O'Reilly logo

Sendmail, 3rd Edition by Bryan Costales

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Classes with mc Configuration

In configuring with the mc technique, many classes are defined for your convenience. You need to be aware of these, not only to take advantage of them, but also to avoid reusing their names by mistake. Table 22-2 lists all the macros that the mc technique uses as of version 8.12. Most are described in other sections, but a few are described here. See a description of LOCAL_CONFIG (Section 4.3.3.1) for the general method used for adding members and new class names using the mc configuration technique.

Table 22-2. Class macros used with the mc configuration technique

Class

§

Description

$={Accept}

Section 7.5.1

With the access_db feature, the possible acceptance strings from the access database (V8.10 and above)

$=B

FEATURE(bestmx_is_local)

With the bestmx_is_local feature, the domains to look up in bestmx in place of $=w

$={Canonify}

FEATURE(nocanonify)

With CANONIFY_DOMAIN or CANONIFY_DOMAIN_FILE, do canonify these domains (V8.10 and above)

$=E

Section 4.4.1

With EXPOSED_USER or EXPOSED_USER_FILE, the list of exposed users

$=G

Section 4.8.1

With GENERICS_DOMAIN or GENERICS_DOMAIN_FILE, list of domains to look up in generics table

$=L

Section 4.5.5

With LOCAL_USER or LOCAL_USER_FILE, the list of local users

$={LDAPRoute}

See this section

With LDAPROUTE_DOMAIN or LDAPROUTE_DOMAIN_FILE, route only LDAP hosts in this class

$={LDAPRouteEquiv}

See this section

With LDAPROUTE_EQUIVALENT or LDAPROUTE_EQUIVALENT_FILE, the host ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required