You will learn how to:

  • Use Kobble to generate Supabase JWT tokens
  • Configure your RLS policies based on your Kobble Users IDs
  • Use the Supabase client with Kobble to access your Supabase database from your frontend

Using Kobble with Supabase gives you the benefit of using your Supabase database while leveraging your Kobble Customer Portal, User Management, Gateways and more.

Pre-requisites: You need to set up your Kobble account before starting this guide.

Getting started

Here’s a diagram illustrating how Kobble and Supabase work together in this tutorial.

1

Create a SQL query that checks the user ID

Create a function named request_user_id(), which will get the Kobble user ID of the requesting user from the request headers.

This will allow you to access the user ID in your RLS policies that we’ll configure later.

  1. In the sidebar of your Supabase dashboard, navigate to SQL Editor.
  2. Select New query.
  3. Paste the following into the editor:
CREATE OR REPLACE FUNCTION request_user_id()
RETURNS TEXT AS $$
SELECT NULLIF(
current_setting('request.jwt.claims', true)::json->>'sub',
''
)::text;
$$ LANGUAGE SQL STABLE;
  1. Select Run to execute the query and create our function.
2

Add a column for user IDs to your Supabase tables

To allow users access to their own data, you need to create a RLS policy that uses the User ID sent in the request.

By storing the User ID in your tables, you can use it in your RLS policies to compare the requester’s ID with the User ID in the table.

In this tutorial, we’ll add a user_id column to a Posts table as an example.

So we’ll assume that you have a Posts table in your Supabase database and we want only Post owners to be able to create, update, and view their own posts.

  1. In your Supabase dashboard, navigate to Database > Tables.
  2. Select the table you want to add the user_id column to.
  3. Click on Insert a column and fill in the following details:
    • Name: user_id
    • Type: text
    • Default: (request_user_id()). This will make it default to the return value of the custom function we’ve defined earlier. Doing this user’s ID will be available to Supabase from the request headers.

Here’s how it looks in our example with our Posts table:

3

Create RLS policies based on the User ID

For our example, we want to allow users to create, update, and view their own posts only.

In your Supabase dashboard, navigate to Authentication > Policies. Under the name of the table you want users to have access to, select New Policy.

Open the SQL Editor and paste the following code:

CREATE POLICY "create user post" ON "public"."Posts"
AS PERMISSIVE FOR INSERT
TO authenticated

WITH CHECK (request_user_id() = user_id)

We can repeat the same operation as you did for the INSERT policy but for to allow UPDATE and SELECT operations:

CREATE POLICY "update user post" ON "public"."Posts"
AS PERMISSIVE FOR UPDATE
TO authenticated

WITH CHECK (request_user_id() = user_id)
CREATE POLICY "read user post" ON "public"."Posts"
AS PERMISSIVE FOR SELECT
TO authenticated

WITH CHECK (request_user_id() = user_id)
Note that this is only an example for this tutorial. You can create more complex policies based on your needs.
4

Get your Supabase JWT secret key

To give users access to your data, Supabase’s API requires an authentication token.

The Kobble SDK will generate this authentication token for you, but it needs your Supabase project’s JWT secret key first.

  1. Find the JWT secret key in your Supabase dashboard:
  • In your Supabase dashboard, select Project Settings > API.
  • Copy the value in the JWT Secret field.

  1. Paste it on Kobble
  • Open your Kobble dashboard and go to Integrations.
  • Click on the Supabase integration.
  • Paste the JWT secret key in the field provided.

5

Setup your supabase client

  1. Install the Supabase client and kobble sdk in your project.
Here we’re using the @kobbleio/javascript package, which is the Kobble SDK for Single Page Applications. But you can check our quickstart guides for more examples.
  1. Initialize your Kobble SDK (either React SDK, Vanilla SDK, or Vue SDK) with as shown in our quickstart guides.
// src/kobble/index.ts
import { createKobbleClient } from '@kobbleio/javascript'

export const kobbleClient = createKobbleClient({
    domain: import.meta.env.VITE_KOBBLE_DOMAIN,
    clientId: import.meta.env.VITE_KOBBLE_CLIENT_ID,
    redirectUri: import.meta.env.VITE_KOBBLE_REDIRECT_URI
})
  1. Export a new Supabase client instance which will use the Kobble token.
// src/supabase/index.ts
import { kobbleClient } from "../kobble";
import { createClient } from "@supabase/supabase-js";

function createKobbleSupabaseClient() {
    return createClient(
        import.meta.env.VITE_SUPABASE_URL!,
        import.meta.env.VITE_SUPABASE_KEY!,
        {
            global: {
                fetch: async (url, options = {}) => {
                    // We inject the Kobble token in the fetch headers
                    const token = await kobbleClient.getSupabaseToken();

                    const headers = new Headers(options?.headers);
                    headers.set("Authorization", `Bearer ${token}`);

                    return fetch(url, {
                        ...options,
                        headers,
                    });
                },
            },
        }
    );
}

export const supabaseClient = createKobbleSupabaseClient();
6

Use the Supabase client in your app

Now you can use the supabaseClient anywhere in your app.

Here’s an example function that will save a Post to your Supabase database:

import { supabaseClient } from "../supabase";

const insertPost = async () => {
    await supabaseClient.from('Posts').insert({
        title: 'Hello world!',
    })
}

Here, the supabase client will automatically send the Supabase JWT generated by Kobble to Supabase. Supabase will accept the request due to our RLS policies that check the user ID in the request headers.

🎉 You made it!

You have successfully configured the Supabase integration! Only your imagination is the limit now…