/build/static/layout/Breadcrumb_cap_w.png

Scripting Question


Changing a vendor .msi so zipped files extract silently

08/18/2014 2384 views
I have a vendor msi that runs winzip self extractor part way through the install to extract some files. How do I get the extraction to be silent during install, or how do I remove the extraction process so I can just add the files in later? I'm using Flexera's InstallShield.
Answer Summary:
0 Comments   [ + ] Show comments

Comments


All Answers

0
Once the files are extracted, copy them somewhere safe. Next, build a response transform for the MSI. Finally, add the extracted files to the transform.
Answered 08/18/2014 by: VBScab
Red Belt

  • Thanks for the quick response VBScab. This would be perfect but I'm v. green :( what do I put in the transform to stop the winzip from running?
0
Or you could look for the custom action that calls winzip and edit the command line arguments to make the unzip operation silent.
Answered 08/18/2014 by: EdT
Red Belt

  • Thanks EdT, I managed to remove another chunk that was extracting during the install and that was using a custom action, but I can't find where this winzip file is called from (not a cust action as far as I can tell). Any other ideas where it might be? Cheers
    • >Any other ideas
      Log the installation verbosely. That'll show you.
    • What makes you believe it is a WinZip file? WinZip is not a free utility so the only way that someone could distribute files zipped using winzip would be to ship them as a self extracting EXE. It is possible that the files you are seeing are coming from internal CAB files in the MSI. Are these files recorded in the file table?
 
This website uses cookies. By continuing to use this site and/or clicking the "Accept" button you are providing consent Quest Software and its affiliates do NOT sell the Personal Data you provide to us either when you register on our websites or when you do business with us. For more information about our Privacy Policy and our data protection efforts, please visit GDPR-HQ