ConfiguredObjectStrategy Members

Include Protected Members
Include Inherited Members

Retired Content

This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies. This page may contain URLs that were valid when originally published, but now link to sites or pages that no longer exist.

The ConfiguredObjectStrategy type exposes the following members.

Constructors

  Name Description
Public method ConfiguredObjectStrategy
Initializes a new instance of the ConfiguredObjectStrategy class.

Methods

  Name Description
Public method BuildUp
Override of BuildUp(IBuilderContext, Type, Object, String). Creates the requested object using the custom factory associated to type t.
(Overrides BuilderStrategy.BuildUp(IBuilderContext, Type, Object, String).)
Public method BuildUp<TItem> (Inherited from BuilderStrategy.)
Public method Equals (Inherited from Object.)
Protected method Finalize (Inherited from Object.)
Protected method GetConfigurationSource
Returns the IConfigurationSource instance from the context.
(Inherited from EnterpriseLibraryBuilderStrategy.)
Public method GetHashCode (Inherited from Object.)
Protected method GetReflectionCache
Returns the ConfigurationReflectionCache instance from the context.
(Inherited from EnterpriseLibraryBuilderStrategy.)
Public method GetType (Inherited from Object.)
Protected method MemberwiseClone (Inherited from Object.)
Protected method ParametersToTypeList (Inherited from BuilderStrategy.)
Public method TearDown (Inherited from BuilderStrategy.)
Public method ToString (Inherited from Object.)
Protected method TraceBuildUp (Inherited from BuilderStrategy.)
Protected method TraceEnabled (Inherited from BuilderStrategy.)
Protected method TraceTearDown (Inherited from BuilderStrategy.)

See Also

ConfiguredObjectStrategy Class

Microsoft.Practices.EnterpriseLibrary.Common.Configuration.ObjectBuilder Namespace

Retired Content

This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies. This page may contain URLs that were valid when originally published, but now link to sites or pages that no longer exist.