Share via


ExternalConfigurationFileStorageCreationCommand Members

Include Protected Members
Include Inherited Members

Retired Content

This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies. This page may contain URLs that were valid when originally published, but now link to sites or pages that no longer exist.

The ExternalConfigurationFileStorageCreationCommand type exposes the following members.

Constructors

  Name Description
Public method ExternalConfigurationFileStorageCreationCommand
Initialize a new instance of the ExternalConfigurationFileStorageCreationCommand class with a file name and IServiceProvider.

Methods

  Name Description
Protected method CanOverwriteFile
Determines if the current FileName can be overwrriten. It will prompt the user throuth the user interface if the user wants to overwrite the file.
(Inherited from FileStorageCreationCommand.)
Public method Equals (Inherited from Object.)
Public method Execute
Executes the creation of the file.
(Overrides StorageCreationCommand.Execute().)
Protected method Finalize (Inherited from Object.)
Public method GetHashCode (Inherited from Object.)
Public method GetType (Inherited from Object.)
Protected method LogError
(Inherited from StorageCreationCommand.)
Protected method MemberwiseClone (Inherited from Object.)
Public method ToString (Inherited from Object.)

Properties

  Name Description
Protected property FileName
Gets or sets the name of the file to create.
(Inherited from FileStorageCreationCommand.)
Public property Name
Gets the name of the storage to create.
(Inherited from StorageCreationCommand.)
Protected property ServiceProvider
Gets or sets the IServiceProvider for the command.
(Inherited from StorageCreationCommand.)

See Also

ExternalConfigurationFileStorageCreationCommand Class

Microsoft.Practices.EnterpriseLibrary.Configuration.Design Namespace

Retired Content

This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies. This page may contain URLs that were valid when originally published, but now link to sites or pages that no longer exist.