Useful Tables

This chapter contains three useful tables:

  • Table 22-1 lists the mc macros used to fill class macros with values.

  • Table 22-2 lists all the class macros that use the mc technique.

  • Table 22-3 lists all the class macros defined internally by sendmail.

Use mc Macros to Fill Class Macros

Several mc macros are used to fill class macros with values based on a test file. These are listed in Table 22-1, along with the class macros they fill. Note that the classes shown should not be used directly because there is no guarantee that they will continue to be available in the future. To be safe, always use the mc macro instead. To reinforce this precaution, we use the mc name for the class (as the EXPOSED_USER class) instead of the class macro name (as the $=E class), as the leading items in the table.

Table 22-1. mc macros used to fill class macros

mc macro

sendmail text reference

Class macro

CANONIFY_DOMAIN_FILE

4.8.28[3ed]

$={Canonify}

confCT_FILE

4.8.47[3ed]

$=t

EXPOSED_USER_FILE

4.4.1[3ed]

$=E

GENERICS_DOMAIN_FILE

4.8.15[3ed]

$=G

LDAPROUTE_DOMAIN_FILE

23.7.11.18[3ed]

$={LDAPRoute}

LDAPROUTE_EQUIVALENT_FILE

23.7.11.18[3ed]

$={LDAPRouteEquiv}

LOCAL_USER_FILE

4.5.5[3ed]

$=L

MASQUERADE_DOMAIN_FILE

4.4.3[3ed]

$=M

MASQUERADE_EXCEPTION_FILE

4.4.6[3ed]

$=N

RELAY_DOMAIN_FILE

7.4.1.2[3ed]

$=R

VIRTUSER_DOMAIN_FILE

4.8.50[3ed]

$={VirtHost}

Classes with mc Configuration

In configuring with the mc technique, many classes ...

Get sendmail 8.13 Companion now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.