neutron/neutron/agent/windows
Lucian Petrut a4f91358a0 Windows: fix exec calls
At some point, we've switched to an alternative process launcher
that uses named pipes to communicate with the child processes. This
implementation has some issues, truncating the process output in some
situations.

This change switches back to subprocess.Popen, which is a much easier
and convenient way to perform exec calls. We're also ensuring that the
os module is not patched (which would cause subprocess.Popen to fail
on Windows due to an eventlet limitation, the reason why the above
mentioned implementation was first introduced).

We're also ensuring that such calls do not block other greenthreads
by leveraging eventlet.tpool.

Side note: I had to store subprocess.Popen in a variable in order
to avoid having OpenStack bandit complaining, even though we're
explicitly passing "shell=False":
http://paste.openstack.org/raw/658319/

Closes-Bug: #1709931

Change-Id: Ib58e12030e69ea10862452c2f141a7a5f2527621
(cherry picked from commit 82d468ba7f)
2018-06-20 18:16:16 +00:00
..
__init__.py OVS agent support on Hyper-V 2015-03-25 13:48:33 -07:00
ip_lib.py Make code follow log translation guideline 2017-08-14 10:53:33 -07:00
polling.py Fixes "OVS Agent doesn't start on Windows" 2016-03-15 03:14:05 +00:00
utils.py Windows: fix exec calls 2018-06-20 18:16:16 +00:00