start page | rating of books | rating of authors | reviews | copyrights

sendmail Desktop Reference

sendmail Desktop ReferenceSearch this book
Previous: 3.6 The K Command Chapter 3
Databases
Next: 3.8 Databases in Rules
 

3.7 Classes

There are many classes available for use with the K command and for use in rewriting rules. Some require special compile flags to be included when sendmail is built.

btree

Uses Berkeley's db form of database. Database file names have a .db appended (see §33.8.1).

bestmx

Looks up the best MX record for a host (see §33.8.2).

dbm

Uses the ndbm form of database. The database is formed of two files, one whose name ends in .pag and the other in .dir (see §33.8.3).

dequote

Removes quotation marks (see §33.8.4).

hash

Uses Berkeley's db form of database (see §33.8.5).

hesiod

Uses MIT network user authentication services (see §33.8.6).

host

Uses an internal table to store and look up hostnames (see §33.4.3).

implicit

Searches for an aliases database file (see §33.8.8).

ldapx

Uses the Lightweight Directory Access Protocol (see §33.8.9).

netinfo

Uses NeXT Computer's network information services (see §33.8.10).

nis

Uses Sun's Network Information Services ( nis , see §33.8.11).

nisplus

Uses Sun's newer Network Information Services ( nisplus , see §33.8.12).

null

Provides a "never found" service (for internal use only, see §33.8.13).

program

Runs an external program to look up the key (see §33.8.14).

sequence

Searches a series of maps (see §33.8.15).

stab

Loads aliases into the symbol table (internally) (see §33.8.16).

switch

Auto-builds sequences of databases based on service-switch file entries (see §33.8.17).

text

Looks up keys in flat text files (see §33.8.18).

userdb

Uses the User Database (see §33.8.19).

user

Looks up local passwd (5) information (see §33.8.20).


Previous: 3.6 The K Command sendmail Desktop Reference Next: 3.8 Databases in Rules
3.6 The K Command   3.8 Databases in Rules