Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Parameters: [auth#appname#IdentityPoolId] do not exist in the template #14071

Closed
2 tasks done
sandeep-pracbee opened this issue Jan 16, 2025 · 4 comments
Closed
2 tasks done
Labels
pending-response Issue is pending response from the issue author pending-triage Issue is pending triage

Comments

@sandeep-pracbee
Copy link

sandeep-pracbee commented Jan 16, 2025

How did you install the Amplify CLI?

npm

If applicable, what version of Node.js are you using?

v18.20.4

Amplify CLI Version

12.14.0

What operating system are you using?

Mac

Did you make any manual changes to the cloud resources managed by Amplify? Please describe the changes made.

I am trying to add auth trigger to add user to a group on signup

Describe the bug

🛑 The following resources failed to deploy:
Resource Name: authuserPoolGroups (AWS::CloudFormation::Stack)
Event Type: update
Reason: Parameters: [authpracticeplatformauthIdentityPoolId] do not exist in the template
URL: https://console.aws.amazon.com/cloudformation/home?region=ap-south-1#/stacks/arn%3Aaws%3Acloudformation%3Aap-south-1%3A340350398738%3Astack%2Famplify-practiceplatform-live-171934%2Fc8268fe0-1683-11ec-ab1a-0254939c68f8/events


🛑 Resource is not in the state stackUpdateComplete
Name: authuserPoolGroups (AWS::CloudFormation::Stack), Event Type: update, Reason: Parameters: [authpracticeplatformauthIdentityPoolId] do not exist in the template, IsCustomResource: false

Expected behavior

The auth category changes can be deployed

Reproduction steps

Have an Amplify project with auth category

Make some change to the auth

Run amplify push -y.

Project Identifier

❯ amplify diagnose --send-report

Learn more at https://docs.amplify.aws/cli/reference/diagnose/

✅ Report saved: /var/folders/1l/wr43_r390c72bblx3z1v38hh0000gn/T/practiceplatform/report-1736997829560.zip

⠏ Sending zip
DiagnoseReportUploadError
✖ Sending zip

Log output

# Put your logs below this line


Additional information

No response

Before submitting, please confirm:

  • I have done my best to include a minimal, self-contained set of instructions for consistently reproducing the issue.
  • I have removed any sensitive information from my code snippets and submission.

I verified that the parameter authpracticeplatformauthIdentityPoolId was passed in the template.

Image
@sandeep-pracbee sandeep-pracbee added the pending-triage Issue is pending triage label Jan 16, 2025
@sandeep-pracbee
Copy link
Author

I verified that the parameter authpracticeplatformauthIdentityPoolId was passed in the template.

@ykethan
Copy link
Member

ykethan commented Jan 17, 2025

Hey @sandeep-pracbee, thank you for reaching out. Could you provide us some additional information on the changes made using the CLI?
Additionally, could you check the backend-config.json and amplify-meta.json, if the userPoolGroups contains the dependsOn block with IdentityPoolId?

@ykethan ykethan added the pending-response Issue is pending response from the issue author label Jan 17, 2025
@ykethan
Copy link
Member

ykethan commented Feb 4, 2025

Closing the issue due to inactivity. Do reach out to us if you are still experiencing this issue.

@ykethan ykethan closed this as not planned Won't fix, can't repro, duplicate, stale Feb 4, 2025
Copy link

github-actions bot commented Feb 4, 2025

This issue is now closed. Comments on closed issues are hard for our team to see.
If you need more assistance, please open a new issue that references this one.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
pending-response Issue is pending response from the issue author pending-triage Issue is pending triage
Projects
None yet
Development

No branches or pull requests

2 participants