Jaa


FileStorageCreationCommand Members

Include Protected Members
Include Inherited Members

Retired Content

This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies. This page may contain URLs that were valid when originally published, but now link to sites or pages that no longer exist.

The FileStorageCreationCommand type exposes the following members.

Constructors

  Name Description
Protected method FileStorageCreationCommand
Initialize a new instance of the FileStorageCreationCommand class with a file name and IServiceProvider.

Methods

  Name Description
Protected method CanOverwriteFile
Determines if the current FileName can be overwrriten. It will prompt the user throuth the user interface if the user wants to overwrite the file.
Public method Equals (Inherited from Object.)
Public method Execute
When overriden by a class, executes the command to create the storage.
(Inherited from StorageCreationCommand.)
Protected method Finalize (Inherited from Object.)
Protected methodStatic member GetAbsolutePathFromConfigurationPath
Gets the absolute path for a file based on the application's configuration file location.
Public method GetHashCode (Inherited from Object.)
Public method GetType (Inherited from Object.)
Protected method LogError
(Inherited from StorageCreationCommand.)
Protected method MemberwiseClone (Inherited from Object.)
Public method ToString (Inherited from Object.)

Properties

  Name Description
Protected property FileName
Gets or sets the name of the file to create.
Public property Name
Gets the name of the storage to create.
(Inherited from StorageCreationCommand.)
Protected property ServiceProvider
Gets or sets the IServiceProvider for the command.
(Inherited from StorageCreationCommand.)

See Also

FileStorageCreationCommand Class

Microsoft.Practices.EnterpriseLibrary.Configuration.Design Namespace

Retired Content

This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies. This page may contain URLs that were valid when originally published, but now link to sites or pages that no longer exist.