Hi,

just to clarify:
I try to install a x86 Office AddIn for a x86 Office installation on a 
x64 windows 7 System. So the paths, that I can see so far, are ok. The 
problem I have, occurres only on a few (vb6) files, which I can register 
using regsvr32, but I can't extract the required registry keys using heat.

The result of heat is a component with just the file without the 
registry keys for type lib, class id, etc.

Well, I guess I don't have a choice but registering this components 
using regsvr32 in a custom action for installation and regsvr32 /u for 
removal...

Regards, Michel


Am 26.05.2012 16:10, schrieb Brian C:
> <Hit send too early>
> For us, we compared the heat extraction with the .reg results from using 
> RegSpy for our 64 bit dlls.   Everything was the same except the source path, 
> so the script just copies the .wxs generated by heat and replaces the source 
> path with the 64 bit location.
>
> Brian
>
>
> ________________________________
>   From: Brian C<briancoving...@yahoo.com>
> To: General discussion for Windows Installer XML 
> toolset.<wix-users@lists.sourceforge.net>
> Sent: Friday, May 25, 2012 11:46 PM
> Subject: Re: [WiX-users] harvesting COM information using heat.exe results in 
> HEAT5150
>
> Heat does not extract for 64-bit dlls.  We have had to write a script to 
> "convert" the 32 bit extraction into 64 bit.
>
>
>
> ________________________________
> From: Michael Scheepers<mscheep...@tool-links.de>
> To: General discussion for Windows Installer XML 
> toolset.<wix-users@lists.sourceforge.net>
> Sent: Friday, May 25, 2012 2:56 AM
> Subject: [WiX-users] harvesting COM information using heat.exe results in 
> HEAT5150
>
> Hi there,
>
> I try to extract the self-register information for a COM file written
> with VB6 a long time ago.
>
> If I use regsvr32 to register the file manually on Win7 64-bit it works
> fine. But when I try to extract the information using heat with the
> following command line, just the file tag is generated, without having
> the com information extracted.
> Command line:
>      heat file file.dll -sfrag -srd -suid -svb6 -out file.wxi
> Result:
>      heat.exe : warning HEAT5150 : Could not harvest data from a
>      file that was expected to be a SelfReg DLL: path\to\file.dll.
>      If this file does not support SelfReg you can ignore this
>      warning. Otherwise, this error detail may be helpful to
>      diagnose the failure: Ein Aufrufziel hat einen Ausnahmefehler
>      verursacht.
>
> When I use Dependency Walker I can see, that a delay-load dependency to
> GPSVC.DLL was not found. That might be, because I am running a Windows 7
> 64-bit machine, but the DLL is for a x86 architecture, but again:
> registering the file using regsvr32 works fine. I searched the internet
> and found an article [1] where the solution is to change the
> architecture of the dll to 64-bit, but that is no option to me.
>
> So is there an other way to have the file self-registered during
> installation except using 2 custom actions to call regsvr32 and regsvr32 /u
>
> Regards, Michel
>
> [1]
> http://social.msdn.microsoft.com/Forums/en-IE/vcgeneral/thread/93f8509b-b6e8-45a8-81a4-a7a127385d84
>
> ------------------------------------------------------------------------------
> Live Security Virtual Conference
> Exclusive live event will cover all the ways today's security and
> threat landscape has changed and how IT managers can respond. Discussions
> will include endpoint security, mobile security and the latest in malware
> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
> _______________________________________________
> WiX-users mailing list
> WiX-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/wix-users
> ------------------------------------------------------------------------------
> Live Security Virtual Conference
> Exclusive live event will cover all the ways today's security and
> threat landscape has changed and how IT managers can respond. Discussions
> will include endpoint security, mobile security and the latest in malware
> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
> _______________________________________________
> WiX-users mailing list
> WiX-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/wix-users
> ------------------------------------------------------------------------------
> Live Security Virtual Conference
> Exclusive live event will cover all the ways today's security and
> threat landscape has changed and how IT managers can respond. Discussions
> will include endpoint security, mobile security and the latest in malware
> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
> _______________________________________________
> WiX-users mailing list
> WiX-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/wix-users
>

-- 
Michael Scheepers
Grüner Weg 46
41468 Neuss

Tel.:   +49 (2131) 133 48 30
Fax:    +49 (2131) 133 48 32
Mobil:  +49 (173) 318 320 5

eMail:  mscheep...@tool-links.de


Der Inhalt dieser Email, inklusive seiner Anhaenge, ist vertraulich und 
ausschließlich für den bezeichneten Empfaenger bestimmt. Wenn Sie nicht 
der vorgesehene Empfaenger dieser Email oder dessen Vertreter sind, so 
beachten Sie bitte, dass jede Form der Kenntnisnahme, Nutzung, 
Veroeffentlichung, Vervielfaeltigung oder Weitergabe unzulaessig ist. 
Wir bitten Sie in diesem Fall, sich mit dem Absender dieser Email in 
Verbindung zu setzen.

This e-mail is intended exclusively for the individual or entity to 
which it is addressed and may contain confidential or legally privileged 
information, which may not be disclosed under current legislation. Any 
form of disclosure, copying or distribution of this e-mail is strictly 
prohibited. If you have received this message in error, please notify 
the sender immediately by e-mail and delete all copies of the message.

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
WiX-users mailing list
WiX-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/wix-users

Reply via email to