There isn't, and quite intentionally.

Telnet is a obviously a very insecure protocol, completely insecure in
fact, and we strongly want to discourage usage.

Yet, it would be quite trivial to write a connection plugin to support it,
though, as connection plugins just need to support the ability to put a
file, get a file, and execute a module (assume ftp would also be used
rather than netcat?).

To be honest, I considered it as an April fools joke at one point -- to
actually implement it -- but I didn't do it.

Most networking equipment -- though a lot of the ways people attempt to
configure networking equipment with Ansible can be hacky -- can usually be
coerced into enabling SSH.

We would likely refuse the pull request, to be honest -- it is just asking
for a world of hurt should MITM possibilities arise.

--Michael





On Tue, Apr 15, 2014 at 5:33 PM, Bas Meijer <[email protected]> wrote:

> Is there by any chance a 'telnet' module? I would like to connect to a
> certain port on localhost and enter text and look for strings in the output.
>
> --
> You received this message because you are subscribed to the Google Groups
> "Ansible Project" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to [email protected].
> To post to this group, send email to [email protected].
> To view this discussion on the web visit
> https://groups.google.com/d/msgid/ansible-project/91124DEF-F2F0-40D1-94B1-A673D7119008%40iwelcome.com
> .
> For more options, visit https://groups.google.com/d/optout.
>

-- 
You received this message because you are subscribed to the Google Groups 
"Ansible Project" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/ansible-project/CA%2BnsWgzSaHKkcctOF%2BcL3N9sSq8oiytyp6ZrdPqr%3Dit229gc9A%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to