From 1c0e123f00dd411489e156237dcec3639129c381 Mon Sep 17 00:00:00 2001 From: Vincent Vanwaelscappel Date: Mon, 9 Feb 2026 12:48:35 +0100 Subject: [PATCH] #7868 @0.25 --- src/HTTP.php | 10 ++++++++-- 1 file changed, 8 insertions(+), 2 deletions(-) diff --git a/src/HTTP.php b/src/HTTP.php index 2d90e2b..049441a 100644 --- a/src/HTTP.php +++ b/src/HTTP.php @@ -42,7 +42,7 @@ class HTTP $flaresolverrCodes = [401, 403, 622]; - if ($flaresolverr && in_array($res['http_code'], $flaresolverrCodes) /*&& in_array('cloudflare', $response->getHeader('Server'))*/) { + if ($flaresolverr && in_array($res['http_code'], $flaresolverrCodes)) { try { $cloudflareRes = self::getHttpCodeCloudflare($url, $flaresolverr, $timeout); if ($cloudflareRes) { @@ -68,7 +68,10 @@ class HTTP $map = ['GuzzleHttp\Exception\ConnectException' => 622, 'GuzzleHttp\Psr7\Exception\MalformedUriException' => 600]; $messageMap = ['Undefined array key "solution"' => 603]; - $startMap = ['cURL error 60: SSL: no alternative certificate subject name matches target host name' => 695]; + $startMap = [ + 'cURL error 60: SSL: no alternative certificate subject name matches target host name' => 695, + 'cURL error 60: SSL certificate problem: self-signed certificate' => 696, + ]; $exceptionClass = get_class($e); $message = $e->getMessage(); @@ -131,6 +134,9 @@ class HTTP $response = self::_request($apiUrl, $timeout, 'POST', ['json' => $payload, 'headers' => ['Content-Type' => 'application/json']], false); $body = json_decode($response->getBody(), true); $httpcode = $body['solution']['status']; + if ($body['message'] == 'Challenge not detected!') { + return false; + } if (self::$_cookiesJar && isset($body['solution']['cookies'])) { foreach ($body['solution']['cookies'] as $cookie) { -- 2.39.5