-- Migration Script: From custom users table to Supabase Auth -- ============================================================ -- IMPORTANT: Run these steps IN ORDER, one at a time! -- ============================================================ -- ============================================================ -- STEP 1: Backup the old users table (run this first!) -- ============================================================ -- Create backup of existing users table CREATE TABLE IF NOT EXISTS users_backup AS SELECT * FROM users; -- Verify backup was created SELECT COUNT(*) as backup_count FROM users_backup; -- ============================================================ -- STEP 2: Create profiles table -- ============================================================ CREATE TABLE IF NOT EXISTS profiles ( id UUID PRIMARY KEY REFERENCES auth.users(id) ON DELETE CASCADE, created_at TIMESTAMP WITH TIME ZONE DEFAULT NOW(), updated_at TIMESTAMP WITH TIME ZONE DEFAULT NOW(), account_type TEXT NOT NULL DEFAULT 'ghostwriter', display_name TEXT, onboarding_status TEXT DEFAULT 'pending', onboarding_data JSONB DEFAULT '{}'::JSONB, customer_id UUID, company_id UUID ); -- ============================================================ -- STEP 3: Drop constraints that reference the old users table -- ============================================================ -- Drop FK constraints from companies table ALTER TABLE companies DROP CONSTRAINT IF EXISTS companies_owner_user_id_fkey; -- Drop FK constraints from invitations table ALTER TABLE invitations DROP CONSTRAINT IF EXISTS invitations_invited_by_user_id_fkey; ALTER TABLE invitations DROP CONSTRAINT IF EXISTS invitations_accepted_by_user_id_fkey; -- Drop FK constraints from customers table ALTER TABLE customers DROP CONSTRAINT IF EXISTS customers_user_id_fkey; -- ============================================================ -- STEP 4: Rename old users table -- ============================================================ ALTER TABLE IF EXISTS users RENAME TO users_old; -- ============================================================ -- STEP 5: Create the users VIEW -- ============================================================ CREATE OR REPLACE VIEW users AS SELECT p.id, p.created_at, p.updated_at, au.email, NULL::TEXT as password_hash, CASE WHEN au.raw_app_meta_data->>'provider' = 'linkedin_oidc' THEN 'linkedin_oauth' ELSE 'email_password' END as auth_method, au.raw_user_meta_data->>'sub' as linkedin_sub, au.raw_user_meta_data->>'vanityName' as linkedin_vanity_name, COALESCE(au.raw_user_meta_data->>'name', au.raw_user_meta_data->>'full_name') as linkedin_name, au.raw_user_meta_data->>'picture' as linkedin_picture, p.account_type, p.display_name, p.onboarding_status, p.onboarding_data, p.customer_id, p.company_id, au.email_confirmed_at IS NOT NULL as email_verified, NULL::TEXT as email_verification_token, NULL::TIMESTAMP WITH TIME ZONE as email_verification_expires_at FROM profiles p JOIN auth.users au ON p.id = au.id; -- ============================================================ -- STEP 6: Create the trigger for new users -- ============================================================ CREATE OR REPLACE FUNCTION public.handle_new_user() RETURNS TRIGGER AS $$ BEGIN INSERT INTO public.profiles (id, account_type, onboarding_status, display_name) VALUES ( NEW.id, COALESCE(NEW.raw_user_meta_data->>'account_type', 'ghostwriter'), 'pending', NEW.raw_user_meta_data->>'display_name' ) ON CONFLICT (id) DO NOTHING; RETURN NEW; END; $$ LANGUAGE plpgsql SECURITY DEFINER; DROP TRIGGER IF EXISTS on_auth_user_created ON auth.users; CREATE TRIGGER on_auth_user_created AFTER INSERT ON auth.users FOR EACH ROW EXECUTE FUNCTION public.handle_new_user(); -- ============================================================ -- STEP 7: Re-add FK constraints pointing to auth.users -- ============================================================ -- Add FK to companies ALTER TABLE companies ADD CONSTRAINT companies_owner_user_id_fkey FOREIGN KEY (owner_user_id) REFERENCES auth.users(id) ON DELETE CASCADE; -- Add FK to invitations ALTER TABLE invitations ADD CONSTRAINT invitations_invited_by_user_id_fkey FOREIGN KEY (invited_by_user_id) REFERENCES auth.users(id) ON DELETE CASCADE; ALTER TABLE invitations ADD CONSTRAINT invitations_accepted_by_user_id_fkey FOREIGN KEY (accepted_by_user_id) REFERENCES auth.users(id) ON DELETE SET NULL; -- Add FK to customers ALTER TABLE customers ADD CONSTRAINT customers_user_id_fkey FOREIGN KEY (user_id) REFERENCES auth.users(id) ON DELETE SET NULL; -- Add FK from profiles to companies ALTER TABLE profiles ADD CONSTRAINT fk_profiles_company FOREIGN KEY (company_id) REFERENCES companies(id) ON DELETE SET NULL; -- Add FK from profiles to customers ALTER TABLE profiles ADD CONSTRAINT fk_profiles_customer FOREIGN KEY (customer_id) REFERENCES customers(id) ON DELETE SET NULL; -- ============================================================ -- STEP 8: Create indexes on profiles -- ============================================================ CREATE INDEX IF NOT EXISTS idx_profiles_account_type ON profiles(account_type); CREATE INDEX IF NOT EXISTS idx_profiles_onboarding_status ON profiles(onboarding_status); CREATE INDEX IF NOT EXISTS idx_profiles_customer_id ON profiles(customer_id); CREATE INDEX IF NOT EXISTS idx_profiles_company_id ON profiles(company_id); -- ============================================================ -- STEP 9: Create updated_at trigger for profiles -- ============================================================ -- Make sure the function exists CREATE OR REPLACE FUNCTION update_updated_at_column() RETURNS TRIGGER AS $$ BEGIN NEW.updated_at = NOW(); RETURN NEW; END; $$ LANGUAGE plpgsql; DROP TRIGGER IF EXISTS update_profiles_updated_at ON profiles; CREATE TRIGGER update_profiles_updated_at BEFORE UPDATE ON profiles FOR EACH ROW EXECUTE FUNCTION update_updated_at_column(); -- ============================================================ -- STEP 10: Enable RLS on profiles -- ============================================================ ALTER TABLE profiles ENABLE ROW LEVEL SECURITY; -- Drop existing policies if they exist DROP POLICY IF EXISTS "Users can view own profile" ON profiles; DROP POLICY IF EXISTS "Users can update own profile" ON profiles; DROP POLICY IF EXISTS "Service role has full access to profiles" ON profiles; -- Profiles: Users can read/update their own profile CREATE POLICY "Users can view own profile" ON profiles FOR SELECT USING (auth.uid() = id); CREATE POLICY "Users can update own profile" ON profiles FOR UPDATE USING (auth.uid() = id); -- Service role can do everything (for admin operations) CREATE POLICY "Service role has full access to profiles" ON profiles FOR ALL USING (true); -- ============================================================ -- DONE! -- -- The old users table has been renamed to 'users_old'. -- A backup was created as 'users_backup'. -- -- New users will be created via Supabase Auth and will -- automatically get a profile via the trigger. -- -- To clean up later (after verifying everything works): -- DROP TABLE IF EXISTS users_old; -- DROP TABLE IF EXISTS users_backup; -- ============================================================ -- Verify the migration SELECT 'Migration complete!' as status; SELECT COUNT(*) as profiles_count FROM profiles; SELECT COUNT(*) as auth_users_count FROM auth.users;