海淘优惠码 > 商家大全 > Trident Hotels优惠码 > Trident Hotels

点评
-
首页 上一页 1 下一页 末页
Trident Hotels的评论
NoSuchElementException
selenium.common.exceptions.NoSuchElementException: Message: no such element: Unable to locate element: {"method":"css selector","selector":"div.lmt__inner_textarea_container:nth-child(2) >d-textarea >div"} (Session info: chrome=81.0.4044.138) Stacktrace: Backtrace: Ordinal0 [0x005E5E93+2449043] Ordinal0 [0x00518281+1606273] Ordinal0 [0x0040F889+522377] Ordinal0 [0x003A8D18+101656] Ordinal0 [0x003C48B0+215216] Ordinal0 [0x003B9FE0+172000] Ordinal0 [0x003C326C+209516] Ordinal0 [0x003B9E5B+171611] Ordinal0 [0x003A1DD8+73176] Ordinal0 [0x003A2E50+77392] Ordinal0 [0x003A2DE9+77289] Ordinal0 [0x0052D7F7+1693687] GetHandleVerifier [0x00684576+522742] GetHandleVerifier [0x006842B4+522036] GetHandleVerifier [0x00699587+608775] GetHandleVerifier [0x00684DE6+524902] Ordinal0 [0x00525BDC+1661916] Ordinal0 [0x0052F15B+1700187] Ordinal0 [0x0052F2C3+1700547] Ordinal0 [0x00545135+1790261] BaseThreadInitThunk [0x74B06A14+36] RtlInitializeExceptionChain [0x771FA9EF+143] RtlInitializeExceptionChain [0x771FA9BA+90]
Traceback (most recent call last)
File "C:\ProgramData\Miniconda3\lib\site-packages\flask\app.py", line 2095, in
__call__def __call__(self, environ: dict, start_response: t.Callable) -> t.Any:"""The WSGI server calls the Flask application object as theWSGI application. This calls :meth:`wsgi_app`, which can bewrapped to apply middleware."""return self.wsgi_app(environ, start_response)File "C:\ProgramData\Miniconda3\lib\site-packages\flask\app.py", line 2080, in
wsgi_apptry:ctx.push()response = self.full_dispatch_request()except Exception as e:error = eresponse = self.handle_exception(e)except: # noqa: B001error = sys.exc_info()[1]raisereturn response(environ, start_response)finally:File "C:\ProgramData\Miniconda3\lib\site-packages\flask\app.py", line 2077, in
wsgi_appctx = self.request_context(environ)error: t.Optional[BaseException] = Nonetry:try:ctx.push()response = self.full_dispatch_request()except Exception as e:error = eresponse = self.handle_exception(e)except: # noqa: B001error = sys.exc_info()[1]File "C:\ProgramData\Miniconda3\lib\site-packages\flask\app.py", line 1525, in
full_dispatch_requestrequest_started.send(self)rv = self.preprocess_request()if rv is None:rv = self.dispatch_request()except Exception as e:rv = self.handle_user_exception(e)return self.finalize_request(rv)def finalize_request(self,rv: t.Union[ResponseReturnValue, HTTPException],File "C:\ProgramData\Miniconda3\lib\site-packages\flask\app.py", line 1523, in
full_dispatch_requestself.try_trigger_before_first_request_functions()try:request_started.send(self)rv = self.preprocess_request()if rv is None:rv = self.dispatch_request()except Exception as e:rv = self.handle_user_exception(e)return self.finalize_request(rv)def finalize_request(File "C:\ProgramData\Miniconda3\lib\site-packages\flask\app.py", line 1509, in
dispatch_requestgetattr(rule, "provide_automatic_options", False)and req.method == "OPTIONS"):return self.make_default_options_response()# otherwise dispatch to the handler for that endpointreturn self.ensure_sync(self.view_functions[rule.endpoint])(**req.view_args)def full_dispatch_request(self) -> Response:"""Dispatches the request and on top of that performs requestpre and postprocessing as well as HTTP exception catching anderror handling.File "C:\pythoncode\google tranlate\app.py", line 327, in
deeplfyif not to:to="zh"print(txt)if not txt:returntranslated = deep_tranlate(txt,fr,to)return translated@app.route('/baidufy',methods=['GET','POST'])def baidufy():
File "C:\pythoncode\google tranlate\app.py", line 94, in
deep_tranlatepyperclip.copy(text_to_translate)# Get thie inupt_areainput_css = "div.lmt__inner_textarea_container:nth-child(2) >d-textarea >div"input_area = driver.find_element_by_css_selector(input_css)#return(input_area.get_attribute('class'))#调用JS的方法#js ='document.querySelector("div.lmt__inner_textarea_container:nth-child(2) >d-textarea >div p").innerHTML=""+text_to_translate'#driver.execute_script(js)File "C:\ProgramData\Miniconda3\lib\site-packages\selenium\webdriver\remote\webdriver.py", line 814, in
find_element_by_css_selectorwarnings.warn("find_element_by_css_selector is deprecated. Please use find_element(by=By.CSS_SELECTOR, value=css_selector) instead",DeprecationWarning,stacklevel=2,)return self.find_element(by=By.CSS_SELECTOR, value=css_selector)def find_elements_by_css_selector(self, css_selector) -> List[WebElement]:"""Finds elements by css selector.File "C:\ProgramData\Miniconda3\lib\site-packages\selenium\webdriver\remote\webdriver.py", line 1251, in
find_elementvalue = ".%s" % valueelif by == By.NAME:by = By.CSS_SELECTORvalue = '[name="%s"]' % valuereturn self.execute(Command.FIND_ELEMENT, {'using': by,'value': value})['value']def find_elements(self, by=By.ID, value=None) -> List[WebElement]:"""File "C:\ProgramData\Miniconda3\lib\site-packages\selenium\webdriver\remote\webdriver.py", line 430, in
executeparams['sessionId'] = self.session_idparams = self._wrap_value(params)response = self.command_executor.execute(driver_command, params)if response:self.error_handler.check_response(response)response['value'] = self._unwrap_value(response.get('value', None))return response# If the server doesn't send a response, assume the command was# a successFile "C:\ProgramData\Miniconda3\lib\site-packages\selenium\webdriver\remote\errorhandler.py", line 247, in
check_responseif 'data' in value:alert_text = value['data'].get('text')elif 'alert' in value:alert_text = value['alert'].get('text')raise exception_class(message, screen, stacktrace, alert_text) # type: ignore[call-arg] # mypy is not smart enough hereraise exception_class(message, screen, stacktrace)def _value_or_default(self, obj: Mapping[_KT, _VT], key: _KT, default: _VT) -> _VT:return obj[key] if key in obj else default
selenium.common.exceptions.NoSuchElementException: Message: no such element: Unable to locate element: {"method":"css selector","selector":"div.lmt__inner_textarea_container:nth-child(2) >d-textarea >div"} (Session info: chrome=81.0.4044.138) Stacktrace: Backtrace: Ordinal0 [0x005E5E93+2449043] Ordinal0 [0x00518281+1606273] Ordinal0 [0x0040F889+522377] Ordinal0 [0x003A8D18+101656] Ordinal0 [0x003C48B0+215216] Ordinal0 [0x003B9FE0+172000] Ordinal0 [0x003C326C+209516] Ordinal0 [0x003B9E5B+171611] Ordinal0 [0x003A1DD8+73176] Ordinal0 [0x003A2E50+77392] Ordinal0 [0x003A2DE9+77289] Ordinal0 [0x0052D7F7+1693687] GetHandleVerifier [0x00684576+522742] GetHandleVerifier [0x006842B4+522036] GetHandleVerifier [0x00699587+608775] GetHandleVerifier [0x00684DE6+524902] Ordinal0 [0x00525BDC+1661916] Ordinal0 [0x0052F15B+1700187] Ordinal0 [0x0052F2C3+1700547] Ordinal0 [0x00545135+1790261] BaseThreadInitThunk [0x74B06A14+36] RtlInitializeExceptionChain [0x771FA9EF+143] RtlInitializeExceptionChain [0x771FA9BA+90]
This is the Copy/Paste friendly version of the traceback.
Console Locked
The console is locked and needs to be unlocked by entering the PIN. You can find the PIN printed out on the standard output of your shell that runs the server.









