I remember looking at this many years ago and the observation and consensus 
was that you couldn't change it.  That MSI read it in when it initialized 
and that was that.  Maybe it does warrant reexamining as it'd be useful in 
multiple instance scenarios (think named instances ).

I know the MSDN help topic 
(http://msdn.microsoft.com/en-us/library/windows/desktop/aa370857(v=vs.85).a
spx) says:
 
"This property can be changed by a transform."

 Knowing how horribly cryptic the SDK is, the translation has always been  
"can be only changed"  as it would otherwise be pointless to mention that 
something can be changed by a transform.  Because, well, duh, nearly 
anything can be changed by a transform.

----------------------------------------
 From: "Matt O'Connell" <techsupport...@gmail.com>
Sent: Friday, August 31, 2012 4:47 AM
To: chr...@iswix.com, "General discussion for Windows Installer XML 
toolset." <wix-users@lists.sourceforge.net>
Subject: Re: [WiX-users] Changing product name at install time

That's not what I've found. I've got a custom action running which 
changes our ProductName at install time in WiX 3.5. It is one our first 
actions in our InstallExecuteSequence and seems to work. All the Actions 
before it need to not reference [ProductName] or else get the 'wrong' 
result. Can you think of something wrong with this or is this not good 
practice for some reason?

On 30/08/2012 23:26, Christopher Painter wrote:
> No. The ProductName property is immutable once the installer begins.
> You'd have to do something like asking for the name before starting the
> install and then dynamically generate and apply a transform for
> installation.
>
> ----------------------------------------
> From: "Jain, Mukesh" <mukeshj...@kpmg.com>
> Sent: Thursday, August 30, 2012 5:07 PM
> To: wix-users@lists.sourceforge.net
> Subject: [WiX-users] Changing product name at install time
>
> Can we change product name at install time?
>
> Thanks,
> Mukesh
>
> **** ANY TAX ADVICE IN THIS COMMUNICATION IS NOT INTENDED OR
> WRITTEN BY KPMG TO BE USED, AND CANNOT BE USED, BY A CLIENT OR ANY
> OTHER PERSON OR ENTITY FOR THE PURPOSE OF (I) AVOIDING PENALTIES
> THAT MAY BE IMPOSED ON ANY TAXPAYER OR (ii) PROMOTING, MARKETING OR
> RECOMMENDING TO ANOTHER PARTY ANY MATTERS ADDRESSED HEREIN. ***
>
> Any advice in this communication is limited to the conclusions
> specifically set forth herein and is based on the completeness and
> accuracy of the stated facts, assumptions and/or representations
> included. In rendering our advice, we may consider tax authorities
> that are subject to change, retroactively and/or prospectively, and
> any such changes could affect the validity of our advice. We will
> not update our advice for subsequent changes or modifications to
> the laws and regulations, or to the judicial and administrative
> interpretations thereof.
>
> The advice or other information in this document was prepared for
> the sole benefit of KPMG's client and may not be relied upon by any
> other person or organization. KPMG accepts no responsibility or
> liability in respect of this document to any person or organization
> other than KPMG's client.
>
> ***********************************************************************
> The information in this email is confidential and may be legally
> privileged. It is intended solely for the addressee. Access to this 
email
> by anyone else is unauthorized. If you are not the intended recipient, 
any
> disclosure, copying, distribution or any action taken or omitted to be
> taken in reliance on it, is prohibited and may be unlawful. When 
addressed
> to our clients any opinions or advice contained in this email are 
subject
> to the terms and conditions expressed in the governing KPMG client
> engagement letter.
> ***********************************************************************
>
> 
----------------------------------------------------------------------------

> --
> Live Security Virtual Conference
> Exclusive live event will cover all the ways today's security and
> threat landscape has changed and how IT managers can respond. 
Discussions
> will include endpoint security, mobile security and the latest in 
malware
> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
> _______________________________________________
> WiX-users mailing list
> WiX-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/wix-users
>
>
> 
----------------------------------------------------------------------------
--
> Live Security Virtual Conference
> Exclusive live event will cover all the ways today's security and
> threat landscape has changed and how IT managers can respond. 
Discussions
> will include endpoint security, mobile security and the latest in 
malware
> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
> _______________________________________________
> WiX-users mailing list
> WiX-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/wix-users


------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
WiX-users mailing list
WiX-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/wix-users

Reply via email to