Share via


ConfiguredObjectStrategy Class

Retired Content

This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies. This page may contain URLs that were valid when originally published, but now link to sites or pages that no longer exist.

Implementation of IBuilderStrategy which creates objects.

Namespace:  Microsoft.Practices.EnterpriseLibrary.Common.Configuration.ObjectBuilder
Assembly:  Microsoft.Practices.EnterpriseLibrary.Common (in Microsoft.Practices.EnterpriseLibrary.Common.dll)

Syntax

'Declaration
PublicClassConfiguredObjectStrategy _
    Inherits EnterpriseLibraryBuilderStrategy
publicclassConfiguredObjectStrategy : EnterpriseLibraryBuilderStrategy
publicref classConfiguredObjectStrategy : public EnterpriseLibraryBuilderStrategy
publicclass ConfiguredObjectStrategy extends EnterpriseLibraryBuilderStrategy

Remarks

The strategy looks for the CustomFactory attribute to retrieve the ICustomFactory implementation needed to build the requested types based on configuration.

The provided context must have a ConfigurationObjectPolicy holding a IConfigurationSource where to request the configuration information.

Inheritance Hierarchy

System.Object
  Microsoft.Practices.ObjectBuilder.BuilderStrategy
    Microsoft.Practices.EnterpriseLibrary.Common.Configuration.ObjectBuilder.EnterpriseLibraryBuilderStrategy
      Microsoft.Practices.EnterpriseLibrary.Common.Configuration.ObjectBuilder.ConfiguredObjectStrategy

See Also

ConfiguredObjectStrategy Members

Microsoft.Practices.EnterpriseLibrary.Common.Configuration.ObjectBuilder Namespace

Microsoft.Practices.EnterpriseLibrary.Common.Configuration.ObjectBuilder.ICustomFactory

Microsoft.Practices.EnterpriseLibrary.Common.Configuration.ObjectBuilder.CustomFactoryAttribute

Microsoft.Practices.EnterpriseLibrary.Common.Configuration.ObjectBuilder.ConfigurationObjectPolicy

Retired Content

This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies. This page may contain URLs that were valid when originally published, but now link to sites or pages that no longer exist.