JavaScript Client Library
@supabase/supabase-jsView on GitHubThis reference documents every object and method available in Supabase's isomorphic JavaScript library, supabase-js. You can use supabase-js to interact with your Postgres database, listen to database changes, invoke Deno Edge Functions, build login and user management functionality, and manage large files.
To convert SQL queries to supabase-js calls, use the SQL to REST API translator.
Installing
Install as package
You can install @supabase/supabase-js via the terminal.
1npm install @supabase/supabase-jsInstall via CDN
You can install @supabase/supabase-js via CDN links.
1<script src="https://cdn.jsdelivr.net/npm/@supabase/supabase-js@2"></script>2//or3<script src="https://unpkg.com/@supabase/supabase-js@2"></script>Use at runtime in Deno
You can use supabase-js in the Deno runtime via JSR:
1import { createClient } from 'npm:@supabase/supabase-js@2'Initializing
Create a new client for use in the browser.
Parameters
- supabaseUrlstring
The unique Supabase URL which is supplied when you create a new project in your project dashboard.
- supabaseKeystring
The unique Supabase Key which is supplied when you create a new project in your project dashboard.
- optionsOptionalSupabaseClientOptions
1import { createClient } from '@supabase/supabase-js'23// Create a single supabase client for interacting with your database4const supabase = createClient('https://xyzcompany.supabase.co', 'publishable-or-anon-key')TypeScript support
supabase-js has TypeScript support for type inference, autocompletion, type-safe queries, and more.
With TypeScript, supabase-js detects things like not null constraints and generated columns. Nullable columns are typed as T | null when you select the column. Generated columns will show a type error when you insert to it.
supabase-js also detects relationships between tables. A referenced table with one-to-many relationship is typed as T[]. Likewise, a referenced table with many-to-one relationship is typed as T | null.
Generating TypeScript Types
You can use the Supabase CLI to generate the types. You can also generate the types from the dashboard.
1supabase gen types typescript --project-id abcdefghijklmnopqrst > database.types.tsThese types are generated from your database schema. Given a table public.movies, the generated types will look like:
1create table public.movies (2 id bigint generated always as identity primary key,3 name text not null,4 data jsonb null5);1export type Json = string | number | boolean | null | { [key: string]: Json | undefined } | Json[]23export interface Database {4 public: {5 Tables: {6 movies: {7 Row: { // the data expected from .select()8 id: number9 name: string10 data: Json | null11 }12 Insert: { // the data to be passed to .insert()13 id?: never // generated columns must not be supplied14 name: string // `not null` columns with no default must be supplied15 data?: Json | null // nullable columns can be omitted16 }17 Update: { // the data to be passed to .update()18 id?: never19 name?: string // `not null` columns are optional on .update()20 data?: Json | null21 }22 }23 }24 }25}Using TypeScript type definitions
You can supply the type definitions to supabase-js like so:
1import { createClient } from '@supabase/supabase-js'2import { Database } from './database.types'34const supabase = createClient<Database>(5 process.env.SUPABASE_URL,6 process.env.SUPABASE_ANON_KEY7)Helper types for Tables and Joins
You can use the following helper types to make the generated TypeScript types easier to use.
Sometimes the generated types are not what you expect. For example, a view's column may show up as nullable when you expect it to be not null. Using type-fest, you can override the types like so:
1export type Json = // ...23export interface Database {4 // ...5}1import { MergeDeep } from 'type-fest'2import { Database as DatabaseGenerated } from './database-generated.types'3export { Json } from './database-generated.types'45// Override the type for a specific column in a view:6export type Database = MergeDeep<7 DatabaseGenerated,8 {9 public: {10 Views: {11 movies_view: {12 Row: {13 // id is a primary key in public.movies, so it must be `not null`14 id: number15 }16 }17 }18 }19 }20>You can also override the type of an individual successful response if needed:
1// Partial type override allows you to only override some of the properties in your results2const { data } = await supabase.from('countries').select().overrideTypes<Array<{ id: string }>>()3// For a full replacement of the original return type use the `{ merge: false }` property as second argument4const { data } = await supabase5 .from('countries')6 .select()7 .overrideTypes<Array<{ id: string }>, { merge: false }>()8// Use it with `maybeSingle` or `single`9const { data } = await supabase.from('countries').select().single().overrideTypes<{ id: string }>()The generated types provide shorthands for accessing tables and enums.
1import { Database, Tables, Enums } from "./database.types.ts";23// Before 😕4let movie: Database['public']['Tables']['movies']['Row'] = // ...56// After 😍7let movie: Tables<'movies'>Response types for complex queries
supabase-js always returns a data object (for success), and an error object (for unsuccessful requests).
These helper types provide the result types from any query, including nested types for database joins.
Given the following schema with a relation between cities and countries, we can get the nested CountriesWithCities type:
1create table countries (2 "id" serial primary key,3 "name" text4);56create table cities (7 "id" serial primary key,8 "name" text,9 "country_id" int references "countries"10);1import { QueryResult, QueryData, QueryError } from '@supabase/supabase-js'23const countriesWithCitiesQuery = supabase4 .from("countries")5 .select(`6 id,7 name,8 cities (9 id,10 name11 )12 `);13type CountriesWithCities = QueryData<typeof countriesWithCitiesQuery>;1415const { data, error } = await countriesWithCitiesQuery;16if (error) throw error;17const countriesWithCities: CountriesWithCities = data;Fetch data
select(columns?, options?)Perform a SELECT query on the table or view.
- By default, Supabase projects return a maximum of 1,000 rows. This setting can be changed in your project's API settings. It's recommended that you keep it low to limit the payload size of accidental or malicious requests. You can use
range()queries to paginate through your data. select()can be combined with Filtersselect()can be combined with Modifiersapikeyis a reserved keyword if you're using the Supabase Platform and should be avoided as a column name.
Parameters
- columnsOptionalQuery
The columns to retrieve, separated by commas. Columns can be renamed when returned with
customName:columnName - optionsOptionalobject
Named parameters
1const { data, error } = await supabase2 .from('characters')3 .select()Insert data
insert(values, options?)Parameters
- valuesOne of the following options
- Option 1Row
- Option 2Array<Row>
- optionsOptionalobject
1const { error } = await supabase2 .from('countries')3 .insert({ id: 1, name: 'Mordor' })Update data
update(values, options)Perform an UPDATE on the table or view.
By default, updated rows are not returned. To return it, chain the call with .select() after filters.
update()should always be combined with Filters to target the item(s) you wish to update.
Parameters
- valuesRow
The values to update with
- optionsobject
Named parameters
1const { error } = await supabase2 .from('instruments')3 .update({ name: 'piano' })4 .eq('id', 1)Upsert data
upsert(values, options?)- Primary keys must be included in
valuesto use upsert.
Parameters
- valuesOne of the following options
- Option 1Row
- Option 2Array<Row>
- optionsOptionalobject
1const { data, error } = await supabase2 .from('instruments')3 .upsert({ id: 1, name: 'piano' })4 .select()Delete data
delete(options)Perform a DELETE on the table or view.
By default, deleted rows are not returned. To return it, chain the call with .select() after filters.
delete()should always be combined with filters to target the item(s) you wish to delete.- If you use
delete()with filters and you have RLS enabled, only rows visible throughSELECTpolicies are deleted. Note that by default no rows are visible, so you need at least oneSELECT/ALLpolicy that makes the rows visible. - When using
delete().in(), specify an array of values to target multiple rows with a single query. This is particularly useful for batch deleting entries that share common criteria, such as deleting users by their IDs. Ensure that the array you provide accurately represents all records you intend to delete to avoid unintended data removal.
Parameters
- optionsobject
Named parameters
1const response = await supabase2 .from('countries')3 .delete()4 .eq('id', 1)Call a Postgres function
rpc(fn, args, options)Perform a function call.
Parameters
- fnFnName
The function name to call
- argsArgs
The arguments to pass to the function call
- optionsobject
Named parameters
1const { data, error } = await supabase.rpc('hello_world')Using filters
Filters allow you to only return rows that match certain conditions.
Filters can be used on select(), update(), upsert(), and delete() queries.
If a Postgres function returns a table response, you can also apply filters.
1const { data, error } = await supabase2 .from('instruments')3 .select('name, section_id')4 .eq('name', 'violin') // Correct56const { data, error } = await supabase7 .from('instruments')8 .eq('name', 'violin') // Incorrect9 .select('name, section_id')Column is equal to a value
eq(column, value)Match only rows where column is equal to value.
To check if the value of column is NULL, you should use .is() instead.
Parameters
- columnColumnName
The column to filter on
- value
The value to filter with
Return Type
1const { data, error } = await supabase2 .from('characters')3 .select()4 .eq('name', 'Leia')Column is not equal to a value
neq(column, value)Match only rows where column is not equal to value.
Parameters
- columnColumnName
The column to filter on
- value
The value to filter with
Return Type
1const { data, error } = await supabase2 .from('characters')3 .select()4 .neq('name', 'Leia')Column is greater than a value
gt(column, value)Parameters
- columnOne of the following options
- Option 1ColumnName
- Option 2string
- valueOne of the following options
- Option 1Row['ColumnName']
- Option 2unknown
Return Type
1const { data, error } = await supabase2 .from('characters')3 .select()4 .gt('id', 2)Column is greater than or equal to a value
gte(column, value)Parameters
- columnOne of the following options
- Option 1ColumnName
- Option 2string
- valueOne of the following options
- Option 1Row['ColumnName']
- Option 2unknown
Return Type
1const { data, error } = await supabase2 .from('characters')3 .select()4 .gte('id', 2)Column is less than a value
lt(column, value)Parameters
- columnOne of the following options
- Option 1ColumnName
- Option 2string
- valueOne of the following options
- Option 1Row['ColumnName']
- Option 2unknown
Return Type
1const { data, error } = await supabase2 .from('characters')3 .select()4 .lt('id', 2)Column is less than or equal to a value
lte(column, value)Parameters
- columnOne of the following options
- Option 1ColumnName
- Option 2string
- valueOne of the following options
- Option 1Row['ColumnName']
- Option 2unknown
Return Type
1const { data, error } = await supabase2 .from('characters')3 .select()4 .lte('id', 2)Column matches a pattern
like(column, pattern)Parameters
- columnOne of the following options
- Option 1ColumnName
- Option 2string
- patternstring
Return Type
1const { data, error } = await supabase2 .from('characters')3 .select()4 .like('name', '%Lu%')Column matches a case-insensitive pattern
ilike(column, pattern)Parameters
- columnOne of the following options
- Option 1ColumnName
- Option 2string
- patternstring
Return Type
1const { data, error } = await supabase2 .from('characters')3 .select()4 .ilike('name', '%lu%')Column is a value
is(column, value)Parameters
- columnOne of the following options
- Option 1ColumnName
- Option 2string
- valueOne of the following options
- Option 1null
- Option 2boolean
Return Type
1const { data, error } = await supabase2 .from('countries')3 .select()4 .is('name', null)Column is in an array
in(column, values)Match only rows where column is included in the values array.
Parameters
- columnColumnName
The column to filter on
- valuesArray
The values array to filter with
Return Type
1const { data, error } = await supabase2 .from('characters')3 .select()4 .in('name', ['Leia', 'Han'])Column contains every element in a value
contains(column, value)Parameters
- columnOne of the following options
- Option 1ColumnName
- Option 2string
- valueOne of the following options
- Option 1string
- Option 2Record<string, unknown>
- Option 3Array<Row['ColumnName']>
- Option 4Array<unknown>
Return Type
1const { data, error } = await supabase2 .from('issues')3 .select()4 .contains('tags', ['is:open', 'priority:low'])Contained by value
containedBy(column, value)Parameters
- columnOne of the following options
- Option 1ColumnName
- Option 2string
- valueOne of the following options
- Option 1string
- Option 2Record<string, unknown>
- Option 3Array<Row['ColumnName']>
- Option 4Array<unknown>
Return Type
1const { data, error } = await supabase2 .from('classes')3 .select('name')4 .containedBy('days', ['monday', 'tuesday', 'wednesday', 'friday'])Greater than a range
rangeGt(column, range)Parameters
- columnOne of the following options
- Option 1ColumnName
- Option 2string
- rangestring
Return Type
1const { data, error } = await supabase2 .from('reservations')3 .select()4 .rangeGt('during', '[2000-01-02 08:00, 2000-01-02 09:00)')Greater than or equal to a range
rangeGte(column, range)Parameters
- columnOne of the following options
- Option 1ColumnName
- Option 2string
- rangestring
Return Type
1const { data, error } = await supabase2 .from('reservations')3 .select()4 .rangeGte('during', '[2000-01-02 08:30, 2000-01-02 09:30)')Less than a range
rangeLt(column, range)Parameters
- columnOne of the following options
- Option 1ColumnName
- Option 2string
- rangestring
Return Type
1const { data, error } = await supabase2 .from('reservations')3 .select()4 .rangeLt('during', '[2000-01-01 15:00, 2000-01-01 16:00)')Less than or equal to a range
rangeLte(column, range)Parameters
- columnOne of the following options
- Option 1ColumnName
- Option 2string
- rangestring
Return Type
1const { data, error } = await supabase2 .from('reservations')3 .select()4 .rangeLte('during', '[2000-01-01 14:00, 2000-01-01 16:00)')Mutually exclusive to a range
rangeAdjacent(column, range)Parameters
- columnOne of the following options
- Option 1ColumnName
- Option 2string
- rangestring
Return Type
1const { data, error } = await supabase2 .from('reservations')3 .select()4 .rangeAdjacent('during', '[2000-01-01 12:00, 2000-01-01 13:00)')With a common element
overlaps(column, value)Parameters
- columnOne of the following options
- Option 1ColumnName
- Option 2string
- valueOne of the following options
- Option 1string
- Option 2Array<Row['ColumnName']>
- Option 3Array<unknown>
Return Type
1const { data, error } = await supabase2 .from('issues')3 .select('title')4 .overlaps('tags', ['is:closed', 'severity:high'])Match a string
textSearch(column, query, options?)- For more information, see Postgres full text search.
Parameters
- columnOne of the following options
- Option 1ColumnName
- Option 2string
- querystring
- optionsOptionalobject
Return Type
1const result = await supabase2 .from("texts")3 .select("content")4 .textSearch("content", `'eggs' & 'ham'`, {5 config: "english",6 });Match an associated value
match(query)Parameters
- queryOne of the following options
- Option 1Record<ColumnName, Row['ColumnName']>
- Option 2Record<string, unknown>
Return Type
1const { data, error } = await supabase2 .from('characters')3 .select('name')4 .match({ id: 2, name: 'Leia' })Don't match the filter
not(column, operator, value)not() expects you to use the raw PostgREST syntax for the filter values.
1.not('id', 'in', '(5,6,7)') // Use `()` for `in` filter2.not('arraycol', 'cs', '{"a","b"}') // Use `cs` for `contains()`, `{}` for array valuesParameters
- columnOne of the following options
- Option 1ColumnName
- Option 2string
- operatorOne of the following options
- Option 1FilterOperator
- Option 2string
- valueOne of the following options
- Option 1Row['ColumnName']
- Option 2unknown
Return Type
1const { data, error } = await supabase2 .from('countries')3 .select()4 .not('name', 'is', null)Match at least one filter
or(filters, options)Match only rows which satisfy at least one of the filters.
Unlike most filters, filters is used as-is and needs to follow PostgREST syntax. You also need to make sure it's properly sanitized.
It's currently not possible to do an .or() filter across multiple tables.
or() expects you to use the raw PostgREST syntax for the filter names and values.
1.or('id.in.(5,6,7), arraycol.cs.{"a","b"}') // Use `()` for `in` filter, `{}` for array values and `cs` for `contains()`.2.or('id.in.(5,6,7), arraycol.cd.{"a","b"}') // Use `cd` for `containedBy()`Parameters
- filtersstring
The filters to use, following PostgREST syntax
- optionsobject
Named parameters
Return Type
1const { data, error } = await supabase2 .from('characters')3 .select('name')4 .or('id.eq.2,name.eq.Han')Match the filter
filter(column, operator, value)filter() expects you to use the raw PostgREST syntax for the filter values.
1.filter('id', 'in', '(5,6,7)') // Use `()` for `in` filter2.filter('arraycol', 'cs', '{"a","b"}') // Use `cs` for `contains()`, `{}` for array valuesParameters
- columnOne of the following options
- Option 1ColumnName
- Option 2string
- operatorOne of the following options
- Option 1FilterOperator
- Option 2"not.match"
- Option 3"not.eq"
- Option 4"not.neq"
- Option 5"not.gt"
- Option 6"not.gte"
- Option 7"not.lt"
- Option 8"not.lte"
- Option 9"not.like"
- Option 10"not.ilike"
- Option 11"not.is"
- Option 12"not.isdistinct"
- Option 13"not.in"
- Option 14"not.cs"
- Option 15"not.cd"
- Option 16"not.sl"
- Option 17"not.sr"
- Option 18"not.nxl"
- Option 19"not.nxr"
- Option 20"not.adj"
- Option 21"not.ov"
- Option 22"not.fts"
- Option 23"not.plfts"
- Option 24"not.phfts"
- Option 25"not.wfts"
- Option 26"not.imatch"
- Option 27string
- valueunknown
Return Type
1const { data, error } = await supabase2 .from('characters')3 .select()4 .filter('name', 'in', '("Han","Yoda")')Using modifiers
Filters work on the row level—they allow you to return rows that only match certain conditions without changing the shape of the rows. Modifiers are everything that don't fit that definition—allowing you to change the format of the response (e.g., returning a CSV string).
Modifiers must be specified after filters. Some modifiers only apply for queries that return rows (e.g., select() or rpc() on a function that returns a table response).
Return data after inserting
select(columns?)Perform a SELECT on the query result.
By default, .insert(), .update(), .upsert(), and .delete() do not return modified rows. By calling this method, modified rows are returned in data.
Parameters
- columnsOptionalQuery
The columns to retrieve, separated by commas
1const { data, error } = await supabase2 .from('characters')3 .upsert({ id: 1, name: 'Han Solo' })4 .select()Order the results
order(column, options?)Parameters
- columnOne of the following options
- Option 1ColumnName
- Option 2string
- optionsOptionalobject
Return Type
1const { data, error } = await supabase2 .from('characters')3 .select('id, name')4 .order('id', { ascending: false })Limit the number of rows returned
limit(count, options)Limit the query result by count.
Parameters
- countnumber
The maximum number of rows to return
- optionsobject
Named parameters
Return Type
1const { data, error } = await supabase2 .from('characters')3 .select('name')4 .limit(1)Limit the query to a range
range(from, to, options)Limit the query result by starting at an offset from and ending at the offset to. Only records within this range are returned. This respects the query order and if there is no order clause the range could behave unexpectedly. The from and to values are 0-based and inclusive: range(1, 3) will include the second, third and fourth rows of the query.
Parameters
- fromnumber
The starting index from which to limit the result
- tonumber
The last index to which to limit the result
- optionsobject
Named parameters
Return Type
1const { data, error } = await supabase2 .from('characters')3 .select('name')4 .range(0, 1)Set an abort signal
abortSignal(signal)Set the AbortSignal for the fetch request.
You can use this to set a timeout for the request.
Parameters
- signalAbortSignal
The AbortSignal to use for the fetch request
Return Type
1const ac = new AbortController()2ac.abort()3const { data, error } = await supabase4 .from('very_big_table')5 .select()6 .abortSignal(ac.signal)Retrieve one row of data
single()Return data as a single object instead of an array of objects.
Query result must be one row (e.g. using .limit(1)), otherwise this returns an error.
1const { data, error } = await supabase2 .from('characters')3 .select('name')4 .limit(1)5 .single()Retrieve zero or one row of data
maybeSingle()Return data as a single object instead of an array of objects.
Query result must be zero or one row (e.g. using .limit(1)), otherwise this returns an error.
1const { data, error } = await supabase2 .from('characters')3 .select()4 .eq('name', 'Katniss')5 .maybeSingle()Retrieve as a CSV
csv()Return data as a string in CSV format.
1const { data, error } = await supabase2 .from('characters')3 .select()4 .csv()Override type of successful response
returns()Override the type of the returned data.
- Deprecated: use overrideTypes method instead
1const { data } = await supabase2 .from('countries')3 .select()4 .returns<Array<MyType>>()Partially override or replace type of successful response
overrideTypes()Override the type of the returned data field in the response.
1const { data } = await supabase2 .from('countries')3 .select()4 .overrideTypes<Array<MyType>, { merge: false }>()Using explain
explain(options)Return data as the EXPLAIN plan for the query.
You need to enable the db_plan_enabled setting before using this method.
Parameters
- optionsobject
Named parameters
Return Type
- Option 1PostgrestBuilder
- Option 2PostgrestBuilder
1const { data, error } = await supabase2 .from('characters')3 .select()4 .explain()Overview
-
The auth methods can be accessed via the
supabase.authnamespace. -
By default, the supabase client sets
persistSessionto true and attempts to store the session in local storage. When using the supabase client in an environment that doesn't support local storage, you might notice the following warning message being logged:No storage option exists to persist the session, which may result in unexpected behavior when using auth. If you want to set
persistSessionto true, please provide a storage option or you may setpersistSessionto false to disable this warning.This warning message can be safely ignored if you're not using auth on the server-side. If you are using auth and you want to set
persistSessionto true, you will need to provide a custom storage implementation that follows this interface. -
Any email links and one-time passwords (OTPs) sent have a default expiry of 24 hours. We have the following rate limits in place to guard against brute force attacks.
-
The expiry of an access token can be set in the "JWT expiry limit" field in your project's auth settings. A refresh token never expires and can only be used once.
1import { createClient } from '@supabase/supabase-js'23const supabase = createClient(supabase_url, anon_key)Create a new user
signUp(credentials)Creates a new user.
Be aware that if a user account exists in the system you may get back an error message that attempts to hide this information from the user. This method has support for PKCE via email signups. The PKCE flow cannot be used when autoconfirm is enabled.
- By default, the user needs to verify their email address before logging in. To turn this off, disable Confirm email in your project.
- Confirm email determines if users need to confirm their email address after signing up.
- If Confirm email is enabled, a
useris returned butsessionis null. - If Confirm email is disabled, both a
userand asessionare returned.
- If Confirm email is enabled, a
- When the user confirms their email address, they are redirected to the
SITE_URLby default. You can modify yourSITE_URLor add additional redirect URLs in your project. - If signUp() is called for an existing confirmed user:
- When both Confirm email and Confirm phone (even when phone provider is disabled) are enabled in your project, an obfuscated/fake user object is returned.
- When either Confirm email or Confirm phone (even when phone provider is disabled) is disabled, the error message,
User already registeredis returned.
- To fetch the currently logged-in user, refer to
getUser().
Parameters
- credentialsSignUpWithPasswordCredentials
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase.auth.signUp({2 email: '[email protected]',3 password: 'example-password',4})Listen to auth events
onAuthStateChange(callback)Receive a notification every time an auth event happens. Safe to use without an async function as callback.
- Subscribes to important events occurring on the user's session.
- Use on the frontend/client. It is less useful on the server.
- Events are emitted across tabs to keep your application's UI up-to-date. Some events can fire very frequently, based on the number of tabs open. Use a quick and efficient callback function, and defer or debounce as many operations as you can to be performed outside of the callback.
- Important: A callback can be an
asyncfunction and it runs synchronously during the processing of the changes causing the event. You can easily create a dead-lock by usingawaiton a call to another method of the Supabase library.- Avoid using
asyncfunctions as callbacks. - Limit the number of
awaitcalls inasynccallbacks. - Do not use other Supabase functions in the callback function. If you must, dispatch the functions once the callback has finished executing. Use this as a quick way to achieve this:
1supabase.auth.onAuthStateChange((event, session) => {2setTimeout(async () => {3// await on other Supabase function here4// this runs right after the callback has finished5}, 0)6})
- Avoid using
- Emitted events:
INITIAL_SESSION- Emitted right after the Supabase client is constructed and the initial session from storage is loaded.
SIGNED_IN- Emitted each time a user session is confirmed or re-established, including on user sign in and when refocusing a tab.
- Avoid making assumptions as to when this event is fired, this may occur even when the user is already signed in. Instead, check the user object attached to the event to see if a new user has signed in and update your application's UI.
- This event can fire very frequently depending on the number of tabs open in your application.
SIGNED_OUT- Emitted when the user signs out. This can be after:
- A call to
supabase.auth.signOut(). - After the user's session has expired for any reason:
- User has signed out on another device.
- The session has reached its timebox limit or inactivity timeout.
- User has signed in on another device with single session per user enabled.
- Check the User Sessions docs for more information.
- A call to
- Use this to clean up any local storage your application has associated with the user.
- Emitted when the user signs out. This can be after:
TOKEN_REFRESHED- Emitted each time a new access and refresh token are fetched for the signed in user.
- It's best practice and highly recommended to extract the access token (JWT) and store it in memory for further use in your application.
- Avoid frequent calls to
supabase.auth.getSession()for the same purpose.
- Avoid frequent calls to
- There is a background process that keeps track of when the session should be refreshed so you will always receive valid tokens by listening to this event.
- The frequency of this event is related to the JWT expiry limit configured on your project.
USER_UPDATED- Emitted each time the
supabase.auth.updateUser()method finishes successfully. Listen to it to update your application's UI based on new profile information.
- Emitted each time the
PASSWORD_RECOVERY- Emitted instead of the
SIGNED_INevent when the user lands on a page that includes a password recovery link in the URL. - Use it to show a UI to the user where they can reset their password.
- Emitted instead of the
Parameters
- callbackfunction
A callback function to be invoked when an auth event happens.
Return Type
1const { data } = supabase.auth.onAuthStateChange((event, session) => {2 console.log(event, session)34 if (event === 'INITIAL_SESSION') {5 // handle initial session6 } else if (event === 'SIGNED_IN') {7 // handle sign in event8 } else if (event === 'SIGNED_OUT') {9 // handle sign out event10 } else if (event === 'PASSWORD_RECOVERY') {11 // handle password recovery event12 } else if (event === 'TOKEN_REFRESHED') {13 // handle token refreshed event14 } else if (event === 'USER_UPDATED') {15 // handle user updated event16 }17})1819// call unsubscribe to remove the callback20data.subscription.unsubscribe()Create an anonymous user
signInAnonymously(credentials?)Creates a new anonymous user.
- Returns an anonymous user
- It is recommended to set up captcha for anonymous sign-ins to prevent abuse. You can pass in the captcha token in the
optionsparam.
Parameters
- credentialsOptionalSignInAnonymouslyCredentials
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase.auth.signInAnonymously({2 options: {3 captchaToken4 }5});Sign in a user
signInWithPassword(credentials)Log in an existing user with an email and password or phone and password.
Be aware that you may get back an error message that will not distinguish between the cases where the account does not exist or that the email/phone and password combination is wrong or that the account can only be accessed via social login.
- Requires either an email and password or a phone number and password.
Parameters
- credentialsSignInWithPasswordCredentials
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase.auth.signInWithPassword({2 email: '[email protected]',3 password: 'example-password',4})Sign in with ID token (native sign-in)
signInWithIdToken(credentials)Allows signing in with an OIDC ID token. The authentication provider used should be enabled and configured.
- Use an ID token to sign in.
- Especially useful when implementing sign in using native platform dialogs in mobile or desktop apps using Sign in with Apple or Sign in with Google on iOS and Android.
- You can also use Google's One Tap and Automatic sign-in via this API.
Parameters
- credentialsSignInWithIdTokenCredentials
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase.auth.signInWithIdToken({2 provider: 'google',3 token: 'your-id-token'4})Sign in a user through OTP
signInWithOtp(credentials)Log in a user using magiclink or a one-time password (OTP).
If the {{ .ConfirmationURL }} variable is specified in the email template, a magiclink will be sent. If the {{ .Token }} variable is specified in the email template, an OTP will be sent. If you're using phone sign-ins, only an OTP will be sent. You won't be able to send a magiclink for phone sign-ins.
Be aware that you may get back an error message that will not distinguish between the cases where the account does not exist or, that the account can only be accessed via social login.
Do note that you will need to configure a Whatsapp sender on Twilio if you are using phone sign in with the 'whatsapp' channel. The whatsapp channel is not supported on other providers at this time. This method supports PKCE when an email is passed.
- Requires either an email or phone number.
- This method is used for passwordless sign-ins where a OTP is sent to the user's email or phone number.
- If the user doesn't exist,
signInWithOtp()will signup the user instead. To restrict this behavior, you can setshouldCreateUserinSignInWithPasswordlessCredentials.optionstofalse. - If you're using an email, you can configure whether you want the user to receive a magiclink or a OTP.
- If you're using phone, you can configure whether you want the user to receive a OTP.
- The magic link's destination URL is determined by the
SITE_URL. - See redirect URLs and wildcards to add additional redirect URLs to your project.
- Magic links and OTPs share the same implementation. To send users a one-time code instead of a magic link, modify the magic link email template to include
{{ .Token }}instead of{{ .ConfirmationURL }}. - See our Twilio Phone Auth Guide for details about configuring WhatsApp sign in.
Parameters
- credentialsOne of the following options
- Option 1object
- Option 2object
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase.auth.signInWithOtp({2 email: '[email protected]',3 options: {4 emailRedirectTo: 'https://example.com/welcome'5 }6})Sign in a user through OAuth
signInWithOAuth(credentials)Log in an existing user via a third-party provider. This method supports the PKCE flow.
- This method is used for signing in using Social Login (OAuth) providers.
- It works by redirecting your application to the provider's authorization screen, before bringing back the user to your app.
Parameters
- credentialsSignInWithOAuthCredentials
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase.auth.signInWithOAuth({2 provider: 'github'3})Sign in a user through SSO
signInWithSSO(params)Attempts a single-sign on using an enterprise Identity Provider. A successful SSO attempt will redirect the current page to the identity provider authorization page. The redirect URL is implementation and SSO protocol specific.
You can use it by providing a SSO domain. Typically you can extract this domain by asking users for their email address. If this domain is registered on the Auth instance the redirect will use that organization's currently active SSO Identity Provider for the login.
If you have built an organization-specific login page, you can use the organization's SSO Identity Provider UUID directly instead.
- Before you can call this method you need to establish a connection to an identity provider. Use the CLI commands to do this.
- If you've associated an email domain to the identity provider, you can use the
domainproperty to start a sign-in flow. - In case you need to use a different way to start the authentication flow with an identity provider, you can use the
providerIdproperty. For example:- Mapping specific user email addresses with an identity provider.
- Using different hints to identity the identity provider to be used by the user, like a company-specific page, IP address or other tracking information.
Parameters
- paramsOne of the following options
- Option 1object
- Option 2object
Return Type
- Option 1object
- Option 2object
1// You can extract the user's email domain and use it to trigger the2 // authentication flow with the correct identity provider.34 const { data, error } = await supabase.auth.signInWithSSO({5 domain: 'company.com'6 })78 if (data?.url) {9 // redirect the user to the identity provider's authentication flow10 window.location.href = data.url11 }Sign in a user through Web3 (Solana, Ethereum)
signInWithWeb3(credentials)Signs in a user by verifying a message signed by the user's private key. Supports Ethereum (via Sign-In-With-Ethereum) & Solana (Sign-In-With-Solana) standards, both of which derive from the EIP-4361 standard With slight variation on Solana's side.
- Uses a Web3 (Ethereum, Solana) wallet to sign a user in.
- Read up on the potential for abuse before using it.
Parameters
- credentialsOne of the following options
- Option 1One of the following options
- Option 1object
- Option 2object
- Option 2One of the following options
- Option 1object
- Option 2object
Return Type
- Option 1object
- Option 2object
1// uses window.ethereum for the wallet2 const { data, error } = await supabase.auth.signInWithWeb3({3 chain: 'ethereum',4 statement: 'I accept the Terms of Service at https://example.com/tos'5 })67 // uses window.solana for the wallet8 const { data, error } = await supabase.auth.signInWithWeb3({9 chain: 'solana',10 statement: 'I accept the Terms of Service at https://example.com/tos'11 })Get user claims from verified JWT
getClaims(jwt?, options)Extracts the JWT claims present in the access token by first verifying the JWT against the server's JSON Web Key Set endpoint /.well-known/jwks.json which is often cached, resulting in significantly faster responses. Prefer this method over #getUser which always sends a request to the Auth server for each JWT.
If the project is not using an asymmetric JWT signing key (like ECC or RSA) it always sends a request to the Auth server (similar to #getUser) to verify the JWT.
- Parses the user's access token as a JSON Web Token (JWT) and returns its components if valid and not expired.
- If your project is using asymmetric JWT signing keys, then the verification is done locally usually without a network request using the WebCrypto API.
- A network request is sent to your project's JWT signing key discovery endpoint
https://project-id.supabase.co/auth/v1/.well-known/jwks.json, which is cached locally. If your environment is ephemeral, such as a Lambda function that is destroyed after every request, a network request will be sent for each new invocation. Supabase provides a network-edge cache providing fast responses for these situations. - If the user's access token is about to expire when calling this function, the user's session will first be refreshed before validating the JWT.
- If your project is using a symmetric secret to sign the JWT, it always sends a request similar to
getUser()to validate the JWT at the server before returning the decoded token. This is also used if the WebCrypto API is not available in the environment. Make sure you polyfill it in such situations. - The returned claims can be customized per project using the Custom Access Token Hook.
Parameters
- jwtOptionalstring
An optional specific JWT you wish to verify, not the one you can obtain from #getSession.
- optionsobject
Various additional options that allow you to customize the behavior of this method.
Return Type
- Option 1object
- Option 2object
- Option 3object
1const { data, error } = await supabase.auth.getClaims()Sign out a user
signOut(options)Inside a browser context, signOut() will remove the logged in user from the browser session and log them out - removing all items from localstorage and then trigger a "SIGNED_OUT" event.
For server-side management, you can revoke all refresh tokens for a user by passing a user's JWT through to auth.api.signOut(JWT: string). There is no way to revoke a user's access token jwt until it expires. It is recommended to set a shorter expiry on the jwt for this reason.
If using others scope, no SIGNED_OUT event is fired!
- In order to use the
signOut()method, the user needs to be signed in first. - By default,
signOut()uses the global scope, which signs out all other sessions that the user is logged into as well. Customize this behavior by passing a scope parameter. - Since Supabase Auth uses JWTs for authentication, the access token JWT will be valid until it's expired. When the user signs out, Supabase revokes the refresh token and deletes the JWT from the client-side. This does not revoke the JWT and it will still be valid until it expires.
Parameters
- optionsSignOut
Return Type
1const { error } = await supabase.auth.signOut()Send a password reset request
resetPasswordForEmail(email, options)Sends a password reset request to an email address. This method supports the PKCE flow.
- The password reset flow consist of 2 broad steps: (i) Allow the user to login via the password reset link; (ii) Update the user's password.
- The
resetPasswordForEmail()only sends a password reset link to the user's email. To update the user's password, seeupdateUser(). - A
PASSWORD_RECOVERYevent will be emitted when the password recovery link is clicked. You can useonAuthStateChange()to listen and invoke a callback function on these events. - When the user clicks the reset link in the email they are redirected back to your application. You can configure the URL that the user is redirected to with the
redirectToparameter. See redirect URLs and wildcards to add additional redirect URLs to your project. - After the user has been redirected successfully, prompt them for a new password and call
updateUser():
1const { data, error } = await supabase.auth.updateUser({2 password: new_password3})Parameters
- emailstring
The email address of the user.
- optionsobject
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase.auth.resetPasswordForEmail(email, {2 redirectTo: 'https://example.com/update-password',3})Verify and log in through OTP
verifyOtp(params)Log in a user given a User supplied OTP or TokenHash received through mobile or email.
- The
verifyOtpmethod takes in different verification types. - If a phone number is used, the type can either be:
sms– Used when verifying a one-time password (OTP) sent via SMS during sign-up or sign-in.phone_change– Used when verifying an OTP sent to a new phone number during a phone number update process.
- If an email address is used, the type can be one of the following (note:
signupandmagiclinktypes are deprecated):email– Used when verifying an OTP sent to the user's email during sign-up or sign-in.recovery– Used when verifying an OTP sent for account recovery, typically after a password reset request.invite– Used when verifying an OTP sent as part of an invitation to join a project or organization.email_change– Used when verifying an OTP sent to a new email address during an email update process.
- The verification type used should be determined based on the corresponding auth method called before
verifyOtpto sign up / sign-in a user. - The
TokenHashis contained in the email templates and can be used to sign in. You may wish to use the hash for the PKCE flow for Server Side Auth. Read the Password-based Auth guide for more details.
Parameters
- paramsOne of the following options
- Option 1VerifyMobileOtpParams
- Option 2VerifyEmailOtpParams
- Option 3VerifyTokenHashParams
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase.auth.verifyOtp({ email, token, type: 'email'})Retrieve a session
getSession()Returns the session, refreshing it if necessary.
The session returned can be null if the session is not detected which can happen in the event a user is not signed-in or has logged out.
IMPORTANT: This method loads values directly from the storage attached to the client. If that storage is based on request cookies for example, the values in it may not be authentic and therefore it's strongly advised against using this method and its results in such circumstances. A warning will be emitted if this is detected. Use #getUser() instead.
- Since the introduction of asymmetric JWT signing keys, this method is considered low-level and we encourage you to use
getClaims()orgetUser()instead. - Retrieves the current user session from the storage medium (local storage, cookies).
- The session contains an access token (signed JWT), a refresh token and the user object.
- If the session's access token is expired or is about to expire, this method will use the refresh token to refresh the session.
- When using in a browser, or you've called
startAutoRefresh()in your environment (React Native, etc.) this function always returns a valid access token without refreshing the session itself, as this is done in the background. This function returns very fast. - IMPORTANT SECURITY NOTICE: If using an insecure storage medium, such as cookies or request headers, the user object returned by this function must not be trusted. Always verify the JWT using
getClaims()or your own JWT verification library to securely establish the user's identity and access. You can also usegetUser()to fetch the user object directly from the Auth server for this purpose. - When using in a browser, this function is synchronized across all tabs using the LockManager API. In other environments make sure you've defined a proper
lockproperty, if necessary, to make sure there are no race conditions while the session is being refreshed.
Return Type
- Option 1object
- Option 2object
- Option 3object
1const { data, error } = await supabase.auth.getSession()Retrieve a new session
refreshSession(currentSession?)Returns a new session, regardless of expiry status. Takes in an optional current session. If not passed in, then refreshSession() will attempt to retrieve it from getSession(). If the current session's refresh token is invalid, an error will be thrown.
- This method will refresh and return a new session whether the current one is expired or not.
Parameters
- currentSessionOptionalobject
The current session. If passed in, it must contain a refresh token.
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase.auth.refreshSession()2const { session, user } = dataRetrieve a user
getUser(jwt?)Gets the current user details if there is an existing session. This method performs a network request to the Supabase Auth server, so the returned value is authentic and can be used to base authorization rules on.
- This method fetches the user object from the database instead of local session.
- This method is useful for checking if the user is authorized because it validates the user's access token JWT on the server.
- Should always be used when checking for user authorization on the server. On the client, you can instead use
getSession().session.userfor faster results.getSessionis insecure on the server.
Parameters
- jwtOptionalstring
Takes in an optional access token JWT. If no JWT is provided, the JWT from the current session is used.
Return Type
- Option 1object
- Option 2object
1const { data: { user } } = await supabase.auth.getUser()Update a user
updateUser(attributes, options)Updates user data for a logged in user.
- In order to use the
updateUser()method, the user needs to be signed in first. - By default, email updates sends a confirmation link to both the user's current and new email. To only send a confirmation link to the user's new email, disable Secure email change in your project's email auth provider settings.
Parameters
- attributesUserAttributes
- optionsobject
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase.auth.updateUser({2 email: '[email protected]'3})Retrieve identities linked to a user
getUserIdentities()Gets all the identities linked to a user.
- The user needs to be signed in to call
getUserIdentities().
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase.auth.getUserIdentities()Link an identity to a user
linkIdentity(credentials)Links an oauth identity to an existing user. This method supports the PKCE flow.
- The Enable Manual Linking option must be enabled from your project's authentication settings.
- The user needs to be signed in to call
linkIdentity(). - If the candidate identity is already linked to the existing user or another user,
linkIdentity()will fail. - If
linkIdentityis run in the browser, the user is automatically redirected to the returned URL. On the server, you should handle the redirect.
Parameters
- credentialsOne of the following options
- Option 1SignInWithOAuthCredentials
- Option 2SignInWithIdTokenCredentials
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase.auth.linkIdentity({2 provider: 'github'3})Unlink an identity from a user
unlinkIdentity(identity)Unlinks an identity from a user by deleting it. The user will no longer be able to sign in with that identity once it's unlinked.
- The Enable Manual Linking option must be enabled from your project's authentication settings.
- The user needs to be signed in to call
unlinkIdentity(). - The user must have at least 2 identities in order to unlink an identity.
- The identity to be unlinked must belong to the user.
Parameters
- identityUserIdentity
Return Type
- Option 1object
- Option 2object
1// retrieve all identities linked to a user2const identities = await supabase.auth.getUserIdentities()34// find the google identity5const googleIdentity = identities.find(6 identity => identity.provider === 'google'7)89// unlink the google identity10const { error } = await supabase.auth.unlinkIdentity(googleIdentity)Send a password reauthentication nonce
reauthenticate()Sends a reauthentication OTP to the user's email or phone number. Requires the user to be signed-in.
- This method is used together with
updateUser()when a user's password needs to be updated. - If you require your user to reauthenticate before updating their password, you need to enable the Secure password change option in your project's email provider settings.
- A user is only require to reauthenticate before updating their password if Secure password change is enabled and the user hasn't recently signed in. A user is deemed recently signed in if the session was created in the last 24 hours.
- This method will send a nonce to the user's email. If the user doesn't have a confirmed email address, the method will send the nonce to the user's confirmed phone number instead.
- After receiving the OTP, include it as the
noncein yourupdateUser()call to finalize the password change.
Return Type
- Option 1object
- Option 2object
1const { error } = await supabase.auth.reauthenticate()Resend an OTP
resend(credentials)Resends an existing signup confirmation email, email change email, SMS OTP or phone change OTP.
- Resends a signup confirmation, email change or phone change email to the user.
- Passwordless sign-ins can be resent by calling the
signInWithOtp()method again. - Password recovery emails can be resent by calling the
resetPasswordForEmail()method again. - This method will only resend an email or phone OTP to the user if there was an initial signup, email change or phone change request being made(note: For existing users signing in with OTP, you should use
signInWithOtp()again to resend the OTP). - You can specify a redirect url when you resend an email link using the
emailRedirectTooption.
Parameters
- credentialsOne of the following options
- Option 1object
- Option 2object
Return Type
- Option 1object
- Option 2object
1const { error } = await supabase.auth.resend({2 type: 'signup',3 email: '[email protected]',4 options: {5 emailRedirectTo: 'https://example.com/welcome'6 }7})Set the session data
setSession(currentSession)Sets the session data from the current session. If the current session is expired, setSession will take care of refreshing it to obtain a new session. If the refresh token or access token in the current session is invalid, an error will be thrown.
- This method sets the session using an
access_tokenandrefresh_token. - If successful, a
SIGNED_INevent is emitted.
Parameters
- currentSessionobject
The current session that minimally contains an access token and refresh token.
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase.auth.setSession({2 access_token,3 refresh_token4 })Exchange an auth code for a session
exchangeCodeForSession(authCode)Log in an existing user by exchanging an Auth Code issued during the PKCE flow.
- Used when
flowTypeis set topkcein client options.
Parameters
- authCodestring
Return Type
- Option 1object
- Option 2object
1supabase.auth.exchangeCodeForSession('34e770dd-9ff9-416c-87fa-43b31d7ef225')Start auto-refresh session (non-browser)
startAutoRefresh()Starts an auto-refresh process in the background. The session is checked every few seconds. Close to the time of expiration a process is started to refresh the session. If refreshing fails it will be retried for as long as necessary.
If you set the GoTrueClientOptions#autoRefreshToken you don't need to call this function, it will be called for you.
On browsers the refresh process works only when the tab/window is in the foreground to conserve resources as well as prevent race conditions and flooding auth with requests. If you call this method any managed visibility change callback will be removed and you must manage visibility changes on your own.
On non-browser platforms the refresh process works continuously in the background, which may not be desirable. You should hook into your platform's foreground indication mechanism and call these methods appropriately to conserve resources.
#stopAutoRefresh
- Only useful in non-browser environments such as React Native or Electron.
- The Supabase Auth library automatically starts and stops proactively refreshing the session when a tab is focused or not.
- On non-browser platforms, such as mobile or desktop apps built with web technologies, the library is not able to effectively determine whether the application is focused or not.
- To give this hint to the application, you should be calling this method when the app is in focus and calling
supabase.auth.stopAutoRefresh()when it's out of focus.
Return Type
1import { AppState } from 'react-native'23// make sure you register this only once!4AppState.addEventListener('change', (state) => {5 if (state === 'active') {6 supabase.auth.startAutoRefresh()7 } else {8 supabase.auth.stopAutoRefresh()9 }10})Stop auto-refresh session (non-browser)
stopAutoRefresh()Stops an active auto refresh process running in the background (if any).
If you call this method any managed visibility change callback will be removed and you must manage visibility changes on your own.
See #startAutoRefresh for more details.
- Only useful in non-browser environments such as React Native or Electron.
- The Supabase Auth library automatically starts and stops proactively refreshing the session when a tab is focused or not.
- On non-browser platforms, such as mobile or desktop apps built with web technologies, the library is not able to effectively determine whether the application is focused or not.
- When your application goes in the background or out of focus, call this method to stop the proactive refreshing of the session.
Return Type
1import { AppState } from 'react-native'23// make sure you register this only once!4AppState.addEventListener('change', (state) => {5 if (state === 'active') {6 supabase.auth.startAutoRefresh()7 } else {8 supabase.auth.stopAutoRefresh()9 }10})Initialize client session
initialize()Initializes the client session either from the url or from storage. This method is automatically called when instantiating the client, but should also be called manually when checking for an error from an auth redirect (oauth, magiclink, password recovery, etc).
Return Type
Auth MFA
This section contains methods commonly used for Multi-Factor Authentication (MFA) and are invoked behind the supabase.auth.mfa namespace.
Currently, there is support for time-based one-time password (TOTP) and phone verification code as the 2nd factor. Recovery codes are not supported but users can enroll multiple factors, with an upper limit of 10.
Having a 2nd factor for recovery frees the user of the burden of having to store their recovery codes somewhere. It also reduces the attack surface since multiple recovery codes are usually generated compared to just having 1 backup factor.
Learn more about implementing MFA in your application in the MFA guide.
Enroll a factor
enroll(params)Starts the enrollment process for a new Multi-Factor Authentication (MFA) factor. This method creates a new unverified factor. To verify a factor, present the QR code or secret to the user and ask them to add it to their authenticator app. The user has to enter the code from their authenticator app to verify it.
Upon verifying a factor, all other sessions are logged out and the current session's authenticator level is promoted to aal2.
- Use
totporphoneas thefactorTypeand use the returnedidto create a challenge. - To create a challenge, see
mfa.challenge(). - To verify a challenge, see
mfa.verify(). - To create and verify a TOTP challenge in a single step, see
mfa.challengeAndVerify(). - To generate a QR code for the
totpsecret in Next.js, you can do the following:
1<Image src={data.totp.qr_code} alt={data.totp.uri} layout="fill"></Image>- The
challengeandverifysteps are separated when using Phone factors as the user will need time to receive and input the code obtained from the SMS in challenge.
Parameters
- paramsOne of the following options
- Option 1object
- Option 2object
- Option 3object
- Option 4MFAEnrollTOTPParams
- Option 5MFAEnrollPhoneParams
- Option 6MFAEnrollWebauthnParams
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase.auth.mfa.enroll({2 factorType: 'totp',3 friendlyName: 'your_friendly_name'4})56// Use the id to create a challenge.7// The challenge can be verified by entering the code generated from the authenticator app.8// The code will be generated upon scanning the qr_code or entering the secret into the authenticator app.9const { id, type, totp: { qr_code, secret, uri }, friendly_name } = data10const challenge = await supabase.auth.mfa.challenge({ factorId: id });Create a challenge
challenge(params)Prepares a challenge used to verify that a user has access to a MFA factor.
- An enrolled factor is required before creating a challenge.
- To verify a challenge, see
mfa.verify(). - A phone factor sends a code to the user upon challenge. The channel defaults to
smsunless otherwise specified.
Parameters
- paramsOne of the following options
- Option 1object
- Option 2object
- Option 3object
- Option 4MFAChallengeTOTPParams
- Option 5MFAChallengePhoneParams
- Option 6MFAChallengeWebauthnParams
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase.auth.mfa.challenge({2 factorId: '34e770dd-9ff9-416c-87fa-43b31d7ef225'3})Verify a challenge
verify(params)Verifies a code against a challenge. The verification code is provided by the user by entering a code seen in their authenticator app.
- To verify a challenge, please create a challenge first.
Parameters
- paramsOne of the following options
- Option 1object
- Option 2object
- Option 3MFAVerifyTOTPParams
- Option 4MFAVerifyPhoneParams
- Option 5MFAVerifyWebauthnParams
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase.auth.mfa.verify({2 factorId: '34e770dd-9ff9-416c-87fa-43b31d7ef225',3 challengeId: '4034ae6f-a8ce-4fb5-8ee5-69a5863a7c15',4 code: '123456'5})Create and verify a challenge
challengeAndVerify(params)Helper method which creates a challenge and immediately uses the given code to verify against it thereafter. The verification code is provided by the user by entering a code seen in their authenticator app.
- Intended for use with only TOTP factors.
- An enrolled factor is required before invoking
challengeAndVerify(). - Executes
mfa.challenge()andmfa.verify()in a single step.
Parameters
- paramsobject
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase.auth.mfa.challengeAndVerify({2 factorId: '34e770dd-9ff9-416c-87fa-43b31d7ef225',3 code: '123456'4})Unenroll a factor
unenroll(params)Unenroll removes a MFA factor. A user has to have an aal2 authenticator level in order to unenroll a verified factor.
Parameters
- paramsMFAUnenrollParams
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase.auth.mfa.unenroll({2 factorId: '34e770dd-9ff9-416c-87fa-43b31d7ef225',3})Get Authenticator Assurance Level
getAuthenticatorAssuranceLevel()Returns the Authenticator Assurance Level (AAL) for the active session.
aal1(ornull) means that the user's identity has been verified only with a conventional login (email+password, OTP, magic link, social login, etc.).aal2means that the user's identity has been verified both with a conventional login and at least one MFA factor.
Although this method returns a promise, it's fairly quick (microseconds) and rarely uses the network. You can use this to check whether the current user needs to be shown a screen to verify their MFA factors.
- Authenticator Assurance Level (AAL) is the measure of the strength of an authentication mechanism.
- In Supabase, having an AAL of
aal1refers to having the 1st factor of authentication such as an email and password or OAuth sign-in whileaal2refers to the 2nd factor of authentication such as a time-based, one-time-password (TOTP) or Phone factor. - If the user has a verified factor, the
nextLevelfield will returnaal2, else, it will returnaal1.
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase.auth.mfa.getAuthenticatorAssuranceLevel()2const { currentLevel, nextLevel, currentAuthenticationMethods } = dataList all factors for current user
listFactors()Returns the list of MFA factors enabled for this user.
Return Type
- Option 1object
- Option 2object
OAuth Server
The OAuth Server API allows you to build custom OAuth consent screens for your application. Only relevant when the OAuth 2.1 server is enabled in Supabase Auth.
List grants
listGrants()Lists all OAuth grants that the authenticated user has authorized. Only relevant when the OAuth 2.1 server is enabled in Supabase Auth.
Return Type
- Option 1object
- Option 2object
Revoke grant
revokeGrant(options)Revokes a user's OAuth grant for a specific client. Only relevant when the OAuth 2.1 server is enabled in Supabase Auth.
Revocation marks consent as revoked, deletes active sessions for that OAuth client, and invalidates associated refresh tokens.
Parameters
- optionsobject
Revocation options
Return Type
- Option 1object
- Option 2object
Auth Admin
- Any method under the
supabase.auth.adminnamespace requires aservice_rolekey. - These methods are considered admin methods and should be called on a trusted server. Never expose your
service_rolekey in the browser.
1import { createClient } from '@supabase/supabase-js'23const supabase = createClient(supabase_url, service_role_key, {4 auth: {5 autoRefreshToken: false,6 persistSession: false7 }8})910// Access auth admin api11const adminAuthClient = supabase.auth.adminRetrieve a user
getUserById(uid)Get user by id.
- Fetches the user object from the database based on the user's id.
- The
getUserById()method requires the user's id which maps to theauth.users.idcolumn.
Parameters
- uidstring
The user's unique identifier
This function should only be called on a server. Never expose your
service_rolekey in the browser.
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase.auth.admin.getUserById(1)List all users
listUsers(params?)Get a list of users.
This function should only be called on a server. Never expose your service_role key in the browser.
- Defaults to return 50 users per page.
Parameters
- paramsOptionalPageParams
An object which supports
pageandperPageas numbers, to alter the paginated results.
Return Type
- Option 1object
- Option 2object
1const { data: { users }, error } = await supabase.auth.admin.listUsers()Create a user
createUser(attributes)Creates a new user. This function should only be called on a server. Never expose your service_role key in the browser.
- To confirm the user's email address or phone number, set
email_confirmorphone_confirmto true. Both arguments default to false. createUser()will not send a confirmation email to the user. You can useinviteUserByEmail()if you want to send them an email invite instead.- If you are sure that the created user's email or phone number is legitimate and verified, you can set the
email_confirmorphone_confirmparam totrue.
Parameters
- attributesAdminUserAttributes
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase.auth.admin.createUser({2 email: '[email protected]',3 password: 'password',4 user_metadata: { name: 'Yoda' }5})Delete a user
deleteUser(id, shouldSoftDelete)Delete a user. Requires a service_role key.
- The
deleteUser()method requires the user's ID, which maps to theauth.users.idcolumn.
Parameters
- idstring
The user id you want to remove.
- shouldSoftDeleteboolean
If true, then the user will be soft-deleted from the auth schema. Soft deletion allows user identification from the hashed user ID but is not reversible. Defaults to false for backward compatibility.
This function should only be called on a server. Never expose your
service_rolekey in the browser.
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase.auth.admin.deleteUser(2 '715ed5db-f090-4b8c-a067-640ecee36aa0'3)Send an email invite link
inviteUserByEmail(email, options)Sends an invite link to an email address.
- Sends an invite link to the user's email address.
- The
inviteUserByEmail()method is typically used by administrators to invite users to join the application. - Note that PKCE is not supported when using
inviteUserByEmail. This is because the browser initiating the invite is often different from the browser accepting the invite which makes it difficult to provide the security guarantees required of the PKCE flow.
Parameters
- emailstring
The email address of the user.
- optionsobject
Additional options to be included when inviting.
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase.auth.admin.inviteUserByEmail('[email protected]')Generate an email link
generateLink(params)Generates email links and OTPs to be sent via a custom email provider.
- The following types can be passed into
generateLink():signup,magiclink,invite,recovery,email_change_current,email_change_new,phone_change. generateLink()only generates the email link foremail_change_emailif the Secure email change is enabled in your project's email auth provider settings.generateLink()handles the creation of the user forsignup,inviteandmagiclink.
Parameters
- paramsGenerateLinkParams
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase.auth.admin.generateLink({2 type: 'signup',3 email: '[email protected]',4 password: 'secret'5})Update a user
updateUserById(uid, attributes)Updates the user data.
Parameters
- uidstring
- attributesAdminUserAttributes
The data you want to update.
This function should only be called on a server. Never expose your
service_rolekey in the browser.
Return Type
- Option 1object
- Option 2object
1const { data: user, error } = await supabase.auth.admin.updateUserById(2 '11111111-1111-1111-1111-111111111111',3 { email: '[email protected]' }4)Sign out a user (admin)
signOut(jwt, scope)Removes a logged-in session.
Parameters
- jwtstring
A valid, logged-in JWT.
- scopeOne of the following options
The logout sope.
- Option 1"global"
- Option 2"local"
- Option 3"others"
Return Type
Delete a factor for a user
deleteFactor(params)Deletes a factor on a user. This will log the user out of all active sessions if the deleted factor was verified.
Parameters
- paramsAuthMFAAdminDeleteFactorParams
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase.auth.admin.mfa.deleteFactor({2 id: '34e770dd-9ff9-416c-87fa-43b31d7ef225',3 userId: 'a89baba7-b1b7-440f-b4bb-91026967f66b',4})List all factors for a user (admin)
listFactors(params)Lists all factors associated to a user.
Parameters
- paramsAuthMFAAdminListFactorsParams
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase.auth.admin.mfa.listFactors()OAuth Admin
The OAuth Admin API allows you to manage OAuth clients programmatically. Only relevant when the OAuth 2.1 server is enabled in Supabase Auth. These functions should only be called on a server. Never expose your service_role key in the browser.
List OAuth clients
listClients(params?)Lists all OAuth clients with optional pagination. Only relevant when the OAuth 2.1 server is enabled in Supabase Auth.
This function should only be called on a server. Never expose your service_role key in the browser.
Parameters
- paramsOptionalPageParams
Return Type
- Option 1object
- Option 2object
Get OAuth client
getClient(clientId)Gets details of a specific OAuth client. Only relevant when the OAuth 2.1 server is enabled in Supabase Auth.
This function should only be called on a server. Never expose your service_role key in the browser.
Parameters
- clientIdstring
Return Type
- Option 1object
- Option 2object
Create OAuth client
createClient(params)Creates a new OAuth client. Only relevant when the OAuth 2.1 server is enabled in Supabase Auth.
This function should only be called on a server. Never expose your service_role key in the browser.
Parameters
- paramsCreateOAuthClientParams
Return Type
- Option 1object
- Option 2object
Update OAuth client
updateClient(clientId, params)Updates an existing OAuth client. Only relevant when the OAuth 2.1 server is enabled in Supabase Auth.
This function should only be called on a server. Never expose your service_role key in the browser.
Parameters
- clientIdstring
- paramsUpdateOAuthClientParams
Return Type
- Option 1object
- Option 2object
Delete OAuth client
deleteClient(clientId)Deletes an OAuth client. Only relevant when the OAuth 2.1 server is enabled in Supabase Auth.
This function should only be called on a server. Never expose your service_role key in the browser.
Parameters
- clientIdstring
Return Type
Regenerate client secret
regenerateClientSecret(clientId)Regenerates the secret for an OAuth client. Only relevant when the OAuth 2.1 server is enabled in Supabase Auth.
This function should only be called on a server. Never expose your service_role key in the browser.
Parameters
- clientIdstring
Return Type
- Option 1object
- Option 2object
Invokes a Supabase Edge Function.
invoke(functionName, options)Invokes a function
- Requires an Authorization header.
- Invoke params generally match the Fetch API spec.
- When you pass in a body to your function, we automatically attach the Content-Type header for
Blob,ArrayBuffer,File,FormDataandString. If it doesn't match any of these types we assume the payload isjson, serialize it and attach theContent-Typeheader asapplication/json. You can override this behavior by passing in aContent-Typeheader of your own. - Responses are automatically parsed as
json,blobandform-datadepending on theContent-Typeheader sent by your function. Responses are parsed astextby default.
Parameters
- functionNamestring
The name of the Function to invoke.
- optionsFunctionInvokeOptions
Options for invoking the Function.
Return Type
- Option 1FunctionsResponseSuccess
- Option 2FunctionsResponseFailure
1const { data, error } = await supabase.functions.invoke('hello', {2 body: { foo: 'bar' }3})Subscribe to channel
on(type, filter, callback)Creates an event handler that listens to changes.
- By default, Broadcast and Presence are enabled for all projects.
- By default, listening to database changes is disabled for new projects due to database performance and security concerns. You can turn it on by managing Realtime's replication.
- You can receive the "previous" data for updates and deletes by setting the table's
REPLICA IDENTITYtoFULL(e.g.,ALTER TABLE your_table REPLICA IDENTITY FULL;). - Row level security is not applied to delete statements. When RLS is enabled and replica identity is set to full, only the primary key is sent to clients.
Parameters
- typeOne of the following options
- Option 1"presence"
- Option 2"postgres_changes"
- Option 3"broadcast"
- Option 4"system"
- filterOne of the following options
- Option 1object
- Option 2object
- Option 3object
- Option 4RealtimePostgresChangesFilter
- Option 5RealtimePostgresChangesFilter
- Option 6RealtimePostgresChangesFilter
- Option 7RealtimePostgresChangesFilter
- Option 8object
- Option 9object
- Option 10object
- Option 11object
- Option 12object
- callbackfunction
1const channel = supabase.channel("room1")23channel.on("broadcast", { event: "cursor-pos" }, (payload) => {4 console.log("Cursor position received!", payload);5}).subscribe((status) => {6 if (status === "SUBSCRIBED") {7 channel.send({8 type: "broadcast",9 event: "cursor-pos",10 payload: { x: Math.random(), y: Math.random() },11 });12 }13});Unsubscribe from a channel
removeChannel(channel)Unsubscribes and removes Realtime channel from Realtime client.
- Removing a channel is a great way to maintain the performance of your project's Realtime service as well as your database if you're listening to Postgres changes. Supabase will automatically handle cleanup 30 seconds after a client is disconnected, but unused channels may cause degradation as more clients are simultaneously subscribed.
Parameters
- channelRealtimeChannel
The name of the Realtime channel.
Return Type
- Option 1"error"
- Option 2"ok"
- Option 3"timed out"
1supabase.removeChannel(myChannel)Unsubscribe from all channels
removeAllChannels()Unsubscribes and removes all Realtime channels from Realtime client.
- Removing channels is a great way to maintain the performance of your project's Realtime service as well as your database if you're listening to Postgres changes. Supabase will automatically handle cleanup 30 seconds after a client is disconnected, but unused channels may cause degradation as more clients are simultaneously subscribed.
Return Type
1supabase.removeAllChannels()Retrieve all channels
getChannels()Returns all Realtime channels.
Return Type
1const channels = supabase.getChannels()Broadcast a message
send(args, opts)Sends a message into the channel.
- When using REST you don't need to subscribe to the channel
- REST calls are only available from 2.37.0 onwards
Parameters
- argsobject
Arguments to send to channel
- opts{ [key: string]: any }
Options to be used during the send process
Return Type
- Option 1"ok"
- Option 2"timed out"
- Option 3"error"
1supabase2 .channel('room1')3 .subscribe((status) => {4 if (status === 'SUBSCRIBED') {5 channel.send({6 type: 'broadcast',7 event: 'cursor-pos',8 payload: { x: Math.random(), y: Math.random() },9 })10 }11 })File Buckets
This section contains methods for working with File Buckets.
Access a storage bucket
from(id)Perform file operation in a bucket.
Parameters
- idstring
The bucket id to operate on.
1const avatars = supabase.storage.from('avatars')List all buckets
listBuckets(options?)Retrieves the details of all Storage buckets within an existing project.
- RLS policy permissions required:
bucketstable permissions:selectobjectstable permissions: none
- Refer to the Storage guide on how access control works
Parameters
- optionsOptionalListBucketOptions
Query parameters for listing buckets
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase2 .storage3 .listBuckets()Retrieve a bucket
getBucket(id)Retrieves the details of an existing Storage bucket.
- RLS policy permissions required:
bucketstable permissions:selectobjectstable permissions: none
- Refer to the Storage guide on how access control works
Parameters
- idstring
The unique identifier of the bucket you would like to retrieve.
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase2 .storage3 .getBucket('avatars')Create a bucket
createBucket(id, options)Creates a new Storage bucket
- RLS policy permissions required:
bucketstable permissions:insertobjectstable permissions: none
- Refer to the Storage guide on how access control works
Parameters
- idstring
A unique identifier for the bucket you are creating.
- optionsobject
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase2 .storage3 .createBucket('avatars', {4 public: false,5 allowedMimeTypes: ['image/png'],6 fileSizeLimit: 10247 })Empty a bucket
emptyBucket(id)Removes all objects inside a single bucket.
- RLS policy permissions required:
bucketstable permissions:selectobjectstable permissions:selectanddelete
- Refer to the Storage guide on how access control works
Parameters
- idstring
The unique identifier of the bucket you would like to empty.
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase2 .storage3 .emptyBucket('avatars')Update a bucket
updateBucket(id, options)Updates a Storage bucket
- RLS policy permissions required:
bucketstable permissions:selectandupdateobjectstable permissions: none
- Refer to the Storage guide on how access control works
Parameters
- idstring
A unique identifier for the bucket you are updating.
- optionsobject
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase2 .storage3 .updateBucket('avatars', {4 public: false,5 allowedMimeTypes: ['image/png'],6 fileSizeLimit: 10247 })Delete a bucket
deleteBucket(id)Deletes an existing bucket. A bucket can't be deleted with existing objects inside it. You must first empty() the bucket.
- RLS policy permissions required:
bucketstable permissions:selectanddeleteobjectstable permissions: none
- Refer to the Storage guide on how access control works
Parameters
- idstring
The unique identifier of the bucket you would like to delete.
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase2 .storage3 .deleteBucket('avatars')Upload a file
upload(path, fileBody, fileOptions?)Uploads a file to an existing bucket.
- RLS policy permissions required:
bucketstable permissions: noneobjectstable permissions: onlyinsertwhen you are uploading new files andselect,insertandupdatewhen you are upserting files
- Refer to the Storage guide on how access control works
- For React Native, using either
Blob,FileorFormDatadoes not work as intended. Upload file usingArrayBufferfrom base64 file data instead, see example below.
Parameters
- pathstring
The file path, including the file name. Should be of the format
folder/subfolder/filename.png. The bucket must already exist before attempting to upload. - fileBodyFileBody
The body of the file to be stored in the bucket.
- fileOptionsOptionalFileOptions
Optional file upload options including cacheControl, contentType, upsert, and metadata.
Return Type
- Option 1object
- Option 2object
1const avatarFile = event.target.files[0]2const { data, error } = await supabase3 .storage4 .from('avatars')5 .upload('public/avatar1.png', avatarFile, {6 cacheControl: '3600',7 upsert: false8 })Replace an existing file
update(path, fileBody, fileOptions?)Replaces an existing file at the specified path with a new one.
- RLS policy permissions required:
bucketstable permissions: noneobjectstable permissions:updateandselect
- Refer to the Storage guide on how access control works
- For React Native, using either
Blob,FileorFormDatadoes not work as intended. Update file usingArrayBufferfrom base64 file data instead, see example below.
Parameters
- pathstring
The relative file path. Should be of the format
folder/subfolder/filename.png. The bucket must already exist before attempting to update. - fileBodyOne of the following options
The body of the file to be stored in the bucket.
- Option 1string
- Option 2ArrayBuffer
- Option 3ReadableStream
- Option 4Blob
- Option 5File
- Option 6FormData
- Option 7@types/node.__global.NodeJS.ReadableStream
- Option 8URLSearchParams
- Option 9ArrayBufferView
- Option 10@types/node.__global.Buffer
- fileOptionsOptionalFileOptions
Optional file upload options including cacheControl, contentType, upsert, and metadata.
Return Type
- Option 1object
- Option 2object
1const avatarFile = event.target.files[0]2const { data, error } = await supabase3 .storage4 .from('avatars')5 .update('public/avatar1.png', avatarFile, {6 cacheControl: '3600',7 upsert: true8 })Move an existing file
move(fromPath, toPath, options?)Moves an existing file to a new path in the same bucket.
- RLS policy permissions required:
bucketstable permissions: noneobjectstable permissions:updateandselect
- Refer to the Storage guide on how access control works
Parameters
- fromPathstring
The original file path, including the current file name. For example
folder/image.png. - toPathstring
The new file path, including the new file name. For example
folder/image-new.png. - optionsOptionalDestinationOptions
The destination options.
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase2 .storage3 .from('avatars')4 .move('public/avatar1.png', 'private/avatar2.png')Copy an existing file
copy(fromPath, toPath, options?)Copies an existing file to a new path in the same bucket.
- RLS policy permissions required:
bucketstable permissions: noneobjectstable permissions:insertandselect
- Refer to the Storage guide on how access control works
Parameters
- fromPathstring
The original file path, including the current file name. For example
folder/image.png. - toPathstring
The new file path, including the new file name. For example
folder/image-copy.png. - optionsOptionalDestinationOptions
The destination options.
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase2 .storage3 .from('avatars')4 .copy('public/avatar1.png', 'private/avatar2.png')Create a signed URL
createSignedUrl(path, expiresIn, options?)Creates a signed URL. Use a signed URL to share a file for a fixed amount of time.
- RLS policy permissions required:
bucketstable permissions: noneobjectstable permissions:select
- Refer to the Storage guide on how access control works
Parameters
- pathstring
The file path, including the current file name. For example
folder/image.png. - expiresInnumber
The number of seconds until the signed URL expires. For example,
60for a URL which is valid for one minute. - optionsOptionalobject
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase2 .storage3 .from('avatars')4 .createSignedUrl('folder/avatar1.png', 60)Create signed URLs
createSignedUrls(paths, expiresIn, options?)Creates multiple signed URLs. Use a signed URL to share a file for a fixed amount of time.
- RLS policy permissions required:
bucketstable permissions: noneobjectstable permissions:select
- Refer to the Storage guide on how access control works
Parameters
- pathsArray<string>
The file paths to be downloaded, including the current file names. For example
['folder/image.png', 'folder2/image2.png']. - expiresInnumber
The number of seconds until the signed URLs expire. For example,
60for URLs which are valid for one minute. - optionsOptionalobject
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase2 .storage3 .from('avatars')4 .createSignedUrls(['folder/avatar1.png', 'folder/avatar2.png'], 60)Create signed upload URL
createSignedUploadUrl(path, options?)Creates a signed upload URL. Signed upload URLs can be used to upload files to the bucket without further authentication. They are valid for 2 hours.
- RLS policy permissions required:
bucketstable permissions: noneobjectstable permissions:insert
- Refer to the Storage guide on how access control works
Parameters
- pathstring
The file path, including the current file name. For example
folder/image.png. - optionsOptionalobject
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase2 .storage3 .from('avatars')4 .createSignedUploadUrl('folder/cat.jpg')Upload to a signed URL
uploadToSignedUrl(path, token, fileBody, fileOptions?)Upload a file with a token generated from createSignedUploadUrl.
- RLS policy permissions required:
bucketstable permissions: noneobjectstable permissions: none
- Refer to the Storage guide on how access control works
Parameters
- pathstring
The file path, including the file name. Should be of the format
folder/subfolder/filename.png. The bucket must already exist before attempting to upload. - tokenstring
The token generated from
createSignedUploadUrl - fileBodyFileBody
The body of the file to be stored in the bucket.
- fileOptionsOptionalFileOptions
HTTP headers (cacheControl, contentType, etc.). Note: The
upsertoption has no effect here. To enable upsert behavior, pass{ upsert: true }when callingcreateSignedUploadUrl()instead.
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase2 .storage3 .from('avatars')4 .uploadToSignedUrl('folder/cat.jpg', 'token-from-createSignedUploadUrl', file)Retrieve public URL
getPublicUrl(path, options?)A simple convenience function to get the URL for an asset in a public bucket. If you do not want to use this function, you can construct the public URL by concatenating the bucket URL with the path to the asset. This function does not verify if the bucket is public. If a public URL is created for a bucket which is not public, you will not be able to download the asset.
- The bucket needs to be set to public, either via updateBucket() or by going to Storage on supabase.com/dashboard, clicking the overflow menu on a bucket and choosing "Make public"
- RLS policy permissions required:
bucketstable permissions: noneobjectstable permissions: none
- Refer to the Storage guide on how access control works
Parameters
- pathstring
The path and name of the file to generate the public URL for. For example
folder/image.png. - optionsOptionalobject
Return Type
1const { data } = supabase2 .storage3 .from('public-bucket')4 .getPublicUrl('folder/avatar1.png')Download a file
download(path, options?)Downloads a file from a private bucket. For public buckets, make a request to the URL returned from getPublicUrl instead.
- RLS policy permissions required:
bucketstable permissions: noneobjectstable permissions:select
- Refer to the Storage guide on how access control works
Parameters
- pathstring
The full path and file name of the file to be downloaded. For example
folder/image.png. - optionsOptionalOptions
1const { data, error } = await supabase2 .storage3 .from('avatars')4 .download('folder/avatar1.png')Delete files in a bucket
remove(paths)Deletes files within the same bucket
- RLS policy permissions required:
bucketstable permissions: noneobjectstable permissions:deleteandselect
- Refer to the Storage guide on how access control works
Parameters
- pathsArray<string>
An array of files to delete, including the path and file name. For example [
'folder/image.png'].
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase2 .storage3 .from('avatars')4 .remove(['folder/avatar1.png'])List all files in a bucket
list(path?, options?, parameters?)Lists all the files and folders within a path of the bucket.
- RLS policy permissions required:
bucketstable permissions: noneobjectstable permissions:select
- Refer to the Storage guide on how access control works
Parameters
- pathOptionalstring
The folder path.
- optionsOptionalSearchOptions
Search options including limit (defaults to 100), offset, sortBy, and search
- parametersOptionalFetchParameters
Optional fetch parameters including signal for cancellation
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase2 .storage3 .from('avatars')4 .list('folder', {5 limit: 100,6 offset: 0,7 sortBy: { column: 'name', order: 'asc' },8 })Check if file exists
exists(path)Checks the existence of a file.
Parameters
- pathstring
The file path, including the file name. For example
folder/image.png.
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase2 .storage3 .from('avatars')4 .exists('folder/avatar1.png')Get file metadata
info(path)Retrieves the details of an existing file.
Parameters
- pathstring
The file path, including the file name. For example
folder/image.png.
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase2 .storage3 .from('avatars')4 .info('folder/avatar1.png')List files (v2)
listV2(options?, parameters?)this method signature might change in the future
Parameters
- optionsOptionalSearchV2Options
search options
- parametersOptionalFetchParameters
Return Type
- Option 1object
- Option 2object
Convert file to base64
toBase64(data)Parameters
- datastring
Return Type
Analytics Buckets
This section contains methods for working with Analytics Buckets.
Access an analytics bucket
from(bucketName)Get an Iceberg REST Catalog client configured for a specific analytics bucket Use this to perform advanced table and namespace operations within the bucket The returned client provides full access to the Apache Iceberg REST Catalog API with the Supabase { data, error } pattern for consistent error handling on all operations.
Public alpha: This API is part of a public alpha release and may not be available to your account type.
Parameters
- bucketNamestring
The name of the analytics bucket (warehouse) to connect to
1// First, create an analytics bucket2const { data: bucket, error: bucketError } = await supabase3 .storage4 .analytics5 .createBucket('analytics-data')67// Get the Iceberg catalog for that bucket8const catalog = supabase.storage.analytics.from('analytics-data')910// Create a namespace11const { error: nsError } = await catalog.createNamespace({ namespace: ['default'] })1213// Create a table with schema14const { data: tableMetadata, error: tableError } = await catalog.createTable(15 { namespace: ['default'] },16 {17 name: 'events',18 schema: {19 type: 'struct',20 fields: [21 { id: 1, name: 'id', type: 'long', required: true },22 { id: 2, name: 'timestamp', type: 'timestamp', required: true },23 { id: 3, name: 'user_id', type: 'string', required: false }24 ],25 'schema-id': 0,26 'identifier-field-ids': [1]27 },28 'partition-spec': {29 'spec-id': 0,30 fields: []31 },32 'write-order': {33 'order-id': 0,34 fields: []35 },36 properties: {37 'write.format.default': 'parquet'38 }39 }40)Create a new analytics bucket
createBucket(name)Creates a new analytics bucket using Iceberg tables Analytics buckets are optimized for analytical queries and data processing
Public alpha: This API is part of a public alpha release and may not be available to your account type.
- Creates a new analytics bucket using Iceberg tables
- Analytics buckets are optimized for analytical queries and data processing
Parameters
- namestring
A unique name for the bucket you are creating
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase2 .storage3 .analytics4 .createBucket('analytics-data')List analytics buckets
listBuckets(options?)Retrieves the details of all Analytics Storage buckets within an existing project Only returns buckets of type 'ANALYTICS'
Public alpha: This API is part of a public alpha release and may not be available to your account type.
- Retrieves the details of all Analytics Storage buckets within an existing project
- Only returns buckets of type 'ANALYTICS'
Parameters
- optionsOptionalobject
Query parameters for listing buckets
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase2 .storage3 .analytics4 .listBuckets({5 limit: 10,6 offset: 0,7 sortColumn: 'created_at',8 sortOrder: 'desc'9 })Delete an analytics bucket
deleteBucket(bucketName)Deletes an existing analytics bucket A bucket can't be deleted with existing objects inside it You must first empty the bucket before deletion
Public alpha: This API is part of a public alpha release and may not be available to your account type.
- Deletes an analytics bucket
Parameters
- bucketNamestring
The unique identifier of the bucket you would like to delete
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase2 .storage3 .analytics4 .deleteBucket('analytics-data')Vector Buckets
This section contains methods for working with Vector Buckets.
Access a vector bucket
from(vectorBucketName)Access operations for a specific vector bucket Returns a scoped client for index and vector operations within the bucket
Public alpha: This API is part of a public alpha release and may not be available to your account type.
Parameters
- vectorBucketNamestring
Name of the vector bucket
1const bucket = supabase.storage.vectors.from('embeddings-prod')Create a vector bucket
createBucket(vectorBucketName)Creates a new vector bucket Vector buckets are containers for vector indexes and their data
Public alpha: This API is part of a public alpha release and may not be available to your account type.
Parameters
- vectorBucketNamestring
Unique name for the vector bucket
Return Type
- Option 1SuccessResponse
- Option 2ErrorResponse
1const { data, error } = await supabase2 .storage3 .vectors4 .createBucket('embeddings-prod')Delete a vector bucket
deleteBucket(vectorBucketName)Deletes a vector bucket (bucket must be empty) All indexes must be deleted before deleting the bucket
Public alpha: This API is part of a public alpha release and may not be available to your account type.
Parameters
- vectorBucketNamestring
Name of the vector bucket to delete
Return Type
- Option 1SuccessResponse
- Option 2ErrorResponse
1const { data, error } = await supabase2 .storage3 .vectors4 .deleteBucket('embeddings-old')Retrieve a vector bucket
getBucket(vectorBucketName)Retrieves metadata for a specific vector bucket
Public alpha: This API is part of a public alpha release and may not be available to your account type.
Parameters
- vectorBucketNamestring
Name of the vector bucket
Return Type
- Option 1SuccessResponse
- Option 2ErrorResponse
1const { data, error } = await supabase2 .storage3 .vectors4 .getBucket('embeddings-prod')56console.log('Bucket created:', data?.vectorBucket.creationTime)List all vector buckets
listBuckets(options)Lists all vector buckets with optional filtering and pagination
Public alpha: This API is part of a public alpha release and may not be available to your account type.
Parameters
- optionsListVectorBucketsOptions
Optional filters (prefix, maxResults, nextToken)
Return Type
- Option 1SuccessResponse
- Option 2ErrorResponse
1const { data, error } = await supabase2 .storage3 .vectors4 .listBuckets({ prefix: 'embeddings-' })56data?.vectorBuckets.forEach(bucket => {7 console.log(bucket.vectorBucketName)8})Create a vector index
createIndex(options)Creates a new vector index in this bucket Convenience method that automatically includes the bucket name
Public alpha: This API is part of a public alpha release and may not be available to your account type.
Parameters
- optionsOmit
Index configuration (vectorBucketName is automatically set)
Return Type
- Option 1SuccessResponse
- Option 2ErrorResponse
1const bucket = supabase.storage.vectors.from('embeddings-prod')2await bucket.createIndex({3 indexName: 'documents-openai',4 dataType: 'float32',5 dimension: 1536,6 distanceMetric: 'cosine',7 metadataConfiguration: {8 nonFilterableMetadataKeys: ['raw_text']9 }10})Delete a vector index
deleteIndex(indexName)Deletes an index from this bucket Convenience method that automatically includes the bucket name
Public alpha: This API is part of a public alpha release and may not be available to your account type.
Parameters
- indexNamestring
Name of the index to delete
Return Type
- Option 1SuccessResponse
- Option 2ErrorResponse
1const bucket = supabase.storage.vectors.from('embeddings-prod')2await bucket.deleteIndex('old-index')Retrieve a vector index
getIndex(indexName)Retrieves metadata for a specific index in this bucket Convenience method that automatically includes the bucket name
Public alpha: This API is part of a public alpha release and may not be available to your account type.
Parameters
- indexNamestring
Name of the index to retrieve
Return Type
- Option 1SuccessResponse
- Option 2ErrorResponse
1const bucket = supabase.storage.vectors.from('embeddings-prod')2const { data } = await bucket.getIndex('documents-openai')3console.log('Dimension:', data?.index.dimension)List all vector indexes
listIndexes(options)Lists indexes in this bucket Convenience method that automatically includes the bucket name
Public alpha: This API is part of a public alpha release and may not be available to your account type.
Parameters
- optionsOmit
Listing options (vectorBucketName is automatically set)
Return Type
- Option 1SuccessResponse
- Option 2ErrorResponse
1const bucket = supabase.storage.vectors.from('embeddings-prod')2const { data } = await bucket.listIndexes({ prefix: 'documents-' })Access a vector index
VectorBucketScope(indexName)Access operations for a specific index within this bucket Returns a scoped client for vector data operations
Public alpha: This API is part of a public alpha release and may not be available to your account type.
Parameters
- indexNamestring
Name of the index
1const index = supabase.storage.vectors.from('embeddings-prod').index('documents-openai')23// Insert vectors4await index.putVectors({5 vectors: [6 { key: 'doc-1', data: { float32: [...] }, metadata: { title: 'Intro' } }7 ]8})910// Query similar vectors11const { data } = await index.queryVectors({12 queryVector: { float32: [...] },13 topK: 514})Delete vectors from index
deleteVectors(options)Deletes vectors by keys from this index Convenience method that automatically includes bucket and index names
Public alpha: This API is part of a public alpha release and may not be available to your account type.
Parameters
- optionsOmit
Deletion options (bucket and index names automatically set)
Return Type
- Option 1SuccessResponse
- Option 2ErrorResponse
1const index = supabase.storage.vectors.from('embeddings-prod').index('documents-openai')2await index.deleteVectors({3 keys: ['doc-1', 'doc-2', 'doc-3']4})Retrieve vectors from index
getVectors(options)Retrieves vectors by keys from this index Convenience method that automatically includes bucket and index names
Public alpha: This API is part of a public alpha release and may not be available to your account type.
Parameters
- optionsOmit
Vector retrieval options (bucket and index names automatically set)
Return Type
- Option 1SuccessResponse
- Option 2ErrorResponse
1const index = supabase.storage.vectors.from('embeddings-prod').index('documents-openai')2const { data } = await index.getVectors({3 keys: ['doc-1', 'doc-2'],4 returnMetadata: true5})List vectors in index
listVectors(options)Lists vectors in this index with pagination Convenience method that automatically includes bucket and index names
Public alpha: This API is part of a public alpha release and may not be available to your account type.
Parameters
- optionsOmit
Listing options (bucket and index names automatically set)
Return Type
- Option 1SuccessResponse
- Option 2ErrorResponse
1const index = supabase.storage.vectors.from('embeddings-prod').index('documents-openai')2const { data } = await index.listVectors({3 maxResults: 500,4 returnMetadata: true5})Add vectors to index
putVectors(options)Inserts or updates vectors in this index Convenience method that automatically includes bucket and index names
Public alpha: This API is part of a public alpha release and may not be available to your account type.
Parameters
- optionsOmit
Vector insertion options (bucket and index names automatically set)
Return Type
- Option 1SuccessResponse
- Option 2ErrorResponse
1const index = supabase.storage.vectors.from('embeddings-prod').index('documents-openai')2await index.putVectors({3 vectors: [4 {5 key: 'doc-1',6 data: { float32: [0.1, 0.2, ...] },7 metadata: { title: 'Introduction', page: 1 }8 }9 ]10})Search vectors in index
queryVectors(options)Queries for similar vectors in this index Convenience method that automatically includes bucket and index names
Public alpha: This API is part of a public alpha release and may not be available to your account type.
Parameters
- optionsOmit
Query options (bucket and index names automatically set)
Return Type
- Option 1SuccessResponse
- Option 2ErrorResponse
1const index = supabase.storage.vectors.from('embeddings-prod').index('documents-openai')2const { data } = await index.queryVectors({3 queryVector: { float32: [0.1, 0.2, ...] },4 topK: 5,5 filter: { category: 'technical' },6 returnDistance: true,7 returnMetadata: true8})