Amazon Redshift will no longer support the creation of new Python UDFs starting November 1, 2025.
If you would like to use Python UDFs, create the UDFs prior to that date.
Existing Python UDFs will continue to function as normal. For more information, see the
blog post
SVV_FUNCTION_PRIVILEGES
Use SVV_FUNCTION_PRIVILEGES to view the function permissions that are explicitly granted to users, roles, and groups in the current database.
SVV_FUNCTION_PRIVILEGES is visible to the following users:
Superusers
Users with the ACCESS SYSTEM TABLE permission
Other users can only see identities they have access to or own.
Table columns
Column name | Data type | Description |
---|---|---|
namespace_name | text | The name of the namespace where a specified function exists. |
function_name | text | The name of the function. |
argument_types | text | The string that represents the type of input argument for a function. |
privilege_type | text | The type of the permission. Possible value is EXECUTE. |
identity_id | integer | The ID of the identity. Possible values are user ID, role ID, or group ID. |
identity_name | text | The name of the identity. |
identity_type | text | The type of the identity. Possible values are user, role, group, or public. |
admin_option | boolean | A value that indicates whether the user can grant the permission to other users and roles. It is always false for the role and group identity type. |
Sample query
The following example displays the result of the SVV_FUNCTION_PRIVILEGES.
SELECT namespace_name,function_name,argument_types,privilege_type,identity_name,identity_type,admin_option FROM svv_function_privileges WHERE identity_name IN ('role1', 'reguser'); namespace_name | function_name | argument_types | privilege_type | identity_name | identity_type | admin_option ----------------+---------------+----------------------------+----------------+----------------+---------------+-------------- public | test_func1 | integer | EXECUTE | role1 | role | False public | test_func2 | integer, character varying | EXECUTE | reguser | user | False