chameleon cml -v 命令不生效

mnemlml8  于 2022-10-20  发布在  其他
关注(0)|答案(4)|浏览(194)

window10 安装chameleon后命令不生效
C:\Users\caoxc>npm -v
6.14.6

C:\Users\caoxc>npm i -g chameleon-tool
C:\FCD\caoxc\devApplication\android\node\nodejs\node_global\cml -> C:\FCD\caoxc\devApplication\android\node\nodejs\node_global\node_modules\chameleon-tool\chameleon.js
npm WARN optional SKIPPING OPTIONAL DEPENDENCY: fsevents@1.2.4 (node_modules\chameleon-tool\node_modules\fsevents):
npm WARN notsup SKIPPING OPTIONAL DEPENDENCY: Unsupported platform for fsevents@1.2.4: wanted {"os":"darwin","arch":"any"} (current: {"os":"win32","arch":"x64"})

  • chameleon-tool@1.0.6

updated 1 package in 15.211s

C:\Users\caoxc>cml -v
'cml' 不是内部或外部命令,也不是可运行的程序
或批处理文件。

C:\Users\caoxc>node -v
v14.6.0

C:\Users\caoxc>

kyxcudwk

kyxcudwk1#

node 版本试下 8.10.0 ~11 之间的 , 14 版本的node太高了

ohtdti5x

ohtdti5x2#

window10 安装chameleon后命令不生效
C:\Users\caoxc>npm -v
6.14.6

C:\Users\caoxc>npm i -g chameleon-tool
C:\FCD\caoxc\devApplication\android\node\nodejs\node_global\cml -> C:\FCD\caoxc\devApplication\android\node\nodejs\node_global\node_modules\chameleon-tool\chameleon.js
npm WARN optional SKIPPING OPTIONAL DEPENDENCY: fsevents@1.2.4 (node_modules\chameleon-tool\node_modules\fsevents):
npm WARN notsup SKIPPING OPTIONAL DEPENDENCY: Unsupported platform for fsevents@1.2.4: wanted {"os":"darwin","arch":"any"} (current: {"os":"win32","arch":"x64"})

  • chameleon-tool@1.0.6

updated 1 package in 15.211s

C:\Users\caoxc>cml -v
'cml' 不是内部或外部命令,也不是可运行的程序
或批处理文件。

C:\Users\caoxc>node -v
v14.6.0

C:\Users\caoxc>

9q78igpj

9q78igpj3#

node 版本试下 8.10.0 ~11 之间的 , 14 版本的node太高了

C:\Users\caoxc>node -v
v8.10.0

C:\Users\caoxc>npm -v
5.6.0

C:\Users\caoxc>npm config get cache
C:\FCD\caoxc\devApplication\android\node\nodejs\node_cache

C:\Users\caoxc>npm i -g chameleon-tool
npm WARN notice [SECURITY] lodash has the following vulnerabilities: 1 high, 1 low. Go here for more details: https://www.npmjs.com/advisories?search=lodash&version=4.17.15 - Run npm i npm@latest -g to upgrade your npm version, and then npm audit to get more info.
npm WARN notice [SECURITY] lodash has the following vulnerabilities: 1 high, 1 low. Go here for more details: https://www.npmjs.com/advisories?search=lodash&version=4.17.15 - Run npm i npm@latest -g to upgrade your npm version, and then npm audit to get more info.
npm WARN notice [SECURITY] lodash has the following vulnerabilities: 1 high, 1 low. Go here for more details: https://www.npmjs.com/advisories?search=lodash&version=4.17.15 - Run npm i npm@latest -g to upgrade your npm version, and then npm audit to get more info.
npm WARN notice [SECURITY] lodash has the following vulnerabilities: 1 high, 1 low. Go here for more details: https://www.npmjs.com/advisories?search=lodash&version=4.17.15 - Run npm i npm@latest -g to upgrade your npm version, and then npm audit to get more info.
npm WARN notice [SECURITY] lodash has the following vulnerabilities: 1 high, 1 low. Go here for more details: https://www.npmjs.com/advisories?search=lodash&version=4.17.15 - Run npm i npm@latest -g to upgrade your npm version, and then npm audit to get more info.
npm WARN notice [SECURITY] lodash has the following vulnerabilities: 1 high, 1 low. Go here for more details: https://www.npmjs.com/advisories?search=lodash&version=4.17.15 - Run npm i npm@latest -g to upgrade your npm version, and then npm audit to get more info.
npm WARN notice [SECURITY] lodash has the following vulnerabilities: 1 high, 1 low. Go here for more details: https://www.npmjs.com/advisories?search=lodash&version=4.17.15 - Run npm i npm@latest -g to upgrade your npm version, and then npm audit to get more info.
npm WARN notice [SECURITY] webpack-bundle-analyzer has the following vulnerability: 1 moderate. Go here for more details: https://www.npmjs.com/advisories?search=webpack-bundle-analyzer&version=2.13.1 - Run npm i npm@latest -g to upgrade your npm version, and then npm audit to get more info.
npm WARN notice [SECURITY] yargs-parser has the following vulnerability: 1 low. Go here for more details: https://www.npmjs.com/advisories?search=yargs-parser&version=7.0.0 - Run npm i npm@latest -g to upgrade your npm version, and then npm audit to get more info.
npm WARN notice [SECURITY] yargs-parser has the following vulnerability: 1 low. Go here for more details: https://www.npmjs.com/advisories?search=yargs-parser&version=10.1.0 - Run npm i npm@latest -g to upgrade your npm version, and then npm audit to get more info.
npm WARN notice [SECURITY] acorn has the following vulnerability: 1 moderate. Go here for more details: https://www.npmjs.com/advisories?search=acorn&version=5.7.3 - Run npm i npm@latest -g to upgrade your npm version, and then npm audit to get more info.
npm WARN notice [SECURITY] acorn has the following vulnerability: 1 moderate. Go here for more details: https://www.npmjs.com/advisories?search=acorn&version=5.7.3 - Run npm i npm@latest -g to upgrade your npm version, and then npm audit to get more info.
npm WARN notice [SECURITY] set-value has the following vulnerability: 1 high. Go here for more details: https://www.npmjs.com/advisories?search=set-value&version=0.4.3 - Run npm i npm@latest -g to upgrade your npm version, and then npm audit to get more info.
npm WARN notice [SECURITY] tunnel-agent has the following vulnerability: 1 moderate. Go here for more details: https://www.npmjs.com/advisories?search=tunnel-agent&version=0.4.3 - Run npm i npm@latest -g to upgrade your npm version, and then npm audit to get more info.
npm WARN notice [SECURITY] js-yaml has the following vulnerabilities: 1 high, 1 moderate. Go here for more details: https://www.npmjs.com/advisories?search=js-yaml&version=3.7.0 - Run npm i npm@latest -g to upgrade your npm version, and then npm audit to get more info.
npm WARN notice [SECURITY] js-yaml has the following vulnerabilities: 1 high, 1 moderate. Go here for more details: https://www.npmjs.com/advisories?search=js-yaml&version=3.6.1 - Run npm i npm@latest -g to upgrade your npm version, and then npm audit to get more info.
npm WARN notice [SECURITY] js-yaml has the following vulnerabilities: 1 high, 1 moderate. Go here for more details: https://www.npmjs.com/advisories?search=js-yaml&version=3.12.1 - Run npm i npm@latest -g to upgrade your npm version, and then npm audit to get more info.
npm WARN notice [SECURITY] set-value has the following vulnerability: 1 high. Go here for more details: https://www.npmjs.com/advisories?search=set-value&version=2.0.0 - Run npm i npm@latest -g to upgrade your npm version, and then npm audit to get more info.
npm WARN notice [SECURITY] serialize-javascript has the following vulnerability: 1 moderate. Go here for more details: https://www.npmjs.com/advisories?search=serialize-javascript&version=1.6.1 - Run npm i npm@latest -g to upgrade your npm version, and then npm audit to get more info.
npm WARN notice [SECURITY] minimist has the following vulnerability: 1 low. Go here for more details: https://www.npmjs.com/advisories?search=minimist&version=0.0.10 - Run npm i npm@latest -g to upgrade your npm version, and then npm audit to get more info.
npm WARN notice [SECURITY] yargs-parser has the following vulnerability: 1 low. Go here for more details: https://www.npmjs.com/advisories?search=yargs-parser&version=9.0.2 - Run npm i npm@latest -g to upgrade your npm version, and then npm audit to get more info.
npm WARN notice [SECURITY] mem has the following vulnerability: 1 low. Go here for more details: https://www.npmjs.com/advisories?search=mem&version=1.1.0 - Run npm i npm@latest -g to upgrade your npm version, and then npm audit to get more info.
npm WARN notice [SECURITY] minimist has the following vulnerability: 1 low. Go here for more details: https://www.npmjs.com/advisories?search=minimist&version=0.0.8 - Run npm i npm@latest -g to upgrade your npm version, and then npm audit to get more info.
npm WARN notice [SECURITY] handlebars has the following vulnerabilities: 1 critical, 4 high, 1 moderate. Go here for more details: https://www.npmjs.com/advisories?search=handlebars&version=4.0.11 - Run npm i npm@latest -g to upgrade your npm version, and then npm audit to get more info.
npm WARN notice [SECURITY] mixin-deep has the following vulnerability: 1 high. Go here for more details: https://www.npmjs.com/advisories?search=mixin-deep&version=1.3.1 - Run npm i npm@latest -g to upgrade your npm version, and then npm audit to get more info.
npm WARN notice [SECURITY] minimist has the following vulnerability: 1 low. Go here for more details: https://www.npmjs.com/advisories?search=minimist&version=1.2.0 - Run npm i npm@latest -g to upgrade your npm version, and then npm audit to get more info.
npm WARN notice [SECURITY] elliptic has the following vulnerability: 1 high. Go here for more details: https://www.npmjs.com/advisories?search=elliptic&version=6.4.1 - Run npm i npm@latest -g to upgrade your npm version, and then npm audit to get more info.
npm WARN notice [SECURITY] lodash.merge has the following vulnerability: 1 high. Go here for more details: https://www.npmjs.com/advisories?search=lodash.merge&version=4.6.1 - Run npm i npm@latest -g to upgrade your npm version, and then npm audit to get more info.
npm WARN notice [SECURITY] lodash has the following vulnerabilities: 2 high, 1 low. Go here for more details: https://www.npmjs.com/advisories?search=lodash&version=4.17.11 - Run npm i npm@latest -g to upgrade your npm version, and then npm audit to get more info.
npm WARN notice [SECURITY] kind-of has the following vulnerability: 1 low. Go here for more details: https://www.npmjs.com/advisories?search=kind-of&version=6.0.2 - Run npm i npm@latest -g to upgrade your npm version, and then npm audit to get more info.
npm WARN notice [SECURITY] cryptiles has the following vulnerability: 1 high. Go here for more details: https://www.npmjs.com/advisories?search=cryptiles&version=2.0.5 - Run npm i npm@latest -g to upgrade your npm version, and then npm audit to get more info.
npm WARN notice [SECURITY] hoek has the following vulnerability: 1 moderate. Go here for more details: https://www.npmjs.com/advisories?search=hoek&version=2.16.3 - Run npm i npm@latest -g to upgrade your npm version, and then npm audit to get more info.
npm WARN notice [SECURITY] tar has the following vulnerability: 1 high. Go here for more details: https://www.npmjs.com/advisories?search=tar&version=4.4.1 - Run npm i npm@latest -g to upgrade your npm version, and then npm audit to get more info.
npm WARN notice [SECURITY] acorn has the following vulnerability: 1 moderate. Go here for more details: https://www.npmjs.com/advisories?search=acorn&version=6.0.5 - Run npm i npm@latest -g to upgrade your npm version, and then npm audit to get more info.
npm WARN notice [SECURITY] eslint-utils has the following vulnerability: 1 critical. Go here for more details: https://www.npmjs.com/advisories?search=eslint-utils&version=1.3.1 - Run npm i npm@latest -g to upgrade your npm version, and then npm audit to get more info.
C:\FCD\caoxc\devApplication\android\node\nodejs\node_global\cml -> C:\FCD\caoxc\devApplication\android\node\nodejs\node_global\node_modules\chameleon-tool\chameleon.js
uglifyjs-webpack-plugin@0.4.6 postinstall C:\FCD\caoxc\devApplication\android\node\nodejs\node_global\node_modules\chameleon-tool\node_modules\uglifyjs-webpack-plugin
node lib/post_install.js

npm WARN rollback Rolling back node-pre-gyp@0.10.0 failed (this is probably harmless): EPERM: operation not permitted, rmdir 'C:\FCD\caoxc\devApplication\android\node\nodejs\node_global\node_modules\chameleon-tool\node_modules\fsevents\node_modules'
npm WARN optional SKIPPING OPTIONAL DEPENDENCY: fsevents@1.2.4 (node_modules\chameleon-tool\node_modules\fsevents):
npm WARN notsup SKIPPING OPTIONAL DEPENDENCY: Unsupported platform for fsevents@1.2.4: wanted {"os":"darwin","arch":"any"} (current: {"os":"win32","arch":"x64"})

  • chameleon-tool@1.0.6

added 1869 packages in 109.458s

C:\Users\caoxc>cml -v
'cml' 不是内部或外部命令,也不是可运行的程序
或批处理文件。

C:\Users\caoxc>

o75abkj4

o75abkj44#

先 npm uninstall chameleon-tool -g
然后在 npm install chameleon-tool -g 试试吧

我刚试了下没有复现你这个问题

相关问题