-
-
Notifications
You must be signed in to change notification settings - Fork 126
Closed
Description
The API lacks endpoints to append individual IPs to existing firewall aliases, forcing users to replace the entire IP array. This becomes problematic when the total IPs exceed the 128 limit, causing 400 errors and preventing incremental updates.
To Reproduce
Steps to reproduce the behavior:
- Create a firewall alias with 125+ existing IPs
- Attempt to add 5+ new IPs using PATCH
/api/v2/firewall/alias - Send payload with all existing IPs + new IPs (total > 128)
- See error response with code 400
Expected behavior
Should be able to add individual IPs to an existing alias without needing to send the entire IP array, or have endpoints specifically for adding/removing individual IPs from aliases.
Screenshots or Response
API Response when trying to update alias with 133 IPs (130 existing + 3 new):
{
"code": 400,
"status": "bad request",
"response_id": "LENGTH_VALIDATOR_MAXIMUM_CONSTRAINT",
"message": "Field `address` exceeds the maximum array length of 128.",
"data": []
}
Additional context
Use Case: Automated synchronization of blocked IPs from security devices to pfSense firewall aliases.
Impact: This limitation prevents automated security systems from maintaining dynamic IP blocklists when approaching the 128 IP limit, requiring manual intervention or workarounds like creating multiple aliases.
Questions:
Is the 128 IP limit per alias configurable?
Are there plans to implement incremental IP management endpoints?
Would PRs be accepted for these features?Metadata
Metadata
Assignees
Labels
No labels