window10 安装chameleon后命令不生效
C:\Users\caoxc>npm -v
6.14.6
C:\Users\caoxc>npm i -g chameleon-tool
C:\FCD\caoxc\devApplication\android\node\nodejs\node_global\cml -> C:\FCD\caoxc\devApplication\android\node\nodejs\node_global\node_modules\chameleon-tool\chameleon.js
npm WARN optional SKIPPING OPTIONAL DEPENDENCY: fsevents@1.2.4 (node_modules\chameleon-tool\node_modules\fsevents):
npm WARN notsup SKIPPING OPTIONAL DEPENDENCY: Unsupported platform for fsevents@1.2.4: wanted {"os":"darwin","arch":"any"} (current: {"os":"win32","arch":"x64"})
- chameleon-tool@1.0.6
updated 1 package in 15.211s
C:\Users\caoxc>cml -v
'cml' 不是内部或外部命令,也不是可运行的程序
或批处理文件。
C:\Users\caoxc>node -v
v14.6.0
C:\Users\caoxc>
4条答案
按热度按时间kyxcudwk1#
node 版本试下 8.10.0 ~11 之间的 , 14 版本的node太高了
ohtdti5x2#
window10 安装chameleon后命令不生效
C:\Users\caoxc>npm -v
6.14.6
C:\Users\caoxc>npm i -g chameleon-tool
C:\FCD\caoxc\devApplication\android\node\nodejs\node_global\cml -> C:\FCD\caoxc\devApplication\android\node\nodejs\node_global\node_modules\chameleon-tool\chameleon.js
npm WARN optional SKIPPING OPTIONAL DEPENDENCY: fsevents@1.2.4 (node_modules\chameleon-tool\node_modules\fsevents):
npm WARN notsup SKIPPING OPTIONAL DEPENDENCY: Unsupported platform for fsevents@1.2.4: wanted {"os":"darwin","arch":"any"} (current: {"os":"win32","arch":"x64"})
updated 1 package in 15.211s
C:\Users\caoxc>cml -v
'cml' 不是内部或外部命令,也不是可运行的程序
或批处理文件。
C:\Users\caoxc>node -v
v14.6.0
C:\Users\caoxc>
9q78igpj3#
node 版本试下 8.10.0 ~11 之间的 , 14 版本的node太高了
C:\Users\caoxc>node -v
v8.10.0
C:\Users\caoxc>npm -v
5.6.0
C:\Users\caoxc>npm config get cache
C:\FCD\caoxc\devApplication\android\node\nodejs\node_cache
C:\Users\caoxc>npm i -g chameleon-tool
npm WARN notice [SECURITY] lodash has the following vulnerabilities: 1 high, 1 low. Go here for more details: https://www.npmjs.com/advisories?search=lodash&version=4.17.15 - Run
npm i npm@latest -g
to upgrade your npm version, and thennpm audit
to get more info.npm WARN notice [SECURITY] lodash has the following vulnerabilities: 1 high, 1 low. Go here for more details: https://www.npmjs.com/advisories?search=lodash&version=4.17.15 - Run
npm i npm@latest -g
to upgrade your npm version, and thennpm audit
to get more info.npm WARN notice [SECURITY] lodash has the following vulnerabilities: 1 high, 1 low. Go here for more details: https://www.npmjs.com/advisories?search=lodash&version=4.17.15 - Run
npm i npm@latest -g
to upgrade your npm version, and thennpm audit
to get more info.npm WARN notice [SECURITY] lodash has the following vulnerabilities: 1 high, 1 low. Go here for more details: https://www.npmjs.com/advisories?search=lodash&version=4.17.15 - Run
npm i npm@latest -g
to upgrade your npm version, and thennpm audit
to get more info.npm WARN notice [SECURITY] lodash has the following vulnerabilities: 1 high, 1 low. Go here for more details: https://www.npmjs.com/advisories?search=lodash&version=4.17.15 - Run
npm i npm@latest -g
to upgrade your npm version, and thennpm audit
to get more info.npm WARN notice [SECURITY] lodash has the following vulnerabilities: 1 high, 1 low. Go here for more details: https://www.npmjs.com/advisories?search=lodash&version=4.17.15 - Run
npm i npm@latest -g
to upgrade your npm version, and thennpm audit
to get more info.npm WARN notice [SECURITY] lodash has the following vulnerabilities: 1 high, 1 low. Go here for more details: https://www.npmjs.com/advisories?search=lodash&version=4.17.15 - Run
npm i npm@latest -g
to upgrade your npm version, and thennpm audit
to get more info.npm WARN notice [SECURITY] webpack-bundle-analyzer has the following vulnerability: 1 moderate. Go here for more details: https://www.npmjs.com/advisories?search=webpack-bundle-analyzer&version=2.13.1 - Run
npm i npm@latest -g
to upgrade your npm version, and thennpm audit
to get more info.npm WARN notice [SECURITY] yargs-parser has the following vulnerability: 1 low. Go here for more details: https://www.npmjs.com/advisories?search=yargs-parser&version=7.0.0 - Run
npm i npm@latest -g
to upgrade your npm version, and thennpm audit
to get more info.npm WARN notice [SECURITY] yargs-parser has the following vulnerability: 1 low. Go here for more details: https://www.npmjs.com/advisories?search=yargs-parser&version=10.1.0 - Run
npm i npm@latest -g
to upgrade your npm version, and thennpm audit
to get more info.npm WARN notice [SECURITY] acorn has the following vulnerability: 1 moderate. Go here for more details: https://www.npmjs.com/advisories?search=acorn&version=5.7.3 - Run
npm i npm@latest -g
to upgrade your npm version, and thennpm audit
to get more info.npm WARN notice [SECURITY] acorn has the following vulnerability: 1 moderate. Go here for more details: https://www.npmjs.com/advisories?search=acorn&version=5.7.3 - Run
npm i npm@latest -g
to upgrade your npm version, and thennpm audit
to get more info.npm WARN notice [SECURITY] set-value has the following vulnerability: 1 high. Go here for more details: https://www.npmjs.com/advisories?search=set-value&version=0.4.3 - Run
npm i npm@latest -g
to upgrade your npm version, and thennpm audit
to get more info.npm WARN notice [SECURITY] tunnel-agent has the following vulnerability: 1 moderate. Go here for more details: https://www.npmjs.com/advisories?search=tunnel-agent&version=0.4.3 - Run
npm i npm@latest -g
to upgrade your npm version, and thennpm audit
to get more info.npm WARN notice [SECURITY] js-yaml has the following vulnerabilities: 1 high, 1 moderate. Go here for more details: https://www.npmjs.com/advisories?search=js-yaml&version=3.7.0 - Run
npm i npm@latest -g
to upgrade your npm version, and thennpm audit
to get more info.npm WARN notice [SECURITY] js-yaml has the following vulnerabilities: 1 high, 1 moderate. Go here for more details: https://www.npmjs.com/advisories?search=js-yaml&version=3.6.1 - Run
npm i npm@latest -g
to upgrade your npm version, and thennpm audit
to get more info.npm WARN notice [SECURITY] js-yaml has the following vulnerabilities: 1 high, 1 moderate. Go here for more details: https://www.npmjs.com/advisories?search=js-yaml&version=3.12.1 - Run
npm i npm@latest -g
to upgrade your npm version, and thennpm audit
to get more info.npm WARN notice [SECURITY] set-value has the following vulnerability: 1 high. Go here for more details: https://www.npmjs.com/advisories?search=set-value&version=2.0.0 - Run
npm i npm@latest -g
to upgrade your npm version, and thennpm audit
to get more info.npm WARN notice [SECURITY] serialize-javascript has the following vulnerability: 1 moderate. Go here for more details: https://www.npmjs.com/advisories?search=serialize-javascript&version=1.6.1 - Run
npm i npm@latest -g
to upgrade your npm version, and thennpm audit
to get more info.npm WARN notice [SECURITY] minimist has the following vulnerability: 1 low. Go here for more details: https://www.npmjs.com/advisories?search=minimist&version=0.0.10 - Run
npm i npm@latest -g
to upgrade your npm version, and thennpm audit
to get more info.npm WARN notice [SECURITY] yargs-parser has the following vulnerability: 1 low. Go here for more details: https://www.npmjs.com/advisories?search=yargs-parser&version=9.0.2 - Run
npm i npm@latest -g
to upgrade your npm version, and thennpm audit
to get more info.npm WARN notice [SECURITY] mem has the following vulnerability: 1 low. Go here for more details: https://www.npmjs.com/advisories?search=mem&version=1.1.0 - Run
npm i npm@latest -g
to upgrade your npm version, and thennpm audit
to get more info.npm WARN notice [SECURITY] minimist has the following vulnerability: 1 low. Go here for more details: https://www.npmjs.com/advisories?search=minimist&version=0.0.8 - Run
npm i npm@latest -g
to upgrade your npm version, and thennpm audit
to get more info.npm WARN notice [SECURITY] handlebars has the following vulnerabilities: 1 critical, 4 high, 1 moderate. Go here for more details: https://www.npmjs.com/advisories?search=handlebars&version=4.0.11 - Run
npm i npm@latest -g
to upgrade your npm version, and thennpm audit
to get more info.npm WARN notice [SECURITY] mixin-deep has the following vulnerability: 1 high. Go here for more details: https://www.npmjs.com/advisories?search=mixin-deep&version=1.3.1 - Run
npm i npm@latest -g
to upgrade your npm version, and thennpm audit
to get more info.npm WARN notice [SECURITY] minimist has the following vulnerability: 1 low. Go here for more details: https://www.npmjs.com/advisories?search=minimist&version=1.2.0 - Run
npm i npm@latest -g
to upgrade your npm version, and thennpm audit
to get more info.npm WARN notice [SECURITY] elliptic has the following vulnerability: 1 high. Go here for more details: https://www.npmjs.com/advisories?search=elliptic&version=6.4.1 - Run
npm i npm@latest -g
to upgrade your npm version, and thennpm audit
to get more info.npm WARN notice [SECURITY] lodash.merge has the following vulnerability: 1 high. Go here for more details: https://www.npmjs.com/advisories?search=lodash.merge&version=4.6.1 - Run
npm i npm@latest -g
to upgrade your npm version, and thennpm audit
to get more info.npm WARN notice [SECURITY] lodash has the following vulnerabilities: 2 high, 1 low. Go here for more details: https://www.npmjs.com/advisories?search=lodash&version=4.17.11 - Run
npm i npm@latest -g
to upgrade your npm version, and thennpm audit
to get more info.npm WARN notice [SECURITY] kind-of has the following vulnerability: 1 low. Go here for more details: https://www.npmjs.com/advisories?search=kind-of&version=6.0.2 - Run
npm i npm@latest -g
to upgrade your npm version, and thennpm audit
to get more info.npm WARN notice [SECURITY] cryptiles has the following vulnerability: 1 high. Go here for more details: https://www.npmjs.com/advisories?search=cryptiles&version=2.0.5 - Run
npm i npm@latest -g
to upgrade your npm version, and thennpm audit
to get more info.npm WARN notice [SECURITY] hoek has the following vulnerability: 1 moderate. Go here for more details: https://www.npmjs.com/advisories?search=hoek&version=2.16.3 - Run
npm i npm@latest -g
to upgrade your npm version, and thennpm audit
to get more info.npm WARN notice [SECURITY] tar has the following vulnerability: 1 high. Go here for more details: https://www.npmjs.com/advisories?search=tar&version=4.4.1 - Run
npm i npm@latest -g
to upgrade your npm version, and thennpm audit
to get more info.npm WARN notice [SECURITY] acorn has the following vulnerability: 1 moderate. Go here for more details: https://www.npmjs.com/advisories?search=acorn&version=6.0.5 - Run
npm i npm@latest -g
to upgrade your npm version, and thennpm audit
to get more info.npm WARN notice [SECURITY] eslint-utils has the following vulnerability: 1 critical. Go here for more details: https://www.npmjs.com/advisories?search=eslint-utils&version=1.3.1 - Run
npm i npm@latest -g
to upgrade your npm version, and thennpm audit
to get more info.C:\FCD\caoxc\devApplication\android\node\nodejs\node_global\cml -> C:\FCD\caoxc\devApplication\android\node\nodejs\node_global\node_modules\chameleon-tool\chameleon.js
uglifyjs-webpack-plugin@0.4.6 postinstall C:\FCD\caoxc\devApplication\android\node\nodejs\node_global\node_modules\chameleon-tool\node_modules\uglifyjs-webpack-plugin
node lib/post_install.js
npm WARN rollback Rolling back node-pre-gyp@0.10.0 failed (this is probably harmless): EPERM: operation not permitted, rmdir 'C:\FCD\caoxc\devApplication\android\node\nodejs\node_global\node_modules\chameleon-tool\node_modules\fsevents\node_modules'
npm WARN optional SKIPPING OPTIONAL DEPENDENCY: fsevents@1.2.4 (node_modules\chameleon-tool\node_modules\fsevents):
npm WARN notsup SKIPPING OPTIONAL DEPENDENCY: Unsupported platform for fsevents@1.2.4: wanted {"os":"darwin","arch":"any"} (current: {"os":"win32","arch":"x64"})
added 1869 packages in 109.458s
C:\Users\caoxc>cml -v
'cml' 不是内部或外部命令,也不是可运行的程序
或批处理文件。
C:\Users\caoxc>
o75abkj44#
先 npm uninstall chameleon-tool -g
然后在 npm install chameleon-tool -g 试试吧
我刚试了下没有复现你这个问题