@php-wasm/node-7-2 3.0.35 → 3.0.37

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -3,15 +3,17 @@
3
3
  // this code in Node.js as an ES module.
4
4
  import { createRequire } from 'module';
5
5
  const require = createRequire(import.meta.url);
6
- // Note: The path module is currently needed by code injected by the php-wasm Dockerfile.
7
- import { fileURLToPath } from 'url';
6
+ // Note: The path and url modules are currently needed by code injected by the php-wasm Dockerfile.
8
7
  import path from 'path';
9
- const __filename = fileURLToPath(import.meta.url);
10
- const __dirname = path.dirname(__filename);
8
+ import { fileURLToPath } from 'url';
11
9
 
12
- const dependencyFilename = path.join(__dirname, '7_2_34', 'php_7_2.wasm');
10
+ const currentDirPath =
11
+ typeof __dirname !== 'undefined'
12
+ ? __dirname
13
+ : path.dirname(fileURLToPath(import.meta.url));
14
+ const dependencyFilename = path.join(currentDirPath, '7_2_34', 'php_7_2.wasm');
13
15
  export { dependencyFilename };
14
- export const dependenciesTotalSize = 22621952;
16
+ export const dependenciesTotalSize = 22621562;
15
17
  const phpVersionString = '7.2.34';
16
18
  export function init(RuntimeName, PHPLoader) {
17
19
  // The rest of the code comes from the built php.js file and esm-suffix.js
@@ -75,7 +77,7 @@ export function init(RuntimeName, PHPLoader) {
75
77
  // the complexity of lazy-loading.
76
78
  var fs = require('fs');
77
79
 
78
- scriptDirectory = __dirname + '/';
80
+ scriptDirectory = currentDirPath + '/';
79
81
 
80
82
  // include: node_shell_read.js
81
83
  readBinary = (filename) => {
@@ -5121,8 +5123,10 @@ export function init(RuntimeName, PHPLoader) {
5121
5123
  );
5122
5124
 
5123
5125
  var ___call_sighandler = (fp, sig) =>
5124
- ((a1) => {})(
5125
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ sig
5126
+ ((
5127
+ a1
5128
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
5129
+ sig
5126
5130
  );
5127
5131
  ___call_sighandler.sig = 'vpi';
5128
5132
 
@@ -7021,13 +7025,6 @@ export function init(RuntimeName, PHPLoader) {
7021
7025
  });
7022
7026
  }
7023
7027
 
7024
- if (ENVIRONMENT_IS_NODE) {
7025
- return require('child_process').spawn(command, args, {
7026
- ...options,
7027
- shell: true,
7028
- stdio: ['pipe', 'pipe', 'pipe'],
7029
- });
7030
- }
7031
7028
  const e = new Error(
7032
7029
  'popen(), proc_open() etc. are unsupported on this PHP instance. Call php.setSpawnHandler() ' +
7033
7030
  'and provide a callback to handle spawning processes, or disable a popen(), proc_open() ' +
@@ -8995,8 +8992,11 @@ export function init(RuntimeName, PHPLoader) {
8995
8992
  dlSetError(`'Could not load dynamic lib: ${filename}\n${e}`);
8996
8993
  runtimeKeepalivePop();
8997
8994
  callUserCallback(() =>
8998
- ((a1, a2) => {})(
8999
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
8995
+ ((
8996
+ a1,
8997
+ a2
8998
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
8999
+ handle,
9000
9000
  user_data
9001
9001
  )
9002
9002
  );
@@ -9004,8 +9004,11 @@ export function init(RuntimeName, PHPLoader) {
9004
9004
  function successCallback() {
9005
9005
  runtimeKeepalivePop();
9006
9006
  callUserCallback(() =>
9007
- ((a1, a2) => {})(
9008
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
9007
+ ((
9008
+ a1,
9009
+ a2
9010
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
9011
+ handle,
9009
9012
  user_data
9010
9013
  )
9011
9014
  );
@@ -18685,8 +18688,11 @@ export function init(RuntimeName, PHPLoader) {
18685
18688
  var trace = getCallstack();
18686
18689
  var parts = trace.split('\n');
18687
18690
  for (var i = 0; i < parts.length; i++) {
18688
- var ret = ((a1, a2) => {})(
18689
- /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0,
18691
+ var ret = ((
18692
+ a1,
18693
+ a2
18694
+ ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
18695
+ 0,
18690
18696
  arg
18691
18697
  );
18692
18698
  if (ret !== 0) return;
@@ -19230,8 +19236,12 @@ export function init(RuntimeName, PHPLoader) {
19230
19236
  stringToUTF8(e.locale || '', keyEventData + 128, 32);
19231
19237
 
19232
19238
  if (
19233
- ((a1, a2, a3) => {})(
19234
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
19239
+ ((
19240
+ a1,
19241
+ a2,
19242
+ a3
19243
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19244
+ eventTypeId,
19235
19245
  keyEventData,
19236
19246
  userData
19237
19247
  )
@@ -19349,8 +19359,12 @@ export function init(RuntimeName, PHPLoader) {
19349
19359
  fillMouseEventData(JSEvents.mouseEvent, e, target);
19350
19360
 
19351
19361
  if (
19352
- ((a1, a2, a3) => {})(
19353
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
19362
+ ((
19363
+ a1,
19364
+ a2,
19365
+ a3
19366
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19367
+ eventTypeId,
19354
19368
  JSEvents.mouseEvent,
19355
19369
  userData
19356
19370
  )
@@ -19564,8 +19578,12 @@ export function init(RuntimeName, PHPLoader) {
19564
19578
  HEAPF64[(wheelEvent + 80) >> 3] = e['deltaZ'];
19565
19579
  HEAP32[(wheelEvent + 88) >> 2] = e['deltaMode'];
19566
19580
  if (
19567
- ((a1, a2, a3) => {})(
19568
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
19581
+ ((
19582
+ a1,
19583
+ a2,
19584
+ a3
19585
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19586
+ eventTypeId,
19569
19587
  wheelEvent,
19570
19588
  userData
19571
19589
  )
@@ -19646,8 +19664,12 @@ export function init(RuntimeName, PHPLoader) {
19646
19664
  HEAP32[(uiEvent + 28) >> 2] = pageXOffset | 0; // scroll offsets are float
19647
19665
  HEAP32[(uiEvent + 32) >> 2] = pageYOffset | 0;
19648
19666
  if (
19649
- ((a1, a2, a3) => {})(
19650
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
19667
+ ((
19668
+ a1,
19669
+ a2,
19670
+ a3
19671
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19672
+ eventTypeId,
19651
19673
  uiEvent,
19652
19674
  userData
19653
19675
  )
@@ -19721,8 +19743,12 @@ export function init(RuntimeName, PHPLoader) {
19721
19743
  stringToUTF8(id, focusEvent + 128, 128);
19722
19744
 
19723
19745
  if (
19724
- ((a1, a2, a3) => {})(
19725
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
19746
+ ((
19747
+ a1,
19748
+ a2,
19749
+ a3
19750
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19751
+ eventTypeId,
19726
19752
  focusEvent,
19727
19753
  userData
19728
19754
  )
@@ -19838,8 +19864,12 @@ export function init(RuntimeName, PHPLoader) {
19838
19864
  ); // TODO: Thread-safety with respect to emscripten_get_deviceorientation_status()
19839
19865
 
19840
19866
  if (
19841
- ((a1, a2, a3) => {})(
19842
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
19867
+ ((
19868
+ a1,
19869
+ a2,
19870
+ a3
19871
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19872
+ eventTypeId,
19843
19873
  JSEvents.deviceOrientationEvent,
19844
19874
  userData
19845
19875
  )
@@ -19923,8 +19953,12 @@ export function init(RuntimeName, PHPLoader) {
19923
19953
  fillDeviceMotionEventData(JSEvents.deviceMotionEvent, e, target); // TODO: Thread-safety with respect to emscripten_get_devicemotion_status()
19924
19954
 
19925
19955
  if (
19926
- ((a1, a2, a3) => {})(
19927
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
19956
+ ((
19957
+ a1,
19958
+ a2,
19959
+ a3
19960
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19961
+ eventTypeId,
19928
19962
  JSEvents.deviceMotionEvent,
19929
19963
  userData
19930
19964
  )
@@ -20031,8 +20065,12 @@ export function init(RuntimeName, PHPLoader) {
20031
20065
  fillOrientationChangeEventData(orientationChangeEvent);
20032
20066
 
20033
20067
  if (
20034
- ((a1, a2, a3) => {})(
20035
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20068
+ ((
20069
+ a1,
20070
+ a2,
20071
+ a3
20072
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20073
+ eventTypeId,
20036
20074
  orientationChangeEvent,
20037
20075
  userData
20038
20076
  )
@@ -20161,8 +20199,12 @@ export function init(RuntimeName, PHPLoader) {
20161
20199
  fillFullscreenChangeEventData(fullscreenChangeEvent);
20162
20200
 
20163
20201
  if (
20164
- ((a1, a2, a3) => {})(
20165
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20202
+ ((
20203
+ a1,
20204
+ a2,
20205
+ a3
20206
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20207
+ eventTypeId,
20166
20208
  fullscreenChangeEvent,
20167
20209
  userData
20168
20210
  )
@@ -20307,8 +20349,12 @@ export function init(RuntimeName, PHPLoader) {
20307
20349
  );
20308
20350
 
20309
20351
  if (currentFullscreenStrategy.canvasResizedCallback) {
20310
- ((a1, a2, a3) => {})(
20311
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
20352
+ ((
20353
+ a1,
20354
+ a2,
20355
+ a3
20356
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20357
+ 37,
20312
20358
  0,
20313
20359
  currentFullscreenStrategy.canvasResizedCallbackUserData
20314
20360
  );
@@ -20409,8 +20455,12 @@ export function init(RuntimeName, PHPLoader) {
20409
20455
  currentFullscreenStrategy = strategy;
20410
20456
 
20411
20457
  if (strategy.canvasResizedCallback) {
20412
- ((a1, a2, a3) => {})(
20413
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
20458
+ ((
20459
+ a1,
20460
+ a2,
20461
+ a3
20462
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20463
+ 37,
20414
20464
  0,
20415
20465
  strategy.canvasResizedCallbackUserData
20416
20466
  );
@@ -20510,8 +20560,12 @@ export function init(RuntimeName, PHPLoader) {
20510
20560
  !inCenteredWithoutScalingFullscreenMode &&
20511
20561
  currentFullscreenStrategy.canvasResizedCallback
20512
20562
  ) {
20513
- ((a1, a2, a3) => {})(
20514
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
20563
+ ((
20564
+ a1,
20565
+ a2,
20566
+ a3
20567
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20568
+ 37,
20515
20569
  0,
20516
20570
  currentFullscreenStrategy.canvasResizedCallbackUserData
20517
20571
  );
@@ -20610,8 +20664,12 @@ export function init(RuntimeName, PHPLoader) {
20610
20664
  softFullscreenResizeWebGLRenderTarget
20611
20665
  );
20612
20666
  if (strategy.canvasResizedCallback) {
20613
- ((a1, a2, a3) => {})(
20614
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
20667
+ ((
20668
+ a1,
20669
+ a2,
20670
+ a3
20671
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20672
+ 37,
20615
20673
  0,
20616
20674
  strategy.canvasResizedCallbackUserData
20617
20675
  );
@@ -20624,8 +20682,12 @@ export function init(RuntimeName, PHPLoader) {
20624
20682
 
20625
20683
  // Inform the caller that the canvas size has changed.
20626
20684
  if (strategy.canvasResizedCallback) {
20627
- ((a1, a2, a3) => {})(
20628
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
20685
+ ((
20686
+ a1,
20687
+ a2,
20688
+ a3
20689
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20690
+ 37,
20629
20691
  0,
20630
20692
  strategy.canvasResizedCallbackUserData
20631
20693
  );
@@ -20687,8 +20749,12 @@ export function init(RuntimeName, PHPLoader) {
20687
20749
  fillPointerlockChangeEventData(pointerlockChangeEvent);
20688
20750
 
20689
20751
  if (
20690
- ((a1, a2, a3) => {})(
20691
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20752
+ ((
20753
+ a1,
20754
+ a2,
20755
+ a3
20756
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20757
+ eventTypeId,
20692
20758
  pointerlockChangeEvent,
20693
20759
  userData
20694
20760
  )
@@ -20742,8 +20808,12 @@ export function init(RuntimeName, PHPLoader) {
20742
20808
  ) => {
20743
20809
  var pointerlockErrorEventHandlerFunc = (e = event) => {
20744
20810
  if (
20745
- ((a1, a2, a3) => {})(
20746
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20811
+ ((
20812
+ a1,
20813
+ a2,
20814
+ a3
20815
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20816
+ eventTypeId,
20747
20817
  0,
20748
20818
  userData
20749
20819
  )
@@ -20897,8 +20967,12 @@ export function init(RuntimeName, PHPLoader) {
20897
20967
  fillVisibilityChangeEventData(visibilityChangeEvent);
20898
20968
 
20899
20969
  if (
20900
- ((a1, a2, a3) => {})(
20901
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20970
+ ((
20971
+ a1,
20972
+ a2,
20973
+ a3
20974
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20975
+ eventTypeId,
20902
20976
  visibilityChangeEvent,
20903
20977
  userData
20904
20978
  )
@@ -21018,8 +21092,12 @@ export function init(RuntimeName, PHPLoader) {
21018
21092
  HEAP32[(touchEvent + 8) >> 2] = numTouches;
21019
21093
 
21020
21094
  if (
21021
- ((a1, a2, a3) => {})(
21022
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
21095
+ ((
21096
+ a1,
21097
+ a2,
21098
+ a3
21099
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21100
+ eventTypeId,
21023
21101
  touchEvent,
21024
21102
  userData
21025
21103
  )
@@ -21157,8 +21235,12 @@ export function init(RuntimeName, PHPLoader) {
21157
21235
  fillGamepadEventData(gamepadEvent, e['gamepad']);
21158
21236
 
21159
21237
  if (
21160
- ((a1, a2, a3) => {})(
21161
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
21238
+ ((
21239
+ a1,
21240
+ a2,
21241
+ a3
21242
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21243
+ eventTypeId,
21162
21244
  gamepadEvent,
21163
21245
  userData
21164
21246
  )
@@ -21260,8 +21342,12 @@ export function init(RuntimeName, PHPLoader) {
21260
21342
  ) => {
21261
21343
  var beforeUnloadEventHandlerFunc = (e = event) => {
21262
21344
  // Note: This is always called on the main browser thread, since it needs synchronously return a value!
21263
- var confirmationMessage = ((a1, a2, a3) => {})(
21264
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
21345
+ var confirmationMessage = ((
21346
+ a1,
21347
+ a2,
21348
+ a3
21349
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21350
+ eventTypeId,
21265
21351
  0,
21266
21352
  userData
21267
21353
  );
@@ -21332,8 +21418,12 @@ export function init(RuntimeName, PHPLoader) {
21332
21418
  fillBatteryEventData(batteryEvent, battery);
21333
21419
 
21334
21420
  if (
21335
- ((a1, a2, a3) => {})(
21336
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
21421
+ ((
21422
+ a1,
21423
+ a2,
21424
+ a3
21425
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21426
+ eventTypeId,
21337
21427
  batteryEvent,
21338
21428
  userData
21339
21429
  )
@@ -21435,8 +21525,11 @@ export function init(RuntimeName, PHPLoader) {
21435
21525
 
21436
21526
  var _emscripten_request_animation_frame = (cb, userData) =>
21437
21527
  requestAnimationFrame((timeStamp) =>
21438
- ((a1, a2) => {})(
21439
- /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp,
21528
+ ((
21529
+ a1,
21530
+ a2
21531
+ ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21532
+ timeStamp,
21440
21533
  userData
21441
21534
  )
21442
21535
  );
@@ -21448,8 +21541,11 @@ export function init(RuntimeName, PHPLoader) {
21448
21541
  var _emscripten_request_animation_frame_loop = (cb, userData) => {
21449
21542
  function tick(timeStamp) {
21450
21543
  if (
21451
- ((a1, a2) => {})(
21452
- /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp,
21544
+ ((
21545
+ a1,
21546
+ a2
21547
+ ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21548
+ timeStamp,
21453
21549
  userData
21454
21550
  )
21455
21551
  ) {
@@ -21706,8 +21802,10 @@ export function init(RuntimeName, PHPLoader) {
21706
21802
  return emSetImmediate(() => {
21707
21803
  runtimeKeepalivePop();
21708
21804
  callUserCallback(() =>
21709
- ((a1) => {})(
21710
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
21805
+ ((
21806
+ a1
21807
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21808
+ userData
21711
21809
  )
21712
21810
  );
21713
21811
  });
@@ -21724,8 +21822,10 @@ export function init(RuntimeName, PHPLoader) {
21724
21822
  function tick() {
21725
21823
  callUserCallback(() => {
21726
21824
  if (
21727
- ((a1) => {})(
21728
- /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
21825
+ ((
21826
+ a1
21827
+ ) => {}) /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21828
+ userData
21729
21829
  )
21730
21830
  ) {
21731
21831
  emSetImmediate(tick);
@@ -21742,8 +21842,10 @@ export function init(RuntimeName, PHPLoader) {
21742
21842
  var _emscripten_set_timeout = (cb, msecs, userData) =>
21743
21843
  safeSetTimeout(
21744
21844
  () =>
21745
- ((a1) => {})(
21746
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
21845
+ ((
21846
+ a1
21847
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21848
+ userData
21747
21849
  ),
21748
21850
  msecs
21749
21851
  );
@@ -21759,8 +21861,11 @@ export function init(RuntimeName, PHPLoader) {
21759
21861
  runtimeKeepalivePop();
21760
21862
  callUserCallback(() => {
21761
21863
  if (
21762
- ((a1, a2) => {})(
21763
- /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ t,
21864
+ ((
21865
+ a1,
21866
+ a2
21867
+ ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21868
+ t,
21764
21869
  userData
21765
21870
  )
21766
21871
  ) {
@@ -21784,8 +21889,10 @@ export function init(RuntimeName, PHPLoader) {
21784
21889
  runtimeKeepalivePush();
21785
21890
  return setInterval(() => {
21786
21891
  callUserCallback(() =>
21787
- ((a1) => {})(
21788
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
21892
+ ((
21893
+ a1
21894
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21895
+ userData
21789
21896
  )
21790
21897
  );
21791
21898
  }, msecs);
@@ -21800,8 +21907,10 @@ export function init(RuntimeName, PHPLoader) {
21800
21907
 
21801
21908
  var _emscripten_async_call = (func, arg, millis) => {
21802
21909
  var wrapper = () =>
21803
- ((a1) => {})(
21804
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
21910
+ ((
21911
+ a1
21912
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21913
+ arg
21805
21914
  );
21806
21915
 
21807
21916
  if (
@@ -21834,7 +21943,7 @@ export function init(RuntimeName, PHPLoader) {
21834
21943
 
21835
21944
  var _emscripten_set_main_loop = (func, fps, simulateInfiniteLoop) => {
21836
21945
  var iterFunc =
21837
- () => {}; /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */
21946
+ () => {} /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */;
21838
21947
  setMainLoop(iterFunc, fps, simulateInfiniteLoop);
21839
21948
  };
21840
21949
  _emscripten_set_main_loop.sig = 'vpii';
@@ -21846,8 +21955,10 @@ export function init(RuntimeName, PHPLoader) {
21846
21955
  simulateInfiniteLoop
21847
21956
  ) => {
21848
21957
  var iterFunc = () =>
21849
- ((a1) => {})(
21850
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
21958
+ ((
21959
+ a1
21960
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21961
+ arg
21851
21962
  );
21852
21963
  setMainLoop(iterFunc, fps, simulateInfiniteLoop, arg);
21853
21964
  };
@@ -21868,8 +21979,10 @@ export function init(RuntimeName, PHPLoader) {
21868
21979
  var __emscripten_push_main_loop_blocker = (func, arg, name) => {
21869
21980
  MainLoop.queue.push({
21870
21981
  func: () => {
21871
- ((a1) => {})(
21872
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
21982
+ ((
21983
+ a1
21984
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21985
+ arg
21873
21986
  );
21874
21987
  },
21875
21988
  name: UTF8ToString(name),
@@ -21882,8 +21995,10 @@ export function init(RuntimeName, PHPLoader) {
21882
21995
  var __emscripten_push_uncounted_main_loop_blocker = (func, arg, name) => {
21883
21996
  MainLoop.queue.push({
21884
21997
  func: () => {
21885
- ((a1) => {})(
21886
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
21998
+ ((
21999
+ a1
22000
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22001
+ arg
21887
22002
  );
21888
22003
  },
21889
22004
  name: UTF8ToString(name),
@@ -21917,8 +22032,12 @@ export function init(RuntimeName, PHPLoader) {
21917
22032
  var resultPtr = stackAlloc(POINTER_SIZE);
21918
22033
  HEAPU32[resultPtr >> 2] = 0;
21919
22034
  try {
21920
- var result = ((a1, a2, a3) => {})(
21921
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ resultPtr,
22035
+ var result = ((
22036
+ a1,
22037
+ a2,
22038
+ a3
22039
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22040
+ resultPtr,
21922
22041
  userData,
21923
22042
  value
21924
22043
  );
@@ -22755,15 +22874,19 @@ export function init(RuntimeName, PHPLoader) {
22755
22874
  () => {
22756
22875
  runtimeKeepalivePop();
22757
22876
  if (onload)
22758
- ((a1) => {})(
22759
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file
22877
+ ((
22878
+ a1
22879
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22880
+ file
22760
22881
  );
22761
22882
  },
22762
22883
  () => {
22763
22884
  runtimeKeepalivePop();
22764
22885
  if (onerror)
22765
- ((a1) => {})(
22766
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file
22886
+ ((
22887
+ a1
22888
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22889
+ file
22767
22890
  );
22768
22891
  },
22769
22892
  true // don'tCreateFile - it's already there
@@ -22797,16 +22920,21 @@ export function init(RuntimeName, PHPLoader) {
22797
22920
  () => {
22798
22921
  runtimeKeepalivePop();
22799
22922
  if (onload)
22800
- ((a1, a2) => {})(
22801
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
22923
+ ((
22924
+ a1,
22925
+ a2
22926
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22927
+ arg,
22802
22928
  cname
22803
22929
  );
22804
22930
  },
22805
22931
  () => {
22806
22932
  runtimeKeepalivePop();
22807
22933
  if (onerror)
22808
- ((a1) => {})(
22809
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
22934
+ ((
22935
+ a1
22936
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22937
+ arg
22810
22938
  );
22811
22939
  },
22812
22940
  true // don'tCreateFile - it's already there
@@ -23074,10 +23202,10 @@ export function init(RuntimeName, PHPLoader) {
23074
23202
  runtimeKeepalivePop();
23075
23203
  callUserCallback(() =>
23076
23204
  withStackSave(() =>
23077
- ((a1) => {})(
23078
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stringToUTF8OnStack(
23079
- _file
23080
- )
23205
+ ((
23206
+ a1
23207
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23208
+ stringToUTF8OnStack(_file)
23081
23209
  )
23082
23210
  )
23083
23211
  );
@@ -23121,8 +23249,12 @@ export function init(RuntimeName, PHPLoader) {
23121
23249
  callUserCallback(() => {
23122
23250
  var buffer = _malloc(byteArray.length);
23123
23251
  HEAPU8.set(byteArray, buffer);
23124
- ((a1, a2, a3) => {})(
23125
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata,
23252
+ ((
23253
+ a1,
23254
+ a2,
23255
+ a3
23256
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23257
+ userdata,
23126
23258
  buffer,
23127
23259
  byteArray.length
23128
23260
  );
@@ -23132,8 +23264,10 @@ export function init(RuntimeName, PHPLoader) {
23132
23264
  if (onerror) {
23133
23265
  runtimeKeepalivePop();
23134
23266
  callUserCallback(() => {
23135
- ((a1) => {})(
23136
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata
23267
+ ((
23268
+ a1
23269
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23270
+ userdata
23137
23271
  );
23138
23272
  });
23139
23273
  }
@@ -23189,8 +23323,12 @@ export function init(RuntimeName, PHPLoader) {
23189
23323
  );
23190
23324
  if (onload) {
23191
23325
  var sp = stackSave();
23192
- ((a1, a2, a3) => {})(
23193
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
23326
+ ((
23327
+ a1,
23328
+ a2,
23329
+ a3
23330
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23331
+ handle,
23194
23332
  userdata,
23195
23333
  stringToUTF8OnStack(_file)
23196
23334
  );
@@ -23198,8 +23336,12 @@ export function init(RuntimeName, PHPLoader) {
23198
23336
  }
23199
23337
  } else {
23200
23338
  if (onerror)
23201
- ((a1, a2, a3) => {})(
23202
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
23339
+ ((
23340
+ a1,
23341
+ a2,
23342
+ a3
23343
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23344
+ handle,
23203
23345
  userdata,
23204
23346
  http.status
23205
23347
  );
@@ -23212,8 +23354,12 @@ export function init(RuntimeName, PHPLoader) {
23212
23354
  http.onerror = (e) => {
23213
23355
  runtimeKeepalivePop();
23214
23356
  if (onerror)
23215
- ((a1, a2, a3) => {})(
23216
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
23357
+ ((
23358
+ a1,
23359
+ a2,
23360
+ a3
23361
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23362
+ handle,
23217
23363
  userdata,
23218
23364
  http.status
23219
23365
  );
@@ -23228,8 +23374,12 @@ export function init(RuntimeName, PHPLoader) {
23228
23374
  ) {
23229
23375
  var percentComplete = (e.loaded / e.total) * 100;
23230
23376
  if (onprogress)
23231
- ((a1, a2, a3) => {})(
23232
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
23377
+ ((
23378
+ a1,
23379
+ a2,
23380
+ a3
23381
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23382
+ handle,
23233
23383
  userdata,
23234
23384
  percentComplete
23235
23385
  );
@@ -23286,8 +23436,13 @@ export function init(RuntimeName, PHPLoader) {
23286
23436
  if (http.statusText) {
23287
23437
  statusText = stringToUTF8OnStack(http.statusText);
23288
23438
  }
23289
- ((a1, a2, a3, a4) => {})(
23290
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
23439
+ ((
23440
+ a1,
23441
+ a2,
23442
+ a3,
23443
+ a4
23444
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23445
+ handle,
23291
23446
  userdata,
23292
23447
  http.status,
23293
23448
  statusText
@@ -23308,8 +23463,13 @@ export function init(RuntimeName, PHPLoader) {
23308
23463
  var buffer = _malloc(byteArray.length);
23309
23464
  HEAPU8.set(byteArray, buffer);
23310
23465
  if (onload)
23311
- ((a1, a2, a3, a4) => {})(
23312
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
23466
+ ((
23467
+ a1,
23468
+ a2,
23469
+ a3,
23470
+ a4
23471
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23472
+ handle,
23313
23473
  userdata,
23314
23474
  buffer,
23315
23475
  byteArray.length
@@ -23330,8 +23490,13 @@ export function init(RuntimeName, PHPLoader) {
23330
23490
  // PROGRESS
23331
23491
  http.onprogress = (e) => {
23332
23492
  if (onprogress)
23333
- ((a1, a2, a3, a4) => {})(
23334
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
23493
+ ((
23494
+ a1,
23495
+ a2,
23496
+ a3,
23497
+ a4
23498
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23499
+ handle,
23335
23500
  userdata,
23336
23501
  e.loaded,
23337
23502
  e.lengthComputable || e.lengthComputable === undefined
@@ -23662,16 +23827,24 @@ export function init(RuntimeName, PHPLoader) {
23662
23827
  if (event === 'error') {
23663
23828
  withStackSave(() => {
23664
23829
  var msg = stringToUTF8OnStack(data[2]);
23665
- ((a1, a2, a3, a4) => {})(
23666
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data[0],
23830
+ ((
23831
+ a1,
23832
+ a2,
23833
+ a3,
23834
+ a4
23835
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23836
+ data[0],
23667
23837
  data[1],
23668
23838
  msg,
23669
23839
  userData
23670
23840
  );
23671
23841
  });
23672
23842
  } else {
23673
- ((a1, a2) => {})(
23674
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data,
23843
+ ((
23844
+ a1,
23845
+ a2
23846
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23847
+ data,
23675
23848
  userData
23676
23849
  );
23677
23850
  }
@@ -24624,8 +24797,12 @@ export function init(RuntimeName, PHPLoader) {
24624
24797
  ) => {
24625
24798
  var webGlEventHandlerFunc = (e = event) => {
24626
24799
  if (
24627
- ((a1, a2, a3) => {})(
24628
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
24800
+ ((
24801
+ a1,
24802
+ a2,
24803
+ a3
24804
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24805
+ eventTypeId,
24629
24806
  0,
24630
24807
  userData
24631
24808
  )
@@ -24844,15 +25021,21 @@ export function init(RuntimeName, PHPLoader) {
24844
25021
  ) {
24845
25022
  event.preventDefault();
24846
25023
  GLUT.saveModifiers(event);
24847
- ((a1, a2) => {})(
24848
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX,
25024
+ ((
25025
+ a1,
25026
+ a2
25027
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25028
+ lastX,
24849
25029
  lastY
24850
25030
  );
24851
25031
  } else if (GLUT.buttons != 0 && GLUT.motionFunc) {
24852
25032
  event.preventDefault();
24853
25033
  GLUT.saveModifiers(event);
24854
- ((a1, a2) => {})(
24855
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX,
25034
+ ((
25035
+ a1,
25036
+ a2
25037
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25038
+ lastX,
24856
25039
  lastY
24857
25040
  );
24858
25041
  }
@@ -25013,8 +25196,12 @@ export function init(RuntimeName, PHPLoader) {
25013
25196
  if (GLUT.specialFunc) {
25014
25197
  event.preventDefault();
25015
25198
  GLUT.saveModifiers(event);
25016
- ((a1, a2, a3) => {})(
25017
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
25199
+ ((
25200
+ a1,
25201
+ a2,
25202
+ a3
25203
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25204
+ key,
25018
25205
  Browser.mouseX,
25019
25206
  Browser.mouseY
25020
25207
  );
@@ -25024,8 +25211,12 @@ export function init(RuntimeName, PHPLoader) {
25024
25211
  if (key !== null && GLUT.keyboardFunc) {
25025
25212
  event.preventDefault();
25026
25213
  GLUT.saveModifiers(event);
25027
- ((a1, a2, a3) => {})(
25028
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
25214
+ ((
25215
+ a1,
25216
+ a2,
25217
+ a3
25218
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25219
+ key,
25029
25220
  Browser.mouseX,
25030
25221
  Browser.mouseY
25031
25222
  );
@@ -25040,8 +25231,12 @@ export function init(RuntimeName, PHPLoader) {
25040
25231
  if (GLUT.specialUpFunc) {
25041
25232
  event.preventDefault();
25042
25233
  GLUT.saveModifiers(event);
25043
- ((a1, a2, a3) => {})(
25044
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
25234
+ ((
25235
+ a1,
25236
+ a2,
25237
+ a3
25238
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25239
+ key,
25045
25240
  Browser.mouseX,
25046
25241
  Browser.mouseY
25047
25242
  );
@@ -25051,8 +25246,12 @@ export function init(RuntimeName, PHPLoader) {
25051
25246
  if (key !== null && GLUT.keyboardUpFunc) {
25052
25247
  event.preventDefault();
25053
25248
  GLUT.saveModifiers(event);
25054
- ((a1, a2, a3) => {})(
25055
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
25249
+ ((
25250
+ a1,
25251
+ a2,
25252
+ a3
25253
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25254
+ key,
25056
25255
  Browser.mouseX,
25057
25256
  Browser.mouseY
25058
25257
  );
@@ -25116,10 +25315,13 @@ export function init(RuntimeName, PHPLoader) {
25116
25315
  } catch (e) {}
25117
25316
  event.preventDefault();
25118
25317
  GLUT.saveModifiers(event);
25119
- ((a1, a2, a3, a4) => {})(
25120
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[
25121
- 'button'
25122
- ],
25318
+ ((
25319
+ a1,
25320
+ a2,
25321
+ a3,
25322
+ a4
25323
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25324
+ event['button'],
25123
25325
  0 /*GLUT_DOWN*/,
25124
25326
  Browser.mouseX,
25125
25327
  Browser.mouseY
@@ -25134,10 +25336,13 @@ export function init(RuntimeName, PHPLoader) {
25134
25336
  if (GLUT.mouseFunc) {
25135
25337
  event.preventDefault();
25136
25338
  GLUT.saveModifiers(event);
25137
- ((a1, a2, a3, a4) => {})(
25138
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[
25139
- 'button'
25140
- ],
25339
+ ((
25340
+ a1,
25341
+ a2,
25342
+ a3,
25343
+ a4
25344
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25345
+ event['button'],
25141
25346
  1 /*GLUT_UP*/,
25142
25347
  Browser.mouseX,
25143
25348
  Browser.mouseY
@@ -25166,8 +25371,13 @@ export function init(RuntimeName, PHPLoader) {
25166
25371
  if (GLUT.mouseFunc) {
25167
25372
  event.preventDefault();
25168
25373
  GLUT.saveModifiers(event);
25169
- ((a1, a2, a3, a4) => {})(
25170
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ button,
25374
+ ((
25375
+ a1,
25376
+ a2,
25377
+ a3,
25378
+ a4
25379
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25380
+ button,
25171
25381
  0 /*GLUT_DOWN*/,
25172
25382
  Browser.mouseX,
25173
25383
  Browser.mouseY
@@ -25205,8 +25415,11 @@ export function init(RuntimeName, PHPLoader) {
25205
25415
  /* Can't call _glutReshapeWindow as that requests cancelling fullscreen. */
25206
25416
  if (GLUT.reshapeFunc) {
25207
25417
  // out("GLUT.reshapeFunc (from FS): " + width + ", " + height);
25208
- ((a1, a2) => {})(
25209
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
25418
+ ((
25419
+ a1,
25420
+ a2
25421
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25422
+ width,
25210
25423
  height
25211
25424
  );
25212
25425
  }
@@ -25262,8 +25475,11 @@ export function init(RuntimeName, PHPLoader) {
25262
25475
  // Resize callback stage 2: updateResizeListeners notifies reshapeFunc
25263
25476
  Browser.resizeListeners.push((width, height) => {
25264
25477
  if (GLUT.reshapeFunc) {
25265
- ((a1, a2) => {})(
25266
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
25478
+ ((
25479
+ a1,
25480
+ a2
25481
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25482
+ width,
25267
25483
  height
25268
25484
  );
25269
25485
  }
@@ -25378,8 +25594,10 @@ export function init(RuntimeName, PHPLoader) {
25378
25594
  var _glutTimerFunc = (msec, func, value) =>
25379
25595
  safeSetTimeout(
25380
25596
  () =>
25381
- ((a1) => {})(
25382
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ value
25597
+ ((
25598
+ a1
25599
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25600
+ value
25383
25601
  ),
25384
25602
  msec
25385
25603
  );
@@ -25539,8 +25757,11 @@ export function init(RuntimeName, PHPLoader) {
25539
25757
  Browser.setCanvasSize(width, height, true); // N.B. GLUT.reshapeFunc is also registered as a canvas resize callback.
25540
25758
  // Just call it once here.
25541
25759
  if (GLUT.reshapeFunc) {
25542
- ((a1, a2) => {})(
25543
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
25760
+ ((
25761
+ a1,
25762
+ a2
25763
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25764
+ width,
25544
25765
  height
25545
25766
  );
25546
25767
  }
@@ -26594,15 +26815,21 @@ export function init(RuntimeName, PHPLoader) {
26594
26815
  callUserCallback(() => {
26595
26816
  if (error) {
26596
26817
  if (onerror)
26597
- ((a1) => {})(
26598
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26818
+ ((
26819
+ a1
26820
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26821
+ arg
26599
26822
  );
26600
26823
  return;
26601
26824
  }
26602
26825
  var buffer = _malloc(byteArray.length);
26603
26826
  HEAPU8.set(byteArray, buffer);
26604
- ((a1, a2, a3) => {})(
26605
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
26827
+ ((
26828
+ a1,
26829
+ a2,
26830
+ a3
26831
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26832
+ arg,
26606
26833
  buffer,
26607
26834
  byteArray.length
26608
26835
  );
@@ -26634,14 +26861,18 @@ export function init(RuntimeName, PHPLoader) {
26634
26861
  callUserCallback(() => {
26635
26862
  if (error) {
26636
26863
  if (onerror)
26637
- ((a1) => {})(
26638
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26864
+ ((
26865
+ a1
26866
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26867
+ arg
26639
26868
  );
26640
26869
  return;
26641
26870
  }
26642
26871
  if (onstore)
26643
- ((a1) => {})(
26644
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26872
+ ((
26873
+ a1
26874
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26875
+ arg
26645
26876
  );
26646
26877
  });
26647
26878
  }
@@ -26656,14 +26887,18 @@ export function init(RuntimeName, PHPLoader) {
26656
26887
  callUserCallback(() => {
26657
26888
  if (error) {
26658
26889
  if (onerror)
26659
- ((a1) => {})(
26660
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26890
+ ((
26891
+ a1
26892
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26893
+ arg
26661
26894
  );
26662
26895
  return;
26663
26896
  }
26664
26897
  if (ondelete)
26665
- ((a1) => {})(
26666
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26898
+ ((
26899
+ a1
26900
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26901
+ arg
26667
26902
  );
26668
26903
  });
26669
26904
  });
@@ -26680,14 +26915,19 @@ export function init(RuntimeName, PHPLoader) {
26680
26915
  callUserCallback(() => {
26681
26916
  if (error) {
26682
26917
  if (onerror)
26683
- ((a1) => {})(
26684
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26918
+ ((
26919
+ a1
26920
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26921
+ arg
26685
26922
  );
26686
26923
  return;
26687
26924
  }
26688
26925
  if (oncheck)
26689
- ((a1, a2) => {})(
26690
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
26926
+ ((
26927
+ a1,
26928
+ a2
26929
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26930
+ arg,
26691
26931
  exists
26692
26932
  );
26693
26933
  });
@@ -26703,14 +26943,18 @@ export function init(RuntimeName, PHPLoader) {
26703
26943
  callUserCallback(() => {
26704
26944
  if (error) {
26705
26945
  if (onerror)
26706
- ((a1) => {})(
26707
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26946
+ ((
26947
+ a1
26948
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26949
+ arg
26708
26950
  );
26709
26951
  return;
26710
26952
  }
26711
26953
  if (onclear)
26712
- ((a1) => {})(
26713
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26954
+ ((
26955
+ a1
26956
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26957
+ arg
26714
26958
  );
26715
26959
  });
26716
26960
  });
@@ -26867,8 +27111,11 @@ export function init(RuntimeName, PHPLoader) {
26867
27111
  safeSetTimeout(() => {
26868
27112
  var stackBegin = Asyncify.currData + 12;
26869
27113
  var stackEnd = HEAPU32[Asyncify.currData >> 2];
26870
- ((a1, a2) => {})(
26871
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stackBegin,
27114
+ ((
27115
+ a1,
27116
+ a2
27117
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27118
+ stackBegin,
26872
27119
  stackEnd
26873
27120
  );
26874
27121
  wakeUp();
@@ -26917,8 +27164,10 @@ export function init(RuntimeName, PHPLoader) {
26917
27164
  HEAPU32[(newFiber + 12) >> 2] = 0;
26918
27165
 
26919
27166
  var userData = HEAPU32[(newFiber + 16) >> 2];
26920
- ((a1) => {})(
26921
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
27167
+ ((
27168
+ a1
27169
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27170
+ userData
26922
27171
  );
26923
27172
  } else {
26924
27173
  var asyncifyData = newFiber + 20;
@@ -27929,8 +28178,11 @@ export function init(RuntimeName, PHPLoader) {
27929
28178
  if (!SDL.eventHandler) return;
27930
28179
 
27931
28180
  while (SDL.pollEvent(SDL.eventHandlerTemp)) {
27932
- ((a1, a2) => {})(
27933
- /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL.eventHandlerContext,
28181
+ ((
28182
+ a1,
28183
+ a2
28184
+ ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
28185
+ SDL.eventHandlerContext,
27934
28186
  SDL.eventHandlerTemp
27935
28187
  );
27936
28188
  }
@@ -29554,9 +29806,12 @@ export function init(RuntimeName, PHPLoader) {
29554
29806
  return;
29555
29807
 
29556
29808
  // Ask SDL audio data from the user code.
29557
- ((a1, a2, a3) => {})(
29558
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL
29559
- .audio.userdata,
29809
+ ((
29810
+ a1,
29811
+ a2,
29812
+ a3
29813
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
29814
+ SDL.audio.userdata,
29560
29815
  SDL.audio.buffer,
29561
29816
  SDL.audio.bufferSize
29562
29817
  );
@@ -30014,8 +30269,10 @@ export function init(RuntimeName, PHPLoader) {
30014
30269
  info.audio = null;
30015
30270
  }
30016
30271
  if (SDL.channelFinished) {
30017
- ((a1) => {})(
30018
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel
30272
+ ((
30273
+ a1
30274
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
30275
+ channel
30019
30276
  );
30020
30277
  }
30021
30278
  }
@@ -30083,8 +30340,10 @@ export function init(RuntimeName, PHPLoader) {
30083
30340
  channelInfo.audio = null;
30084
30341
  }
30085
30342
  if (SDL.channelFinished)
30086
- ((a1) => {})(
30087
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel
30343
+ ((
30344
+ a1
30345
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
30346
+ channel
30088
30347
  );
30089
30348
  };
30090
30349
  if (channelInfo.audio) {
@@ -30819,8 +31078,11 @@ export function init(RuntimeName, PHPLoader) {
30819
31078
  var _SDL_AddTimer = (interval, callback, param) =>
30820
31079
  safeSetTimeout(
30821
31080
  () =>
30822
- ((a1, a2) => {})(
30823
- /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ interval,
31081
+ ((
31082
+ a1,
31083
+ a2
31084
+ ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31085
+ interval,
30824
31086
  param
30825
31087
  ),
30826
31088
  interval
@@ -31205,8 +31467,12 @@ export function init(RuntimeName, PHPLoader) {
31205
31467
 
31206
31468
  socket.onopen = function (e) {
31207
31469
  var eventPtr = WS.getSocketEvent(socketId);
31208
- ((a1, a2, a3) => {})(
31209
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31470
+ ((
31471
+ a1,
31472
+ a2,
31473
+ a3
31474
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31475
+ 0 /*TODO*/,
31210
31476
  eventPtr,
31211
31477
  userData
31212
31478
  );
@@ -31228,8 +31494,12 @@ export function init(RuntimeName, PHPLoader) {
31228
31494
 
31229
31495
  socket.onerror = function (e) {
31230
31496
  var eventPtr = WS.getSocketEvent(socketId);
31231
- ((a1, a2, a3) => {})(
31232
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31497
+ ((
31498
+ a1,
31499
+ a2,
31500
+ a3
31501
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31502
+ 0 /*TODO*/,
31233
31503
  eventPtr,
31234
31504
  userData
31235
31505
  );
@@ -31254,8 +31524,12 @@ export function init(RuntimeName, PHPLoader) {
31254
31524
  ((HEAP8[eventPtr + 4] = e.wasClean),
31255
31525
  (HEAP16[(eventPtr + 6) >> 1] = e.code),
31256
31526
  stringToUTF8(e.reason, eventPtr + 8, 512));
31257
- ((a1, a2, a3) => {})(
31258
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31527
+ ((
31528
+ a1,
31529
+ a2,
31530
+ a3
31531
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31532
+ 0 /*TODO*/,
31259
31533
  eventPtr,
31260
31534
  userData
31261
31535
  );
@@ -31289,8 +31563,12 @@ export function init(RuntimeName, PHPLoader) {
31289
31563
  ((HEAPU32[(eventPtr + 4) >> 2] = buf),
31290
31564
  (HEAP32[(eventPtr + 8) >> 2] = len),
31291
31565
  (HEAP8[eventPtr + 12] = isText),
31292
- ((a1, a2, a3) => {})(
31293
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31566
+ ((
31567
+ a1,
31568
+ a2,
31569
+ a3
31570
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31571
+ 0 /*TODO*/,
31294
31572
  eventPtr,
31295
31573
  userData
31296
31574
  ));
@@ -31532,13 +31810,13 @@ export function init(RuntimeName, PHPLoader) {
31532
31810
  // end include: postlibrary.js
31533
31811
 
31534
31812
  var ASM_CONSTS = {
31535
- 10576145: ($0) => {
31813
+ 10576129: ($0) => {
31536
31814
  if (!$0) {
31537
31815
  AL.alcErr = 0xa004;
31538
31816
  return 1;
31539
31817
  }
31540
31818
  },
31541
- 10576193: ($0) => {
31819
+ 10576177: ($0) => {
31542
31820
  if (!AL.currentCtx) {
31543
31821
  err('alGetProcAddress() called without a valid context');
31544
31822
  return 1;