ShapeGeometry.DoFoldToShape Method
Calculates the point where a connector crosses the outline of the shape geometry. It is used to compute where connectors should terminate.
Namespace: Microsoft.VisualStudio.Modeling.Diagrams
Assembly: Microsoft.VisualStudio.Modeling.Sdk.Diagrams.12.0 (in Microsoft.VisualStudio.Modeling.Sdk.Diagrams.12.0.dll)
Syntax
'Declaration
Public MustOverride Function DoFoldToShape ( _
geometryHost As IGeometryHost, _
potentialPoint As PointD, _
vectorEndpoint As PointD _
) As PointD
public abstract PointD DoFoldToShape(
IGeometryHost geometryHost,
PointD potentialPoint,
PointD vectorEndpoint
)
public:
virtual PointD DoFoldToShape(
IGeometryHost^ geometryHost,
PointD potentialPoint,
PointD vectorEndpoint
) abstract
abstract DoFoldToShape :
geometryHost:IGeometryHost *
potentialPoint:PointD *
vectorEndpoint:PointD -> PointD
public abstract function DoFoldToShape(
geometryHost : IGeometryHost,
potentialPoint : PointD,
vectorEndpoint : PointD
) : PointD
Parameters
geometryHost
Type: Microsoft.VisualStudio.Modeling.Diagrams.IGeometryHostThe shape or link.
potentialPoint
Type: Microsoft.VisualStudio.Modeling.Diagrams.PointDThe point along the bounding rectangle where the connector crosses the boundary, measured relative to the parent shape.
vectorEndpoint
Type: Microsoft.VisualStudio.Modeling.Diagrams.PointDThe direction of the connector. An arbitrary point along the line, in coordinates relative to the potentialPoint. For example, if the line is horizontal, the Y coordinate will be 0.
Return Value
Type: Microsoft.VisualStudio.Modeling.Diagrams.PointD
The point where the connector crosses the outline of the shape, measured relative to the parent shape.
Remarks
You can override this method if your shape does not extend fully to the boundary rectangle. Alternatively, it might be simpler to override DoFoldToShape in ShapeElement, and avoid having to create your own ShapeGeometry class.
.NET Framework Security
- Full trust for the immediate caller. This member cannot be used by partially trusted code. For more information, see Using Libraries from Partially Trusted Code.