git: 2e13459e2aa4 - main - pf tests: fix plfow:v6 after scapy-2.6.0 update

From: Kristof Provost <kp_at_FreeBSD.org>
Date: Tue, 15 Oct 2024 14:29:34 UTC
The branch main has been updated by kp:

URL: https://cgit.FreeBSD.org/src/commit/?id=2e13459e2aa43506069f14e026ff2d7629c0d8e8

commit 2e13459e2aa43506069f14e026ff2d7629c0d8e8
Author:     Kristof Provost <kp@FreeBSD.org>
AuthorDate: 2024-10-15 09:08:09 +0000
Commit:     Kristof Provost <kp@FreeBSD.org>
CommitDate: 2024-10-15 14:29:11 +0000

    pf tests: fix plfow:v6 after scapy-2.6.0 update
    
    Avoid receiving ICMPv6 destination unreachable packets, because scapy will
    attempt to parse the pflow information from those (partial) packets as well, and
    then get confused.
    
    MFC after:      1 week
    Sponsored by:   Rubicon Communications, LLC ("Netgate")
---
 tests/sys/netpfil/pf/pft_read_ipfix.py | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/tests/sys/netpfil/pf/pft_read_ipfix.py b/tests/sys/netpfil/pf/pft_read_ipfix.py
index 2c11bdfd130c..02ef2ca5ab06 100644
--- a/tests/sys/netpfil/pf/pft_read_ipfix.py
+++ b/tests/sys/netpfil/pf/pft_read_ipfix.py
@@ -60,7 +60,7 @@ def parse_ipfix(p):
 		c = datafl.payload
 
 def receive(recvif, recvport):
-	pkts = sp.sniff(iface=recvif, timeout=65)
+	pkts = sp.sniff(iface=recvif, timeout=65, filter="udp port 2055")
 
 	if len(pkts) == 0:
 		print("No data")