سلام من دستور
npm install && npm run dev
رو برای نصب زدم و خطای زیر رو آورد
npm WARN old lockfile
npm WARN old lockfile The package-lock.json file was created with an old version of npm,
npm WARN old lockfile so supplemental metadata must be fetched from the registry.
npm WARN old lockfile
npm WARN old lockfile This is a one-time fix-up, please be patient...
npm WARN old lockfile
Terminate batch job (Y/N)? y
PS C:\Users\ArshiaMohammadeii\Desktop\asd\emichelnew> npm install --package-lock-only
npm WARN old lockfile
npm WARN old lockfile The package-lock.json file was created with an old version of npm,
npm WARN old lockfile so supplemental metadata must be fetched from the registry.
npm WARN old lockfile
npm WARN old lockfile This is a one-time fix-up, please be patient...
up to date, audited 1304 packages in 58s
55 packages are looking for funding
run `npm fund` for details
57 vulnerabilities (2 low, 17 moderate, 32 high, 6 critical)
To address issues that do not require attention, run:
npm audit fix
To address all issues (including breaking changes), run:
npm audit fix --force
Run `npm audit` for details.
PS C:\Users\ArshiaMohammadeii\Desktop\asd\emichelnew> npm audit
# npm audit report
ansi-html <0.0.8
Severity: high
Uncontrolled Resource Consumption in ansi-html - https://github.com/advisories/GHSA-whgm-jr23-g3j9
fix available via `npm audit fix`
node_modules/ansi-html
webpack-dev-server 2.0.0-beta - 4.7.2
Depends on vulnerable versions of ansi-html
Depends on vulnerable versions of chokidar
Depends on vulnerable versions of selfsigned
node_modules/webpack-dev-server
ansi-regex 3.0.0 || 4.0.0 - 4.1.0
Severity: high
Inefficient Regular Expression Complexity in chalk/ansi-regex - https://github.com/advisories/GHSA-93q8-gq69-wqmw
Inefficient Regular Expression Complexity in chalk/ansi-regex - https://github.com/advisories/GHSA-93q8-gq69-wqmw
fix available via `npm audit fix`
node_modules/cliui/node_modules/ansi-regex
node_modules/string-width/node_modules/ansi-regex
node_modules/webpack-cli/node_modules/ansi-regex
node_modules/webpack-dev-server/node_modules/ansi-regex
node_modules/wrap-ansi/node_modules/ansi-regex
node_modules/yargs/node_modules/ansi-regex
async 2.0.0 - 2.6.3
Severity: high
Prototype Pollution in async - https://github.com/advisories/GHSA-fwr7-v2mv-hh25
fix available via `npm audit fix`
node_modules/async
browserslist 4.0.0 - 4.16.4
Severity: moderate
Regular Expression Denial of Service in browserslist - https://github.com/advisories/GHSA-w8qv-6jwh-64r5
fix available via `npm audit fix`
node_modules/browserslist
color-string <1.5.5
Severity: moderate
Regular Expression Denial of Service (ReDOS) - https://github.com/advisories/GHSA-257v-vj4p-3w2h
fix available via `npm audit fix`
node_modules/color-string
decode-uri-component <0.2.1
decode-uri-component vulnerable to Denial of Service (DoS) - https://github.com/advisories/GHSA-w573-4hg7-7wgq
fix available via `npm audit fix`
node_modules/decode-uri-component
dns-packet <1.3.2
Severity: high
Potential memory exposure in dns-packet - https://github.com/advisories/GHSA-3wcq-x3mq-6r9p
fix available via `npm audit fix`
node_modules/dns-packet
elliptic <6.5.4
Severity: moderate
Use of a Broken or Risky Cryptographic Algorithm - https://github.com/advisories/GHSA-r9p9-mrjm-926w
fix available via `npm audit fix`
node_modules/elliptic
eventsource <1.1.1
Severity: critical
Exposure of Sensitive Information in eventsource - https://github.com/advisories/GHSA-6h5x-7c5m-7cr7
fix available via `npm audit fix`
node_modules/eventsource
follow-redirects <=1.14.7
Severity: high
Exposure of Sensitive Information to an Unauthorized Actor in follow-redirects - https://github.com/advisories/GHSA-pw2r-vq6v-hr8c
Exposure of sensitive information in follow-redirects - https://github.com/advisories/GHSA-74fj-2j2h-c42q
fix available via `npm audit fix`
node_modules/follow-redirects
glob-parent =6.0.0 || <5.1.2
Severity: high
glob-parent 6.0.0 vulnerable to Regular Expression Denial of Service - https://github.com/advisories/GHSA-cj88-88mr-972w
glob-parent before 5.1.2 vulnerable to Regular Expression Denial of Service in enclosure regex - https://github.com/advisories/GHSA-ww39-953v-wcq6fix available via `npm audit fix --force`
Will install laravel-mix@6.0.49, which is a breaking change
node_modules/glob-parent
node_modules/tailwindcss/node_modules/glob-parent
node_modules/watchpack/node_modules/glob-parent
chokidar 1.0.0-rc1 - 2.1.8
Depends on vulnerable versions of glob-parent
node_modules/chokidar
laravel-mix <=5.0.9
Depends on vulnerable versions of chokidar
Depends on vulnerable versions of css-loader
Depends on vulnerable versions of imagemin
Depends on vulnerable versions of terser
Depends on vulnerable versions of yargs
node_modules/laravel-mix
watchpack-chokidar2 *
Depends on vulnerable versions of chokidar
node_modules/watchpack-chokidar2
watchpack 1.7.2 - 1.7.5
Depends on vulnerable versions of watchpack-chokidar2
node_modules/watchpack
webpack 4.44.0 - 4.46.0
Depends on vulnerable versions of watchpack
node_modules/webpack
fast-glob <=2.2.7
Depends on vulnerable versions of glob-parent
node_modules/fast-glob
globby 8.0.0 - 9.2.0
Depends on vulnerable versions of fast-glob
node_modules/globby
imagemin 6.0.0 - 6.1.0
Depends on vulnerable versions of globby
node_modules/imagemin
ini <1.3.6
Severity: high
ini before 1.3.6 vulnerable to Prototype Pollution via ini.parse - https://github.com/advisories/GHSA-qqgx-2p2h-9c37
fix available via `npm audit fix`
node_modules/ini
is-svg 2.1.0 - 4.2.2
Severity: high
ReDOS in IS-SVG - https://github.com/advisories/GHSA-r8j5-h5cx-65gg
Regular Expression Denial of Service (ReDoS) - https://github.com/advisories/GHSA-7r28-3m3f-r2pr
fix available via `npm audit fix`
node_modules/is-svg
postcss-svgo 4.0.0-nightly.2020.1.9 - 5.0.0-rc.2
Depends on vulnerable versions of is-svg
Depends on vulnerable versions of svgo
node_modules/postcss-svgo
json5 <1.0.2 || >=2.0.0 <2.2.2
Severity: high
Prototype Pollution in JSON5 via Parse Method - https://github.com/advisories/GHSA-9c47-m6qq-7p4h
Prototype Pollution in JSON5 via Parse Method - https://github.com/advisories/GHSA-9c47-m6qq-7p4h
fix available via `npm audit fix`
node_modules/adjust-sourcemap-loader/node_modules/json5
node_modules/json5
node_modules/loader-utils/node_modules/json5
node_modules/resolve-url-loader/node_modules/json5
loader-utils <=1.4.1
Severity: critical
Prototype pollution in webpack loader-utils - https://github.com/advisories/GHSA-76p3-8jx3-jpfq
loader-utils is vulnerable to Regular Expression Denial of Service (ReDoS) via url variable - https://github.com/advisories/GHSA-3rfm-jhwj-7488
loader-utils is vulnerable to Regular Expression Denial of Service (ReDoS) - https://github.com/advisories/GHSA-hhq3-ff78-jv3g
fix available via `npm audit fix`
node_modules/adjust-sourcemap-loader/node_modules/loader-utils
node_modules/loader-utils
node_modules/resolve-url-loader/node_modules/loader-utils
adjust-sourcemap-loader <=2.0.0
Depends on vulnerable versions of loader-utils
Depends on vulnerable versions of object-path
node_modules/adjust-sourcemap-loader
resolve-url-loader 0.0.1-experiment-postcss || 1.0.3 - 2.0.0 || 3.0.1 - 3.1.4 || 4.0.0-alpha.1 - 4.0.0-beta.2
Depends on vulnerable versions of adjust-sourcemap-loader
Depends on vulnerable versions of loader-utils
Depends on vulnerable versions of postcss
node_modules/resolve-url-loader
lodash <=4.17.20
Severity: high
Regular Expression Denial of Service (ReDoS) in lodash - https://github.com/advisories/GHSA-29mw-wpgm-hmr9
Command Injection in lodash - https://github.com/advisories/GHSA-35jh-r3h4-6jhm
Prototype Pollution in lodash - https://github.com/advisories/GHSA-p6mc-m468-83gw
fix available via `npm audit fix`
node_modules/lodash
minimatch <3.0.5
Severity: high
minimatch ReDoS vulnerability - https://github.com/advisories/GHSA-f8q6-p94x-37v3
fix available via `npm audit fix`
node_modules/minimatch
minimist 1.0.0 - 1.2.5
Severity: critical
Prototype Pollution in minimist - https://github.com/advisories/GHSA-xvch-5gv4-984h
fix available via `npm audit fix`
node_modules/minimist
nanoid 3.0.0 - 3.1.30
Severity: moderate
Exposure of Sensitive Information to an Unauthorized Actor in nanoid - https://github.com/advisories/GHSA-qrpm-p2h7-hrv2
fix available via `npm audit fix`
node_modules/nanoid
node-forge <=1.2.1
Severity: high
Prototype Pollution in node-forge debug API. - https://github.com/advisories/GHSA-5rrq-pxf6-6jx5
Prototype Pollution in node-forge util.setPath API - https://github.com/advisories/GHSA-wxgw-qj99-44c2
URL parsing in node-forge could lead to undesired behavior. - https://github.com/advisories/GHSA-gf8q-jrpm-jvxq
Improper Verification of Cryptographic Signature in `node-forge` - https://github.com/advisories/GHSA-2r2c-g63r-vccr
Open Redirect in node-forge - https://github.com/advisories/GHSA-8fr3-hfg3-gpgp
Improper Verification of Cryptographic Signature in node-forge - https://github.com/advisories/GHSA-cfm4-qjh2-4765
Improper Verification of Cryptographic Signature in node-forge - https://github.com/advisories/GHSA-x4jg-mjrx-434g
Prototype Pollution in node-forge - https://github.com/advisories/GHSA-92xj-mqp7-vmcj
fix available via `npm audit fix`
node_modules/node-forge
selfsigned 1.1.1 - 1.10.14
Depends on vulnerable versions of node-forge
node_modules/selfsigned
node-notifier <8.0.1
Severity: moderate
OS Command Injection in node-notifier - https://github.com/advisories/GHSA-5fw9-fq32-wv5p
fix available via `npm audit fix`
node_modules/node-notifier
webpack-notifier <=1.11.1
Depends on vulnerable versions of node-notifier
node_modules/webpack-notifier
nth-check <2.0.1
Severity: high
Inefficient Regular Expression Complexity in nth-check - https://github.com/advisories/GHSA-rp65-9cf3-cjxr
fix available via `npm audit fix`
node_modules/nth-check
css-select <=3.1.0
Depends on vulnerable versions of nth-check
node_modules/css-select
svgo 1.0.0 - 1.3.2
Depends on vulnerable versions of css-select
node_modules/svgo
object-path <=0.11.7
Severity: high
Prototype Pollution in object-path - https://github.com/advisories/GHSA-v39p-96qg-c8rf
Prototype pollution in object-path - https://github.com/advisories/GHSA-cwx2-736x-mf6w
Prototype Pollution in object-path - https://github.com/advisories/GHSA-8v63-cqqc-6r2c
fix available via `npm audit fix`
node_modules/object-path
path-parse <1.0.7
Severity: moderate
Regular Expression Denial of Service in path-parse - https://github.com/advisories/GHSA-hj48-42vr-x3v9
fix available via `npm audit fix`
node_modules/path-parse
postcss <=7.0.35
Severity: moderate
Regular Expression Denial of Service in postcss - https://github.com/advisories/GHSA-566m-qj78-rww5
Regular Expression Denial of Service in postcss - https://github.com/advisories/GHSA-hwj9-h5mp-3pm3
fix available via `npm audit fix --force`
Will install laravel-mix@6.0.49, which is a breaking change
node_modules/css-loader/node_modules/postcss
node_modules/icss-utils/node_modules/postcss
node_modules/postcss-modules-extract-imports/node_modules/postcss
node_modules/postcss-modules-local-by-default/node_modules/postcss
node_modules/postcss-modules-scope/node_modules/postcss
node_modules/postcss-modules-values/node_modules/postcss
node_modules/resolve-url-loader/node_modules/postcss
css-loader 0.15.0 - 1.0.1
Depends on vulnerable versions of icss-utils
Depends on vulnerable versions of postcss
Depends on vulnerable versions of postcss-modules-extract-imports
Depends on vulnerable versions of postcss-modules-local-by-default
Depends on vulnerable versions of postcss-modules-scope
Depends on vulnerable versions of postcss-modules-values
node_modules/css-loader
icss-utils <=3.0.1
Depends on vulnerable versions of postcss
node_modules/icss-utils
postcss-modules-extract-imports <=1.2.1
Depends on vulnerable versions of postcss
node_modules/postcss-modules-extract-imports
postcss-modules-local-by-default <=1.2.0
Depends on vulnerable versions of postcss
node_modules/postcss-modules-local-by-default
postcss-modules-scope <=1.1.0
Depends on vulnerable versions of postcss
node_modules/postcss-modules-scope
postcss-modules-values <=1.3.0
Depends on vulnerable versions of postcss
node_modules/postcss-modules-values
qs 6.7.0 - 6.7.2
Severity: high
qs vulnerable to Prototype Pollution - https://github.com/advisories/GHSA-hrpp-h998-j3pp
fix available via `npm audit fix`
node_modules/qs
body-parser 1.19.0
Depends on vulnerable versions of qs
node_modules/body-parser
express 4.17.0 - 4.17.1 || 5.0.0-alpha.1 - 5.0.0-alpha.8
Depends on vulnerable versions of body-parser
Depends on vulnerable versions of qs
node_modules/express
ssri 5.2.2 - 6.0.1 || 7.0.0 - 7.1.0
Severity: high
Regular Expression Denial of Service (ReDoS) - https://github.com/advisories/GHSA-vx3p-948g-6vhq
Regular Expression Denial of Service (ReDoS) - https://github.com/advisories/GHSA-vx3p-948g-6vhq
fix available via `npm audit fix`
node_modules/ssri
node_modules/webpack/node_modules/ssri
terser <4.8.1
Severity: high
Terser insecure use of regular expressions leads to ReDoS - https://github.com/advisories/GHSA-4wf5-vphf-c2xc
fix available via `npm audit fix --force`
Will install laravel-mix@6.0.49, which is a breaking change
node_modules/terser
node_modules/terser-webpack-plugin/node_modules/terser
node_modules/webpack/node_modules/terser
url-parse <=1.5.8
Severity: critical
Incorrect hostname / protocol due to unstripped leading control characters. - https://github.com/advisories/GHSA-jf5r-8hm2-f872
Incorrect returned href via an '@' sign but no user info and hostname - https://github.com/advisories/GHSA-8v38-pw62-9cw2
Authorization bypass in url-parse - https://github.com/advisories/GHSA-rqff-837h-mm52
Open redirect in url-parse - https://github.com/advisories/GHSA-hh27-ffr2-f2jc
Path traversal in url-parse - https://github.com/advisories/GHSA-9m6j-fcg5-2442
Authorization Bypass Through User-Controlled Key in url-parse - https://github.com/advisories/GHSA-hgjh-723h-mx2j
fix available via `npm audit fix`
node_modules/url-parse
ws 6.0.0 - 6.2.1
Severity: moderate
ReDoS in Sec-Websocket-Protocol header - https://github.com/advisories/GHSA-6fc8-4gx4-v693
fix available via `npm audit fix`
node_modules/ws
y18n 4.0.0
Severity: high
Prototype Pollution in y18n - https://github.com/advisories/GHSA-c4w7-xm78-47vh
fix available via `npm audit fix`
node_modules/y18n
yargs-parser 6.0.0 - 13.1.1
yargs-parser Vulnerable to Prototype Pollution - https://github.com/advisories/GHSA-p9pc-299p-vxgp
fix available via `npm audit fix --force`
Will install laravel-mix@6.0.49, which is a breaking change
node_modules/yargs/node_modules/yargs-parser
yargs 8.0.0-candidate.0 - 12.0.5
Depends on vulnerable versions of yargs-parser
node_modules/yargs
57 vulnerabilities (2 low, 17 moderate, 32 high, 6 critical)
To address issues that do not require attention, run:
npm audit fix
To address all issues (including breaking changes), run:
npm audit fix --force
PS C:\Users\ArshiaMohammadeii\Desktop\asd\emichelnew> npm audit fix --force
npm WARN using --force Recommended protections disabled.
npm WARN audit Updating laravel-mix to 6.0.49, which is a SemVer major change.
npm WARN ERESOLVE overriding peer dependency
npm WARN While resolving: @tailwindcss/custom-forms@0.2.1
npm WARN Found: tailwindcss@2.2.2
npm WARN node_modules/tailwindcss
npm WARN peer tailwindcss@">=2.0.0" from @tailwindcss/aspect-ratio@0.2.1
npm WARN node_modules/@tailwindcss/aspect-ratio
npm WARN @tailwindcss/aspect-ratio@"^0.2.1" from the root project
npm WARN 1 more (the root project)
npm WARN
npm WARN Could not resolve dependency:
npm WARN peer tailwindcss@"^1.0" from @tailwindcss/custom-forms@0.2.1
npm WARN node_modules/@tailwindcss/custom-forms
npm WARN @tailwindcss/custom-forms@"^0.2.1" from @tailwindcss/ui@0.4.0
npm WARN node_modules/@tailwindcss/ui
npm WARN 1 more (the root project)
npm WARN
npm WARN Conflicting peer dependency: tailwindcss@1.9.6
npm WARN node_modules/tailwindcss
npm WARN peer tailwindcss@"^1.0" from @tailwindcss/custom-forms@0.2.1
npm WARN node_modules/@tailwindcss/custom-forms
npm WARN @tailwindcss/custom-forms@"^0.2.1" from @tailwindcss/ui@0.4.0
npm WARN node_modules/@tailwindcss/ui
npm WARN 1 more (the root project)
npm WARN ERESOLVE overriding peer dependency
npm WARN While resolving: @tailwindcss/typography@0.2.0
npm WARN Found: tailwindcss@2.2.2
npm WARN node_modules/tailwindcss
npm WARN peer tailwindcss@">=2.0.0" from @tailwindcss/aspect-ratio@0.2.1
npm WARN node_modules/@tailwindcss/aspect-ratio
npm WARN @tailwindcss/aspect-ratio@"^0.2.1" from the root project
npm WARN 1 more (the root project)
npm WARN
npm WARN Could not resolve dependency:
npm WARN peer tailwindcss@"^1.5.0" from @tailwindcss/typography@0.2.0
npm WARN node_modules/@tailwindcss/typography
npm WARN @tailwindcss/typography@"^0.2.0" from @tailwindcss/ui@0.4.0
npm WARN node_modules/@tailwindcss/ui
npm WARN 1 more (the root project)
npm WARN
npm WARN Conflicting peer dependency: tailwindcss@1.9.6
npm WARN node_modules/tailwindcss
npm WARN peer tailwindcss@"^1.5.0" from @tailwindcss/typography@0.2.0
npm WARN node_modules/@tailwindcss/typography
npm WARN @tailwindcss/typography@"^0.2.0" from @tailwindcss/ui@0.4.0
npm WARN node_modules/@tailwindcss/ui
npm WARN 1 more (the root project)
npm WARN ERESOLVE overriding peer dependency
npm WARN While resolving: @tailwindcss/ui@0.4.0
npm WARN Found: tailwindcss@2.2.2
npm WARN node_modules/tailwindcss
npm WARN peer tailwindcss@">=2.0.0" from @tailwindcss/aspect-ratio@0.2.1
npm WARN node_modules/@tailwindcss/aspect-ratio
npm WARN @tailwindcss/aspect-ratio@"^0.2.1" from the root project
npm WARN 1 more (the root project)
npm WARN
npm WARN Could not resolve dependency:
npm WARN node_modules/@tailwindcss/ui
npm WARN dev @tailwindcss/ui@"^0.4" from the root project
npm WARN
npm WARN Conflicting peer dependency: tailwindcss@1.9.6
npm WARN node_modules/tailwindcss
npm WARN peer tailwindcss@"^1.5.1" from @tailwindcss/ui@0.4.0
npm WARN node_modules/@tailwindcss/ui
npm WARN dev @tailwindcss/ui@"^0.4" from the root project
added 176 packages, removed 634 packages, changed 393 packages, and audited 845 packages in 2m
81 packages are looking for funding
run `npm fund` for details
found 0 vulnerabilities
PS C:\Users\ArshiaMohammadeii\Desktop\asd\emichelnew> npm run dev
> dev
> npm run development
> development
> cross-env NODE_ENV=development node_modules/webpack/bin/webpack.js --progress --hide-modules --config=node_modules/laravel-mix/setup/webpack.config.js
[webpack-cli] Error: Unknown option '--hide-modules'
[webpack-cli] Run 'webpack --help' to see available conpm install --save-dev laravel-mix@latest
بعد توی اینترنت سرچ کردم و گفت باید دستور
npm install --save-dev laravel-mix@latest
رو بزنید و زدم و دباره یان خطارو آورد
npm ERR! code ERESOLVE
npm ERR! ERESOLVE could not resolve
npm ERR!
npm ERR! Found: tailwindcss@2.2.2
npm ERR! nodemodules/tailwindcss
npm ERR! peer tailwindcss@">=2.0.0" from @tailwindcss/aspect-ratio@0.2.1
npm ERR! nodemodules/@tailwindcss/aspect-ratio
npm ERR! @tailwindcss/aspect-ratio@"^0.2.1" from the root project
npm ERR! dev tailwindcss@"^2.2.2" from the root project
npm ERR!
npm ERR! Could not resolve dependency:
npm ERR! peer tailwindcss@"^1.0" from @tailwindcss/custom-forms@0.2.1
npm ERR! nodemodules/@tailwindcss/custom-forms
npm ERR! @tailwindcss/custom-forms@"^0.2.1" from @tailwindcss/ui@0.4.0
npm ERR! nodemodules/@tailwindcss/ui
npm ERR! dev @tailwindcss/ui@"^0.4" from the root project
npm ERR! dev @tailwindcss/custom-forms@"^0.2.1" from the root project
npm ERR!
npm ERR! Conflicting peer dependency: tailwindcss@1.9.6
npm ERR! nodemodules/tailwindcss
npm ERR! peer tailwindcss@"^1.0" from @tailwindcss/custom-forms@0.2.1
npm ERR! nodemodules/@tailwindcss/custom-forms
npm ERR! @tailwindcss/custom-forms@"^0.2.1" from @tailwindcss/ui@0.4.0
npm ERR! nodemodules/@tailwindcss/ui
npm ERR! dev @tailwindcss/ui@"^0.4" from the root project
npm ERR! dev @tailwindcss/custom-forms@"^0.2.1" from the root project
npm ERR!
npm ERR! Fix the upstream dependency conflict, or retry
npm ERR! this command with --force or --legacy-peer-deps
npm ERR! to accept an incorrect (and potentially broken) dependency resolution.
npm ERR!
npm ERR!
npm ERR! For a full report see:
npm ERR! C:\\Users\\ArshiaMohammadeii\\AppData\\Local\\npm-cachelogs\\2023-03-28T193812659Z-eresolve-report.txt
npm ERR! A complete log of this run can be found in:
npm ERR! C:\\Users\\ArshiaMohammadeii\\AppData\\Local\\npm-cachelogs\\2023-03-28T193812659Z-debug-0.log
لطفا کمک کنید
به Arshiamohammadei کمک کنید تا مشکل خودش را حل کند؛ اینطور میتوانیم با هم پیشرفت کنیم.
آیا مایل به ارسال نوتیفیکیشن و اخبار از طرف راکت هستید ؟