I have properties set by a <DirectorySearch> and a <RegistrySearch> both of 
which work as expected with UI but neither of which is set when run in silent 
mode:

<Property Id="ABCFOLDER">
  <DirectorySearch Id="ABCSearch" Path="[SOURCEDIR]ABC" Depth="1" />
</Property>

<Property Id="DOTXYZ">
  <RegistrySearch Id="DotXYZSearch" Root="HKCR" Key=".xyz" Type="raw" />
</Property>

Log file with UI:

  Action start 11:29:54: AppSearch.
  AppSearch: Property: DOTXYZ, Signature: DotXYZSearch
  MSI (c) (D0:A4) [11:29:54:650]: Note: 1: 2262 2: Signature 3: -2147287038
  MSI (c) (D0:A4) [11:29:54:730]: Note: 1: 1402 2: HKEY_CLASSES_ROOT\.xyz 3: 2
  AppSearch: Property: IPIFOLDER, Signature: ABCSearch
  MSI (c) (D0:A4) [11:29:54:740]: Note: 1: 2262 2: Signature 3: -2147287038
  MSI (c) (D0:A4) [11:29:54:760]: PROPERTY CHANGE: Adding ABCFOLDER property. 
Its value is 'C:\Users\kparkes\Documents\ABC\'.
  Action ended 11:29:54: AppSearch. Return value 1.

Log file in silent mode:

 Action start 12:28:43: AppSearch.
  MSI (s) (44:9C) [12:28:43:152]: Note: 1: 2262 2: Signature 3: -2147287038
  MSI (s) (44:9C) [12:28:43:152]: Note: 1: 1402 2: HKEY_CLASSES_ROOT\.xyz 3: 2
  MSI (s) (44:9C) [12:28:43:152]: Note: 1: 2262 2: Signature 3: -2147287038
  MSI (s) (44:9C) [12:28:43:162]: Doing action: LaunchConditions
  Action ended 12:28:43: AppSearch. Return value 1.

What am I doing wrong?

Thanks
------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure 
contains a definitive record of customers, application performance, 
security threats, fraudulent activity, and more. Splunk takes this 
data and makes sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-novd2d
_______________________________________________
WiX-users mailing list
WiX-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/wix-users

Reply via email to