ConfigurationNameMappingStrategy Members

Include Protected Members
Include Inherited Members

Retired Content

This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies. This page may contain URLs that were valid when originally published, but now link to sites or pages that no longer exist.

The ConfigurationNameMappingStrategy type exposes the following members.

Constructors

  Name Description
Public method ConfigurationNameMappingStrategy

Methods

  Name Description
Public method BuildUp
Override of BuildUp(IBuilderContext, Type, Object, String). Updates the instance name using a name mapper associated to type t so later strategies in the build chain will use the updated instance name.
(Overrides BuilderStrategy.BuildUp(IBuilderContext, Type, Object, String).)
Public method BuildUp<TItem> (Inherited from BuilderStrategy.)
Public method Equals (Inherited from Object.)
Protected method Finalize (Inherited from Object.)
Protected method GetConfigurationSource
Returns the IConfigurationSource instance from the context.
(Inherited from EnterpriseLibraryBuilderStrategy.)
Public method GetHashCode (Inherited from Object.)
Protected method GetReflectionCache
Returns the ConfigurationReflectionCache instance from the context.
(Inherited from EnterpriseLibraryBuilderStrategy.)
Public method GetType (Inherited from Object.)
Protected method MemberwiseClone (Inherited from Object.)
Protected method ParametersToTypeList (Inherited from BuilderStrategy.)
Public method TearDown (Inherited from BuilderStrategy.)
Public method ToString (Inherited from Object.)
Protected method TraceBuildUp (Inherited from BuilderStrategy.)
Protected method TraceEnabled (Inherited from BuilderStrategy.)
Protected method TraceTearDown (Inherited from BuilderStrategy.)

See Also

ConfigurationNameMappingStrategy Class

Microsoft.Practices.EnterpriseLibrary.Common.Configuration.ObjectBuilder Namespace

Retired Content

This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies. This page may contain URLs that were valid when originally published, but now link to sites or pages that no longer exist.