海淘优惠码

AAA Auto Insurance怎么样,AAA Auto Insurance靠谱吗

商城:AAA Auto Insurance优惠券
通过AAA Auto Insurance汽车保险获得更多。 AAA汽车保险为您的汽车提供一站式服务。了解您的汽车保险需求,预算和生活方式-这是为您找到合适保险范围的关键。 正如我们传奇的拖车司机一样,我们的保险代理人致力于为您提供帮助。保证可以信任的名称时,可以享受24/7的快速,高效的索赔服务。

官网地址:https://calstate.aaa.com/insurance/car

AAA Auto Insurance官网点评:

selenium.common.exceptions.NoSuchElementException: Message: no such element: Unable to locate element: {"method":"css selector","selector":"div.lmt__inner_textarea_container:nth-child(2) >d-textarea >div"} (Session info: chrome=81.0.4044.138) Stacktrace: Backtrace: Ordinal0 [0x005E5E93+2449043] Ordinal0 [0x00518281+1606273] Ordinal0 [0x0040F889+522377] Ordinal0 [0x003A8D18+101656] Ordinal0 [0x003C48B0+215216] Ordinal0 [0x003B9FE0+172000] Ordinal0 [0x003C326C+209516] Ordinal0 [0x003B9E5B+171611] Ordinal0 [0x003A1DD8+73176] Ordinal0 [0x003A2E50+77392] Ordinal0 [0x003A2DE9+77289] Ordinal0 [0x0052D7F7+1693687] GetHandleVerifier [0x00684576+522742] GetHandleVerifier [0x006842B4+522036] GetHandleVerifier [0x00699587+608775] GetHandleVerifier [0x00684DE6+524902] Ordinal0 [0x00525BDC+1661916] Ordinal0 [0x0052F15B+1700187] Ordinal0 [0x0052F2C3+1700547] Ordinal0 [0x00545135+1790261] BaseThreadInitThunk [0x74B06A14+36] RtlInitializeExceptionChain [0x771FA9EF+143] RtlInitializeExceptionChain [0x771FA9BA+90] // Werkzeug Debugger

NoSuchElementException

selenium.common.exceptions.NoSuchElementException: Message: no such element: Unable to locate element: {"method":"css selector","selector":"div.lmt__inner_textarea_container:nth-child(2) >d-textarea >div"} (Session info: chrome=81.0.4044.138) Stacktrace: Backtrace: Ordinal0 [0x005E5E93+2449043] Ordinal0 [0x00518281+1606273] Ordinal0 [0x0040F889+522377] Ordinal0 [0x003A8D18+101656] Ordinal0 [0x003C48B0+215216] Ordinal0 [0x003B9FE0+172000] Ordinal0 [0x003C326C+209516] Ordinal0 [0x003B9E5B+171611] Ordinal0 [0x003A1DD8+73176] Ordinal0 [0x003A2E50+77392] Ordinal0 [0x003A2DE9+77289] Ordinal0 [0x0052D7F7+1693687] GetHandleVerifier [0x00684576+522742] GetHandleVerifier [0x006842B4+522036] GetHandleVerifier [0x00699587+608775] GetHandleVerifier [0x00684DE6+524902] Ordinal0 [0x00525BDC+1661916] Ordinal0 [0x0052F15B+1700187] Ordinal0 [0x0052F2C3+1700547] Ordinal0 [0x00545135+1790261] BaseThreadInitThunk [0x74B06A14+36] RtlInitializeExceptionChain [0x771FA9EF+143] RtlInitializeExceptionChain [0x771FA9BA+90]

Traceback (most recent call last)

  • File "C:\ProgramData\Miniconda3\lib\site-packages\flask\app.py", line 2095, in __call__

        def __call__(self, environ: dict, start_response: t.Callable) -> t.Any:
            """The WSGI server calls the Flask application object as the
            WSGI application. This calls :meth:`wsgi_app`, which can be
            wrapped to apply middleware.
            """
            return self.wsgi_app(environ, start_response)
  • File "C:\ProgramData\Miniconda3\lib\site-packages\flask\app.py", line 2080, in wsgi_app

                try:
                    ctx.push()
                    response = self.full_dispatch_request()
                except Exception as e:
                    error = e
                    response = self.handle_exception(e)
                except:  # noqa: B001
                    error = sys.exc_info()[1]
                    raise
                return response(environ, start_response)
            finally:
  • File "C:\ProgramData\Miniconda3\lib\site-packages\flask\app.py", line 2077, in wsgi_app

            ctx = self.request_context(environ)
            error: t.Optional[BaseException] = None
            try:
                try:
                    ctx.push()
                    response = self.full_dispatch_request()
                except Exception as e:
                    error = e
                    response = self.handle_exception(e)
                except:  # noqa: B001
                    error = sys.exc_info()[1]
  • File "C:\ProgramData\Miniconda3\lib\site-packages\flask\app.py", line 1525, in full_dispatch_request

                request_started.send(self)
                rv = self.preprocess_request()
                if rv is None:
                    rv = self.dispatch_request()
            except Exception as e:
                rv = self.handle_user_exception(e)
            return self.finalize_request(rv)
     
        def finalize_request(
            self,
            rv: t.Union[ResponseReturnValue, HTTPException],
  • File "C:\ProgramData\Miniconda3\lib\site-packages\flask\app.py", line 1523, in full_dispatch_request

            self.try_trigger_before_first_request_functions()
            try:
                request_started.send(self)
                rv = self.preprocess_request()
                if rv is None:
                    rv = self.dispatch_request()
            except Exception as e:
                rv = self.handle_user_exception(e)
            return self.finalize_request(rv)
     
        def finalize_request(
  • File "C:\ProgramData\Miniconda3\lib\site-packages\flask\app.py", line 1509, in dispatch_request

                getattr(rule, "provide_automatic_options", False)
                and req.method == "OPTIONS"
            ):
                return self.make_default_options_response()
            # otherwise dispatch to the handler for that endpoint
            return self.ensure_sync(self.view_functions[rule.endpoint])(**req.view_args)
     
        def full_dispatch_request(self) -> Response:
            """Dispatches the request and on top of that performs request
            pre and postprocessing as well as HTTP exception catching and
            error handling.
  • File "C:\pythoncode\google tranlate\app.py", line 327, in deeplfy

        if not to:
            to="zh"
        print(txt)
        if not txt:
            return
        translated = deep_tranlate(txt,fr,to)
        return translated
     
     
    @app.route('/baidufy',methods=['GET','POST'])
    def baidufy():
  • File "C:\pythoncode\google tranlate\app.py", line 94, in deep_tranlate

     
        pyperclip.copy(text_to_translate)
     
        # Get thie inupt_area
        input_css = "div.lmt__inner_textarea_container:nth-child(2) >d-textarea >div"
        input_area = driver.find_element_by_css_selector(input_css)
        #return(input_area.get_attribute('class'))
        #调用JS的方法
        #js ='document.querySelector("div.lmt__inner_textarea_container:nth-child(2) >d-textarea >div p").innerHTML=""+text_to_translate'
        #driver.execute_script(js)
     
  • File "C:\ProgramData\Miniconda3\lib\site-packages\selenium\webdriver\remote\webdriver.py", line 814, in find_element_by_css_selector

            warnings.warn(
                "find_element_by_css_selector is deprecated. Please use find_element(by=By.CSS_SELECTOR, value=css_selector) instead",
                DeprecationWarning,
                stacklevel=2,
            )
            return self.find_element(by=By.CSS_SELECTOR, value=css_selector)
     
        def find_elements_by_css_selector(self, css_selector) -> List[WebElement]:
            """
            Finds elements by css selector.
     
  • File "C:\ProgramData\Miniconda3\lib\site-packages\selenium\webdriver\remote\webdriver.py", line 1251, in find_element

                value = ".%s" % value
            elif by == By.NAME:
                by = By.CSS_SELECTOR
                value = '[name="%s"]' % value
     
            return self.execute(Command.FIND_ELEMENT, {
                'using': by,
                'value': value})['value']
     
        def find_elements(self, by=By.ID, value=None) -> List[WebElement]:
            """
  • File "C:\ProgramData\Miniconda3\lib\site-packages\selenium\webdriver\remote\webdriver.py", line 430, in execute

                    params['sessionId'] = self.session_id
     
            params = self._wrap_value(params)
            response = self.command_executor.execute(driver_command, params)
            if response:
                self.error_handler.check_response(response)
                response['value'] = self._unwrap_value(
                    response.get('value', None))
                return response
            # If the server doesn't send a response, assume the command was
            # a success
  • File "C:\ProgramData\Miniconda3\lib\site-packages\selenium\webdriver\remote\errorhandler.py", line 247, in check_response

                if 'data' in value:
                    alert_text = value['data'].get('text')
                elif 'alert' in value:
                    alert_text = value['alert'].get('text')
                raise exception_class(message, screen, stacktrace, alert_text)  # type: ignore[call-arg]  # mypy is not smart enough here
            raise exception_class(message, screen, stacktrace)
     
        def _value_or_default(self, obj: Mapping[_KT, _VT], key: _KT, default: _VT) -> _VT:
            return obj[key] if key in obj else default
selenium.common.exceptions.NoSuchElementException: Message: no such element: Unable to locate element: {"method":"css selector","selector":"div.lmt__inner_textarea_container:nth-child(2) >d-textarea >div"} (Session info: chrome=81.0.4044.138) Stacktrace: Backtrace: Ordinal0 [0x005E5E93+2449043] Ordinal0 [0x00518281+1606273] Ordinal0 [0x0040F889+522377] Ordinal0 [0x003A8D18+101656] Ordinal0 [0x003C48B0+215216] Ordinal0 [0x003B9FE0+172000] Ordinal0 [0x003C326C+209516] Ordinal0 [0x003B9E5B+171611] Ordinal0 [0x003A1DD8+73176] Ordinal0 [0x003A2E50+77392] Ordinal0 [0x003A2DE9+77289] Ordinal0 [0x0052D7F7+1693687] GetHandleVerifier [0x00684576+522742] GetHandleVerifier [0x006842B4+522036] GetHandleVerifier [0x00699587+608775] GetHandleVerifier [0x00684DE6+524902] Ordinal0 [0x00525BDC+1661916] Ordinal0 [0x0052F15B+1700187] Ordinal0 [0x0052F2C3+1700547] Ordinal0 [0x00545135+1790261] BaseThreadInitThunk [0x74B06A14+36] RtlInitializeExceptionChain [0x771FA9EF+143] RtlInitializeExceptionChain [0x771FA9BA+90]

This is the Copy/Paste friendly version of the traceback.

The debugger caught an exception in your WSGI application. You can now look at the traceback which led to the error. If you enable JavaScript you can also use additional features such as code execution (if the evalex feature is enabled), automatic pasting of the exceptions and much more.

Console Locked

The console is locked and needs to be unlocked by entering the PIN. You can find the PIN printed out on the standard output of your shell that runs the server.

PIN: