X! \fB$(\fP\fIx key\fP\fB$@\fP\fIarg\fP\fB$:\fP\fIdefault\fP\fB$)\fP Lookup the \fIkey\fP in database \fIx\fP, and sprintf \fIarg\fP through the result.
X \fB$>\fP\fIn\fP \*(lqCall\*(rq ruleset \fIn\fP
X \fB$#\fP\fImailer\fP Resolve to \fImailer\fP
X \fB$@\fP\fIhost\fP Specify \fIhost\fP
X***************
X*** 2178,2184 ****
X--- 2237,2304 ----
X .q $[[128.32.130.2]$]
X would become
X .q vangogh.berkeley.edu.
X+ The
X+ .b $: \c
X+ .i default
X+ part is optional and specifies what should be substituted
X+ in case that the
X+ .i name
X+ is not known to
X+ .i gethostent \|(3).
X .pp
X+ General
X+ .i dbm \|(3)
X+ databases may be searched using the
X+ .b $( \c
X+ .i "x key" \c
X+ .b $)
X+ syntax. The expression may be supplied with an optional result argument,
X+ .b $@ \c
X+ .i arg,
X+ and a default string,
X+ .b $: \c
X+ .i default.
X+ The database is specified by a single character and defined using the
X+ .q K
X+ option as in
X+ .(b
X+ OKP/usr/lib/mail/pathtable
X+ .)b
X+ which defines database
X+ .b P
X+ to be associated with the dbm files /usr/lib/mail/pathtable.{dir,pag}.
X+ You can also make sendmail search a
X+ .i "Yellow Pages"
X+ database if your machine supports this. To do this, use the same
X+ definition as above but prefix the map name with a percent sign, as in:
X+ .(b
X+ OKP%mail.aliases
X+ .)b
X+ Only maps in your default domain can currently be accessed.
X+ An expression like
X+ .q "$(P sun $@ soren $: backbone!sun!soren $)"
X+ would look for the string
X+ .q sun
X+ in the
X+ .q P
X+ database and sprintf
X+ .q soren
X+ through the result, or substitute
X+ .q backbone!sun!soren
X+ if the key could not be found.
X+ If no
X+ .i default
X+ argument is supplied and the key could not be found, the whole
X+ expression is replaced with the key.
X+ .pp
X+ The aliases database is automatically available as database
X+ .b @ .
X+ It can either be defined using the
X+ .b A
X+ option or by a
X+ .b OK@
X+ declaration and is in both cases allowed to be a YP map.
X+ .pp
X The
X .b $> \c
X .i n
X***************
X*** 2191,2197 ****
X then becomes
X the substitution for this rule.
X .pp
X! The
X .b $#
X syntax should
X .i only
X--- 2311,2317 ----
X then becomes
X the substitution for this rule.
X .pp
X! In most cases, the
X .b $#
X syntax should
X .i only
X***************
X*** 2236,2252 ****
X .b $@
X and
X .b $:
X! prefixes may precede a
X .b $>
X! spec;
X for example:
X .(b
X .ta 8n
X! R$+ $:$>7$1
X .)b
X matches anything,
X! passes that to ruleset seven,
X! and continues;
X the
X .b $:
X is necessary to avoid an infinite loop.
X--- 2356,2372 ----
X .b $@
X and
X .b $:
X! prefixes may precede
X .b $>
X! specs;
X for example:
X .(b
X .ta 8n
X! R$+ $:$>7$>8$1
X .)b
X matches anything,
X! passes that to ruleset eight and the result of that to ruleset seven,
X! and finally continues;
X the
X .b $:
X is necessary to avoid an infinite loop.
X***************
X*** 2253,2260 ****
X .pp
X Substitution occurs in the order described,
X that is,
X! parameters from the LHS are substituted,
X! hostnames are canonicalized,
X .q subroutines
X are called,
X and finally
X--- 2373,2380 ----
X .pp
X Substitution occurs in the order described,
X that is,
X! parameters from the LHS are substituted and runtime macros are expanded,
X! hostnames are canonicalized and database lookups are performed,
X .q subroutines
X are called,
X and finally
X***************
X*** 2710,2720 ****
X as it proceeds,
X finally showing you the address it ends up with.
X You may use a comma separated list of rwsets
X! for sequential application of rules to an input;
X! ruleset three is always applied first.
X For example:
X .(b
X! 1,21,4 monet:bollard
X .)b
X first applies ruleset three to the input
X .q monet:bollard.
X--- 2830,2839 ----
X as it proceeds,
X finally showing you the address it ends up with.
X You may use a comma separated list of rwsets
X! for sequential application of rules to an input.
X For example:
X .(b
X! 3,1,21,4 monet:bollard
X .)b
X first applies ruleset three to the input
X .q monet:bollard.
X***************
X*** 2854,2859 ****
X--- 2973,2979 ----
X Other flags are described
X in Appendix C.
X .pp
X+ .pp
X The S and R fields in the mailer description
X are per-mailer rewriting sets
X to be applied to sender and recipient addresses
X***************
X*** 2884,2889 ****
X--- 3004,3016 ----
X These sets can also be used
X to do special purpose output rewriting
X in cooperation with ruleset four.
X+ If required, the R and S rulesets may be specified independently for envelope
X+ and header addresses by separating them with a slash. E.g.,
X+ .q R=13/14
X+ means that envelope recipient addresses should be sent through ruleset 13
X+ while those in the header should be passed to ruleset 14.
X+ You can disable any mailer specific rewriting by specifying the ruleset as
X+ zero or by leaving it blank.
X .pp
X The E field defines the string to use
X as an end-of-line indication.
X***************
X*** 3026,3031 ****
X--- 3153,3159 ----
X i Initialize the alias database
X p Print the mail queue
X z Freeze the configuration file
X+ b Run in Batched SMTP mode
X .)b
X The special processing for the
X ARPANET
X***************
X*** 3050,3055 ****
X--- 3178,3188 ----
X .i Sendmail
X runs as the invoking user (rather than root)
X when this flag is specified.
X+ .ip \-Z\fIfile\fP
X+ Use a different frozen configuration file.
X+ .i Sendmail
X+ runs as the invoking user (rather than root)
X+ when this flag is specified.
X .ip \-d\fIlevel\fP
X Set debugging level.
X .ip \-o\fIx\|value\fP
X***************
X*** 3166,3171 ****
X--- 3299,3318 ----
X for SMTP.
X .ip i
X Ignore dots in incoming messages.
X+ .ip K\fIxfile\fP
X+ Declare the
X+ keyed database
X+ .i x
X+ to be associated with the
X+ .i dbm \|(3)
X+ file
X+ .i file.
X+ (\fIX\fP is a single letter.)
X+ The database
X+ .q @
X+ is always bound to the
X+ .i aliases
X+ database.
X .ip L\fIn\fP
X Set the default log level to
X .i n .
X***************
X*** 3406,3415 ****
X will not terminate the message prematurely.
X .ip L
X Limit the line lengths as specified in RFC821.
X! .ip P
X Use the return-path in the SMTP
X .q "MAIL FROM:"
X! command
X rather than just the return address;
X although this is required in RFC821,
X many hosts do not process return paths properly.
X--- 3553,3564 ----
X will not terminate the message prematurely.
X .ip L
X Limit the line lengths as specified in RFC821.
X! .ip p
X Use the return-path in the SMTP
X .q "MAIL FROM:"
X! command or in the UUCP
X! .q From_
X! line
X rather than just the return address;
X although this is required in RFC821,
X many hosts do not process return paths properly.
X***************
X*** 3450,3455 ****
X--- 3599,3620 ----
X Escape lines beginning with
X .q From
X in the message with a `>' sign.
X+ .ip V
X+ Make all header addresses UUCP !-relative with respect to ourselves
X+ and the recipient host. This means that all header lines will have
X+ working paths relative to the recipient host. Routes through the
X+ remote host, i.e. addresses that begin with
X+ .q remote!
X+ are stripped of that part unless the ultimate
X+ recipient resides on the remote host (i.e., there are no more bangs in
X+ the address). All other addresses are prefixed with
X+ .q ourhost!
X+ if not already there.
X+ .i Ourhost
X+ is fetched from the
X+ .b $k
X+ macro, which defaults to your hostname as supplied by
X+ .i gethostname \|(3).
X .+c "OTHER CONFIGURATION"
X .rm $0
X .nr ii 1i
X***************
X*** 3603,3608 ****
X--- 3768,3782 ----
X that allows multiple databases will be used.
X .q DBM
X must also be set.
X+ .ip MDBM
X+ If set, Maryland's
X+ .i mdbm \|(3)
X+ package should be substituted for the
X+ .i ndbm \|(3)
X+ routines. This should only be used if you want the keyed database
X+ functionality (\fB$(x key$)\fP), but don't have
X+ .i ndbm \|(3)
X+ available.
X .ip DEBUG
X If set, debugging information is compiled in.
X To actually get the debugging output,
X***************
X*** 3929,3935 ****
X .ip "/usr/lib/sendmail"
X The binary of
X .i sendmail .
X! .ip /usr/bin/newaliases
X A link to /usr/lib/sendmail;
X causes the alias database to be rebuilt.
X Running this program is completely equivalent to giving
X--- 4103,4109 ----
X .ip "/usr/lib/sendmail"
X The binary of
X .i sendmail .
X! .ip /usr/ucb/newaliases
X A link to /usr/lib/sendmail;
X causes the alias database to be rebuilt.
X Running this program is completely equivalent to giving
X***************
X*** 3937,3948 ****
X the
X .b \-bi
X flag.
X! .ip /usr/bin/mailq
X Prints a listing of the mail queue.
X This program is equivalent to using the
X .b \-bp
X flag to
X .i sendmail .
X .ip /usr/lib/sendmail.cf
X The configuration file,
X in textual form.
X--- 4111,4128 ----
X the
X .b \-bi
X flag.
X! .ip /usr/ucb/mailq
X Prints a listing of the mail queue.
X This program is equivalent to using the
X .b \-bp
X flag to
X .i sendmail .
X+ .ip /usr/ucb/bsmtp
X+ A link to /usr/lib/sendmail; starts up
X+ .i sendmail
X+ in Batched SMTP mode (as if supplied with the
X+ .b \-bb
X+ option).
X .ip /usr/lib/sendmail.cf
X The configuration file,
X in textual form.
END_OF_ida/patches/op.me.diff
if test 15423 -ne `wc -c <ida/patches/op.me.diff`; then
echo shar: \"ida/patches/op.me.diff\" unpacked with wrong size!
fi
# end of overwriting check
fi
echo shar: End of archive 4 \(of 8\).
cp /dev/null ark4isdone
MISSING=""
for I in 1 2 3 4 5 6 7 8 ; do
if test ! -f ark${I}isdone ; then
MISSING="${MISSING} ${I}"
fi
done
if test "${MISSING}" = "" ; then
echo You have unpacked all 8 archives.
echo "See ida/README and ida/INSTALL for further directions."
rm -f ark[1-9]isdone
else
echo You still need to unpack the following archives: