-
Notifications
You must be signed in to change notification settings - Fork 824
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Assets are not uploaded to S3 in auth category for Cognito Triggers #11756
Comments
Hey @yaquawa 👋 thanks for raising this! In the provided reproduction steps, I chose "email verification link with redirect" as specified in the pasted terminal output. With this I was able to reproduce this issue where it appears assets in |
Any update on this? This just occurred to me as well when deploying to my production environment. Worked fine when deploying to my dev and test environments. |
Still occurring - (Aug 2023) , had to manually do the upload to S3 and then manually add policy permissions to be public and enable static website. |
Im also experiencing this issue. Have to upload and change bucket permissions manually |
I am also experiencing this in Amplify CLI v12.4.0. I have a hunch as to why this is happening and shared that below if it helps the devs. I have also shared some steps below to get things working, at least after it fails the first time. Potential cause: I suspect this prevents amplify from applying the necessary settings to the bucket when (or after) it's created as that would require the additional permission s3:PutBucketOwnershipControls. In the meantime, I've taken the actions below. These could have all be done manually in the AWS Console, but I figured using the AWS CLI (not Amplify CLI) was easier and allowed me to see exactly what's happening. Remedy: In AWS Console, I added an inline policy for my amplify IAM user to allow s3:PutBucketOwnershipControls on my specific bucket. Note that I also added s3:PutBucketPublicAccessBlock because the permission for that which comes with "AdministratorAccess-Amplify" only allows it to be used by CloudFormation and I intend to use it myself in the AWS CLI to make some corrections which require it (steps shown below).
In AWS Console, under the bucket Permissions tabs, under Bucket policy, I added this:
In AWS CLI, I configured the bucket to be a static website, referencing the uploaded index.html as the index document: In AWS CLI, I deleted the bucket ownership controls (requires s3:PutBucketOwnershipControls) In AWS CLI, I allowed full public access (removed all public access blocks) (requires s3:PutBucketPublicAccessBlock) Referenced links:
|
…a Email link functionality - reference: aws-amplify/amplify-cli#11756
…a Email link functionality - reference: aws-amplify/amplify-cli#11756 (forgot to hit save on prev commit)
Still a bug in 12.10.0 |
I'm having this same issue too. I'm trying to place assets from a previously create lambda verification bucket into the bucket, however I'm getting access errors as a result. Has any progress been made on this error? |
How did you install the Amplify CLI?
No response
If applicable, what version of Node.js are you using?
No response
Amplify CLI Version
10.5.2
What operating system are you using?
MacOS
Did you make any manual changes to the cloud resources managed by Amplify? Please describe the changes made.
No manual changes made
Reproduction steps
Add User to Group
XXXXXverificationbucket-dev
), you'll find it's empty.The text was updated successfully, but these errors were encountered: