neutron/neutron/agent/windows
Lucian Petrut 82d468ba7f Windows: fix exec calls
At some point, we've switched to an alternative process launcher
that uses named pipes to communicate with the child processes. This
implementation has some issues, truncating the process output in some
situations.

This change switches back to subprocess.Popen, which is a much easier
and convenient way to perform exec calls. We're also ensuring that the
os module is not patched (which would cause subprocess.Popen to fail
on Windows due to an eventlet limitation, the reason why the above
mentioned implementation was first introduced).

We're also ensuring that such calls do not block other greenthreads
by leveraging eventlet.tpool.

Side note: I had to store subprocess.Popen in a variable in order
to avoid having OpenStack bandit complaining, even though we're
explicitly passing "shell=False":
http://paste.openstack.org/raw/658319/

Closes-Bug: #1709931

Change-Id: Ib58e12030e69ea10862452c2f141a7a5f2527621
2018-02-01 17:05:28 +02:00
..
__init__.py OVS agent support on Hyper-V 2015-03-25 13:48:33 -07:00
ip_lib.py Refactoring agent linux&ovsdb config 2017-08-25 10:41:39 -04:00
polling.py Fixes "OVS Agent doesn't start on Windows" 2016-03-15 03:14:05 +00:00
utils.py Windows: fix exec calls 2018-02-01 17:05:28 +02:00