I had a customer report a strange problem and am wondering if anyone can
decipher this message in my log.  

The user gets prompted to Retry or Cancel when this problem occurs, and if
they choose to retry, it continues the upgrade apparently without a problem.

After hundreds of files processing messages in the log, I see this:

MSI (s) (C0:84) [15:58:39:628]: Executing op:
FileRemove(,FileName=cp1250.py,,ComponentId={28A07942-63EC-4B8D-A1B5-8FAEAAFDEE91})
MSI (s) (C0:84) [15:58:39:643]: Verifying accessibility of file: cp1250.py
MSI (s) (C0:84) [15:58:39:643]: Verifying accessibility of file: cp1250.py
MSI (s) (C0:84) [15:58:39:643]: Using source file security for destination.
MSI (s) (C0:84) [15:58:39:643]: Note: 1: 1310 2: 5 3:
C:\Config.Msi\257917cc.rbf 
MSI (s) (C0:84) [16:03:02:285]: Product: activEcho Server -- Error 1310.
Error writing to file: C:\Config.Msi\257917cc.rbf.  System error 5.  Verify
that you have access to that directory.

This is the only file in the log that says "Using source file security for
destination.".  And clearly, the process has access to the folder because it
just did a few hundred of these operations.

What does this mean and how can I avoid it?
Thanks for your help.






--
View this message in context: 
http://windows-installer-xml-wix-toolset.687559.n2.nabble.com/Strange-log-message-and-bad-user-experience-can-t-remove-rbf-file-tp7585449.html
Sent from the wix-users mailing list archive at Nabble.com.

------------------------------------------------------------------------------
Try New Relic Now & We'll Send You this Cool Shirt
New Relic is the only SaaS-based application performance monitoring service 
that delivers powerful full stack analytics. Optimize and monitor your
browser, app, & servers with just a few lines of code. Try New Relic
and get this awesome Nerd Life shirt! http://p.sf.net/sfu/newrelic_d2d_apr
_______________________________________________
WiX-users mailing list
WiX-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/wix-users

Reply via email to