I have properties set by a <DirectorySearch> and a <RegistrySearch> both of which work as expected with UI but neither of which is set when run in silent mode:
<Property Id="ABCFOLDER"> <DirectorySearch Id="ABCSearch" Path="[SOURCEDIR]ABC" Depth="1" /> </Property> <Property Id="DOTXYZ"> <RegistrySearch Id="DotXYZSearch" Root="HKCR" Key=".xyz" Type="raw" /> </Property> Log file with UI: Action start 11:29:54: AppSearch. AppSearch: Property: DOTXYZ, Signature: DotXYZSearch MSI (c) (D0:A4) [11:29:54:650]: Note: 1: 2262 2: Signature 3: -2147287038 MSI (c) (D0:A4) [11:29:54:730]: Note: 1: 1402 2: HKEY_CLASSES_ROOT\.xyz 3: 2 AppSearch: Property: IPIFOLDER, Signature: ABCSearch MSI (c) (D0:A4) [11:29:54:740]: Note: 1: 2262 2: Signature 3: -2147287038 MSI (c) (D0:A4) [11:29:54:760]: PROPERTY CHANGE: Adding ABCFOLDER property. Its value is 'C:\Users\kparkes\Documents\ABC\'. Action ended 11:29:54: AppSearch. Return value 1. Log file in silent mode: Action start 12:28:43: AppSearch. MSI (s) (44:9C) [12:28:43:152]: Note: 1: 2262 2: Signature 3: -2147287038 MSI (s) (44:9C) [12:28:43:152]: Note: 1: 1402 2: HKEY_CLASSES_ROOT\.xyz 3: 2 MSI (s) (44:9C) [12:28:43:152]: Note: 1: 2262 2: Signature 3: -2147287038 MSI (s) (44:9C) [12:28:43:162]: Doing action: LaunchConditions Action ended 12:28:43: AppSearch. Return value 1. What am I doing wrong? Thanks ------------------------------------------------------------------------------ All the data continuously generated in your IT infrastructure contains a definitive record of customers, application performance, security threats, fraudulent activity, and more. Splunk takes this data and makes sense of it. IT sense. And common sense. http://p.sf.net/sfu/splunk-novd2d _______________________________________________ WiX-users mailing list WiX-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/wix-users