diff --git a/lib/ansible/modules/network/cloudengine/ce_dldp.py b/lib/ansible/modules/network/cloudengine/ce_dldp.py
new file mode 100644
index 0000000000..8f31523dbf
--- /dev/null
+++ b/lib/ansible/modules/network/cloudengine/ce_dldp.py
@@ -0,0 +1,560 @@
+#!/usr/bin/python
+#
+# This file is part of Ansible
+#
+# Ansible is free software: you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation, either version 3 of the License, or
+# (at your option) any later version.
+#
+# Ansible is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with Ansible. If not, see .
+#
+
+ANSIBLE_METADATA = {'status': ['preview'],
+ 'supported_by': 'community',
+ 'metadata_version': '1.0'}
+
+DOCUMENTATION = '''
+---
+
+module: ce_dldp
+version_added: "2.4"
+short_description: Manages global DLDP configuration on HUAWEI CloudEngine switches.
+description:
+ - Manages global DLDP configuration on HUAWEI CloudEngine switches.
+author:
+ - Zhijin Zhou (@CloudEngine-Ansible)
+notes:
+ - The relevant configurations will be deleted if DLDP is disabled using enable=disable.
+ - When using auth_mode=none, it will restore the default DLDP authentication mode(By default,
+ DLDP packets are not authenticated.).
+ - By default, the working mode of DLDP is enhance, so you are advised to use work_mode=enhance to restore defualt
+ DLDP working mode.
+ - The default interval for sending Advertisement packets is 5 seconds, so you are advised to use time_interval=5 to
+ restore defualt DLDP interval.
+options:
+ enable:
+ description:
+ - Set global DLDP enable state.
+ required: false
+ default: null
+ choices: ['enable', 'disable']
+ work_mode:
+ description:
+ - Set global DLDP work-mode.
+ required: false
+ default: null
+ choices: ['enhance', 'normal']
+ time_internal:
+ description:
+ - Specifies the interval for sending Advertisement packets.
+ The value is an integer ranging from 1 to 100, in seconds.
+ The default interval for sending Advertisement packets is 5 seconds.
+ required: false
+ default: null
+ auth_mode:
+ description:
+ - Specifies authentication algorithm of DLDP.
+ required: false
+ default: null
+ choices: ['md5', 'simple', 'sha', 'hmac-sha256', 'none']
+ auth_pwd:
+ description:
+ - Specifies authentication password.
+ The value is a string of 1 to 16 case-sensitive plaintexts or 24/32/48/108/128 case-sensitive encrypted
+ characters. The string excludes a question mark (?).
+ required: false
+ default: null
+ reset:
+ description:
+ - Specify whether reset DLDP state of disabled interfaces.
+ required: false
+ default: null
+ choices: ['enable', 'disable']
+'''
+
+EXAMPLES = '''
+- name: DLDP test
+ hosts: cloudengine
+ connection: local
+ gather_facts: no
+ vars:
+ cli:
+ host: "{{ inventory_hostname }}"
+ port: "{{ ansible_ssh_port }}"
+ username: "{{ username }}"
+ password: "{{ password }}"
+ transport: cli
+
+ tasks:
+
+ - name: "Configure global DLDP enable state"
+ ce_dldp:
+ enable: enable
+ provider: "{{ cli }}"
+
+ - name: "Configure DLDP work-mode and ensure global DLDP state is already enabled"
+ ce_dldp:
+ enable: enable
+ work_mode: normal
+ provider: "{{ cli }}"
+
+ - name: "Configure advertisement message time interval in seconds and ensure global DLDP state is already enabled"
+ ce_dldp:
+ enable: enable
+ time_interval: 6
+ provider: "{{ cli }}"
+
+ - name: "Configure a DLDP authentication mode and ensure global DLDP state is already enabled"
+ ce_dldp:
+ enable: enable
+ auth_mode: md5
+ auth_pwd: abc
+ provider: "{{ cli }}"
+
+ - name: "Reset DLDP state of disabled interfaces and ensure global DLDP state is already enabled"
+ ce_dldp:
+ enable: enable
+ reset: enable
+ provider: "{{ cli }}"
+'''
+
+RETURN = '''
+proposed:
+ description: k/v pairs of parameters passed into module
+ returned: always
+ type: dict
+ sample: {
+ "enable": "enable",
+ "reset": "enable",
+ "time_internal": "12",
+ "work_mode": "normal"
+ }
+existing:
+ description: k/v pairs of existing global DLDP configration
+ returned: always
+ type: dict
+ sample: {
+ "enable": "disable",
+ "reset": "disable",
+ "time_internal": "5",
+ "work_mode": "enhance"
+ }
+end_state:
+ description: k/v pairs of global DLDP configration after module execution
+ returned: always
+ type: dict
+ sample: {
+ "enable": "enable",
+ "reset": "enable",
+ "time_internal": "12",
+ "work_mode": "normal"
+ }
+updates:
+ description: command sent to the device
+ returned: always
+ type: list
+ sample: [
+ "dldp enable",
+ "dldp work-mode normal",
+ "dldp interval 12",
+ "dldp reset"
+ ]
+changed:
+ description: check to see if a change was made on the device
+ returned: always
+ type: boolean
+ sample: true
+'''
+
+import copy
+from xml.etree import ElementTree
+from ansible.module_utils.basic import AnsibleModule
+from ansible.module_utils.ce import ce_argument_spec, set_nc_config, get_nc_config, execute_nc_action
+
+CE_NC_ACTION_RESET_DLDP = """
+
+
+
+
+
+"""
+
+CE_NC_GET_GLOBAL_DLDP_CONFIG = """
+
+
+
+
+
+
+
+
+
+
+"""
+
+CE_NC_MERGE_DLDP_GLOBAL_CONFIG_HEAD = """
+
+
+
+ %s
+ %s
+ %s
+"""
+
+CE_NC_MERGE_DLDP_GLOBAL_CONFIG_TAIL = """
+
+
+
+"""
+
+
+class Dldp(object):
+ """Manage global dldp configration"""
+
+ def __init__(self, argument_spec):
+ self.spec = argument_spec
+ self.module = None
+ self.init_module()
+
+ # DLDP global configration info
+ self.enable = self.module.params['enable'] or None
+ self.work_mode = self.module.params['work_mode'] or None
+ self.internal = self.module.params['time_interval'] or None
+ self.reset = self.module.params['reset'] or None
+ self.auth_mode = self.module.params['auth_mode']
+ self.auth_pwd = self.module.params['auth_pwd']
+
+ self.dldp_conf = dict()
+ self.same_conf = False
+ # state
+ self.changed = False
+ self.updates_cmd = list()
+ self.results = dict()
+ self.proposed = dict()
+ self.existing = list()
+ self.end_state = list()
+
+ def check_config_if_same(self):
+ """Judge whether current config is the same as what we excepted"""
+
+ if self.enable and self.enable != self.dldp_conf['dldpEnable']:
+ return False
+
+ if self.internal and self.internal != self.dldp_conf['dldpInterval']:
+ return False
+
+ work_mode = 'normal'
+ if self.dldp_conf['dldpWorkMode'] == 'dldpEnhance':
+ work_mode = 'enhance'
+ if self.work_mode and self.work_mode != work_mode:
+ return False
+
+ if self.auth_mode:
+ if self.auth_mode != 'none':
+ return False
+
+ if self.auth_mode == 'none' and self.dldp_conf['dldpAuthMode'] != 'dldpAuthNone':
+ return False
+
+ if self.reset and self.reset == 'enable':
+ return False
+
+ return True
+
+ def check_params(self):
+ """Check all input params"""
+
+ if (self.auth_mode and self.auth_mode != 'none' and not self.auth_pwd) \
+ or (self.auth_pwd and not self.auth_mode):
+ self.module.fail_json(msg="Error: auth_mode and auth_pwd must both exist or not exist.")
+
+ if self.dldp_conf['dldpEnable'] == 'disable' and not self.enable:
+ if self.work_mode or self.reset or self.internal or self.auth_mode:
+ self.module.fail_json(msg="Error: when DLDP is already disabled globally, "
+ "work_mode, time_internal auth_mode and reset parameters are not "
+ "expected to configure.")
+
+ if self.enable == 'disable' and (self.work_mode or self.internal or self.reset or self.auth_mode):
+ self.module.fail_json(msg="Error: when using enable=disable, work_mode, "
+ "time_internal auth_mode and reset parameters are not expected "
+ "to configure.")
+
+ if self.internal:
+ if not self.internal.isdigit():
+ self.module.fail_json(
+ msg='Error: time_interval must be digit.')
+
+ if int(self.internal) < 1 or int(self.internal) > 100:
+ self.module.fail_json(
+ msg='Error: The value of time_internal should be between 1 and 100.')
+
+ if self.auth_pwd:
+ if '?' in self.auth_pwd:
+ self.module.fail_json(
+ msg='Error: The auth_pwd string excludes a question mark (?).')
+ if (len(self.auth_pwd) != 24) and (len(self.auth_pwd) != 32) and (len(self.auth_pwd) != 48) and \
+ (len(self.auth_pwd) != 108) and (len(self.auth_pwd) != 128):
+ if (len(self.auth_pwd) < 1) or (len(self.auth_pwd) > 16):
+ self.module.fail_json(
+ msg='Error: The value is a string of 1 to 16 case-sensitive plaintexts or 24/32/48/108/128 '
+ 'case-sensitive encrypted characters.')
+
+ def init_module(self):
+ """Init module object"""
+
+ self.module = AnsibleModule(
+ argument_spec=self.spec, supports_check_mode=True)
+
+ def check_response(self, xml_str, xml_name):
+ """Check if response message is already succeed"""
+
+ if "" not in xml_str:
+ self.module.fail_json(msg='Error: %s failed.' % xml_name)
+
+ def get_dldp_exist_config(self):
+ """Get current dldp existed configuration"""
+
+ dldp_conf = dict()
+ xml_str = CE_NC_GET_GLOBAL_DLDP_CONFIG
+ con_obj = get_nc_config(self.module, xml_str)
+ if "" in con_obj:
+ return dldp_conf
+
+ xml_str = con_obj.replace('\r', '').replace('\n', '').\
+ replace('xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"', "").\
+ replace('xmlns="http://www.huawei.com/netconf/vrp"', "")
+
+ # get global DLDP info
+ root = ElementTree.fromstring(xml_str)
+ topo = root.find("data/dldp/dldpSys")
+ if not topo:
+ self.module.fail_json(
+ msg="Error: Get current DLDP configration failed.")
+
+ for eles in topo:
+ if eles.tag in ["dldpEnable", "dldpInterval", "dldpWorkMode", "dldpAuthMode"]:
+ if eles.tag == 'dldpEnable':
+ if eles.text == 'true':
+ value = 'enable'
+ else:
+ value = 'disable'
+ else:
+ value = eles.text
+ dldp_conf[eles.tag] = value
+
+ return dldp_conf
+
+ def config_global_dldp(self):
+ """Config global dldp"""
+
+ if self.same_conf:
+ return
+
+ enable = self.enable
+ if not self.enable:
+ enable = self.dldp_conf['dldpEnable']
+ if enable == 'enable':
+ enable = 'true'
+ else:
+ enable = 'false'
+
+ internal = self.internal
+ if not self.internal:
+ internal = self.dldp_conf['dldpInterval']
+
+ work_mode = self.work_mode
+ if not self.work_mode:
+ work_mode = self.dldp_conf['dldpWorkMode']
+
+ if work_mode == 'enhance' or work_mode == 'dldpEnhance':
+ work_mode = 'dldpEnhance'
+ else:
+ work_mode = 'dldpNormal'
+
+ auth_mode = self.auth_mode
+ if not self.auth_mode:
+ auth_mode = self.dldp_conf['dldpAuthMode']
+ if auth_mode == 'md5':
+ auth_mode = 'dldpAuthMD5'
+ elif auth_mode == 'simple':
+ auth_mode = 'dldpAuthSimple'
+ elif auth_mode == 'sha':
+ auth_mode = 'dldpAuthSHA'
+ elif auth_mode == 'hmac-sha256':
+ auth_mode = 'dldpAuthHMAC-SHA256'
+ elif auth_mode == 'none':
+ auth_mode = 'dldpAuthNone'
+
+ xml_str = CE_NC_MERGE_DLDP_GLOBAL_CONFIG_HEAD % (
+ enable, internal, work_mode)
+ if self.auth_mode:
+ if self.auth_mode == 'none':
+ xml_str += "dldpAuthNone"
+ else:
+ xml_str += "%s" % auth_mode
+ xml_str += "%s" % self.auth_pwd
+
+ xml_str += CE_NC_MERGE_DLDP_GLOBAL_CONFIG_TAIL
+ ret_xml = set_nc_config(self.module, xml_str)
+ self.check_response(ret_xml, "MERGE_DLDP_GLOBAL_CONFIG")
+
+ if self.reset == 'enable':
+ xml_str = CE_NC_ACTION_RESET_DLDP
+ ret_xml = execute_nc_action(self.module, xml_str)
+ self.check_response(ret_xml, "ACTION_RESET_DLDP")
+
+ self.changed = True
+
+ def get_existing(self):
+ """Get existing info"""
+
+ dldp_conf = dict()
+
+ dldp_conf['enable'] = self.dldp_conf.get('dldpEnable', None)
+ dldp_conf['time_interval'] = self.dldp_conf.get('dldpInterval', None)
+ work_mode = self.dldp_conf.get('dldpWorkMode', None)
+ if work_mode == 'dldpEnhance':
+ dldp_conf['work_mode'] = 'enhance'
+ else:
+ dldp_conf['work_mode'] = 'normal'
+
+ auth_mode = self.dldp_conf.get('dldpAuthMode', None)
+ if auth_mode == 'dldpAuthNone':
+ dldp_conf['auth_mode'] = 'none'
+ elif auth_mode == 'dldpAuthSimple':
+ dldp_conf['auth_mode'] = 'simple'
+ elif auth_mode == 'dldpAuthMD5':
+ dldp_conf['auth_mode'] = 'md5'
+ elif auth_mode == 'dldpAuthSHA':
+ dldp_conf['auth_mode'] = 'sha'
+ else:
+ dldp_conf['auth_mode'] = 'hmac-sha256'
+
+ dldp_conf['reset'] = 'disable'
+
+ self.existing = copy.deepcopy(dldp_conf)
+
+ def get_proposed(self):
+ """Get proposed result"""
+
+ self.proposed = dict(enable=self.enable, work_mode=self.work_mode,
+ time_interval=self.internal, reset=self.reset,
+ auth_mode=self.auth_mode, auth_pwd=self.auth_pwd)
+
+ def get_update_cmd(self):
+ """Get update commands"""
+ if self.same_conf:
+ return
+
+ if self.enable and self.enable != self.dldp_conf['dldpEnable']:
+ if self.enable == 'enable':
+ self.updates_cmd.append("dldp enable")
+ elif self.enable == 'disable':
+ self.updates_cmd.append("undo dldp enable")
+ return
+
+ work_mode = 'normal'
+ if self.dldp_conf['dldpWorkMode'] == 'dldpEnhance':
+ work_mode = 'enhance'
+ if self.work_mode and self.work_mode != work_mode:
+ if self.work_mode == 'enhance':
+ self.updates_cmd.append("dldp work-mode enhance")
+ else:
+ self.updates_cmd.append("dldp work-mode normal")
+
+ if self.internal and self.internal != self.dldp_conf['dldpInterval']:
+ self.updates_cmd.append("dldp interval %s" % self.internal)
+
+ if self.auth_mode:
+ if self.auth_mode == 'none':
+ self.updates_cmd.append("undo dldp authentication-mode")
+ else:
+ self.updates_cmd.append("dldp authentication-mode %s %s" % (self.auth_mode, self.auth_pwd))
+
+ if self.reset and self.reset == 'enable':
+ self.updates_cmd.append('dldp reset')
+
+ def get_end_state(self):
+ """Get end state info"""
+
+ dldp_conf = dict()
+ self.dldp_conf = self.get_dldp_exist_config()
+
+ dldp_conf['enable'] = self.dldp_conf.get('dldpEnable', None)
+ dldp_conf['time_interval'] = self.dldp_conf.get('dldpInterval', None)
+ work_mode = self.dldp_conf.get('dldpWorkMode', None)
+ if work_mode == 'dldpEnhance':
+ dldp_conf['work_mode'] = 'enhance'
+ else:
+ dldp_conf['work_mode'] = 'normal'
+
+ auth_mode = self.dldp_conf.get('dldpAuthMode', None)
+ if auth_mode == 'dldpAuthNone':
+ dldp_conf['auth_mode'] = 'none'
+ elif auth_mode == 'dldpAuthSimple':
+ dldp_conf['auth_mode'] = 'simple'
+ elif auth_mode == 'dldpAuthMD5':
+ dldp_conf['auth_mode'] = 'md5'
+ elif auth_mode == 'dldpAuthSHA':
+ dldp_conf['auth_mode'] = 'sha'
+ else:
+ dldp_conf['auth_mode'] = 'hmac-sha256'
+
+ dldp_conf['reset'] = 'disable'
+ if self.reset == 'enable':
+ dldp_conf['reset'] = 'enable'
+ self.end_state = copy.deepcopy(dldp_conf)
+
+ def show_result(self):
+ """Show result"""
+
+ self.results['changed'] = self.changed
+ self.results['proposed'] = self.proposed
+ self.results['existing'] = self.existing
+ self.results['end_state'] = self.end_state
+ if self.changed:
+ self.results['updates'] = self.updates_cmd
+ else:
+ self.results['updates'] = list()
+
+ self.module.exit_json(**self.results)
+
+ def work(self):
+ """Worker"""
+
+ self.dldp_conf = self.get_dldp_exist_config()
+ self.check_params()
+ self.same_conf = self.check_config_if_same()
+ self.get_existing()
+ self.get_proposed()
+ self.config_global_dldp()
+ self.get_update_cmd()
+ self.get_end_state()
+ self.show_result()
+
+
+def main():
+ """Main function entry"""
+
+ argument_spec = dict(
+ enable=dict(choices=['enable', 'disable'], type='str'),
+ work_mode=dict(choices=['enhance', 'normal'], type='str'),
+ time_interval=dict(type='str'),
+ reset=dict(choices=['enable', 'disable'], type='str'),
+ auth_mode=dict(choices=['md5', 'simple', 'sha', 'hmac-sha256', 'none'], type='str'),
+ auth_pwd=dict(type='str', no_log=True),
+ )
+ argument_spec.update(ce_argument_spec)
+ dldp_obj = Dldp(argument_spec)
+ dldp_obj.work()
+
+
+if __name__ == '__main__':
+ main()