Classes with mc Configuration

In configuring with the mc technique, many classes are defined for your convenience. You need to be aware of these, not only to take advantage of them, but also to avoid reusing their names by mistake. Table 22-2 lists all the macros that the mc technique uses as of version 8.12. Most are described in other sections, but a few are described here. See a description of LOCAL_CONFIG (LOCAL_CONFIG mc macro on page 595) for the general method used for adding members and new class names using the mc configuration technique.

Table 22-2. Class macros used with the mc configuration technique

Class

§

Description

$={Accept}

Enabling the access Database Generally on page 277

With FEATURE(access_db), the possible acceptance strings from the access database (V8.10 and later)

$=B

FEATURE(bestmx_is_local) on page 617

With FEATURE(bestmx_is_local), the domains to look up in bestmx in place of $=w

$={Canonify}

FEATURE(nocanonify) on page 634

With CANONIFY_DOMAIN or CANONIFY_DOMAIN_FILE, do canonify these domains (V8.10 and later)

$=E

EXPOSED_USER mc Macro on page 599

With EXPOSED_USER or EXPOSED_USER_FILE, the list of exposed users

$=G

GENERICS_DOMAIN mc macro on page 624

With GENERICS_DOMAIN or GENERICS_DOMAIN_FILE, list of domains to look up in generics table

$=L

LOCAL_USER mc Macro on page 605

With LOCAL_USER or LOCAL_USER_FILE, the list of local users

$={LDAPRoute}

LDAPROUTE_DOMAIN and LDAPROUTE_DOMAIN_FILE on page 924

With LDAPROUTE_DOMAIN ...

Get sendmail, 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.