/build/static/layout/Breadcrumb_cap_w.png

Using a long install command-line in App Deply Toolkit

Hi

The following string for CadCorp Desktop SIS works fine from an elevated CMD prompt but I can't get it to run in the App Deploy Toolkit script , or in SCCM 2012.  What's the best way to treat a long install string like this ? Is it something to do with the extraction of the msi from the executable ?


"Cadcorp SIS Desktop 9.1.1797.64.exe" /s /v"/qn" /v"/norestart" /v"LICENCE_MODEL=Network" /v"LICENCE_SERVER_HOST=servername" /v"COUNTRY=1" /v"CC_CMDLINE_COUNTRY=GBR" /v”ADDLOCAL=x64SIS,x64Core,NTv2,OSTN,Libraries,Fonts,x64SISExe,x64SISLoader,x64Gazetteer,x64OSGBTools”

Thanks






0 Comments   [ + ] Show comments

Answers (2)

Answer Summary:
Posted by: JordanNolan 6 months ago
10th Degree Black Belt
2

On trick would be to put the command into a batch file and just run the simple batch file name .

Also, do you have the cmd line syntax correct?  Not sure about this particular CadCorp app, but the silent command line usually look like this with just one /v and all the parameters in line:

https://help.cadcorp.com/en/8.0/sis/help/Content/Silent_Installation.html

"Cadcorp SIS Desktop 9.1.1797.64.exe" /s /v"/qn /norestart LICENCE_MODEL=Network LICENCE_SERVER_HOST=servername COUNTRY=1 CC_CMDLINE_COUNTRY=GBR ADDLOCAL=x64SIS,x64Core,NTv2,OSTN,Libraries,Fonts,x64SISExe,x64SISLoader,x64Gazetteer,x64OSGBTools”

Posted by: Johnny Hamster 6 months ago
White Belt
0

Hi

Thanks for the suggestion. 
The command line was as supplied by Cadcorp support and works fine from a command prompt.  I ended up extracting the MSI , opening in Orca and creating a transform which seems to work fine.


Cheers

 
This website uses cookies. By continuing to use this site and/or clicking the "Accept" button you are providing consent Quest Software and its affiliates do NOT sell the Personal Data you provide to us either when you register on our websites or when you do business with us. For more information about our Privacy Policy and our data protection efforts, please visit GDPR-HQ