I'm assuming for this that you're going to be using rouilj's archive2.pl for your archiving work. This can be found in contrib/archive2.pl in the Majordomo source directory and it should also be linked to archive in the Majordomo home directory.
The only thing you need to do to get archive2 to work for the test mailing list is change the
@archive_dirs lines in /etc/majordomo.cf to @archive_dirs=("/var/spool/majordomo/archive/test");
and, as they say, voilá!
Since you've set up the rules for finding a given list's archive, Majordomo itself knows that a list's files are stashed in that directory (in our case /var/spool/majordomo/archive/test), and anything in there can be retrieved by members of that mailing list (or others depending on how you've configured the list) using the get command in mail messages to Majordomo.
Majordomo neither knows nor cares about the contents of this directory. It simply returns a list of files when asked for an index, or returns the file when asked for that. These files don't actually have to be mail archives, so you can put anything there that may be of interest to the list's users. For example, we have a client who is running a play-by-mail game and he puts the files that are freely available to all the game's players within the archive directory so that his players can retrieve them using mail.
However, there is a caveat associated with Majordomo's file handling. Since Majordomo doesn't know about the contents of a file, it doesn't know if that file is a binary file. (This is a conscious design decision—if you need to do heavy duty file work Majordomo can interface with ftpmail, but that's another story.) Thus, if you want to make binary files available you will need to uuencode and split them up by hand first.
The list is now virtually ready to hand over to the list administrator to operate via mail. The only thing left to do is to create a temporary info file (/var/spool/lists/test.info) for the mailing list—this should be a short file which gives a description of the list, what it's about, who's in charge, policy, that sort of thing. If you don't know all this, just put a dummy info file in place and let the list administrator worry about setting it correctly.
Now you are ready to set up the list's first subscriber. This is usually the list's owner (the chap that test-approval and owner-list point at), in this case firstname.lastname@example.org. Send the following mail message to Majordomo:
To: majordomo Subject: This bit is irrelevant approve foo subscribe test email@example.com end
where foo is the list password and firstname.lastname@example.org is the owner of the list.
You should also send this user a copy of the file Doc/list-owner-info from the Majordomo source directory, which you have editted to take account of the list details (these are all set at the top of the file) so that she/he will be able to administer the list remotely without having to ask you too many questions.
Of course, if you are both the system administrator and the mailing list administrator you'll need to read this file yourself.
What do you know—Majordomo has a bunch of assorted mailing lists. I strongly recommend that you at least join Majordomo-users. To do that, send the following in the body of a mail message to email@example.com :
subscribe majordomo-users lists end
This will subscribe you to majordomo-users and also send you a list of all the mailing lists available.
Piers Cawley (firstname.lastname@example.org) is the Systems Sheriff at Frontier Internet Services, a UK company providing a bewildering variety of services for getting connected. Piers spends most of his time administering the Linux boxes that these services run on. In his copious free time (hah!) Piers has a distressing tendency to sing folk songs. You can e-mail him or you can laugh at his woefully inadequate homepage at www.ftech.co.uk/~pdcawley.
|Privacy Is Personal||Jul 02, 2015|
|July 2015 Issue of Linux Journal: Mobile||Jul 01, 2015|
|July 2015 Video Preview||Jul 01, 2015|
|PHP for Non-Developers||Jun 30, 2015|
|A Code Boot Camp for Underprivileged Kids||Jun 30, 2015|
|Comprehensive Identity Management and Audit for Red Hat Enterprise Linux||Jun 29, 2015|
- Privacy Is Personal
- PHP for Non-Developers
- Secure Server Deployments in Hostile Territory
- Linux Kernel 4.1 Released
- Django Templates
- Comprehensive Identity Management and Audit for Red Hat Enterprise Linux
- July 2015 Issue of Linux Journal: Mobile
- A Code Boot Camp for Underprivileged Kids
- Practical Books for the Most Technical People on the Planet
- Attack of the Drones