If you are modifying machine state, a better way is to make your custom
action data driven and use Component States to determine when to do work.
You can see that the custom actions in the WiX toolset behave this way.
Lots of the code lives under src\ext and src\ca

On Tue, Jun 5, 2012 at 5:52 AM, Ravi Raj <raviraj.callin...@gmail.com>wrote:

> I want to schedule my custom actions in following manner:
> 1) Install: CA will run *only after* the installer copies all files to the
> respective directories.
> 2) Uninstall: custom action has completed successfully and then installer
> removes the files from the system.
>
> How should I write my custom action? I am using:
>
> <Custom Action="CA_SetCustomActionData_Install"
> Before="CA_GetCustomActionData_Install">NOT Installed</Custom><Custom
> Action="CA_GetCustomActionData_Install" After="InstallInitialize">NOT
> Installed AND NOT UPGRADINGPRODUCTCODE</Custom>
>
> <Custom Action="CA_SetCustomActionData_UnInstall"
> Before="CA_GetCustomActionData_UnInstall">Installed</Custom><Custom
> Action="CA_GetCustomActionData_UnInstall"
> Before="InstallFinialize">Installed</Custom>
>
> But this is not working.
>
> --
> Thanks and Regards,
> Ravi Raj
>
> ------------------------------------------------------------------------------
> Live Security Virtual Conference
> Exclusive live event will cover all the ways today's security and
> threat landscape has changed and how IT managers can respond. Discussions
> will include endpoint security, mobile security and the latest in malware
> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
> _______________________________________________
> WiX-users mailing list
> WiX-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/wix-users
>



-- 
virtually, Rob Mensching - http://RobMensching.com LLC
------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
WiX-users mailing list
WiX-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/wix-users

Reply via email to