Your solution sounds perfectly reasonable.
To check compatibility in 3), youll need to have some way of discovering the
version of the addons. You could either read the addon installer's product
code in FindRelatedProducts or have the addon installer write its
ProductVersion to a version-independent location in the registry and search
for that. The latter has a slight advantage of not having to do multiple
comparisons of GUIDs to check compatibility. It also assumes all addon
installers are in a mutually exclusive series - no parallel installations.
Your testing will have to include the possibility that the user runs both
installers, then removes the base one, violating requirement 2).
Although you dont mention any such requirement, you might be wanting to
restrict which versions of each installer can be installed at the same time.
It'll be hard to enforce that at installation time because each MSI can be
removed or updated after the installation of the other, so such checks are
best handled by the application.
-----Original Message-----
From: Chris Lord [mailto:chris.l...@atterotech.com]
Sent: Tue 8/14/2012 8:35 PM
To: wix-users
Subject: [WiX-users] Installing add-on files to an existing installation
Hi all,
This should be a quick one,
I have an installer that installs my application and its support files.
Following a discussion earlier, it's possible I may need to install some
additional add-on files. Here are my requirements.
1) The add-on files should be installed separately to the main base
files.
2) The add-on files can only be installed if the base software is
present.
3) The base installation should continue to be updatable without
affecting the add-on files (assuming they are compatible of course).
4) The add-on files should be updatable but separately from the base
installation.
I would like to keep things as simple as possible and my initial thought
is to create a second stand-alone MSI that has conditions such that it
will exit if a FindReleatedProducts search for the base install fails.
Would that be the best way of achieving my requirements or is there a
better way?
Any suggestions gratefully received.
Thanks
Chris Lord
Product Engineer
Attero Tech, LLC
1315 Directors Row, Suite 107
Fort Wayne, IN 46808
Ph: 260-496-9668 ext. 377, Fax 260-496-9879
email: chris.l...@atterotech.com
Confidentiality Notice: This message is intended solely for the use of
the addressees shown above. It may contain information that is
privileged, confidential and/or exempt from disclosure under applicable
law. If you are not the intended recipient of this message, you are
hereby notified that the copying, use or distribution of any information
or materials transmitted in or with this message is strictly prohibited.
If you received this message by mistake, please immediately contact me
at (260) 496-9668 x 377 or chris.l...@atterotech.com and destroy the
original message. Thank you.
-----------------------------------------------------------------------------
-
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and
threat landscape has changed and how IT managers can respond. Discussions
will include endpoint security, mobile security and the latest in malware
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
WiX-users mailing list
WiX-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/wix-users
SDL PLC confidential, all rights reserved.
If you are not the intended recipient of this mail SDL requests and requires
that you delete it without acting upon or copying any of its contents, and we
further request that you advise us.
SDL PLC is a public limited company registered in England and Wales.
Registered number: 02675207.
Registered address: Globe House, Clivemont Road, Maidenhead, Berkshire SL6 7DY,
UK.
------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and
threat landscape has changed and how IT managers can respond. Discussions
will include endpoint security, mobile security and the latest in malware
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
WiX-users mailing list
WiX-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/wix-users