Implement Credit-Based Billing for AI SaaS Apps
Build a credit/token system for your AI SaaS. Learn how to add credits tables, consumption tracking, and automatic recharge on subscription renewal in Makerkit.
Credit-based billing charges users based on tokens or credits consumed rather than time. This model is common in AI SaaS applications where users pay for API calls, generated content, or compute time.
Makerkit doesn't include credit-based billing out of the box, but you can implement it using subscriptions plus custom database tables. This guide shows you how.
Architecture Overview
User subscribes → Credits allocated → User consumes credits → Invoice paid → Credits rechargedComponents:
planstable: Maps subscription variants to credit amountscreditstable: Tracks available credits per account- Database functions: Check and consume credits
- Webhook handler: Recharge credits on subscription renewal
Step 1: Create the Plans Table
Store the credit allocation for each plan variant:
CREATE TABLE public.plans ( id SERIAL PRIMARY KEY, name TEXT NOT NULL, variant_id TEXT NOT NULL UNIQUE, tokens INTEGER NOT NULL);ALTER TABLE public.plans ENABLE ROW LEVEL SECURITY;-- Allow authenticated users to read plansCREATE POLICY read_plans ON public.plans FOR SELECT TO authenticated USING (true);-- Insert your plansINSERT INTO public.plans (name, variant_id, tokens) VALUES ('Starter', 'price_starter_monthly', 1000), ('Pro', 'price_pro_monthly', 10000), ('Enterprise', 'price_enterprise_monthly', 100000);The variant_id should match the line item ID in your billing schema (e.g., Stripe Price ID).
Step 2: Create the Credits Table
Track available credits per account:
CREATE TABLE public.credits ( account_id UUID PRIMARY KEY REFERENCES public.accounts(id) ON DELETE CASCADE, tokens INTEGER NOT NULL DEFAULT 0, updated_at TIMESTAMPTZ DEFAULT NOW());ALTER TABLE public.credits ENABLE ROW LEVEL SECURITY;-- Users can read their own creditsCREATE POLICY read_credits ON public.credits FOR SELECT TO authenticated USING (account_id = (SELECT auth.uid()));-- Only service role can modify credits-- No INSERT/UPDATE/DELETE policies for authenticated usersSecurity: Restrict credit modifications
Users should only read their credits. All modifications should go through the service role (admin client) to prevent manipulation.
Step 3: Create Helper Functions
Check if account has enough credits
CREATE OR REPLACE FUNCTION public.has_credits( p_account_id UUID, p_tokens INTEGER)RETURNS BOOLEANSET search_path = ''AS $$BEGIN RETURN ( SELECT tokens >= p_tokens FROM public.credits WHERE account_id = p_account_id );END;$$ LANGUAGE plpgsql SECURITY DEFINER;GRANT EXECUTE ON FUNCTION public.has_credits TO authenticated, service_role;Consume credits
CREATE OR REPLACE FUNCTION public.consume_credits( p_account_id UUID, p_tokens INTEGER)RETURNS BOOLEANSET search_path = ''AS $$DECLARE v_current_tokens INTEGER;BEGIN -- Get current balance with row lock SELECT tokens INTO v_current_tokens FROM public.credits WHERE account_id = p_account_id FOR UPDATE; -- Check if enough credits IF v_current_tokens IS NULL OR v_current_tokens < p_tokens THEN RETURN FALSE; END IF; -- Deduct credits UPDATE public.credits SET tokens = tokens - p_tokens, updated_at = NOW() WHERE account_id = p_account_id; RETURN TRUE;END;$$ LANGUAGE plpgsql SECURITY DEFINER;GRANT EXECUTE ON FUNCTION public.consume_credits TO service_role;Add credits (for recharges)
CREATE OR REPLACE FUNCTION public.add_credits( p_account_id UUID, p_tokens INTEGER)RETURNS VOIDSET search_path = ''AS $$BEGIN INSERT INTO public.credits (account_id, tokens) VALUES (p_account_id, p_tokens) ON CONFLICT (account_id) DO UPDATE SET tokens = public.credits.tokens + p_tokens, updated_at = NOW();END;$$ LANGUAGE plpgsql SECURITY DEFINER;GRANT EXECUTE ON FUNCTION public.add_credits TO service_role;Reset credits (for subscription renewal)
CREATE OR REPLACE FUNCTION public.reset_credits( p_account_id UUID, p_tokens INTEGER)RETURNS VOIDSET search_path = ''AS $$BEGIN INSERT INTO public.credits (account_id, tokens) VALUES (p_account_id, p_tokens) ON CONFLICT (account_id) DO UPDATE SET tokens = p_tokens, updated_at = NOW();END;$$ LANGUAGE plpgsql SECURITY DEFINER;GRANT EXECUTE ON FUNCTION public.reset_credits TO service_role;Step 4: Consume Credits in Your Application
When a user performs an action that costs credits:
import { getSupabaseServerClient } from '@kit/supabase/server-client';import { getSupabaseServerAdminClient } from '@kit/supabase/server-admin-client';export async function consumeApiCredits( accountId: string, tokensRequired: number) { const adminClient = getSupabaseServerAdminClient(); // Consume credits atomically const { data: success, error } = await adminClient.rpc('consume_credits', { p_account_id: accountId, p_tokens: tokensRequired, }); if (error) { throw new Error(`Failed to consume credits: ${error.message}`); } if (!success) { throw new Error('Insufficient credits'); } return true;}Example: AI API Route
// app/api/ai/generate/route.tsimport { NextResponse } from 'next/server';import { getSupabaseRouteHandlerClient } from '@kit/supabase/route-handler-client';import { getSupabaseServerAdminClient } from '@kit/supabase/server-admin-client';const TOKENS_PER_REQUEST = 10;export async function POST(request: Request) { const client = getSupabaseRouteHandlerClient(); const adminClient = getSupabaseServerAdminClient(); // Get current user's account const { data: { user } } = await client.auth.getUser(); if (!user) { return NextResponse.json({ error: 'Unauthorized' }, { status: 401 }); } // Check credits before processing const { data: hasCredits } = await client.rpc('has_credits', { p_account_id: user.id, p_tokens: TOKENS_PER_REQUEST, }); if (!hasCredits) { return NextResponse.json( { error: 'Insufficient credits', code: 'INSUFFICIENT_CREDITS' }, { status: 402 } ); } try { // Call AI API const { prompt } = await request.json(); const result = await callAIService(prompt); // Consume credits after successful response await adminClient.rpc('consume_credits', { p_account_id: user.id, p_tokens: TOKENS_PER_REQUEST, }); return NextResponse.json({ result }); } catch (error) { return NextResponse.json( { error: 'Generation failed' }, { status: 500 } ); }}Step 5: Display Credits in UI
Create a component to show remaining credits:
// components/credits-display.tsx'use client';import { useQuery } from '@tanstack/react-query';import { useSupabase } from '@kit/supabase/hooks/use-supabase';export function CreditsDisplay({ accountId }: { accountId: string }) { const client = useSupabase(); const { data: credits, isLoading } = useQuery({ queryKey: ['credits', accountId], queryFn: async () => { const { data, error } = await client .from('credits') .select('tokens') .eq('account_id', accountId) .single(); if (error) throw error; return data?.tokens ?? 0; }, }); if (isLoading) return <span>Loading...</span>; return ( <div className="flex items-center gap-2"> <span className="text-sm text-muted-foreground">Credits:</span> <span className="font-medium">{credits?.toLocaleString()}</span> </div> );}Step 6: Recharge Credits on Subscription Renewal
Extend the webhook handler to recharge credits when an invoice is paid:
apps/web/app/api/billing/webhook/route.ts
import { getBillingEventHandlerService } from '@kit/billing-gateway';import { enhanceRouteHandler } from '@kit/next/routes';import { getLogger } from '@kit/shared/logger';import { getSupabaseServerAdminClient } from '@kit/supabase/server-admin-client';import billingConfig from '~/config/billing.config';export const POST = enhanceRouteHandler( async ({ request }) => { const provider = billingConfig.provider; const logger = await getLogger(); const adminClient = getSupabaseServerAdminClient(); const service = await getBillingEventHandlerService( () => adminClient, provider, billingConfig, ); try { await service.handleWebhookEvent(request, { onInvoicePaid: async (data) => { const accountId = data.target_account_id; const variantId = data.line_items[0]?.variant_id; if (!variantId) { logger.warn({ accountId }, 'No variant ID in invoice'); return; } // Get token allocation for this plan const { data: plan, error: planError } = await adminClient .from('plans') .select('tokens') .eq('variant_id', variantId) .single(); if (planError || !plan) { logger.error({ variantId, planError }, 'Plan not found'); return; } // Reset credits to plan allocation const { error: creditError } = await adminClient.rpc('reset_credits', { p_account_id: accountId, p_tokens: plan.tokens, }); if (creditError) { logger.error({ accountId, creditError }, 'Failed to reset credits'); throw creditError; } logger.info( { accountId, tokens: plan.tokens }, 'Credits recharged on invoice payment' ); }, onCheckoutSessionCompleted: async (subscription) => { // Also allocate credits on initial subscription const accountId = subscription.target_account_id; const variantId = subscription.line_items[0]?.variant_id; if (!variantId) return; const { data: plan } = await adminClient .from('plans') .select('tokens') .eq('variant_id', variantId) .single(); if (plan) { await adminClient.rpc('reset_credits', { p_account_id: accountId, p_tokens: plan.tokens, }); logger.info( { accountId, tokens: plan.tokens }, 'Initial credits allocated' ); } }, }); return new Response('OK', { status: 200 }); } catch (error) { logger.error({ error }, 'Webhook failed'); return new Response('Failed', { status: 500 }); } }, { auth: false });Step 7: Use Credits in RLS Policies (Optional)
Gate features based on credit balance:
-- Only allow creating tasks if user has creditsCREATE POLICY tasks_insert_with_credits ON public.tasks FOR INSERT TO authenticated WITH CHECK ( public.has_credits((SELECT auth.uid()), 1) );-- Only allow API calls if user has creditsCREATE POLICY api_calls_with_credits ON public.api_logs FOR INSERT TO authenticated WITH CHECK ( public.has_credits(account_id, 1) );Testing
- Create a subscription in test mode
- Verify initial credits are allocated
- Consume some credits via your API
- Trigger a subscription renewal (Stripe:
stripe trigger invoice.paid) - Verify credits are recharged
Common Patterns
Rollover Credits
To allow unused credits to roll over:
-- In onInvoicePaid, add instead of reset:await adminClient.rpc('add_credits', { p_account_id: accountId, p_tokens: plan.tokens,});Credit Expiration
Add an expiration date to credits:
ALTER TABLE public.credits ADD COLUMN expires_at TIMESTAMPTZ;-- Check expiration in has_credits functionCREATE OR REPLACE FUNCTION public.has_credits(...)-- Add: AND (expires_at IS NULL OR expires_at > NOW())Usage Tracking
Track credit consumption for analytics:
CREATE TABLE public.credit_transactions ( id SERIAL PRIMARY KEY, account_id UUID REFERENCES accounts(id), amount INTEGER NOT NULL, type TEXT NOT NULL, -- 'consume', 'recharge', 'bonus' description TEXT, created_at TIMESTAMPTZ DEFAULT NOW());Related Documentation
- Billing Overview - Billing architecture
- Webhooks - Webhook event handling
- Metered Usage - Alternative usage-based billing
- Database Functions - Creating Postgres functions