Hi, just to clarify: I try to install a x86 Office AddIn for a x86 Office installation on a x64 windows 7 System. So the paths, that I can see so far, are ok. The problem I have, occurres only on a few (vb6) files, which I can register using regsvr32, but I can't extract the required registry keys using heat.
The result of heat is a component with just the file without the registry keys for type lib, class id, etc. Well, I guess I don't have a choice but registering this components using regsvr32 in a custom action for installation and regsvr32 /u for removal... Regards, Michel Am 26.05.2012 16:10, schrieb Brian C: > <Hit send too early> > For us, we compared the heat extraction with the .reg results from using > RegSpy for our 64 bit dlls. Everything was the same except the source path, > so the script just copies the .wxs generated by heat and replaces the source > path with the 64 bit location. > > Brian > > > ________________________________ > From: Brian C<briancoving...@yahoo.com> > To: General discussion for Windows Installer XML > toolset.<wix-users@lists.sourceforge.net> > Sent: Friday, May 25, 2012 11:46 PM > Subject: Re: [WiX-users] harvesting COM information using heat.exe results in > HEAT5150 > > Heat does not extract for 64-bit dlls. We have had to write a script to > "convert" the 32 bit extraction into 64 bit. > > > > ________________________________ > From: Michael Scheepers<mscheep...@tool-links.de> > To: General discussion for Windows Installer XML > toolset.<wix-users@lists.sourceforge.net> > Sent: Friday, May 25, 2012 2:56 AM > Subject: [WiX-users] harvesting COM information using heat.exe results in > HEAT5150 > > Hi there, > > I try to extract the self-register information for a COM file written > with VB6 a long time ago. > > If I use regsvr32 to register the file manually on Win7 64-bit it works > fine. But when I try to extract the information using heat with the > following command line, just the file tag is generated, without having > the com information extracted. > Command line: > heat file file.dll -sfrag -srd -suid -svb6 -out file.wxi > Result: > heat.exe : warning HEAT5150 : Could not harvest data from a > file that was expected to be a SelfReg DLL: path\to\file.dll. > If this file does not support SelfReg you can ignore this > warning. Otherwise, this error detail may be helpful to > diagnose the failure: Ein Aufrufziel hat einen Ausnahmefehler > verursacht. > > When I use Dependency Walker I can see, that a delay-load dependency to > GPSVC.DLL was not found. That might be, because I am running a Windows 7 > 64-bit machine, but the DLL is for a x86 architecture, but again: > registering the file using regsvr32 works fine. I searched the internet > and found an article [1] where the solution is to change the > architecture of the dll to 64-bit, but that is no option to me. > > So is there an other way to have the file self-registered during > installation except using 2 custom actions to call regsvr32 and regsvr32 /u > > Regards, Michel > > [1] > http://social.msdn.microsoft.com/Forums/en-IE/vcgeneral/thread/93f8509b-b6e8-45a8-81a4-a7a127385d84 > > ------------------------------------------------------------------------------ > Live Security Virtual Conference > Exclusive live event will cover all the ways today's security and > threat landscape has changed and how IT managers can respond. Discussions > will include endpoint security, mobile security and the latest in malware > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > _______________________________________________ > WiX-users mailing list > WiX-users@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/wix-users > ------------------------------------------------------------------------------ > Live Security Virtual Conference > Exclusive live event will cover all the ways today's security and > threat landscape has changed and how IT managers can respond. Discussions > will include endpoint security, mobile security and the latest in malware > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > _______________________________________________ > WiX-users mailing list > WiX-users@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/wix-users > ------------------------------------------------------------------------------ > Live Security Virtual Conference > Exclusive live event will cover all the ways today's security and > threat landscape has changed and how IT managers can respond. Discussions > will include endpoint security, mobile security and the latest in malware > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > _______________________________________________ > WiX-users mailing list > WiX-users@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/wix-users > -- Michael Scheepers Grüner Weg 46 41468 Neuss Tel.: +49 (2131) 133 48 30 Fax: +49 (2131) 133 48 32 Mobil: +49 (173) 318 320 5 eMail: mscheep...@tool-links.de Der Inhalt dieser Email, inklusive seiner Anhaenge, ist vertraulich und ausschließlich für den bezeichneten Empfaenger bestimmt. Wenn Sie nicht der vorgesehene Empfaenger dieser Email oder dessen Vertreter sind, so beachten Sie bitte, dass jede Form der Kenntnisnahme, Nutzung, Veroeffentlichung, Vervielfaeltigung oder Weitergabe unzulaessig ist. Wir bitten Sie in diesem Fall, sich mit dem Absender dieser Email in Verbindung zu setzen. This e-mail is intended exclusively for the individual or entity to which it is addressed and may contain confidential or legally privileged information, which may not be disclosed under current legislation. Any form of disclosure, copying or distribution of this e-mail is strictly prohibited. If you have received this message in error, please notify the sender immediately by e-mail and delete all copies of the message. ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ _______________________________________________ WiX-users mailing list WiX-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/wix-users