System: Gateways: Configuration - add "Kill states when down" option trigginer a gateway kill for all states with this gateway set, proposal for https://github.com/opnsense/core/issues/6803
* hide monitor options when disabled
* wire configd kill gateway command for 'pfctl -k gateway -k gwip'
* pass required properties in dpinger_status()
Firewall: Aliases - support jq for alias processing, closes https://github.com/opnsense/core/issues/8277
As we already supported a dot [.] terminated format, we should support both advanced queries as simple ones using "container1.container2", by prefixing the simple format with a dot, we can offer both options using the same parser.
While comparing jq with jsonpath, the first option seems to be most practical and easier to explain.
Services: Dnsmasq DNS & DHCP - move tags to a less prominent place.
The use of custom tags is more advanced, so better to organize this further to the right. I have looked at combining topics, but tags don't really belong to either options or ranges as they can be used from most entities. Since we also support the default included interfaces as tags, in most cases people will only need ranges and options anyway.
mvc: send audit messsages emitted in the authentication sequence to proper channel and extend them with relevant event information. (ControllerRoot)
Although it is practical to know that a client is calling an endpoint unauthenticated, we would like to know which client it is and which endpoint it tries to access to easier detect abuse.
firewall/filter: Change location in Menu.xml above current Rules, mark component as new and current rules as legacy. This is just a suggestion, as it will put this more into the spotlight for more people to try after the POC has been cleaned up and potentially released.
firewall/filter: Add alias formatter, it works with multiple source/destination aliases, or single aliases. Shows the link to the alias as tooltip like in the legacy rules.
firewall/filter: Add advanced filtering solution. Interface can be selected, and all internal and model rules will be filtered by interface. Category can be filtered additionally afterwards, it matches after the interface filter.