Template for adding a constraint.
Template to add a column. Make sure to change the name and type.
Update a column timestamp on every update.
Schedule PostgreSQL commands directly from the database.
Basic view template. Change according to your preference.
Basic table template. Change "table_name" to the name you prefer.
Template to create a simple function.
Template to create a function a function that return set of table.
Table with constraints example.
Table with foreign key (fk) template. Change "table_name" to the name you prefer.
Delete items in Storage using SQL
Template for dropping / removing constraint.
Template for dropping / removing function.
Template for dropping / removing row level security.
Template for dropping / removing trigger from table.
How to use full text search in PostgreSQL.
Generate YouTube-like short IDs as Postgres Primary Keys.
Update a field with incrementing value using stored procedure.
List all constraints and their tables.
List all foreign keys (FKs) and their columns.
List all the functions in (predefined/user-defined).
List all primary keys (PKs) and their columns.
List all table data size.
List all the triggers in (predefined/user-defined).
Row level security with advanced/complicated policies.
Row level security that requires table joins .
Row level security that make use of security definer functions .
Row level security for read access.
Row level security for restrict updates.
Row level security policies to implement TTL.
Row level security that verify email domains.
Template to rename any constraints you have.
Check your database version.
Starter template for the Next.js Stripe Subscriptions Starter.
Build a todo list with Row Level Security.
Template for updating a constraint.
Row level security that make use of security definer functions .
Policies can also make use of security definer functions
. This is useful in a many-to-many relationship where you want to restrict access to the linking table. Following the teams
and members
example from above, this example shows how you can use security definer function in combination with a policy to control access to the members table.
-- 1. Follow example for 'Policies with joins' above
-- 2. Enable RLS
alter table members
enable row level security
-- 3. Create security definer function
create or replace function get_teams_for_user(user_id uuid)
returns setof bigint as $$
select team_id
from members
where user_id = $1
$$ stable language sql security definer;
-- 4. Create Policy
create policy "Team members can update team members if they belong to the team."
on members
for all using (
team_id in (
select get_teams_for_user(auth.uid())
)
);