_email_key; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
1398 | --
1399 |
1400 | ALTER TABLE ONLY "auth"."users"
1401 | ADD CONSTRAINT "users_email_key" UNIQUE ("email");
1402 |
1403 |
1404 | --
1405 | -- Name: users users_phone_key; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
1406 | --
1407 |
1408 | ALTER TABLE ONLY "auth"."users"
1409 | ADD CONSTRAINT "users_phone_key" UNIQUE ("phone");
1410 |
1411 |
1412 | --
1413 | -- Name: users users_pkey; Type: CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
1414 | --
1415 |
1416 | ALTER TABLE ONLY "auth"."users"
1417 | ADD CONSTRAINT "users_pkey" PRIMARY KEY ("id");
1418 |
1419 |
1420 | --
1421 | -- Name: boards boards_pkey; Type: CONSTRAINT; Schema: public; Owner: postgres
1422 | --
1423 |
1424 | ALTER TABLE ONLY "public"."boards"
1425 | ADD CONSTRAINT "boards_pkey" PRIMARY KEY ("id");
1426 |
1427 |
1428 | --
1429 | -- Name: cards cards_pkey; Type: CONSTRAINT; Schema: public; Owner: postgres
1430 | --
1431 |
1432 | ALTER TABLE ONLY "public"."cards"
1433 | ADD CONSTRAINT "cards_pkey" PRIMARY KEY ("id");
1434 |
1435 |
1436 | --
1437 | -- Name: lists lists_pkey; Type: CONSTRAINT; Schema: public; Owner: postgres
1438 | --
1439 |
1440 | ALTER TABLE ONLY "public"."lists"
1441 | ADD CONSTRAINT "lists_pkey" PRIMARY KEY ("id");
1442 |
1443 |
1444 | --
1445 | -- Name: buckets buckets_pkey; Type: CONSTRAINT; Schema: storage; Owner: supabase_storage_admin
1446 | --
1447 |
1448 | ALTER TABLE ONLY "storage"."buckets"
1449 | ADD CONSTRAINT "buckets_pkey" PRIMARY KEY ("id");
1450 |
1451 |
1452 | --
1453 | -- Name: migrations migrations_name_key; Type: CONSTRAINT; Schema: storage; Owner: supabase_storage_admin
1454 | --
1455 |
1456 | ALTER TABLE ONLY "storage"."migrations"
1457 | ADD CONSTRAINT "migrations_name_key" UNIQUE ("name");
1458 |
1459 |
1460 | --
1461 | -- Name: migrations migrations_pkey; Type: CONSTRAINT; Schema: storage; Owner: supabase_storage_admin
1462 | --
1463 |
1464 | ALTER TABLE ONLY "storage"."migrations"
1465 | ADD CONSTRAINT "migrations_pkey" PRIMARY KEY ("id");
1466 |
1467 |
1468 | --
1469 | -- Name: objects objects_pkey; Type: CONSTRAINT; Schema: storage; Owner: supabase_storage_admin
1470 | --
1471 |
1472 | ALTER TABLE ONLY "storage"."objects"
1473 | ADD CONSTRAINT "objects_pkey" PRIMARY KEY ("id");
1474 |
1475 |
1476 | --
1477 | -- Name: extensions_tenant_external_id_type_index; Type: INDEX; Schema: _realtime; Owner: postgres
1478 | --
1479 |
1480 | CREATE UNIQUE INDEX "extensions_tenant_external_id_type_index" ON "_realtime"."extensions" USING "btree" ("tenant_external_id", "type");
1481 |
1482 |
1483 | --
1484 | -- Name: tenants_external_id_index; Type: INDEX; Schema: _realtime; Owner: postgres
1485 | --
1486 |
1487 | CREATE UNIQUE INDEX "tenants_external_id_index" ON "_realtime"."tenants" USING "btree" ("external_id");
1488 |
1489 |
1490 | --
1491 | -- Name: audit_logs_instance_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
1492 | --
1493 |
1494 | CREATE INDEX "audit_logs_instance_id_idx" ON "auth"."audit_log_entries" USING "btree" ("instance_id");
1495 |
1496 |
1497 | --
1498 | -- Name: confirmation_token_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
1499 | --
1500 |
1501 | CREATE UNIQUE INDEX "confirmation_token_idx" ON "auth"."users" USING "btree" ("confirmation_token") WHERE (("confirmation_token")::"text" !~ '^[0-9 ]*$'::"text");
1502 |
1503 |
1504 | --
1505 | -- Name: email_change_token_current_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
1506 | --
1507 |
1508 | CREATE UNIQUE INDEX "email_change_token_current_idx" ON "auth"."users" USING "btree" ("email_change_token_current") WHERE (("email_change_token_current")::"text" !~ '^[0-9 ]*$'::"text");
1509 |
1510 |
1511 | --
1512 | -- Name: email_change_token_new_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
1513 | --
1514 |
1515 | CREATE UNIQUE INDEX "email_change_token_new_idx" ON "auth"."users" USING "btree" ("email_change_token_new") WHERE (("email_change_token_new")::"text" !~ '^[0-9 ]*$'::"text");
1516 |
1517 |
1518 | --
1519 | -- Name: factor_id_created_at_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
1520 | --
1521 |
1522 | CREATE INDEX "factor_id_created_at_idx" ON "auth"."mfa_factors" USING "btree" ("user_id", "created_at");
1523 |
1524 |
1525 | --
1526 | -- Name: identities_user_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
1527 | --
1528 |
1529 | CREATE INDEX "identities_user_id_idx" ON "auth"."identities" USING "btree" ("user_id");
1530 |
1531 |
1532 | --
1533 | -- Name: mfa_factors_user_friendly_name_unique; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
1534 | --
1535 |
1536 | CREATE UNIQUE INDEX "mfa_factors_user_friendly_name_unique" ON "auth"."mfa_factors" USING "btree" ("friendly_name", "user_id") WHERE (TRIM(BOTH FROM "friendly_name") <> ''::"text");
1537 |
1538 |
1539 | --
1540 | -- Name: reauthentication_token_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
1541 | --
1542 |
1543 | CREATE UNIQUE INDEX "reauthentication_token_idx" ON "auth"."users" USING "btree" ("reauthentication_token") WHERE (("reauthentication_token")::"text" !~ '^[0-9 ]*$'::"text");
1544 |
1545 |
1546 | --
1547 | -- Name: recovery_token_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
1548 | --
1549 |
1550 | CREATE UNIQUE INDEX "recovery_token_idx" ON "auth"."users" USING "btree" ("recovery_token") WHERE (("recovery_token")::"text" !~ '^[0-9 ]*$'::"text");
1551 |
1552 |
1553 | --
1554 | -- Name: refresh_token_session_id; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
1555 | --
1556 |
1557 | CREATE INDEX "refresh_token_session_id" ON "auth"."refresh_tokens" USING "btree" ("session_id");
1558 |
1559 |
1560 | --
1561 | -- Name: refresh_tokens_instance_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
1562 | --
1563 |
1564 | CREATE INDEX "refresh_tokens_instance_id_idx" ON "auth"."refresh_tokens" USING "btree" ("instance_id");
1565 |
1566 |
1567 | --
1568 | -- Name: refresh_tokens_instance_id_user_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
1569 | --
1570 |
1571 | CREATE INDEX "refresh_tokens_instance_id_user_id_idx" ON "auth"."refresh_tokens" USING "btree" ("instance_id", "user_id");
1572 |
1573 |
1574 | --
1575 | -- Name: refresh_tokens_parent_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
1576 | --
1577 |
1578 | CREATE INDEX "refresh_tokens_parent_idx" ON "auth"."refresh_tokens" USING "btree" ("parent");
1579 |
1580 |
1581 | --
1582 | -- Name: refresh_tokens_session_id_revoked_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
1583 | --
1584 |
1585 | CREATE INDEX "refresh_tokens_session_id_revoked_idx" ON "auth"."refresh_tokens" USING "btree" ("session_id", "revoked");
1586 |
1587 |
1588 | --
1589 | -- Name: refresh_tokens_token_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
1590 | --
1591 |
1592 | CREATE INDEX "refresh_tokens_token_idx" ON "auth"."refresh_tokens" USING "btree" ("token");
1593 |
1594 |
1595 | --
1596 | -- Name: saml_providers_sso_provider_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
1597 | --
1598 |
1599 | CREATE INDEX "saml_providers_sso_provider_id_idx" ON "auth"."saml_providers" USING "btree" ("sso_provider_id");
1600 |
1601 |
1602 | --
1603 | -- Name: saml_relay_states_for_email_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
1604 | --
1605 |
1606 | CREATE INDEX "saml_relay_states_for_email_idx" ON "auth"."saml_relay_states" USING "btree" ("for_email");
1607 |
1608 |
1609 | --
1610 | -- Name: saml_relay_states_sso_provider_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
1611 | --
1612 |
1613 | CREATE INDEX "saml_relay_states_sso_provider_id_idx" ON "auth"."saml_relay_states" USING "btree" ("sso_provider_id");
1614 |
1615 |
1616 | --
1617 | -- Name: sessions_user_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
1618 | --
1619 |
1620 | CREATE INDEX "sessions_user_id_idx" ON "auth"."sessions" USING "btree" ("user_id");
1621 |
1622 |
1623 | --
1624 | -- Name: sso_domains_domain_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
1625 | --
1626 |
1627 | CREATE UNIQUE INDEX "sso_domains_domain_idx" ON "auth"."sso_domains" USING "btree" ("lower"("domain"));
1628 |
1629 |
1630 | --
1631 | -- Name: sso_domains_sso_provider_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
1632 | --
1633 |
1634 | CREATE INDEX "sso_domains_sso_provider_id_idx" ON "auth"."sso_domains" USING "btree" ("sso_provider_id");
1635 |
1636 |
1637 | --
1638 | -- Name: sso_providers_resource_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
1639 | --
1640 |
1641 | CREATE UNIQUE INDEX "sso_providers_resource_id_idx" ON "auth"."sso_providers" USING "btree" ("lower"("resource_id"));
1642 |
1643 |
1644 | --
1645 | -- Name: sso_sessions_session_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
1646 | --
1647 |
1648 | CREATE INDEX "sso_sessions_session_id_idx" ON "auth"."sso_sessions" USING "btree" ("session_id");
1649 |
1650 |
1651 | --
1652 | -- Name: sso_sessions_sso_provider_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
1653 | --
1654 |
1655 | CREATE INDEX "sso_sessions_sso_provider_id_idx" ON "auth"."sso_sessions" USING "btree" ("sso_provider_id");
1656 |
1657 |
1658 | --
1659 | -- Name: user_id_created_at_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
1660 | --
1661 |
1662 | CREATE INDEX "user_id_created_at_idx" ON "auth"."sessions" USING "btree" ("user_id", "created_at");
1663 |
1664 |
1665 | --
1666 | -- Name: users_instance_id_email_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
1667 | --
1668 |
1669 | CREATE INDEX "users_instance_id_email_idx" ON "auth"."users" USING "btree" ("instance_id", "lower"(("email")::"text"));
1670 |
1671 |
1672 | --
1673 | -- Name: users_instance_id_idx; Type: INDEX; Schema: auth; Owner: supabase_auth_admin
1674 | --
1675 |
1676 | CREATE INDEX "users_instance_id_idx" ON "auth"."users" USING "btree" ("instance_id");
1677 |
1678 |
1679 | --
1680 | -- Name: bname; Type: INDEX; Schema: storage; Owner: supabase_storage_admin
1681 | --
1682 |
1683 | CREATE UNIQUE INDEX "bname" ON "storage"."buckets" USING "btree" ("name");
1684 |
1685 |
1686 | --
1687 | -- Name: bucketid_objname; Type: INDEX; Schema: storage; Owner: supabase_storage_admin
1688 | --
1689 |
1690 | CREATE UNIQUE INDEX "bucketid_objname" ON "storage"."objects" USING "btree" ("bucket_id", "name");
1691 |
1692 |
1693 | --
1694 | -- Name: name_prefix_search; Type: INDEX; Schema: storage; Owner: supabase_storage_admin
1695 | --
1696 |
1697 | CREATE INDEX "name_prefix_search" ON "storage"."objects" USING "btree" ("name" "text_pattern_ops");
1698 |
1699 |
1700 | --
1701 | -- Name: objects update_objects_updated_at; Type: TRIGGER; Schema: storage; Owner: supabase_storage_admin
1702 | --
1703 |
1704 | CREATE TRIGGER "update_objects_updated_at" BEFORE UPDATE ON "storage"."objects" FOR EACH ROW EXECUTE FUNCTION "storage"."update_updated_at_column"();
1705 |
1706 |
1707 | --
1708 | -- Name: extensions extensions_tenant_external_id_fkey; Type: FK CONSTRAINT; Schema: _realtime; Owner: postgres
1709 | --
1710 |
1711 | ALTER TABLE ONLY "_realtime"."extensions"
1712 | ADD CONSTRAINT "extensions_tenant_external_id_fkey" FOREIGN KEY ("tenant_external_id") REFERENCES "_realtime"."tenants"("external_id") ON DELETE CASCADE;
1713 |
1714 |
1715 | --
1716 | -- Name: identities identities_user_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
1717 | --
1718 |
1719 | ALTER TABLE ONLY "auth"."identities"
1720 | ADD CONSTRAINT "identities_user_id_fkey" FOREIGN KEY ("user_id") REFERENCES "auth"."users"("id") ON DELETE CASCADE;
1721 |
1722 |
1723 | --
1724 | -- Name: mfa_amr_claims mfa_amr_claims_session_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
1725 | --
1726 |
1727 | ALTER TABLE ONLY "auth"."mfa_amr_claims"
1728 | ADD CONSTRAINT "mfa_amr_claims_session_id_fkey" FOREIGN KEY ("session_id") REFERENCES "auth"."sessions"("id") ON DELETE CASCADE;
1729 |
1730 |
1731 | --
1732 | -- Name: mfa_challenges mfa_challenges_auth_factor_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
1733 | --
1734 |
1735 | ALTER TABLE ONLY "auth"."mfa_challenges"
1736 | ADD CONSTRAINT "mfa_challenges_auth_factor_id_fkey" FOREIGN KEY ("factor_id") REFERENCES "auth"."mfa_factors"("id") ON DELETE CASCADE;
1737 |
1738 |
1739 | --
1740 | -- Name: mfa_factors mfa_factors_user_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
1741 | --
1742 |
1743 | ALTER TABLE ONLY "auth"."mfa_factors"
1744 | ADD CONSTRAINT "mfa_factors_user_id_fkey" FOREIGN KEY ("user_id") REFERENCES "auth"."users"("id") ON DELETE CASCADE;
1745 |
1746 |
1747 | --
1748 | -- Name: refresh_tokens refresh_tokens_parent_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
1749 | --
1750 |
1751 | ALTER TABLE ONLY "auth"."refresh_tokens"
1752 | ADD CONSTRAINT "refresh_tokens_parent_fkey" FOREIGN KEY ("parent") REFERENCES "auth"."refresh_tokens"("token");
1753 |
1754 |
1755 | --
1756 | -- Name: refresh_tokens refresh_tokens_session_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
1757 | --
1758 |
1759 | ALTER TABLE ONLY "auth"."refresh_tokens"
1760 | ADD CONSTRAINT "refresh_tokens_session_id_fkey" FOREIGN KEY ("session_id") REFERENCES "auth"."sessions"("id") ON DELETE CASCADE;
1761 |
1762 |
1763 | --
1764 | -- Name: saml_providers saml_providers_sso_provider_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
1765 | --
1766 |
1767 | ALTER TABLE ONLY "auth"."saml_providers"
1768 | ADD CONSTRAINT "saml_providers_sso_provider_id_fkey" FOREIGN KEY ("sso_provider_id") REFERENCES "auth"."sso_providers"("id") ON DELETE CASCADE;
1769 |
1770 |
1771 | --
1772 | -- Name: saml_relay_states saml_relay_states_sso_provider_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
1773 | --
1774 |
1775 | ALTER TABLE ONLY "auth"."saml_relay_states"
1776 | ADD CONSTRAINT "saml_relay_states_sso_provider_id_fkey" FOREIGN KEY ("sso_provider_id") REFERENCES "auth"."sso_providers"("id") ON DELETE CASCADE;
1777 |
1778 |
1779 | --
1780 | -- Name: sessions sessions_user_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
1781 | --
1782 |
1783 | ALTER TABLE ONLY "auth"."sessions"
1784 | ADD CONSTRAINT "sessions_user_id_fkey" FOREIGN KEY ("user_id") REFERENCES "auth"."users"("id") ON DELETE CASCADE;
1785 |
1786 |
1787 | --
1788 | -- Name: sso_domains sso_domains_sso_provider_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
1789 | --
1790 |
1791 | ALTER TABLE ONLY "auth"."sso_domains"
1792 | ADD CONSTRAINT "sso_domains_sso_provider_id_fkey" FOREIGN KEY ("sso_provider_id") REFERENCES "auth"."sso_providers"("id") ON DELETE CASCADE;
1793 |
1794 |
1795 | --
1796 | -- Name: sso_sessions sso_sessions_session_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
1797 | --
1798 |
1799 | ALTER TABLE ONLY "auth"."sso_sessions"
1800 | ADD CONSTRAINT "sso_sessions_session_id_fkey" FOREIGN KEY ("session_id") REFERENCES "auth"."sessions"("id") ON DELETE CASCADE;
1801 |
1802 |
1803 | --
1804 | -- Name: sso_sessions sso_sessions_sso_provider_id_fkey; Type: FK CONSTRAINT; Schema: auth; Owner: supabase_auth_admin
1805 | --
1806 |
1807 | ALTER TABLE ONLY "auth"."sso_sessions"
1808 | ADD CONSTRAINT "sso_sessions_sso_provider_id_fkey" FOREIGN KEY ("sso_provider_id") REFERENCES "auth"."sso_providers"("id") ON DELETE CASCADE;
1809 |
1810 |
1811 | --
1812 | -- Name: boards boards_user_id_fkey; Type: FK CONSTRAINT; Schema: public; Owner: postgres
1813 | --
1814 |
1815 | ALTER TABLE ONLY "public"."boards"
1816 | ADD CONSTRAINT "boards_user_id_fkey" FOREIGN KEY ("user_id") REFERENCES "auth"."users"("id");
1817 |
1818 |
1819 | --
1820 | -- Name: cards cards_list_id_fkey; Type: FK CONSTRAINT; Schema: public; Owner: postgres
1821 | --
1822 |
1823 | ALTER TABLE ONLY "public"."cards"
1824 | ADD CONSTRAINT "cards_list_id_fkey" FOREIGN KEY ("list_id") REFERENCES "public"."lists"("id");
1825 |
1826 |
1827 | --
1828 | -- Name: cards cards_user_id_fkey; Type: FK CONSTRAINT; Schema: public; Owner: postgres
1829 | --
1830 |
1831 | ALTER TABLE ONLY "public"."cards"
1832 | ADD CONSTRAINT "cards_user_id_fkey" FOREIGN KEY ("user_id") REFERENCES "auth"."users"("id");
1833 |
1834 |
1835 | --
1836 | -- Name: lists lists_board_id_fkey; Type: FK CONSTRAINT; Schema: public; Owner: postgres
1837 | --
1838 |
1839 | ALTER TABLE ONLY "public"."lists"
1840 | ADD CONSTRAINT "lists_board_id_fkey" FOREIGN KEY ("board_id") REFERENCES "public"."boards"("id");
1841 |
1842 |
1843 | --
1844 | -- Name: lists lists_user_id_fkey; Type: FK CONSTRAINT; Schema: public; Owner: postgres
1845 | --
1846 |
1847 | ALTER TABLE ONLY "public"."lists"
1848 | ADD CONSTRAINT "lists_user_id_fkey" FOREIGN KEY ("user_id") REFERENCES "auth"."users"("id");
1849 |
1850 |
1851 | --
1852 | -- Name: buckets buckets_owner_fkey; Type: FK CONSTRAINT; Schema: storage; Owner: supabase_storage_admin
1853 | --
1854 |
1855 | ALTER TABLE ONLY "storage"."buckets"
1856 | ADD CONSTRAINT "buckets_owner_fkey" FOREIGN KEY ("owner") REFERENCES "auth"."users"("id");
1857 |
1858 |
1859 | --
1860 | -- Name: objects objects_bucketId_fkey; Type: FK CONSTRAINT; Schema: storage; Owner: supabase_storage_admin
1861 | --
1862 |
1863 | ALTER TABLE ONLY "storage"."objects"
1864 | ADD CONSTRAINT "objects_bucketId_fkey" FOREIGN KEY ("bucket_id") REFERENCES "storage"."buckets"("id");
1865 |
1866 |
1867 | --
1868 | -- Name: objects objects_owner_fkey; Type: FK CONSTRAINT; Schema: storage; Owner: supabase_storage_admin
1869 | --
1870 |
1871 | ALTER TABLE ONLY "storage"."objects"
1872 | ADD CONSTRAINT "objects_owner_fkey" FOREIGN KEY ("owner") REFERENCES "auth"."users"("id");
1873 |
1874 |
1875 | --
1876 | -- Name: boards Individuals can create boards.; Type: POLICY; Schema: public; Owner: postgres
1877 | --
1878 |
1879 | CREATE POLICY "Individuals can create boards." ON "public"."boards" FOR INSERT WITH CHECK (("auth"."uid"() = "user_id"));
1880 |
1881 |
1882 | --
1883 | -- Name: cards Individuals can create cards.; Type: POLICY; Schema: public; Owner: postgres
1884 | --
1885 |
1886 | CREATE POLICY "Individuals can create cards." ON "public"."cards" FOR INSERT WITH CHECK (("auth"."uid"() = "user_id"));
1887 |
1888 |
1889 | --
1890 | -- Name: lists Individuals can create lists.; Type: POLICY; Schema: public; Owner: postgres
1891 | --
1892 |
1893 | CREATE POLICY "Individuals can create lists." ON "public"."lists" FOR INSERT WITH CHECK (("auth"."uid"() = "user_id"));
1894 |
1895 |
1896 | --
1897 | -- Name: boards Individuals can delete their own boards.; Type: POLICY; Schema: public; Owner: postgres
1898 | --
1899 |
1900 | CREATE POLICY "Individuals can delete their own boards." ON "public"."boards" FOR DELETE USING (("auth"."uid"() = "user_id"));
1901 |
1902 |
1903 | --
1904 | -- Name: cards Individuals can delete their own cards.; Type: POLICY; Schema: public; Owner: postgres
1905 | --
1906 |
1907 | CREATE POLICY "Individuals can delete their own cards." ON "public"."cards" FOR DELETE USING (("auth"."uid"() = "user_id"));
1908 |
1909 |
1910 | --
1911 | -- Name: lists Individuals can delete their own lists.; Type: POLICY; Schema: public; Owner: postgres
1912 | --
1913 |
1914 | CREATE POLICY "Individuals can delete their own lists." ON "public"."lists" FOR DELETE USING (("auth"."uid"() = "user_id"));
1915 |
1916 |
1917 | --
1918 | -- Name: boards Individuals can update their own boards.; Type: POLICY; Schema: public; Owner: postgres
1919 | --
1920 |
1921 | CREATE POLICY "Individuals can update their own boards." ON "public"."boards" FOR UPDATE USING (("auth"."uid"() = "user_id"));
1922 |
1923 |
1924 | --
1925 | -- Name: cards Individuals can update their own cards.; Type: POLICY; Schema: public; Owner: postgres
1926 | --
1927 |
1928 | CREATE POLICY "Individuals can update their own cards." ON "public"."cards" FOR UPDATE USING (("auth"."uid"() = "user_id"));
1929 |
1930 |
1931 | --
1932 | -- Name: lists Individuals can update their own lists.; Type: POLICY; Schema: public; Owner: postgres
1933 | --
1934 |
1935 | CREATE POLICY "Individuals can update their own lists." ON "public"."lists" FOR UPDATE USING (("auth"."uid"() = "user_id"));
1936 |
1937 |
1938 | --
1939 | -- Name: boards Individuals can view their own boards. ; Type: POLICY; Schema: public; Owner: postgres
1940 | --
1941 |
1942 | CREATE POLICY "Individuals can view their own boards. " ON "public"."boards" FOR SELECT USING (("auth"."uid"() = "user_id"));
1943 |
1944 |
1945 | --
1946 | -- Name: cards Individuals can view their own cards. ; Type: POLICY; Schema: public; Owner: postgres
1947 | --
1948 |
1949 | CREATE POLICY "Individuals can view their own cards. " ON "public"."cards" FOR SELECT USING (("auth"."uid"() = "user_id"));
1950 |
1951 |
1952 | --
1953 | -- Name: lists Individuals can view their own lists. ; Type: POLICY; Schema: public; Owner: postgres
1954 | --
1955 |
1956 | CREATE POLICY "Individuals can view their own lists. " ON "public"."lists" FOR SELECT USING (("auth"."uid"() = "user_id"));
1957 |
1958 |
1959 | --
1960 | -- Name: boards; Type: ROW SECURITY; Schema: public; Owner: postgres
1961 | --
1962 |
1963 | ALTER TABLE "public"."boards" ENABLE ROW LEVEL SECURITY;
1964 |
1965 | --
1966 | -- Name: cards; Type: ROW SECURITY; Schema: public; Owner: postgres
1967 | --
1968 |
1969 | ALTER TABLE "public"."cards" ENABLE ROW LEVEL SECURITY;
1970 |
1971 | --
1972 | -- Name: lists; Type: ROW SECURITY; Schema: public; Owner: postgres
1973 | --
1974 |
1975 | ALTER TABLE "public"."lists" ENABLE ROW LEVEL SECURITY;
1976 |
1977 | --
1978 | -- Name: buckets; Type: ROW SECURITY; Schema: storage; Owner: supabase_storage_admin
1979 | --
1980 |
1981 | ALTER TABLE "storage"."buckets" ENABLE ROW LEVEL SECURITY;
1982 |
1983 | --
1984 | -- Name: migrations; Type: ROW SECURITY; Schema: storage; Owner: supabase_storage_admin
1985 | --
1986 |
1987 | ALTER TABLE "storage"."migrations" ENABLE ROW LEVEL SECURITY;
1988 |
1989 | --
1990 | -- Name: objects; Type: ROW SECURITY; Schema: storage; Owner: supabase_storage_admin
1991 | --
1992 |
1993 | ALTER TABLE "storage"."objects" ENABLE ROW LEVEL SECURITY;
1994 |
1995 | --
1996 | -- Name: SCHEMA "auth"; Type: ACL; Schema: -; Owner: supabase_admin
1997 | --
1998 |
1999 | GRANT USAGE ON SCHEMA "auth" TO "anon";
2000 | GRANT USAGE ON SCHEMA "auth" TO "authenticated";
2001 | GRANT USAGE ON SCHEMA "auth" TO "service_role";
2002 | GRANT ALL ON SCHEMA "auth" TO "supabase_auth_admin";
2003 | GRANT ALL ON SCHEMA "auth" TO "dashboard_user";
2004 | GRANT ALL ON SCHEMA "auth" TO "postgres";
2005 |
2006 |
2007 | --
2008 | -- Name: SCHEMA "graphql_public"; Type: ACL; Schema: -; Owner: supabase_admin
2009 | --
2010 |
2011 | GRANT USAGE ON SCHEMA "graphql_public" TO "postgres";
2012 | GRANT USAGE ON SCHEMA "graphql_public" TO "anon";
2013 | GRANT USAGE ON SCHEMA "graphql_public" TO "authenticated";
2014 | GRANT USAGE ON SCHEMA "graphql_public" TO "service_role";
2015 |
2016 |
2017 | --
2018 | -- Name: SCHEMA "public"; Type: ACL; Schema: -; Owner: pg_database_owner
2019 | --
2020 |
2021 | GRANT USAGE ON SCHEMA "public" TO "postgres";
2022 | GRANT USAGE ON SCHEMA "public" TO "anon";
2023 | GRANT USAGE ON SCHEMA "public" TO "authenticated";
2024 | GRANT USAGE ON SCHEMA "public" TO "service_role";
2025 |
2026 |
2027 | --
2028 | -- Name: SCHEMA "realtime"; Type: ACL; Schema: -; Owner: supabase_admin
2029 | --
2030 |
2031 | GRANT USAGE ON SCHEMA "realtime" TO "postgres";
2032 |
2033 |
2034 | --
2035 | -- Name: SCHEMA "storage"; Type: ACL; Schema: -; Owner: supabase_admin
2036 | --
2037 |
2038 | GRANT ALL ON SCHEMA "storage" TO "postgres";
2039 | GRANT USAGE ON SCHEMA "storage" TO "anon";
2040 | GRANT USAGE ON SCHEMA "storage" TO "authenticated";
2041 | GRANT USAGE ON SCHEMA "storage" TO "service_role";
2042 | GRANT ALL ON SCHEMA "storage" TO "supabase_storage_admin";
2043 | GRANT ALL ON SCHEMA "storage" TO "dashboard_user";
2044 |
2045 |
2046 | --
2047 | -- Name: FUNCTION "email"(); Type: ACL; Schema: auth; Owner: supabase_auth_admin
2048 | --
2049 |
2050 | GRANT ALL ON FUNCTION "auth"."email"() TO "dashboard_user";
2051 |
2052 |
2053 | --
2054 | -- Name: FUNCTION "jwt"(); Type: ACL; Schema: auth; Owner: supabase_auth_admin
2055 | --
2056 |
2057 | GRANT ALL ON FUNCTION "auth"."jwt"() TO "postgres";
2058 | GRANT ALL ON FUNCTION "auth"."jwt"() TO "dashboard_user";
2059 |
2060 |
2061 | --
2062 | -- Name: FUNCTION "role"(); Type: ACL; Schema: auth; Owner: supabase_auth_admin
2063 | --
2064 |
2065 | GRANT ALL ON FUNCTION "auth"."role"() TO "dashboard_user";
2066 |
2067 |
2068 | --
2069 | -- Name: FUNCTION "uid"(); Type: ACL; Schema: auth; Owner: supabase_auth_admin
2070 | --
2071 |
2072 | GRANT ALL ON FUNCTION "auth"."uid"() TO "dashboard_user";
2073 |
2074 |
2075 | --
2076 | -- Name: FUNCTION "algorithm_sign"("signables" "text", "secret" "text", "algorithm" "text"); Type: ACL; Schema: extensions; Owner: postgres
2077 | --
2078 |
2079 | GRANT ALL ON FUNCTION "extensions"."algorithm_sign"("signables" "text", "secret" "text", "algorithm" "text") TO "dashboard_user";
2080 |
2081 |
2082 | --
2083 | -- Name: FUNCTION "armor"("bytea"); Type: ACL; Schema: extensions; Owner: postgres
2084 | --
2085 |
2086 | GRANT ALL ON FUNCTION "extensions"."armor"("bytea") TO "dashboard_user";
2087 |
2088 |
2089 | --
2090 | -- Name: FUNCTION "armor"("bytea", "text"[], "text"[]); Type: ACL; Schema: extensions; Owner: postgres
2091 | --
2092 |
2093 | GRANT ALL ON FUNCTION "extensions"."armor"("bytea", "text"[], "text"[]) TO "dashboard_user";
2094 |
2095 |
2096 | --
2097 | -- Name: FUNCTION "crypt"("text", "text"); Type: ACL; Schema: extensions; Owner: postgres
2098 | --
2099 |
2100 | GRANT ALL ON FUNCTION "extensions"."crypt"("text", "text") TO "dashboard_user";
2101 |
2102 |
2103 | --
2104 | -- Name: FUNCTION "dearmor"("text"); Type: ACL; Schema: extensions; Owner: postgres
2105 | --
2106 |
2107 | GRANT ALL ON FUNCTION "extensions"."dearmor"("text") TO "dashboard_user";
2108 |
2109 |
2110 | --
2111 | -- Name: FUNCTION "decrypt"("bytea", "bytea", "text"); Type: ACL; Schema: extensions; Owner: postgres
2112 | --
2113 |
2114 | GRANT ALL ON FUNCTION "extensions"."decrypt"("bytea", "bytea", "text") TO "dashboard_user";
2115 |
2116 |
2117 | --
2118 | -- Name: FUNCTION "decrypt_iv"("bytea", "bytea", "bytea", "text"); Type: ACL; Schema: extensions; Owner: postgres
2119 | --
2120 |
2121 | GRANT ALL ON FUNCTION "extensions"."decrypt_iv"("bytea", "bytea", "bytea", "text") TO "dashboard_user";
2122 |
2123 |
2124 | --
2125 | -- Name: FUNCTION "digest"("bytea", "text"); Type: ACL; Schema: extensions; Owner: postgres
2126 | --
2127 |
2128 | GRANT ALL ON FUNCTION "extensions"."digest"("bytea", "text") TO "dashboard_user";
2129 |
2130 |
2131 | --
2132 | -- Name: FUNCTION "digest"("text", "text"); Type: ACL; Schema: extensions; Owner: postgres
2133 | --
2134 |
2135 | GRANT ALL ON FUNCTION "extensions"."digest"("text", "text") TO "dashboard_user";
2136 |
2137 |
2138 | --
2139 | -- Name: FUNCTION "encrypt"("bytea", "bytea", "text"); Type: ACL; Schema: extensions; Owner: postgres
2140 | --
2141 |
2142 | GRANT ALL ON FUNCTION "extensions"."encrypt"("bytea", "bytea", "text") TO "dashboard_user";
2143 |
2144 |
2145 | --
2146 | -- Name: FUNCTION "encrypt_iv"("bytea", "bytea", "bytea", "text"); Type: ACL; Schema: extensions; Owner: postgres
2147 | --
2148 |
2149 | GRANT ALL ON FUNCTION "extensions"."encrypt_iv"("bytea", "bytea", "bytea", "text") TO "dashboard_user";
2150 |
2151 |
2152 | --
2153 | -- Name: FUNCTION "gen_random_bytes"(integer); Type: ACL; Schema: extensions; Owner: postgres
2154 | --
2155 |
2156 | GRANT ALL ON FUNCTION "extensions"."gen_random_bytes"(integer) TO "dashboard_user";
2157 |
2158 |
2159 | --
2160 | -- Name: FUNCTION "gen_random_uuid"(); Type: ACL; Schema: extensions; Owner: postgres
2161 | --
2162 |
2163 | GRANT ALL ON FUNCTION "extensions"."gen_random_uuid"() TO "dashboard_user";
2164 |
2165 |
2166 | --
2167 | -- Name: FUNCTION "gen_salt"("text"); Type: ACL; Schema: extensions; Owner: postgres
2168 | --
2169 |
2170 | GRANT ALL ON FUNCTION "extensions"."gen_salt"("text") TO "dashboard_user";
2171 |
2172 |
2173 | --
2174 | -- Name: FUNCTION "gen_salt"("text", integer); Type: ACL; Schema: extensions; Owner: postgres
2175 | --
2176 |
2177 | GRANT ALL ON FUNCTION "extensions"."gen_salt"("text", integer) TO "dashboard_user";
2178 |
2179 |
2180 | --
2181 | -- Name: FUNCTION "hmac"("bytea", "bytea", "text"); Type: ACL; Schema: extensions; Owner: postgres
2182 | --
2183 |
2184 | GRANT ALL ON FUNCTION "extensions"."hmac"("bytea", "bytea", "text") TO "dashboard_user";
2185 |
2186 |
2187 | --
2188 | -- Name: FUNCTION "hmac"("text", "text", "text"); Type: ACL; Schema: extensions; Owner: postgres
2189 | --
2190 |
2191 | GRANT ALL ON FUNCTION "extensions"."hmac"("text", "text", "text") TO "dashboard_user";
2192 |
2193 |
2194 | --
2195 | -- Name: FUNCTION "pg_stat_statements"("showtext" boolean, OUT "userid" "oid", OUT "dbid" "oid", OUT "toplevel" boolean, OUT "queryid" bigint, OUT "query" "text", OUT "plans" bigint, OUT "total_plan_time" double precision, OUT "min_plan_time" double precision, OUT "max_plan_time" double precision, OUT "mean_plan_time" double precision, OUT "stddev_plan_time" double precision, OUT "calls" bigint, OUT "total_exec_time" double precision, OUT "min_exec_time" double precision, OUT "max_exec_time" double precision, OUT "mean_exec_time" double precision, OUT "stddev_exec_time" double precision, OUT "rows" bigint, OUT "shared_blks_hit" bigint, OUT "shared_blks_read" bigint, OUT "shared_blks_dirtied" bigint, OUT "shared_blks_written" bigint, OUT "local_blks_hit" bigint, OUT "local_blks_read" bigint, OUT "local_blks_dirtied" bigint, OUT "local_blks_written" bigint, OUT "temp_blks_read" bigint, OUT "temp_blks_written" bigint, OUT "blk_read_time" double precision, OUT "blk_write_time" double precision, OUT "temp_blk_read_time" double precision, OUT "temp_blk_write_time" double precision, OUT "wal_records" bigint, OUT "wal_fpi" bigint, OUT "wal_bytes" numeric, OUT "jit_functions" bigint, OUT "jit_generation_time" double precision, OUT "jit_inlining_count" bigint, OUT "jit_inlining_time" double precision, OUT "jit_optimization_count" bigint, OUT "jit_optimization_time" double precision, OUT "jit_emission_count" bigint, OUT "jit_emission_time" double precision); Type: ACL; Schema: extensions; Owner: postgres
2196 | --
2197 |
2198 | GRANT ALL ON FUNCTION "extensions"."pg_stat_statements"("showtext" boolean, OUT "userid" "oid", OUT "dbid" "oid", OUT "toplevel" boolean, OUT "queryid" bigint, OUT "query" "text", OUT "plans" bigint, OUT "total_plan_time" double precision, OUT "min_plan_time" double precision, OUT "max_plan_time" double precision, OUT "mean_plan_time" double precision, OUT "stddev_plan_time" double precision, OUT "calls" bigint, OUT "total_exec_time" double precision, OUT "min_exec_time" double precision, OUT "max_exec_time" double precision, OUT "mean_exec_time" double precision, OUT "stddev_exec_time" double precision, OUT "rows" bigint, OUT "shared_blks_hit" bigint, OUT "shared_blks_read" bigint, OUT "shared_blks_dirtied" bigint, OUT "shared_blks_written" bigint, OUT "local_blks_hit" bigint, OUT "local_blks_read" bigint, OUT "local_blks_dirtied" bigint, OUT "local_blks_written" bigint, OUT "temp_blks_read" bigint, OUT "temp_blks_written" bigint, OUT "blk_read_time" double precision, OUT "blk_write_time" double precision, OUT "temp_blk_read_time" double precision, OUT "temp_blk_write_time" double precision, OUT "wal_records" bigint, OUT "wal_fpi" bigint, OUT "wal_bytes" numeric, OUT "jit_functions" bigint, OUT "jit_generation_time" double precision, OUT "jit_inlining_count" bigint, OUT "jit_inlining_time" double precision, OUT "jit_optimization_count" bigint, OUT "jit_optimization_time" double precision, OUT "jit_emission_count" bigint, OUT "jit_emission_time" double precision) TO "dashboard_user";
2199 |
2200 |
2201 | --
2202 | -- Name: FUNCTION "pg_stat_statements_info"(OUT "dealloc" bigint, OUT "stats_reset" timestamp with time zone); Type: ACL; Schema: extensions; Owner: postgres
2203 | --
2204 |
2205 | GRANT ALL ON FUNCTION "extensions"."pg_stat_statements_info"(OUT "dealloc" bigint, OUT "stats_reset" timestamp with time zone) TO "dashboard_user";
2206 |
2207 |
2208 | --
2209 | -- Name: FUNCTION "pg_stat_statements_reset"("userid" "oid", "dbid" "oid", "queryid" bigint); Type: ACL; Schema: extensions; Owner: postgres
2210 | --
2211 |
2212 | GRANT ALL ON FUNCTION "extensions"."pg_stat_statements_reset"("userid" "oid", "dbid" "oid", "queryid" bigint) TO "dashboard_user";
2213 |
2214 |
2215 | --
2216 | -- Name: FUNCTION "pgp_armor_headers"("text", OUT "key" "text", OUT "value" "text"); Type: ACL; Schema: extensions; Owner: postgres
2217 | --
2218 |
2219 | GRANT ALL ON FUNCTION "extensions"."pgp_armor_headers"("text", OUT "key" "text", OUT "value" "text") TO "dashboard_user";
2220 |
2221 |
2222 | --
2223 | -- Name: FUNCTION "pgp_key_id"("bytea"); Type: ACL; Schema: extensions; Owner: postgres
2224 | --
2225 |
2226 | GRANT ALL ON FUNCTION "extensions"."pgp_key_id"("bytea") TO "dashboard_user";
2227 |
2228 |
2229 | --
2230 | -- Name: FUNCTION "pgp_pub_decrypt"("bytea", "bytea"); Type: ACL; Schema: extensions; Owner: postgres
2231 | --
2232 |
2233 | GRANT ALL ON FUNCTION "extensions"."pgp_pub_decrypt"("bytea", "bytea") TO "dashboard_user";
2234 |
2235 |
2236 | --
2237 | -- Name: FUNCTION "pgp_pub_decrypt"("bytea", "bytea", "text"); Type: ACL; Schema: extensions; Owner: postgres
2238 | --
2239 |
2240 | GRANT ALL ON FUNCTION "extensions"."pgp_pub_decrypt"("bytea", "bytea", "text") TO "dashboard_user";
2241 |
2242 |
2243 | --
2244 | -- Name: FUNCTION "pgp_pub_decrypt"("bytea", "bytea", "text", "text"); Type: ACL; Schema: extensions; Owner: postgres
2245 | --
2246 |
2247 | GRANT ALL ON FUNCTION "extensions"."pgp_pub_decrypt"("bytea", "bytea", "text", "text") TO "dashboard_user";
2248 |
2249 |
2250 | --
2251 | -- Name: FUNCTION "pgp_pub_decrypt_bytea"("bytea", "bytea"); Type: ACL; Schema: extensions; Owner: postgres
2252 | --
2253 |
2254 | GRANT ALL ON FUNCTION "extensions"."pgp_pub_decrypt_bytea"("bytea", "bytea") TO "dashboard_user";
2255 |
2256 |
2257 | --
2258 | -- Name: FUNCTION "pgp_pub_decrypt_bytea"("bytea", "bytea", "text"); Type: ACL; Schema: extensions; Owner: postgres
2259 | --
2260 |
2261 | GRANT ALL ON FUNCTION "extensions"."pgp_pub_decrypt_bytea"("bytea", "bytea", "text") TO "dashboard_user";
2262 |
2263 |
2264 | --
2265 | -- Name: FUNCTION "pgp_pub_decrypt_bytea"("bytea", "bytea", "text", "text"); Type: ACL; Schema: extensions; Owner: postgres
2266 | --
2267 |
2268 | GRANT ALL ON FUNCTION "extensions"."pgp_pub_decrypt_bytea"("bytea", "bytea", "text", "text") TO "dashboard_user";
2269 |
2270 |
2271 | --
2272 | -- Name: FUNCTION "pgp_pub_encrypt"("text", "bytea"); Type: ACL; Schema: extensions; Owner: postgres
2273 | --
2274 |
2275 | GRANT ALL ON FUNCTION "extensions"."pgp_pub_encrypt"("text", "bytea") TO "dashboard_user";
2276 |
2277 |
2278 | --
2279 | -- Name: FUNCTION "pgp_pub_encrypt"("text", "bytea", "text"); Type: ACL; Schema: extensions; Owner: postgres
2280 | --
2281 |
2282 | GRANT ALL ON FUNCTION "extensions"."pgp_pub_encrypt"("text", "bytea", "text") TO "dashboard_user";
2283 |
2284 |
2285 | --
2286 | -- Name: FUNCTION "pgp_pub_encrypt_bytea"("bytea", "bytea"); Type: ACL; Schema: extensions; Owner: postgres
2287 | --
2288 |
2289 | GRANT ALL ON FUNCTION "extensions"."pgp_pub_encrypt_bytea"("bytea", "bytea") TO "dashboard_user";
2290 |
2291 |
2292 | --
2293 | -- Name: FUNCTION "pgp_pub_encrypt_bytea"("bytea", "bytea", "text"); Type: ACL; Schema: extensions; Owner: postgres
2294 | --
2295 |
2296 | GRANT ALL ON FUNCTION "extensions"."pgp_pub_encrypt_bytea"("bytea", "bytea", "text") TO "dashboard_user";
2297 |
2298 |
2299 | --
2300 | -- Name: FUNCTION "pgp_sym_decrypt"("bytea", "text"); Type: ACL; Schema: extensions; Owner: postgres
2301 | --
2302 |
2303 | GRANT ALL ON FUNCTION "extensions"."pgp_sym_decrypt"("bytea", "text") TO "dashboard_user";
2304 |
2305 |
2306 | --
2307 | -- Name: FUNCTION "pgp_sym_decrypt"("bytea", "text", "text"); Type: ACL; Schema: extensions; Owner: postgres
2308 | --
2309 |
2310 | GRANT ALL ON FUNCTION "extensions"."pgp_sym_decrypt"("bytea", "text", "text") TO "dashboard_user";
2311 |
2312 |
2313 | --
2314 | -- Name: FUNCTION "pgp_sym_decrypt_bytea"("bytea", "text"); Type: ACL; Schema: extensions; Owner: postgres
2315 | --
2316 |
2317 | GRANT ALL ON FUNCTION "extensions"."pgp_sym_decrypt_bytea"("bytea", "text") TO "dashboard_user";
2318 |
2319 |
2320 | --
2321 | -- Name: FUNCTION "pgp_sym_decrypt_bytea"("bytea", "text", "text"); Type: ACL; Schema: extensions; Owner: postgres
2322 | --
2323 |
2324 | GRANT ALL ON FUNCTION "extensions"."pgp_sym_decrypt_bytea"("bytea", "text", "text") TO "dashboard_user";
2325 |
2326 |
2327 | --
2328 | -- Name: FUNCTION "pgp_sym_encrypt"("text", "text"); Type: ACL; Schema: extensions; Owner: postgres
2329 | --
2330 |
2331 | GRANT ALL ON FUNCTION "extensions"."pgp_sym_encrypt"("text", "text") TO "dashboard_user";
2332 |
2333 |
2334 | --
2335 | -- Name: FUNCTION "pgp_sym_encrypt"("text", "text", "text"); Type: ACL; Schema: extensions; Owner: postgres
2336 | --
2337 |
2338 | GRANT ALL ON FUNCTION "extensions"."pgp_sym_encrypt"("text", "text", "text") TO "dashboard_user";
2339 |
2340 |
2341 | --
2342 | -- Name: FUNCTION "pgp_sym_encrypt_bytea"("bytea", "text"); Type: ACL; Schema: extensions; Owner: postgres
2343 | --
2344 |
2345 | GRANT ALL ON FUNCTION "extensions"."pgp_sym_encrypt_bytea"("bytea", "text") TO "dashboard_user";
2346 |
2347 |
2348 | --
2349 | -- Name: FUNCTION "pgp_sym_encrypt_bytea"("bytea", "text", "text"); Type: ACL; Schema: extensions; Owner: postgres
2350 | --
2351 |
2352 | GRANT ALL ON FUNCTION "extensions"."pgp_sym_encrypt_bytea"("bytea", "text", "text") TO "dashboard_user";
2353 |
2354 |
2355 | --
2356 | -- Name: FUNCTION "sign"("payload" "json", "secret" "text", "algorithm" "text"); Type: ACL; Schema: extensions; Owner: postgres
2357 | --
2358 |
2359 | GRANT ALL ON FUNCTION "extensions"."sign"("payload" "json", "secret" "text", "algorithm" "text") TO "dashboard_user";
2360 |
2361 |
2362 | --
2363 | -- Name: FUNCTION "try_cast_double"("inp" "text"); Type: ACL; Schema: extensions; Owner: postgres
2364 | --
2365 |
2366 | GRANT ALL ON FUNCTION "extensions"."try_cast_double"("inp" "text") TO "dashboard_user";
2367 |
2368 |
2369 | --
2370 | -- Name: FUNCTION "url_decode"("data" "text"); Type: ACL; Schema: extensions; Owner: postgres
2371 | --
2372 |
2373 | GRANT ALL ON FUNCTION "extensions"."url_decode"("data" "text") TO "dashboard_user";
2374 |
2375 |
2376 | --
2377 | -- Name: FUNCTION "url_encode"("data" "bytea"); Type: ACL; Schema: extensions; Owner: postgres
2378 | --
2379 |
2380 | GRANT ALL ON FUNCTION "extensions"."url_encode"("data" "bytea") TO "dashboard_user";
2381 |
2382 |
2383 | --
2384 | -- Name: FUNCTION "uuid_generate_v1"(); Type: ACL; Schema: extensions; Owner: postgres
2385 | --
2386 |
2387 | GRANT ALL ON FUNCTION "extensions"."uuid_generate_v1"() TO "dashboard_user";
2388 |
2389 |
2390 | --
2391 | -- Name: FUNCTION "uuid_generate_v1mc"(); Type: ACL; Schema: extensions; Owner: postgres
2392 | --
2393 |
2394 | GRANT ALL ON FUNCTION "extensions"."uuid_generate_v1mc"() TO "dashboard_user";
2395 |
2396 |
2397 | --
2398 | -- Name: FUNCTION "uuid_generate_v3"("namespace" "uuid", "name" "text"); Type: ACL; Schema: extensions; Owner: postgres
2399 | --
2400 |
2401 | GRANT ALL ON FUNCTION "extensions"."uuid_generate_v3"("namespace" "uuid", "name" "text") TO "dashboard_user";
2402 |
2403 |
2404 | --
2405 | -- Name: FUNCTION "uuid_generate_v4"(); Type: ACL; Schema: extensions; Owner: postgres
2406 | --
2407 |
2408 | GRANT ALL ON FUNCTION "extensions"."uuid_generate_v4"() TO "dashboard_user";
2409 |
2410 |
2411 | --
2412 | -- Name: FUNCTION "uuid_generate_v5"("namespace" "uuid", "name" "text"); Type: ACL; Schema: extensions; Owner: postgres
2413 | --
2414 |
2415 | GRANT ALL ON FUNCTION "extensions"."uuid_generate_v5"("namespace" "uuid", "name" "text") TO "dashboard_user";
2416 |
2417 |
2418 | --
2419 | -- Name: FUNCTION "uuid_nil"(); Type: ACL; Schema: extensions; Owner: postgres
2420 | --
2421 |
2422 | GRANT ALL ON FUNCTION "extensions"."uuid_nil"() TO "dashboard_user";
2423 |
2424 |
2425 | --
2426 | -- Name: FUNCTION "uuid_ns_dns"(); Type: ACL; Schema: extensions; Owner: postgres
2427 | --
2428 |
2429 | GRANT ALL ON FUNCTION "extensions"."uuid_ns_dns"() TO "dashboard_user";
2430 |
2431 |
2432 | --
2433 | -- Name: FUNCTION "uuid_ns_oid"(); Type: ACL; Schema: extensions; Owner: postgres
2434 | --
2435 |
2436 | GRANT ALL ON FUNCTION "extensions"."uuid_ns_oid"() TO "dashboard_user";
2437 |
2438 |
2439 | --
2440 | -- Name: FUNCTION "uuid_ns_url"(); Type: ACL; Schema: extensions; Owner: postgres
2441 | --
2442 |
2443 | GRANT ALL ON FUNCTION "extensions"."uuid_ns_url"() TO "dashboard_user";
2444 |
2445 |
2446 | --
2447 | -- Name: FUNCTION "uuid_ns_x500"(); Type: ACL; Schema: extensions; Owner: postgres
2448 | --
2449 |
2450 | GRANT ALL ON FUNCTION "extensions"."uuid_ns_x500"() TO "dashboard_user";
2451 |
2452 |
2453 | --
2454 | -- Name: FUNCTION "verify"("token" "text", "secret" "text", "algorithm" "text"); Type: ACL; Schema: extensions; Owner: postgres
2455 | --
2456 |
2457 | GRANT ALL ON FUNCTION "extensions"."verify"("token" "text", "secret" "text", "algorithm" "text") TO "dashboard_user";
2458 |
2459 |
2460 | --
2461 | -- Name: FUNCTION "comment_directive"("comment_" "text"); Type: ACL; Schema: graphql; Owner: postgres
2462 | --
2463 |
2464 | GRANT ALL ON FUNCTION "graphql"."comment_directive"("comment_" "text") TO "anon";
2465 | GRANT ALL ON FUNCTION "graphql"."comment_directive"("comment_" "text") TO "authenticated";
2466 | GRANT ALL ON FUNCTION "graphql"."comment_directive"("comment_" "text") TO "service_role";
2467 |
2468 |
2469 | --
2470 | -- Name: FUNCTION "exception"("message" "text"); Type: ACL; Schema: graphql; Owner: postgres
2471 | --
2472 |
2473 | GRANT ALL ON FUNCTION "graphql"."exception"("message" "text") TO "anon";
2474 | GRANT ALL ON FUNCTION "graphql"."exception"("message" "text") TO "authenticated";
2475 | GRANT ALL ON FUNCTION "graphql"."exception"("message" "text") TO "service_role";
2476 |
2477 |
2478 | --
2479 | -- Name: FUNCTION "get_schema_version"(); Type: ACL; Schema: graphql; Owner: postgres
2480 | --
2481 |
2482 | GRANT ALL ON FUNCTION "graphql"."get_schema_version"() TO "anon";
2483 | GRANT ALL ON FUNCTION "graphql"."get_schema_version"() TO "authenticated";
2484 | GRANT ALL ON FUNCTION "graphql"."get_schema_version"() TO "service_role";
2485 |
2486 |
2487 | --
2488 | -- Name: FUNCTION "increment_schema_version"(); Type: ACL; Schema: graphql; Owner: postgres
2489 | --
2490 |
2491 | GRANT ALL ON FUNCTION "graphql"."increment_schema_version"() TO "anon";
2492 | GRANT ALL ON FUNCTION "graphql"."increment_schema_version"() TO "authenticated";
2493 | GRANT ALL ON FUNCTION "graphql"."increment_schema_version"() TO "service_role";
2494 |
2495 |
2496 | --
2497 | -- Name: FUNCTION "sort_board"("board_id" bigint, "list_ids" bigint[]); Type: ACL; Schema: public; Owner: postgres
2498 | --
2499 |
2500 | GRANT ALL ON FUNCTION "public"."sort_board"("board_id" bigint, "list_ids" bigint[]) TO "anon";
2501 | GRANT ALL ON FUNCTION "public"."sort_board"("board_id" bigint, "list_ids" bigint[]) TO "authenticated";
2502 | GRANT ALL ON FUNCTION "public"."sort_board"("board_id" bigint, "list_ids" bigint[]) TO "service_role";
2503 |
2504 |
2505 | --
2506 | -- Name: FUNCTION "sort_list"("new_list_id" bigint, "card_ids" bigint[]); Type: ACL; Schema: public; Owner: postgres
2507 | --
2508 |
2509 | GRANT ALL ON FUNCTION "public"."sort_list"("new_list_id" bigint, "card_ids" bigint[]) TO "anon";
2510 | GRANT ALL ON FUNCTION "public"."sort_list"("new_list_id" bigint, "card_ids" bigint[]) TO "authenticated";
2511 | GRANT ALL ON FUNCTION "public"."sort_list"("new_list_id" bigint, "card_ids" bigint[]) TO "service_role";
2512 |
2513 |
2514 | --
2515 | -- Name: FUNCTION "extension"("name" "text"); Type: ACL; Schema: storage; Owner: supabase_storage_admin
2516 | --
2517 |
2518 | GRANT ALL ON FUNCTION "storage"."extension"("name" "text") TO "anon";
2519 | GRANT ALL ON FUNCTION "storage"."extension"("name" "text") TO "authenticated";
2520 | GRANT ALL ON FUNCTION "storage"."extension"("name" "text") TO "service_role";
2521 | GRANT ALL ON FUNCTION "storage"."extension"("name" "text") TO "dashboard_user";
2522 | GRANT ALL ON FUNCTION "storage"."extension"("name" "text") TO "postgres";
2523 |
2524 |
2525 | --
2526 | -- Name: FUNCTION "filename"("name" "text"); Type: ACL; Schema: storage; Owner: supabase_storage_admin
2527 | --
2528 |
2529 | GRANT ALL ON FUNCTION "storage"."filename"("name" "text") TO "anon";
2530 | GRANT ALL ON FUNCTION "storage"."filename"("name" "text") TO "authenticated";
2531 | GRANT ALL ON FUNCTION "storage"."filename"("name" "text") TO "service_role";
2532 | GRANT ALL ON FUNCTION "storage"."filename"("name" "text") TO "dashboard_user";
2533 | GRANT ALL ON FUNCTION "storage"."filename"("name" "text") TO "postgres";
2534 |
2535 |
2536 | --
2537 | -- Name: FUNCTION "foldername"("name" "text"); Type: ACL; Schema: storage; Owner: supabase_storage_admin
2538 | --
2539 |
2540 | GRANT ALL ON FUNCTION "storage"."foldername"("name" "text") TO "anon";
2541 | GRANT ALL ON FUNCTION "storage"."foldername"("name" "text") TO "authenticated";
2542 | GRANT ALL ON FUNCTION "storage"."foldername"("name" "text") TO "service_role";
2543 | GRANT ALL ON FUNCTION "storage"."foldername"("name" "text") TO "dashboard_user";
2544 | GRANT ALL ON FUNCTION "storage"."foldername"("name" "text") TO "postgres";
2545 |
2546 |
2547 | --
2548 | -- Name: TABLE "audit_log_entries"; Type: ACL; Schema: auth; Owner: supabase_auth_admin
2549 | --
2550 |
2551 | GRANT ALL ON TABLE "auth"."audit_log_entries" TO "dashboard_user";
2552 | GRANT ALL ON TABLE "auth"."audit_log_entries" TO "postgres";
2553 |
2554 |
2555 | --
2556 | -- Name: TABLE "identities"; Type: ACL; Schema: auth; Owner: supabase_auth_admin
2557 | --
2558 |
2559 | GRANT ALL ON TABLE "auth"."identities" TO "postgres";
2560 | GRANT ALL ON TABLE "auth"."identities" TO "dashboard_user";
2561 |
2562 |
2563 | --
2564 | -- Name: TABLE "instances"; Type: ACL; Schema: auth; Owner: supabase_auth_admin
2565 | --
2566 |
2567 | GRANT ALL ON TABLE "auth"."instances" TO "dashboard_user";
2568 | GRANT ALL ON TABLE "auth"."instances" TO "postgres";
2569 |
2570 |
2571 | --
2572 | -- Name: TABLE "mfa_amr_claims"; Type: ACL; Schema: auth; Owner: supabase_auth_admin
2573 | --
2574 |
2575 | GRANT ALL ON TABLE "auth"."mfa_amr_claims" TO "postgres";
2576 | GRANT ALL ON TABLE "auth"."mfa_amr_claims" TO "dashboard_user";
2577 |
2578 |
2579 | --
2580 | -- Name: TABLE "mfa_challenges"; Type: ACL; Schema: auth; Owner: supabase_auth_admin
2581 | --
2582 |
2583 | GRANT ALL ON TABLE "auth"."mfa_challenges" TO "postgres";
2584 | GRANT ALL ON TABLE "auth"."mfa_challenges" TO "dashboard_user";
2585 |
2586 |
2587 | --
2588 | -- Name: TABLE "mfa_factors"; Type: ACL; Schema: auth; Owner: supabase_auth_admin
2589 | --
2590 |
2591 | GRANT ALL ON TABLE "auth"."mfa_factors" TO "postgres";
2592 | GRANT ALL ON TABLE "auth"."mfa_factors" TO "dashboard_user";
2593 |
2594 |
2595 | --
2596 | -- Name: TABLE "refresh_tokens"; Type: ACL; Schema: auth; Owner: supabase_auth_admin
2597 | --
2598 |
2599 | GRANT ALL ON TABLE "auth"."refresh_tokens" TO "dashboard_user";
2600 | GRANT ALL ON TABLE "auth"."refresh_tokens" TO "postgres";
2601 |
2602 |
2603 | --
2604 | -- Name: SEQUENCE "refresh_tokens_id_seq"; Type: ACL; Schema: auth; Owner: supabase_auth_admin
2605 | --
2606 |
2607 | GRANT ALL ON SEQUENCE "auth"."refresh_tokens_id_seq" TO "dashboard_user";
2608 | GRANT ALL ON SEQUENCE "auth"."refresh_tokens_id_seq" TO "postgres";
2609 |
2610 |
2611 | --
2612 | -- Name: TABLE "saml_providers"; Type: ACL; Schema: auth; Owner: supabase_auth_admin
2613 | --
2614 |
2615 | GRANT ALL ON TABLE "auth"."saml_providers" TO "postgres";
2616 | GRANT ALL ON TABLE "auth"."saml_providers" TO "dashboard_user";
2617 |
2618 |
2619 | --
2620 | -- Name: TABLE "saml_relay_states"; Type: ACL; Schema: auth; Owner: supabase_auth_admin
2621 | --
2622 |
2623 | GRANT ALL ON TABLE "auth"."saml_relay_states" TO "postgres";
2624 | GRANT ALL ON TABLE "auth"."saml_relay_states" TO "dashboard_user";
2625 |
2626 |
2627 | --
2628 | -- Name: TABLE "schema_migrations"; Type: ACL; Schema: auth; Owner: supabase_auth_admin
2629 | --
2630 |
2631 | GRANT ALL ON TABLE "auth"."schema_migrations" TO "dashboard_user";
2632 | GRANT ALL ON TABLE "auth"."schema_migrations" TO "postgres";
2633 |
2634 |
2635 | --
2636 | -- Name: TABLE "sessions"; Type: ACL; Schema: auth; Owner: supabase_auth_admin
2637 | --
2638 |
2639 | GRANT ALL ON TABLE "auth"."sessions" TO "postgres";
2640 | GRANT ALL ON TABLE "auth"."sessions" TO "dashboard_user";
2641 |
2642 |
2643 | --
2644 | -- Name: TABLE "sso_domains"; Type: ACL; Schema: auth; Owner: supabase_auth_admin
2645 | --
2646 |
2647 | GRANT ALL ON TABLE "auth"."sso_domains" TO "postgres";
2648 | GRANT ALL ON TABLE "auth"."sso_domains" TO "dashboard_user";
2649 |
2650 |
2651 | --
2652 | -- Name: TABLE "sso_providers"; Type: ACL; Schema: auth; Owner: supabase_auth_admin
2653 | --
2654 |
2655 | GRANT ALL ON TABLE "auth"."sso_providers" TO "postgres";
2656 | GRANT ALL ON TABLE "auth"."sso_providers" TO "dashboard_user";
2657 |
2658 |
2659 | --
2660 | -- Name: TABLE "sso_sessions"; Type: ACL; Schema: auth; Owner: supabase_auth_admin
2661 | --
2662 |
2663 | GRANT ALL ON TABLE "auth"."sso_sessions" TO "postgres";
2664 | GRANT ALL ON TABLE "auth"."sso_sessions" TO "dashboard_user";
2665 |
2666 |
2667 | --
2668 | -- Name: TABLE "users"; Type: ACL; Schema: auth; Owner: supabase_auth_admin
2669 | --
2670 |
2671 | GRANT ALL ON TABLE "auth"."users" TO "dashboard_user";
2672 | GRANT ALL ON TABLE "auth"."users" TO "postgres";
2673 |
2674 |
2675 | --
2676 | -- Name: TABLE "pg_stat_statements"; Type: ACL; Schema: extensions; Owner: postgres
2677 | --
2678 |
2679 | GRANT ALL ON TABLE "extensions"."pg_stat_statements" TO "dashboard_user";
2680 |
2681 |
2682 | --
2683 | -- Name: TABLE "pg_stat_statements_info"; Type: ACL; Schema: extensions; Owner: postgres
2684 | --
2685 |
2686 | GRANT ALL ON TABLE "extensions"."pg_stat_statements_info" TO "dashboard_user";
2687 |
2688 |
2689 | --
2690 | -- Name: SEQUENCE "seq_schema_version"; Type: ACL; Schema: graphql; Owner: postgres
2691 | --
2692 |
2693 | GRANT ALL ON SEQUENCE "graphql"."seq_schema_version" TO "anon";
2694 | GRANT ALL ON SEQUENCE "graphql"."seq_schema_version" TO "authenticated";
2695 | GRANT ALL ON SEQUENCE "graphql"."seq_schema_version" TO "service_role";
2696 |
2697 |
2698 | --
2699 | -- Name: TABLE "decrypted_key"; Type: ACL; Schema: pgsodium; Owner: postgres
2700 | --
2701 |
2702 | GRANT ALL ON TABLE "pgsodium"."decrypted_key" TO "pgsodium_keyholder";
2703 |
2704 |
2705 | --
2706 | -- Name: TABLE "masking_rule"; Type: ACL; Schema: pgsodium; Owner: postgres
2707 | --
2708 |
2709 | GRANT ALL ON TABLE "pgsodium"."masking_rule" TO "pgsodium_keyholder";
2710 |
2711 |
2712 | --
2713 | -- Name: TABLE "mask_columns"; Type: ACL; Schema: pgsodium; Owner: postgres
2714 | --
2715 |
2716 | GRANT ALL ON TABLE "pgsodium"."mask_columns" TO "pgsodium_keyholder";
2717 |
2718 |
2719 | --
2720 | -- Name: TABLE "boards"; Type: ACL; Schema: public; Owner: postgres
2721 | --
2722 |
2723 | GRANT ALL ON TABLE "public"."boards" TO "anon";
2724 | GRANT ALL ON TABLE "public"."boards" TO "authenticated";
2725 | GRANT ALL ON TABLE "public"."boards" TO "service_role";
2726 |
2727 |
2728 | --
2729 | -- Name: SEQUENCE "boards_id_seq"; Type: ACL; Schema: public; Owner: postgres
2730 | --
2731 |
2732 | GRANT ALL ON SEQUENCE "public"."boards_id_seq" TO "anon";
2733 | GRANT ALL ON SEQUENCE "public"."boards_id_seq" TO "authenticated";
2734 | GRANT ALL ON SEQUENCE "public"."boards_id_seq" TO "service_role";
2735 |
2736 |
2737 | --
2738 | -- Name: TABLE "cards"; Type: ACL; Schema: public; Owner: postgres
2739 | --
2740 |
2741 | GRANT ALL ON TABLE "public"."cards" TO "anon";
2742 | GRANT ALL ON TABLE "public"."cards" TO "authenticated";
2743 | GRANT ALL ON TABLE "public"."cards" TO "service_role";
2744 |
2745 |
2746 | --
2747 | -- Name: SEQUENCE "cards_id_seq"; Type: ACL; Schema: public; Owner: postgres
2748 | --
2749 |
2750 | GRANT ALL ON SEQUENCE "public"."cards_id_seq" TO "anon";
2751 | GRANT ALL ON SEQUENCE "public"."cards_id_seq" TO "authenticated";
2752 | GRANT ALL ON SEQUENCE "public"."cards_id_seq" TO "service_role";
2753 |
2754 |
2755 | --
2756 | -- Name: TABLE "lists"; Type: ACL; Schema: public; Owner: postgres
2757 | --
2758 |
2759 | GRANT ALL ON TABLE "public"."lists" TO "anon";
2760 | GRANT ALL ON TABLE "public"."lists" TO "authenticated";
2761 | GRANT ALL ON TABLE "public"."lists" TO "service_role";
2762 |
2763 |
2764 | --
2765 | -- Name: SEQUENCE "lists_id_seq"; Type: ACL; Schema: public; Owner: postgres
2766 | --
2767 |
2768 | GRANT ALL ON SEQUENCE "public"."lists_id_seq" TO "anon";
2769 | GRANT ALL ON SEQUENCE "public"."lists_id_seq" TO "authenticated";
2770 | GRANT ALL ON SEQUENCE "public"."lists_id_seq" TO "service_role";
2771 |
2772 |
2773 | --
2774 | -- Name: TABLE "buckets"; Type: ACL; Schema: storage; Owner: supabase_storage_admin
2775 | --
2776 |
2777 | GRANT ALL ON TABLE "storage"."buckets" TO "anon";
2778 | GRANT ALL ON TABLE "storage"."buckets" TO "authenticated";
2779 | GRANT ALL ON TABLE "storage"."buckets" TO "service_role";
2780 | GRANT ALL ON TABLE "storage"."buckets" TO "postgres";
2781 |
2782 |
2783 | --
2784 | -- Name: TABLE "migrations"; Type: ACL; Schema: storage; Owner: supabase_storage_admin
2785 | --
2786 |
2787 | GRANT ALL ON TABLE "storage"."migrations" TO "anon";
2788 | GRANT ALL ON TABLE "storage"."migrations" TO "authenticated";
2789 | GRANT ALL ON TABLE "storage"."migrations" TO "service_role";
2790 | GRANT ALL ON TABLE "storage"."migrations" TO "postgres";
2791 |
2792 |
2793 | --
2794 | -- Name: TABLE "objects"; Type: ACL; Schema: storage; Owner: supabase_storage_admin
2795 | --
2796 |
2797 | GRANT ALL ON TABLE "storage"."objects" TO "anon";
2798 | GRANT ALL ON TABLE "storage"."objects" TO "authenticated";
2799 | GRANT ALL ON TABLE "storage"."objects" TO "service_role";
2800 | GRANT ALL ON TABLE "storage"."objects" TO "postgres";
2801 |
2802 |
2803 | --
2804 | -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: auth; Owner: supabase_auth_admin
2805 | --
2806 |
2807 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_auth_admin" IN SCHEMA "auth" GRANT ALL ON SEQUENCES TO "postgres";
2808 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_auth_admin" IN SCHEMA "auth" GRANT ALL ON SEQUENCES TO "dashboard_user";
2809 |
2810 |
2811 | --
2812 | -- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: auth; Owner: supabase_auth_admin
2813 | --
2814 |
2815 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_auth_admin" IN SCHEMA "auth" GRANT ALL ON FUNCTIONS TO "postgres";
2816 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_auth_admin" IN SCHEMA "auth" GRANT ALL ON FUNCTIONS TO "dashboard_user";
2817 |
2818 |
2819 | --
2820 | -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: auth; Owner: supabase_auth_admin
2821 | --
2822 |
2823 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_auth_admin" IN SCHEMA "auth" GRANT ALL ON TABLES TO "postgres";
2824 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_auth_admin" IN SCHEMA "auth" GRANT ALL ON TABLES TO "dashboard_user";
2825 |
2826 |
2827 | --
2828 | -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: graphql; Owner: supabase_admin
2829 | --
2830 |
2831 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql" GRANT ALL ON SEQUENCES TO "postgres";
2832 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql" GRANT ALL ON SEQUENCES TO "anon";
2833 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql" GRANT ALL ON SEQUENCES TO "authenticated";
2834 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql" GRANT ALL ON SEQUENCES TO "service_role";
2835 |
2836 |
2837 | --
2838 | -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: graphql; Owner: postgres
2839 | --
2840 |
2841 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "graphql" GRANT ALL ON SEQUENCES TO "postgres";
2842 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "graphql" GRANT ALL ON SEQUENCES TO "anon";
2843 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "graphql" GRANT ALL ON SEQUENCES TO "authenticated";
2844 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "graphql" GRANT ALL ON SEQUENCES TO "service_role";
2845 |
2846 |
2847 | --
2848 | -- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: graphql; Owner: supabase_admin
2849 | --
2850 |
2851 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql" GRANT ALL ON FUNCTIONS TO "postgres";
2852 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql" GRANT ALL ON FUNCTIONS TO "anon";
2853 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql" GRANT ALL ON FUNCTIONS TO "authenticated";
2854 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql" GRANT ALL ON FUNCTIONS TO "service_role";
2855 |
2856 |
2857 | --
2858 | -- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: graphql; Owner: postgres
2859 | --
2860 |
2861 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "graphql" GRANT ALL ON FUNCTIONS TO "postgres";
2862 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "graphql" GRANT ALL ON FUNCTIONS TO "anon";
2863 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "graphql" GRANT ALL ON FUNCTIONS TO "authenticated";
2864 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "graphql" GRANT ALL ON FUNCTIONS TO "service_role";
2865 |
2866 |
2867 | --
2868 | -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: graphql; Owner: supabase_admin
2869 | --
2870 |
2871 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql" GRANT ALL ON TABLES TO "postgres";
2872 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql" GRANT ALL ON TABLES TO "anon";
2873 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql" GRANT ALL ON TABLES TO "authenticated";
2874 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql" GRANT ALL ON TABLES TO "service_role";
2875 |
2876 |
2877 | --
2878 | -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: graphql; Owner: postgres
2879 | --
2880 |
2881 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "graphql" GRANT ALL ON TABLES TO "postgres";
2882 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "graphql" GRANT ALL ON TABLES TO "anon";
2883 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "graphql" GRANT ALL ON TABLES TO "authenticated";
2884 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "graphql" GRANT ALL ON TABLES TO "service_role";
2885 |
2886 |
2887 | --
2888 | -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: graphql_public; Owner: supabase_admin
2889 | --
2890 |
2891 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql_public" GRANT ALL ON SEQUENCES TO "postgres";
2892 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql_public" GRANT ALL ON SEQUENCES TO "anon";
2893 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql_public" GRANT ALL ON SEQUENCES TO "authenticated";
2894 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql_public" GRANT ALL ON SEQUENCES TO "service_role";
2895 |
2896 |
2897 | --
2898 | -- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: graphql_public; Owner: supabase_admin
2899 | --
2900 |
2901 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql_public" GRANT ALL ON FUNCTIONS TO "postgres";
2902 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql_public" GRANT ALL ON FUNCTIONS TO "anon";
2903 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql_public" GRANT ALL ON FUNCTIONS TO "authenticated";
2904 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql_public" GRANT ALL ON FUNCTIONS TO "service_role";
2905 |
2906 |
2907 | --
2908 | -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: graphql_public; Owner: supabase_admin
2909 | --
2910 |
2911 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql_public" GRANT ALL ON TABLES TO "postgres";
2912 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql_public" GRANT ALL ON TABLES TO "anon";
2913 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql_public" GRANT ALL ON TABLES TO "authenticated";
2914 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "graphql_public" GRANT ALL ON TABLES TO "service_role";
2915 |
2916 |
2917 | --
2918 | -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: public; Owner: postgres
2919 | --
2920 |
2921 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "public" GRANT ALL ON SEQUENCES TO "postgres";
2922 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "public" GRANT ALL ON SEQUENCES TO "anon";
2923 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "public" GRANT ALL ON SEQUENCES TO "authenticated";
2924 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "public" GRANT ALL ON SEQUENCES TO "service_role";
2925 |
2926 |
2927 | --
2928 | -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: public; Owner: supabase_admin
2929 | --
2930 |
2931 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "public" GRANT ALL ON SEQUENCES TO "postgres";
2932 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "public" GRANT ALL ON SEQUENCES TO "anon";
2933 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "public" GRANT ALL ON SEQUENCES TO "authenticated";
2934 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "public" GRANT ALL ON SEQUENCES TO "service_role";
2935 |
2936 |
2937 | --
2938 | -- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: public; Owner: postgres
2939 | --
2940 |
2941 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "public" GRANT ALL ON FUNCTIONS TO "postgres";
2942 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "public" GRANT ALL ON FUNCTIONS TO "anon";
2943 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "public" GRANT ALL ON FUNCTIONS TO "authenticated";
2944 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "public" GRANT ALL ON FUNCTIONS TO "service_role";
2945 |
2946 |
2947 | --
2948 | -- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: public; Owner: supabase_admin
2949 | --
2950 |
2951 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "public" GRANT ALL ON FUNCTIONS TO "postgres";
2952 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "public" GRANT ALL ON FUNCTIONS TO "anon";
2953 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "public" GRANT ALL ON FUNCTIONS TO "authenticated";
2954 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "public" GRANT ALL ON FUNCTIONS TO "service_role";
2955 |
2956 |
2957 | --
2958 | -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: public; Owner: postgres
2959 | --
2960 |
2961 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "public" GRANT ALL ON TABLES TO "postgres";
2962 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "public" GRANT ALL ON TABLES TO "anon";
2963 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "public" GRANT ALL ON TABLES TO "authenticated";
2964 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "public" GRANT ALL ON TABLES TO "service_role";
2965 |
2966 |
2967 | --
2968 | -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: public; Owner: supabase_admin
2969 | --
2970 |
2971 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "public" GRANT ALL ON TABLES TO "postgres";
2972 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "public" GRANT ALL ON TABLES TO "anon";
2973 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "public" GRANT ALL ON TABLES TO "authenticated";
2974 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "public" GRANT ALL ON TABLES TO "service_role";
2975 |
2976 |
2977 | --
2978 | -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: realtime; Owner: supabase_admin
2979 | --
2980 |
2981 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "realtime" GRANT ALL ON SEQUENCES TO "postgres";
2982 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "realtime" GRANT ALL ON SEQUENCES TO "dashboard_user";
2983 |
2984 |
2985 | --
2986 | -- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: realtime; Owner: supabase_admin
2987 | --
2988 |
2989 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "realtime" GRANT ALL ON FUNCTIONS TO "postgres";
2990 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "realtime" GRANT ALL ON FUNCTIONS TO "dashboard_user";
2991 |
2992 |
2993 | --
2994 | -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: realtime; Owner: supabase_admin
2995 | --
2996 |
2997 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "realtime" GRANT ALL ON TABLES TO "postgres";
2998 | ALTER DEFAULT PRIVILEGES FOR ROLE "supabase_admin" IN SCHEMA "realtime" GRANT ALL ON TABLES TO "dashboard_user";
2999 |
3000 |
3001 | --
3002 | -- Name: DEFAULT PRIVILEGES FOR SEQUENCES; Type: DEFAULT ACL; Schema: storage; Owner: postgres
3003 | --
3004 |
3005 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "storage" GRANT ALL ON SEQUENCES TO "postgres";
3006 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "storage" GRANT ALL ON SEQUENCES TO "anon";
3007 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "storage" GRANT ALL ON SEQUENCES TO "authenticated";
3008 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "storage" GRANT ALL ON SEQUENCES TO "service_role";
3009 |
3010 |
3011 | --
3012 | -- Name: DEFAULT PRIVILEGES FOR FUNCTIONS; Type: DEFAULT ACL; Schema: storage; Owner: postgres
3013 | --
3014 |
3015 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "storage" GRANT ALL ON FUNCTIONS TO "postgres";
3016 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "storage" GRANT ALL ON FUNCTIONS TO "anon";
3017 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "storage" GRANT ALL ON FUNCTIONS TO "authenticated";
3018 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "storage" GRANT ALL ON FUNCTIONS TO "service_role";
3019 |
3020 |
3021 | --
3022 | -- Name: DEFAULT PRIVILEGES FOR TABLES; Type: DEFAULT ACL; Schema: storage; Owner: postgres
3023 | --
3024 |
3025 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "storage" GRANT ALL ON TABLES TO "postgres";
3026 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "storage" GRANT ALL ON TABLES TO "anon";
3027 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "storage" GRANT ALL ON TABLES TO "authenticated";
3028 | ALTER DEFAULT PRIVILEGES FOR ROLE "postgres" IN SCHEMA "storage" GRANT ALL ON TABLES TO "service_role";
3029 |
3030 |
3031 | --
3032 | -- PostgreSQL database dump complete
3033 | --
3034 |
3035 | RESET ALL;
3036 |
--------------------------------------------------------------------------------
/supabase/config.toml:
--------------------------------------------------------------------------------
1 | # A string used to distinguish different Supabase projects on the same host. Defaults to the working
2 | # directory name when running `supabase init`.
3 | project_id = "svelte-kanban"
4 |
5 | [api]
6 | # Port to use for the API URL.
7 | port = 54321
8 | # Schemas to expose in your API. Tables, views and stored procedures in this schema will get API
9 | # endpoints. public and storage are always included.
10 | schemas = []
11 | # Extra schemas to add to the search_path of every request.
12 | extra_search_path = ["extensions"]
13 | # The maximum number of rows returns from a view, table, or stored procedure. Limits payload size
14 | # for accidental or malicious requests.
15 | max_rows = 1000
16 |
17 | [db]
18 | # Port to use for the local database URL.
19 | port = 54322
20 | # The database major version to use. This has to be the same as your remote database's. Run `SHOW
21 | # server_version;` on the remote database to check.
22 | major_version = 15
23 |
24 | [studio]
25 | # Port to use for Supabase Studio.
26 | port = 54323
27 |
28 | # Email testing server. Emails sent with the local dev setup are not actually sent - rather, they
29 | # are monitored, and you can view the emails that would have been sent from the web interface.
30 | [inbucket]
31 | # Port to use for the email testing server web interface.
32 | port = 54324
33 | smtp_port = 54325
34 | pop3_port = 54326
35 |
36 | [storage]
37 | # The maximum file size allowed (e.g. "5MB", "500KB").
38 | file_size_limit = "50MiB"
39 |
40 | [auth]
41 | # The base URL of your website. Used as an allow-list for redirects and for constructing URLs used
42 | # in emails.
43 | site_url = "http://localhost:5173"
44 | # A list of *exact* URLs that auth providers are permitted to redirect to post authentication.
45 | additional_redirect_urls = ["https://localhost:5173"]
46 | # How long tokens are valid for, in seconds. Defaults to 3600 (1 hour), maximum 604,800 seconds (one
47 | # week).
48 | jwt_expiry = 3600
49 | # Allow/disallow new user signups to your project.
50 | enable_signup = true
51 |
52 | [auth.email]
53 | # Allow/disallow new user signups via email to your project.
54 | enable_signup = true
55 | # If enabled, a user will be required to confirm any email change on both the old, and new email
56 | # addresses. If disabled, only the new email is required to confirm.
57 | double_confirm_changes = true
58 | # If enabled, users need to confirm their email address before signing in.
59 | enable_confirmations = false
60 |
61 | # Use an external OAuth provider. The full list of providers are: `apple`, `azure`, `bitbucket`,
62 | # `discord`, `facebook`, `github`, `gitlab`, `google`, `twitch`, `twitter`, `slack`, `spotify`.
63 | [auth.external.apple]
64 | enabled = false
65 | client_id = ""
66 | secret = ""
67 | # Overrides the default auth redirectUrl.
68 | redirect_uri = ""
69 | # Overrides the default auth provider URL. Used to support self-hosted gitlab, single-tenant Azure,
70 | # or any other third-party OIDC providers.
71 | url = ""
72 |
--------------------------------------------------------------------------------
/supabase/seed.sql:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/supabase-community/svelte-kanban/93d3c701aa8cf36472670dd88a6337140e000016/supabase/seed.sql
--------------------------------------------------------------------------------
/svelte.config.js:
--------------------------------------------------------------------------------
1 | import adapter from '@sveltejs/adapter-auto';
2 |
3 | /** @type {import('@sveltejs/kit').Config} */
4 | const config = {
5 | kit: {
6 | adapter: adapter()
7 | }
8 | };
9 |
10 | export default config;
11 |
--------------------------------------------------------------------------------
/vite.config.js:
--------------------------------------------------------------------------------
1 | import { sveltekit } from '@sveltejs/kit/vite';
2 |
3 | /** @type {import('vite').UserConfig} */
4 | const config = {
5 | plugins: [sveltekit()],
6 | test: {
7 | include: ['src/**/*.{test,spec}.{js,ts}']
8 | }
9 | };
10 |
11 | export default config;
12 |
--------------------------------------------------------------------------------