Hi Danp2,
Thanks for replying so fast.
Im actually trying to access a Div inside a shadow-root.
Scite output window:
__WD_Post: URL=HTTP://127.0.0.1:9515/session/a7e30f8f7b44b762b8cae151b3f5af15/element; $sData={"using":"tag name","value":"downloads-manager"}
__WD_Post: StatusCode=200; ResponseText={"value":{"element-6066-11e4-a52e-4f735466cecf":"e76ba505-f16e-4f65-b04c-c82b08f3f6b9"}}
_WD_FindElement: {"value":{"element-6066-11e4-a52e-4f735466cecf":"e76ba505-f16e-4f65-b04c-c82b08f3f6b9"}}
__WD_Post: URL=HTTP://127.0.0.1:9515/session/a7e30f8f7b44b762b8cae151b3f5af15/element; $sData={"using":"xpath","value":"//downloads-manager/div[@id='mainContainer']"}
__WD_Post: StatusCode=404; ResponseText={"value":{"error":"no such element","message":"no such element: Unable to locate element: {\"method\":\"xpath\",\"selector\":\"//downloads-manager/div[@id='mainContainer']\"}\n (Session info: chrome=77.0.3865.90)","stacktrace":"Backtrace:\n\tOrdinal0 [0x0100EB13+1501971]\n\tOrdinal0 [0x00F8F6D1+980689]\n\tOrdinal0 [0x00F1765F+489055]\n\tOrdinal0 [0x00EB7152+94546]\n\tOrdinal0 [0x00ED0E00+200192]\n\tOrdinal0 [0x00EC7A80+162432]\n\tOrdinal0 [0x00ECF93E+194878]\n\tOrdinal0 [0x00EC78EB+162027]\n\tOrdinal0 [0x00EB0AC7+68295]\n\tOrdinal0 [0x00EB1B40+72512]\n\tOrdinal0 [0x00EB1AD9+72409]\n\tOrdinal0 [0x00FA8F37+1085239]\n\tGetHandleVerifier [0x010AD7ED+503293]\n\tGetHandleVerifier [0x010AD580+502672]\n\tGetHandleVerifier [0x010B46AC+531644]\n\tGetHandleVerifier [0x010ADFFA+505354]\n\tOrdinal0 [0x00FA0606+1050118]\n\tOrdinal0 [0x00FA047F+1049727]\n\tOrdinal0 [0x00FAAF9B+1093531]\n\tOrdinal0 [0x00FAB103+1093891]\n\tOrdinal0 [0x00FAA095+1089685]\n\tBaseThreadInitThunk [0x73C68484+36]\n\tRtlValidSecurityDescriptor [0x7705305A+282]\n\tRtlValidSecurityDescriptor [0x7705302A+234]\n"}}
_WD_FindElement: {"value":{"error":"no such element","message":"no such element: Unable to locate element: {\"method\":\"xpath\",\"selector\":\"//downloads-manager/div[@id='mainContainer']\"}\n (Session info: chrome=77.0.3865.90)","stacktrace":"Backtrace:\n\tOrdinal0 [0x0100EB13+1501971]\n\tOrdinal0 [0x00F8F6D1+980689]\n\tOrdinal0 [0x00F1765F+489055]\n\tOrdinal0 [0x00EB7152+94546]\n\tOrdinal0 [0x00ED0E00+200192]\n\tOrdinal0 [0x00EC7A80+162432]\n\tOrdinal0 [0x00ECF93E+194878]\n\tOrdinal0 [0x00EC78EB+162027]\n\tOrdinal0 [0x00EB0AC7+68295]\n\tOrdinal0 [0x00EB1B40+72512]\n\tOrdinal0 [0x00EB1AD9+72409]\n\tOrdinal0 [0x00FA8F37+1085239]\n\tGetHandleVerifier [0x010AD7ED+503293]\n\tGetHandleVerifier [0x010AD580+502672]\n\tGetHandleVerifier [0x010B46AC+531644]\n\tGetHandleVerifier [0x010ADFFA+505354]\n\tOrdinal0 [0x00FA0606+1050118]\n\tOrdinal0 [0x00FA047F+1049727]\n\tOrdinal0 [0x00FAAF9B+1093531]\n\tOrdinal0 [0x00FAB103+1093891]\n\tOrdinal0 [0x00FAA095+1089685]\n\tBaseThreadInitThunk [0x73C68484+36]\n\tRtlValidSecurityDescriptor [0x7705305A+282]\n\tRtlValidSecurityDescriptor [0x7705302A+234]\n"}}
_WD_FindElement ==> No match: HTTP status = 404