It's not just not recommended, it's known to introduce more failures into
your install. You are trading work up front to get the right registration
into your package for failures on customer machines. I personally never
understand that trade off.

You own the registration code, just look at what it needs (and if you don't
own the registration code, what are you doing registering other people's
stuff?).
But I tend to be pretty focused about not having setup fail on customers
machines.

Good luck.
On Wed, May 30, 2012 at 8:28 AM, Michael Scheepers <mscheep...@tool-links.de
> wrote:

> Hi again,
>
> for all others who struggle extracting com information for x86
> components on x64 machines. I solved the problem by using regsvr32 in
> two custom actions. One during installation for registering the second
> during remove for unregistering the components.
>
> I know it is not the recommended way, but the only one which worked for
> me...
>
> Regards, Michel
>
>
> Am 29.05.2012 11:25, schrieb Michael Scheepers:
> > Hi,
> >
> > just to clarify:
> > I try to install a x86 Office AddIn for a x86 Office installation on a
> > x64 windows 7 System. So the paths, that I can see so far, are ok. The
> > problem I have, occurres only on a few (vb6) files, which I can register
> > using regsvr32, but I can't extract the required registry keys using
> heat.
> >
> > The result of heat is a component with just the file without the
> > registry keys for type lib, class id, etc.
> >
> > Well, I guess I don't have a choice but registering this components
> > using regsvr32 in a custom action for installation and regsvr32 /u for
> > removal...
> >
> > Regards, Michel
> >
> >
> > Am 26.05.2012 16:10, schrieb Brian C:
> >> <Hit send too early>
> >> For us, we compared the heat extraction with the .reg results from
> using RegSpy for our 64 bit dlls.   Everything was the same except the
> source path, so the script just copies the .wxs generated by heat and
> replaces the source path with the 64 bit location.
> >>
> >> Brian
> >>
> >>
> >> ________________________________
> >>    From: Brian C<briancoving...@yahoo.com>
> >> To: General discussion for Windows Installer XML toolset.<
> wix-users@lists.sourceforge.net>
> >> Sent: Friday, May 25, 2012 11:46 PM
> >> Subject: Re: [WiX-users] harvesting COM information using heat.exe
> results in HEAT5150
> >>
> >> Heat does not extract for 64-bit dlls.  We have had to write a script
> to "convert" the 32 bit extraction into 64 bit.
> >>
> >>
> >>
> >> ________________________________
> >> From: Michael Scheepers<mscheep...@tool-links.de>
> >> To: General discussion for Windows Installer XML toolset.<
> wix-users@lists.sourceforge.net>
> >> Sent: Friday, May 25, 2012 2:56 AM
> >> Subject: [WiX-users] harvesting COM information using heat.exe results
> in HEAT5150
> >>
> >> Hi there,
> >>
> >> I try to extract the self-register information for a COM file written
> >> with VB6 a long time ago.
> >>
> >> If I use regsvr32 to register the file manually on Win7 64-bit it works
> >> fine. But when I try to extract the information using heat with the
> >> following command line, just the file tag is generated, without having
> >> the com information extracted.
> >> Command line:
> >>       heat file file.dll -sfrag -srd -suid -svb6 -out file.wxi
> >> Result:
> >>       heat.exe : warning HEAT5150 : Could not harvest data from a
> >>       file that was expected to be a SelfReg DLL: path\to\file.dll.
> >>       If this file does not support SelfReg you can ignore this
> >>       warning. Otherwise, this error detail may be helpful to
> >>       diagnose the failure: Ein Aufrufziel hat einen Ausnahmefehler
> >>       verursacht.
> >>
> >> When I use Dependency Walker I can see, that a delay-load dependency to
> >> GPSVC.DLL was not found. That might be, because I am running a Windows 7
> >> 64-bit machine, but the DLL is for a x86 architecture, but again:
> >> registering the file using regsvr32 works fine. I searched the internet
> >> and found an article [1] where the solution is to change the
> >> architecture of the dll to 64-bit, but that is no option to me.
> >>
> >> So is there an other way to have the file self-registered during
> >> installation except using 2 custom actions to call regsvr32 and
> regsvr32 /u
> >>
> >> Regards, Michel
> >>
> >> [1]
> >>
> http://social.msdn.microsoft.com/Forums/en-IE/vcgeneral/thread/93f8509b-b6e8-45a8-81a4-a7a127385d84
> >>
> >>
> ------------------------------------------------------------------------------
> >> Live Security Virtual Conference
> >> Exclusive live event will cover all the ways today's security and
> >> threat landscape has changed and how IT managers can respond.
> Discussions
> >> will include endpoint security, mobile security and the latest in
> malware
> >> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
> >> _______________________________________________
> >> WiX-users mailing list
> >> WiX-users@lists.sourceforge.net
> >> https://lists.sourceforge.net/lists/listinfo/wix-users
> >>
> ------------------------------------------------------------------------------
> >> Live Security Virtual Conference
> >> Exclusive live event will cover all the ways today's security and
> >> threat landscape has changed and how IT managers can respond.
> Discussions
> >> will include endpoint security, mobile security and the latest in
> malware
> >> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
> >> _______________________________________________
> >> WiX-users mailing list
> >> WiX-users@lists.sourceforge.net
> >> https://lists.sourceforge.net/lists/listinfo/wix-users
> >>
> ------------------------------------------------------------------------------
> >> Live Security Virtual Conference
> >> Exclusive live event will cover all the ways today's security and
> >> threat landscape has changed and how IT managers can respond.
> Discussions
> >> will include endpoint security, mobile security and the latest in
> malware
> >> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
> >> _______________________________________________
> >> WiX-users mailing list
> >> WiX-users@lists.sourceforge.net
> >> https://lists.sourceforge.net/lists/listinfo/wix-users
> >>
> >
>
> --
> Michael Scheepers
> Grüner Weg 46
> 41468 Neuss
>
> Tel.:   +49 (2131) 133 48 30
> Fax:    +49 (2131) 133 48 32
> Mobil:  +49 (173) 318 320 5
>
> eMail:  mscheep...@tool-links.de
>
>
> Der Inhalt dieser Email, inklusive seiner Anhaenge, ist vertraulich und
> ausschließlich für den bezeichneten Empfaenger bestimmt. Wenn Sie nicht
> der vorgesehene Empfaenger dieser Email oder dessen Vertreter sind, so
> beachten Sie bitte, dass jede Form der Kenntnisnahme, Nutzung,
> Veroeffentlichung, Vervielfaeltigung oder Weitergabe unzulaessig ist.
> Wir bitten Sie in diesem Fall, sich mit dem Absender dieser Email in
> Verbindung zu setzen.
>
> This e-mail is intended exclusively for the individual or entity to
> which it is addressed and may contain confidential or legally privileged
> information, which may not be disclosed under current legislation. Any
> form of disclosure, copying or distribution of this e-mail is strictly
> prohibited. If you have received this message in error, please notify
> the sender immediately by e-mail and delete all copies of the message.
>
>
> ------------------------------------------------------------------------------
> Live Security Virtual Conference
> Exclusive live event will cover all the ways today's security and
> threat landscape has changed and how IT managers can respond. Discussions
> will include endpoint security, mobile security and the latest in malware
> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
> _______________________________________________
> WiX-users mailing list
> WiX-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/wix-users
>



-- 
virtually, Rob Mensching - http://RobMensching.com LLC
------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
WiX-users mailing list
WiX-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/wix-users

Reply via email to