Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Updates the collection of ghost shapes so that it complies with the source shape's group bounds rules.
Namespace: Microsoft.VisualStudio.Modeling.Diagrams
Assembly: Microsoft.VisualStudio.Modeling.Sdk.Diagrams.10.0 (in Microsoft.VisualStudio.Modeling.Sdk.Diagrams.10.0.dll)
Syntax
'Declaration
Public Overridable Sub GetCompliantGroupBounds ( _
targetShape As ShapeElement, _
ghostShapes As GhostShapeCollection, _
proposedLocationDelta As PointD _
)
public virtual void GetCompliantGroupBounds(
ShapeElement targetShape,
GhostShapeCollection ghostShapes,
PointD proposedLocationDelta
)
public:
virtual void GetCompliantGroupBounds(
ShapeElement^ targetShape,
GhostShapeCollection^ ghostShapes,
PointD proposedLocationDelta
)
abstract GetCompliantGroupBounds :
targetShape:ShapeElement *
ghostShapes:GhostShapeCollection *
proposedLocationDelta:PointD -> unit
override GetCompliantGroupBounds :
targetShape:ShapeElement *
ghostShapes:GhostShapeCollection *
proposedLocationDelta:PointD -> unit
public function GetCompliantGroupBounds(
targetShape : ShapeElement,
ghostShapes : GhostShapeCollection,
proposedLocationDelta : PointD
)
Parameters
- targetShape
Type: Microsoft.VisualStudio.Modeling.Diagrams.ShapeElement
The parent shape, or nulla null reference (Nothing in Visual Basic) if its child shapes are not being assigned to it but just repositioned on the diagram.
- ghostShapes
Type: Microsoft.VisualStudio.Modeling.Diagrams.GhostShapeCollection
A collection of ghost shapes.
- proposedLocationDelta
Type: Microsoft.VisualStudio.Modeling.Diagrams.PointD
The delta for a ghost shape.
Remarks
If a shape has no group bounds rules, the rules for the diagram are used.
Ghost shapes represent the parent shapes at their original locations in the diagram.
.NET Framework Security
- Full trust for the immediate caller. This member cannot be used by partially trusted code. For more information, see Using Libraries from Partially Trusted Code.