@php-wasm/node-7-3 3.0.35 → 3.0.37

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Binary file
@@ -3,15 +3,17 @@
3
3
  // this code in Node.js as an ES module.
4
4
  import { createRequire } from 'module';
5
5
  const require = createRequire(import.meta.url);
6
- // Note: The path module is currently needed by code injected by the php-wasm Dockerfile.
7
- import { fileURLToPath } from 'url';
6
+ // Note: The path and url modules are currently needed by code injected by the php-wasm Dockerfile.
8
7
  import path from 'path';
9
- const __filename = fileURLToPath(import.meta.url);
10
- const __dirname = path.dirname(__filename);
8
+ import { fileURLToPath } from 'url';
11
9
 
12
- const dependencyFilename = path.join(__dirname, '7_3_33', 'php_7_3.wasm');
10
+ const currentDirPath =
11
+ typeof __dirname !== 'undefined'
12
+ ? __dirname
13
+ : path.dirname(fileURLToPath(import.meta.url));
14
+ const dependencyFilename = path.join(currentDirPath, '7_3_33', 'php_7_3.wasm');
13
15
  export { dependencyFilename };
14
- export const dependenciesTotalSize = 22663136;
16
+ export const dependenciesTotalSize = 22663138;
15
17
  const phpVersionString = '7.3.33';
16
18
  export function init(RuntimeName, PHPLoader) {
17
19
  // The rest of the code comes from the built php.js file and esm-suffix.js
@@ -75,7 +77,7 @@ export function init(RuntimeName, PHPLoader) {
75
77
  // the complexity of lazy-loading.
76
78
  var fs = require('fs');
77
79
 
78
- scriptDirectory = __dirname + '/';
80
+ scriptDirectory = currentDirPath + '/';
79
81
 
80
82
  // include: node_shell_read.js
81
83
  readBinary = (filename) => {
@@ -5121,8 +5123,10 @@ export function init(RuntimeName, PHPLoader) {
5121
5123
  );
5122
5124
 
5123
5125
  var ___call_sighandler = (fp, sig) =>
5124
- ((a1) => {})(
5125
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ sig
5126
+ ((
5127
+ a1
5128
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
5129
+ sig
5126
5130
  );
5127
5131
  ___call_sighandler.sig = 'vpi';
5128
5132
 
@@ -8988,8 +8992,11 @@ export function init(RuntimeName, PHPLoader) {
8988
8992
  dlSetError(`'Could not load dynamic lib: ${filename}\n${e}`);
8989
8993
  runtimeKeepalivePop();
8990
8994
  callUserCallback(() =>
8991
- ((a1, a2) => {})(
8992
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
8995
+ ((
8996
+ a1,
8997
+ a2
8998
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
8999
+ handle,
8993
9000
  user_data
8994
9001
  )
8995
9002
  );
@@ -8997,8 +9004,11 @@ export function init(RuntimeName, PHPLoader) {
8997
9004
  function successCallback() {
8998
9005
  runtimeKeepalivePop();
8999
9006
  callUserCallback(() =>
9000
- ((a1, a2) => {})(
9001
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
9007
+ ((
9008
+ a1,
9009
+ a2
9010
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
9011
+ handle,
9002
9012
  user_data
9003
9013
  )
9004
9014
  );
@@ -18678,8 +18688,11 @@ export function init(RuntimeName, PHPLoader) {
18678
18688
  var trace = getCallstack();
18679
18689
  var parts = trace.split('\n');
18680
18690
  for (var i = 0; i < parts.length; i++) {
18681
- var ret = ((a1, a2) => {})(
18682
- /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0,
18691
+ var ret = ((
18692
+ a1,
18693
+ a2
18694
+ ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
18695
+ 0,
18683
18696
  arg
18684
18697
  );
18685
18698
  if (ret !== 0) return;
@@ -19223,8 +19236,12 @@ export function init(RuntimeName, PHPLoader) {
19223
19236
  stringToUTF8(e.locale || '', keyEventData + 128, 32);
19224
19237
 
19225
19238
  if (
19226
- ((a1, a2, a3) => {})(
19227
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
19239
+ ((
19240
+ a1,
19241
+ a2,
19242
+ a3
19243
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19244
+ eventTypeId,
19228
19245
  keyEventData,
19229
19246
  userData
19230
19247
  )
@@ -19342,8 +19359,12 @@ export function init(RuntimeName, PHPLoader) {
19342
19359
  fillMouseEventData(JSEvents.mouseEvent, e, target);
19343
19360
 
19344
19361
  if (
19345
- ((a1, a2, a3) => {})(
19346
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
19362
+ ((
19363
+ a1,
19364
+ a2,
19365
+ a3
19366
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19367
+ eventTypeId,
19347
19368
  JSEvents.mouseEvent,
19348
19369
  userData
19349
19370
  )
@@ -19557,8 +19578,12 @@ export function init(RuntimeName, PHPLoader) {
19557
19578
  HEAPF64[(wheelEvent + 80) >> 3] = e['deltaZ'];
19558
19579
  HEAP32[(wheelEvent + 88) >> 2] = e['deltaMode'];
19559
19580
  if (
19560
- ((a1, a2, a3) => {})(
19561
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
19581
+ ((
19582
+ a1,
19583
+ a2,
19584
+ a3
19585
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19586
+ eventTypeId,
19562
19587
  wheelEvent,
19563
19588
  userData
19564
19589
  )
@@ -19639,8 +19664,12 @@ export function init(RuntimeName, PHPLoader) {
19639
19664
  HEAP32[(uiEvent + 28) >> 2] = pageXOffset | 0; // scroll offsets are float
19640
19665
  HEAP32[(uiEvent + 32) >> 2] = pageYOffset | 0;
19641
19666
  if (
19642
- ((a1, a2, a3) => {})(
19643
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
19667
+ ((
19668
+ a1,
19669
+ a2,
19670
+ a3
19671
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19672
+ eventTypeId,
19644
19673
  uiEvent,
19645
19674
  userData
19646
19675
  )
@@ -19714,8 +19743,12 @@ export function init(RuntimeName, PHPLoader) {
19714
19743
  stringToUTF8(id, focusEvent + 128, 128);
19715
19744
 
19716
19745
  if (
19717
- ((a1, a2, a3) => {})(
19718
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
19746
+ ((
19747
+ a1,
19748
+ a2,
19749
+ a3
19750
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19751
+ eventTypeId,
19719
19752
  focusEvent,
19720
19753
  userData
19721
19754
  )
@@ -19831,8 +19864,12 @@ export function init(RuntimeName, PHPLoader) {
19831
19864
  ); // TODO: Thread-safety with respect to emscripten_get_deviceorientation_status()
19832
19865
 
19833
19866
  if (
19834
- ((a1, a2, a3) => {})(
19835
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
19867
+ ((
19868
+ a1,
19869
+ a2,
19870
+ a3
19871
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19872
+ eventTypeId,
19836
19873
  JSEvents.deviceOrientationEvent,
19837
19874
  userData
19838
19875
  )
@@ -19916,8 +19953,12 @@ export function init(RuntimeName, PHPLoader) {
19916
19953
  fillDeviceMotionEventData(JSEvents.deviceMotionEvent, e, target); // TODO: Thread-safety with respect to emscripten_get_devicemotion_status()
19917
19954
 
19918
19955
  if (
19919
- ((a1, a2, a3) => {})(
19920
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
19956
+ ((
19957
+ a1,
19958
+ a2,
19959
+ a3
19960
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19961
+ eventTypeId,
19921
19962
  JSEvents.deviceMotionEvent,
19922
19963
  userData
19923
19964
  )
@@ -20024,8 +20065,12 @@ export function init(RuntimeName, PHPLoader) {
20024
20065
  fillOrientationChangeEventData(orientationChangeEvent);
20025
20066
 
20026
20067
  if (
20027
- ((a1, a2, a3) => {})(
20028
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20068
+ ((
20069
+ a1,
20070
+ a2,
20071
+ a3
20072
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20073
+ eventTypeId,
20029
20074
  orientationChangeEvent,
20030
20075
  userData
20031
20076
  )
@@ -20154,8 +20199,12 @@ export function init(RuntimeName, PHPLoader) {
20154
20199
  fillFullscreenChangeEventData(fullscreenChangeEvent);
20155
20200
 
20156
20201
  if (
20157
- ((a1, a2, a3) => {})(
20158
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20202
+ ((
20203
+ a1,
20204
+ a2,
20205
+ a3
20206
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20207
+ eventTypeId,
20159
20208
  fullscreenChangeEvent,
20160
20209
  userData
20161
20210
  )
@@ -20300,8 +20349,12 @@ export function init(RuntimeName, PHPLoader) {
20300
20349
  );
20301
20350
 
20302
20351
  if (currentFullscreenStrategy.canvasResizedCallback) {
20303
- ((a1, a2, a3) => {})(
20304
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
20352
+ ((
20353
+ a1,
20354
+ a2,
20355
+ a3
20356
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20357
+ 37,
20305
20358
  0,
20306
20359
  currentFullscreenStrategy.canvasResizedCallbackUserData
20307
20360
  );
@@ -20402,8 +20455,12 @@ export function init(RuntimeName, PHPLoader) {
20402
20455
  currentFullscreenStrategy = strategy;
20403
20456
 
20404
20457
  if (strategy.canvasResizedCallback) {
20405
- ((a1, a2, a3) => {})(
20406
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
20458
+ ((
20459
+ a1,
20460
+ a2,
20461
+ a3
20462
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20463
+ 37,
20407
20464
  0,
20408
20465
  strategy.canvasResizedCallbackUserData
20409
20466
  );
@@ -20503,8 +20560,12 @@ export function init(RuntimeName, PHPLoader) {
20503
20560
  !inCenteredWithoutScalingFullscreenMode &&
20504
20561
  currentFullscreenStrategy.canvasResizedCallback
20505
20562
  ) {
20506
- ((a1, a2, a3) => {})(
20507
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
20563
+ ((
20564
+ a1,
20565
+ a2,
20566
+ a3
20567
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20568
+ 37,
20508
20569
  0,
20509
20570
  currentFullscreenStrategy.canvasResizedCallbackUserData
20510
20571
  );
@@ -20603,8 +20664,12 @@ export function init(RuntimeName, PHPLoader) {
20603
20664
  softFullscreenResizeWebGLRenderTarget
20604
20665
  );
20605
20666
  if (strategy.canvasResizedCallback) {
20606
- ((a1, a2, a3) => {})(
20607
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
20667
+ ((
20668
+ a1,
20669
+ a2,
20670
+ a3
20671
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20672
+ 37,
20608
20673
  0,
20609
20674
  strategy.canvasResizedCallbackUserData
20610
20675
  );
@@ -20617,8 +20682,12 @@ export function init(RuntimeName, PHPLoader) {
20617
20682
 
20618
20683
  // Inform the caller that the canvas size has changed.
20619
20684
  if (strategy.canvasResizedCallback) {
20620
- ((a1, a2, a3) => {})(
20621
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
20685
+ ((
20686
+ a1,
20687
+ a2,
20688
+ a3
20689
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20690
+ 37,
20622
20691
  0,
20623
20692
  strategy.canvasResizedCallbackUserData
20624
20693
  );
@@ -20680,8 +20749,12 @@ export function init(RuntimeName, PHPLoader) {
20680
20749
  fillPointerlockChangeEventData(pointerlockChangeEvent);
20681
20750
 
20682
20751
  if (
20683
- ((a1, a2, a3) => {})(
20684
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20752
+ ((
20753
+ a1,
20754
+ a2,
20755
+ a3
20756
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20757
+ eventTypeId,
20685
20758
  pointerlockChangeEvent,
20686
20759
  userData
20687
20760
  )
@@ -20735,8 +20808,12 @@ export function init(RuntimeName, PHPLoader) {
20735
20808
  ) => {
20736
20809
  var pointerlockErrorEventHandlerFunc = (e = event) => {
20737
20810
  if (
20738
- ((a1, a2, a3) => {})(
20739
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20811
+ ((
20812
+ a1,
20813
+ a2,
20814
+ a3
20815
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20816
+ eventTypeId,
20740
20817
  0,
20741
20818
  userData
20742
20819
  )
@@ -20890,8 +20967,12 @@ export function init(RuntimeName, PHPLoader) {
20890
20967
  fillVisibilityChangeEventData(visibilityChangeEvent);
20891
20968
 
20892
20969
  if (
20893
- ((a1, a2, a3) => {})(
20894
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20970
+ ((
20971
+ a1,
20972
+ a2,
20973
+ a3
20974
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20975
+ eventTypeId,
20895
20976
  visibilityChangeEvent,
20896
20977
  userData
20897
20978
  )
@@ -21011,8 +21092,12 @@ export function init(RuntimeName, PHPLoader) {
21011
21092
  HEAP32[(touchEvent + 8) >> 2] = numTouches;
21012
21093
 
21013
21094
  if (
21014
- ((a1, a2, a3) => {})(
21015
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
21095
+ ((
21096
+ a1,
21097
+ a2,
21098
+ a3
21099
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21100
+ eventTypeId,
21016
21101
  touchEvent,
21017
21102
  userData
21018
21103
  )
@@ -21150,8 +21235,12 @@ export function init(RuntimeName, PHPLoader) {
21150
21235
  fillGamepadEventData(gamepadEvent, e['gamepad']);
21151
21236
 
21152
21237
  if (
21153
- ((a1, a2, a3) => {})(
21154
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
21238
+ ((
21239
+ a1,
21240
+ a2,
21241
+ a3
21242
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21243
+ eventTypeId,
21155
21244
  gamepadEvent,
21156
21245
  userData
21157
21246
  )
@@ -21253,8 +21342,12 @@ export function init(RuntimeName, PHPLoader) {
21253
21342
  ) => {
21254
21343
  var beforeUnloadEventHandlerFunc = (e = event) => {
21255
21344
  // Note: This is always called on the main browser thread, since it needs synchronously return a value!
21256
- var confirmationMessage = ((a1, a2, a3) => {})(
21257
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
21345
+ var confirmationMessage = ((
21346
+ a1,
21347
+ a2,
21348
+ a3
21349
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21350
+ eventTypeId,
21258
21351
  0,
21259
21352
  userData
21260
21353
  );
@@ -21325,8 +21418,12 @@ export function init(RuntimeName, PHPLoader) {
21325
21418
  fillBatteryEventData(batteryEvent, battery);
21326
21419
 
21327
21420
  if (
21328
- ((a1, a2, a3) => {})(
21329
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
21421
+ ((
21422
+ a1,
21423
+ a2,
21424
+ a3
21425
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21426
+ eventTypeId,
21330
21427
  batteryEvent,
21331
21428
  userData
21332
21429
  )
@@ -21428,8 +21525,11 @@ export function init(RuntimeName, PHPLoader) {
21428
21525
 
21429
21526
  var _emscripten_request_animation_frame = (cb, userData) =>
21430
21527
  requestAnimationFrame((timeStamp) =>
21431
- ((a1, a2) => {})(
21432
- /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp,
21528
+ ((
21529
+ a1,
21530
+ a2
21531
+ ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21532
+ timeStamp,
21433
21533
  userData
21434
21534
  )
21435
21535
  );
@@ -21441,8 +21541,11 @@ export function init(RuntimeName, PHPLoader) {
21441
21541
  var _emscripten_request_animation_frame_loop = (cb, userData) => {
21442
21542
  function tick(timeStamp) {
21443
21543
  if (
21444
- ((a1, a2) => {})(
21445
- /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp,
21544
+ ((
21545
+ a1,
21546
+ a2
21547
+ ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21548
+ timeStamp,
21446
21549
  userData
21447
21550
  )
21448
21551
  ) {
@@ -21699,8 +21802,10 @@ export function init(RuntimeName, PHPLoader) {
21699
21802
  return emSetImmediate(() => {
21700
21803
  runtimeKeepalivePop();
21701
21804
  callUserCallback(() =>
21702
- ((a1) => {})(
21703
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
21805
+ ((
21806
+ a1
21807
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21808
+ userData
21704
21809
  )
21705
21810
  );
21706
21811
  });
@@ -21717,8 +21822,10 @@ export function init(RuntimeName, PHPLoader) {
21717
21822
  function tick() {
21718
21823
  callUserCallback(() => {
21719
21824
  if (
21720
- ((a1) => {})(
21721
- /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
21825
+ ((
21826
+ a1
21827
+ ) => {}) /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21828
+ userData
21722
21829
  )
21723
21830
  ) {
21724
21831
  emSetImmediate(tick);
@@ -21735,8 +21842,10 @@ export function init(RuntimeName, PHPLoader) {
21735
21842
  var _emscripten_set_timeout = (cb, msecs, userData) =>
21736
21843
  safeSetTimeout(
21737
21844
  () =>
21738
- ((a1) => {})(
21739
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
21845
+ ((
21846
+ a1
21847
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21848
+ userData
21740
21849
  ),
21741
21850
  msecs
21742
21851
  );
@@ -21752,8 +21861,11 @@ export function init(RuntimeName, PHPLoader) {
21752
21861
  runtimeKeepalivePop();
21753
21862
  callUserCallback(() => {
21754
21863
  if (
21755
- ((a1, a2) => {})(
21756
- /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ t,
21864
+ ((
21865
+ a1,
21866
+ a2
21867
+ ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21868
+ t,
21757
21869
  userData
21758
21870
  )
21759
21871
  ) {
@@ -21777,8 +21889,10 @@ export function init(RuntimeName, PHPLoader) {
21777
21889
  runtimeKeepalivePush();
21778
21890
  return setInterval(() => {
21779
21891
  callUserCallback(() =>
21780
- ((a1) => {})(
21781
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
21892
+ ((
21893
+ a1
21894
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21895
+ userData
21782
21896
  )
21783
21897
  );
21784
21898
  }, msecs);
@@ -21793,8 +21907,10 @@ export function init(RuntimeName, PHPLoader) {
21793
21907
 
21794
21908
  var _emscripten_async_call = (func, arg, millis) => {
21795
21909
  var wrapper = () =>
21796
- ((a1) => {})(
21797
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
21910
+ ((
21911
+ a1
21912
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21913
+ arg
21798
21914
  );
21799
21915
 
21800
21916
  if (
@@ -21827,7 +21943,7 @@ export function init(RuntimeName, PHPLoader) {
21827
21943
 
21828
21944
  var _emscripten_set_main_loop = (func, fps, simulateInfiniteLoop) => {
21829
21945
  var iterFunc =
21830
- () => {}; /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */
21946
+ () => {} /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */;
21831
21947
  setMainLoop(iterFunc, fps, simulateInfiniteLoop);
21832
21948
  };
21833
21949
  _emscripten_set_main_loop.sig = 'vpii';
@@ -21839,8 +21955,10 @@ export function init(RuntimeName, PHPLoader) {
21839
21955
  simulateInfiniteLoop
21840
21956
  ) => {
21841
21957
  var iterFunc = () =>
21842
- ((a1) => {})(
21843
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
21958
+ ((
21959
+ a1
21960
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21961
+ arg
21844
21962
  );
21845
21963
  setMainLoop(iterFunc, fps, simulateInfiniteLoop, arg);
21846
21964
  };
@@ -21861,8 +21979,10 @@ export function init(RuntimeName, PHPLoader) {
21861
21979
  var __emscripten_push_main_loop_blocker = (func, arg, name) => {
21862
21980
  MainLoop.queue.push({
21863
21981
  func: () => {
21864
- ((a1) => {})(
21865
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
21982
+ ((
21983
+ a1
21984
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21985
+ arg
21866
21986
  );
21867
21987
  },
21868
21988
  name: UTF8ToString(name),
@@ -21875,8 +21995,10 @@ export function init(RuntimeName, PHPLoader) {
21875
21995
  var __emscripten_push_uncounted_main_loop_blocker = (func, arg, name) => {
21876
21996
  MainLoop.queue.push({
21877
21997
  func: () => {
21878
- ((a1) => {})(
21879
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
21998
+ ((
21999
+ a1
22000
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22001
+ arg
21880
22002
  );
21881
22003
  },
21882
22004
  name: UTF8ToString(name),
@@ -21910,8 +22032,12 @@ export function init(RuntimeName, PHPLoader) {
21910
22032
  var resultPtr = stackAlloc(POINTER_SIZE);
21911
22033
  HEAPU32[resultPtr >> 2] = 0;
21912
22034
  try {
21913
- var result = ((a1, a2, a3) => {})(
21914
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ resultPtr,
22035
+ var result = ((
22036
+ a1,
22037
+ a2,
22038
+ a3
22039
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22040
+ resultPtr,
21915
22041
  userData,
21916
22042
  value
21917
22043
  );
@@ -22748,15 +22874,19 @@ export function init(RuntimeName, PHPLoader) {
22748
22874
  () => {
22749
22875
  runtimeKeepalivePop();
22750
22876
  if (onload)
22751
- ((a1) => {})(
22752
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file
22877
+ ((
22878
+ a1
22879
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22880
+ file
22753
22881
  );
22754
22882
  },
22755
22883
  () => {
22756
22884
  runtimeKeepalivePop();
22757
22885
  if (onerror)
22758
- ((a1) => {})(
22759
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file
22886
+ ((
22887
+ a1
22888
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22889
+ file
22760
22890
  );
22761
22891
  },
22762
22892
  true // don'tCreateFile - it's already there
@@ -22790,16 +22920,21 @@ export function init(RuntimeName, PHPLoader) {
22790
22920
  () => {
22791
22921
  runtimeKeepalivePop();
22792
22922
  if (onload)
22793
- ((a1, a2) => {})(
22794
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
22923
+ ((
22924
+ a1,
22925
+ a2
22926
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22927
+ arg,
22795
22928
  cname
22796
22929
  );
22797
22930
  },
22798
22931
  () => {
22799
22932
  runtimeKeepalivePop();
22800
22933
  if (onerror)
22801
- ((a1) => {})(
22802
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
22934
+ ((
22935
+ a1
22936
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22937
+ arg
22803
22938
  );
22804
22939
  },
22805
22940
  true // don'tCreateFile - it's already there
@@ -23067,10 +23202,10 @@ export function init(RuntimeName, PHPLoader) {
23067
23202
  runtimeKeepalivePop();
23068
23203
  callUserCallback(() =>
23069
23204
  withStackSave(() =>
23070
- ((a1) => {})(
23071
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stringToUTF8OnStack(
23072
- _file
23073
- )
23205
+ ((
23206
+ a1
23207
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23208
+ stringToUTF8OnStack(_file)
23074
23209
  )
23075
23210
  )
23076
23211
  );
@@ -23114,8 +23249,12 @@ export function init(RuntimeName, PHPLoader) {
23114
23249
  callUserCallback(() => {
23115
23250
  var buffer = _malloc(byteArray.length);
23116
23251
  HEAPU8.set(byteArray, buffer);
23117
- ((a1, a2, a3) => {})(
23118
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata,
23252
+ ((
23253
+ a1,
23254
+ a2,
23255
+ a3
23256
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23257
+ userdata,
23119
23258
  buffer,
23120
23259
  byteArray.length
23121
23260
  );
@@ -23125,8 +23264,10 @@ export function init(RuntimeName, PHPLoader) {
23125
23264
  if (onerror) {
23126
23265
  runtimeKeepalivePop();
23127
23266
  callUserCallback(() => {
23128
- ((a1) => {})(
23129
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata
23267
+ ((
23268
+ a1
23269
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23270
+ userdata
23130
23271
  );
23131
23272
  });
23132
23273
  }
@@ -23182,8 +23323,12 @@ export function init(RuntimeName, PHPLoader) {
23182
23323
  );
23183
23324
  if (onload) {
23184
23325
  var sp = stackSave();
23185
- ((a1, a2, a3) => {})(
23186
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
23326
+ ((
23327
+ a1,
23328
+ a2,
23329
+ a3
23330
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23331
+ handle,
23187
23332
  userdata,
23188
23333
  stringToUTF8OnStack(_file)
23189
23334
  );
@@ -23191,8 +23336,12 @@ export function init(RuntimeName, PHPLoader) {
23191
23336
  }
23192
23337
  } else {
23193
23338
  if (onerror)
23194
- ((a1, a2, a3) => {})(
23195
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
23339
+ ((
23340
+ a1,
23341
+ a2,
23342
+ a3
23343
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23344
+ handle,
23196
23345
  userdata,
23197
23346
  http.status
23198
23347
  );
@@ -23205,8 +23354,12 @@ export function init(RuntimeName, PHPLoader) {
23205
23354
  http.onerror = (e) => {
23206
23355
  runtimeKeepalivePop();
23207
23356
  if (onerror)
23208
- ((a1, a2, a3) => {})(
23209
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
23357
+ ((
23358
+ a1,
23359
+ a2,
23360
+ a3
23361
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23362
+ handle,
23210
23363
  userdata,
23211
23364
  http.status
23212
23365
  );
@@ -23221,8 +23374,12 @@ export function init(RuntimeName, PHPLoader) {
23221
23374
  ) {
23222
23375
  var percentComplete = (e.loaded / e.total) * 100;
23223
23376
  if (onprogress)
23224
- ((a1, a2, a3) => {})(
23225
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
23377
+ ((
23378
+ a1,
23379
+ a2,
23380
+ a3
23381
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23382
+ handle,
23226
23383
  userdata,
23227
23384
  percentComplete
23228
23385
  );
@@ -23279,8 +23436,13 @@ export function init(RuntimeName, PHPLoader) {
23279
23436
  if (http.statusText) {
23280
23437
  statusText = stringToUTF8OnStack(http.statusText);
23281
23438
  }
23282
- ((a1, a2, a3, a4) => {})(
23283
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
23439
+ ((
23440
+ a1,
23441
+ a2,
23442
+ a3,
23443
+ a4
23444
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23445
+ handle,
23284
23446
  userdata,
23285
23447
  http.status,
23286
23448
  statusText
@@ -23301,8 +23463,13 @@ export function init(RuntimeName, PHPLoader) {
23301
23463
  var buffer = _malloc(byteArray.length);
23302
23464
  HEAPU8.set(byteArray, buffer);
23303
23465
  if (onload)
23304
- ((a1, a2, a3, a4) => {})(
23305
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
23466
+ ((
23467
+ a1,
23468
+ a2,
23469
+ a3,
23470
+ a4
23471
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23472
+ handle,
23306
23473
  userdata,
23307
23474
  buffer,
23308
23475
  byteArray.length
@@ -23323,8 +23490,13 @@ export function init(RuntimeName, PHPLoader) {
23323
23490
  // PROGRESS
23324
23491
  http.onprogress = (e) => {
23325
23492
  if (onprogress)
23326
- ((a1, a2, a3, a4) => {})(
23327
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
23493
+ ((
23494
+ a1,
23495
+ a2,
23496
+ a3,
23497
+ a4
23498
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23499
+ handle,
23328
23500
  userdata,
23329
23501
  e.loaded,
23330
23502
  e.lengthComputable || e.lengthComputable === undefined
@@ -23655,16 +23827,24 @@ export function init(RuntimeName, PHPLoader) {
23655
23827
  if (event === 'error') {
23656
23828
  withStackSave(() => {
23657
23829
  var msg = stringToUTF8OnStack(data[2]);
23658
- ((a1, a2, a3, a4) => {})(
23659
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data[0],
23830
+ ((
23831
+ a1,
23832
+ a2,
23833
+ a3,
23834
+ a4
23835
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23836
+ data[0],
23660
23837
  data[1],
23661
23838
  msg,
23662
23839
  userData
23663
23840
  );
23664
23841
  });
23665
23842
  } else {
23666
- ((a1, a2) => {})(
23667
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data,
23843
+ ((
23844
+ a1,
23845
+ a2
23846
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23847
+ data,
23668
23848
  userData
23669
23849
  );
23670
23850
  }
@@ -24617,8 +24797,12 @@ export function init(RuntimeName, PHPLoader) {
24617
24797
  ) => {
24618
24798
  var webGlEventHandlerFunc = (e = event) => {
24619
24799
  if (
24620
- ((a1, a2, a3) => {})(
24621
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
24800
+ ((
24801
+ a1,
24802
+ a2,
24803
+ a3
24804
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24805
+ eventTypeId,
24622
24806
  0,
24623
24807
  userData
24624
24808
  )
@@ -24837,15 +25021,21 @@ export function init(RuntimeName, PHPLoader) {
24837
25021
  ) {
24838
25022
  event.preventDefault();
24839
25023
  GLUT.saveModifiers(event);
24840
- ((a1, a2) => {})(
24841
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX,
25024
+ ((
25025
+ a1,
25026
+ a2
25027
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25028
+ lastX,
24842
25029
  lastY
24843
25030
  );
24844
25031
  } else if (GLUT.buttons != 0 && GLUT.motionFunc) {
24845
25032
  event.preventDefault();
24846
25033
  GLUT.saveModifiers(event);
24847
- ((a1, a2) => {})(
24848
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX,
25034
+ ((
25035
+ a1,
25036
+ a2
25037
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25038
+ lastX,
24849
25039
  lastY
24850
25040
  );
24851
25041
  }
@@ -25006,8 +25196,12 @@ export function init(RuntimeName, PHPLoader) {
25006
25196
  if (GLUT.specialFunc) {
25007
25197
  event.preventDefault();
25008
25198
  GLUT.saveModifiers(event);
25009
- ((a1, a2, a3) => {})(
25010
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
25199
+ ((
25200
+ a1,
25201
+ a2,
25202
+ a3
25203
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25204
+ key,
25011
25205
  Browser.mouseX,
25012
25206
  Browser.mouseY
25013
25207
  );
@@ -25017,8 +25211,12 @@ export function init(RuntimeName, PHPLoader) {
25017
25211
  if (key !== null && GLUT.keyboardFunc) {
25018
25212
  event.preventDefault();
25019
25213
  GLUT.saveModifiers(event);
25020
- ((a1, a2, a3) => {})(
25021
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
25214
+ ((
25215
+ a1,
25216
+ a2,
25217
+ a3
25218
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25219
+ key,
25022
25220
  Browser.mouseX,
25023
25221
  Browser.mouseY
25024
25222
  );
@@ -25033,8 +25231,12 @@ export function init(RuntimeName, PHPLoader) {
25033
25231
  if (GLUT.specialUpFunc) {
25034
25232
  event.preventDefault();
25035
25233
  GLUT.saveModifiers(event);
25036
- ((a1, a2, a3) => {})(
25037
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
25234
+ ((
25235
+ a1,
25236
+ a2,
25237
+ a3
25238
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25239
+ key,
25038
25240
  Browser.mouseX,
25039
25241
  Browser.mouseY
25040
25242
  );
@@ -25044,8 +25246,12 @@ export function init(RuntimeName, PHPLoader) {
25044
25246
  if (key !== null && GLUT.keyboardUpFunc) {
25045
25247
  event.preventDefault();
25046
25248
  GLUT.saveModifiers(event);
25047
- ((a1, a2, a3) => {})(
25048
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
25249
+ ((
25250
+ a1,
25251
+ a2,
25252
+ a3
25253
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25254
+ key,
25049
25255
  Browser.mouseX,
25050
25256
  Browser.mouseY
25051
25257
  );
@@ -25109,10 +25315,13 @@ export function init(RuntimeName, PHPLoader) {
25109
25315
  } catch (e) {}
25110
25316
  event.preventDefault();
25111
25317
  GLUT.saveModifiers(event);
25112
- ((a1, a2, a3, a4) => {})(
25113
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[
25114
- 'button'
25115
- ],
25318
+ ((
25319
+ a1,
25320
+ a2,
25321
+ a3,
25322
+ a4
25323
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25324
+ event['button'],
25116
25325
  0 /*GLUT_DOWN*/,
25117
25326
  Browser.mouseX,
25118
25327
  Browser.mouseY
@@ -25127,10 +25336,13 @@ export function init(RuntimeName, PHPLoader) {
25127
25336
  if (GLUT.mouseFunc) {
25128
25337
  event.preventDefault();
25129
25338
  GLUT.saveModifiers(event);
25130
- ((a1, a2, a3, a4) => {})(
25131
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[
25132
- 'button'
25133
- ],
25339
+ ((
25340
+ a1,
25341
+ a2,
25342
+ a3,
25343
+ a4
25344
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25345
+ event['button'],
25134
25346
  1 /*GLUT_UP*/,
25135
25347
  Browser.mouseX,
25136
25348
  Browser.mouseY
@@ -25159,8 +25371,13 @@ export function init(RuntimeName, PHPLoader) {
25159
25371
  if (GLUT.mouseFunc) {
25160
25372
  event.preventDefault();
25161
25373
  GLUT.saveModifiers(event);
25162
- ((a1, a2, a3, a4) => {})(
25163
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ button,
25374
+ ((
25375
+ a1,
25376
+ a2,
25377
+ a3,
25378
+ a4
25379
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25380
+ button,
25164
25381
  0 /*GLUT_DOWN*/,
25165
25382
  Browser.mouseX,
25166
25383
  Browser.mouseY
@@ -25198,8 +25415,11 @@ export function init(RuntimeName, PHPLoader) {
25198
25415
  /* Can't call _glutReshapeWindow as that requests cancelling fullscreen. */
25199
25416
  if (GLUT.reshapeFunc) {
25200
25417
  // out("GLUT.reshapeFunc (from FS): " + width + ", " + height);
25201
- ((a1, a2) => {})(
25202
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
25418
+ ((
25419
+ a1,
25420
+ a2
25421
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25422
+ width,
25203
25423
  height
25204
25424
  );
25205
25425
  }
@@ -25255,8 +25475,11 @@ export function init(RuntimeName, PHPLoader) {
25255
25475
  // Resize callback stage 2: updateResizeListeners notifies reshapeFunc
25256
25476
  Browser.resizeListeners.push((width, height) => {
25257
25477
  if (GLUT.reshapeFunc) {
25258
- ((a1, a2) => {})(
25259
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
25478
+ ((
25479
+ a1,
25480
+ a2
25481
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25482
+ width,
25260
25483
  height
25261
25484
  );
25262
25485
  }
@@ -25371,8 +25594,10 @@ export function init(RuntimeName, PHPLoader) {
25371
25594
  var _glutTimerFunc = (msec, func, value) =>
25372
25595
  safeSetTimeout(
25373
25596
  () =>
25374
- ((a1) => {})(
25375
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ value
25597
+ ((
25598
+ a1
25599
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25600
+ value
25376
25601
  ),
25377
25602
  msec
25378
25603
  );
@@ -25532,8 +25757,11 @@ export function init(RuntimeName, PHPLoader) {
25532
25757
  Browser.setCanvasSize(width, height, true); // N.B. GLUT.reshapeFunc is also registered as a canvas resize callback.
25533
25758
  // Just call it once here.
25534
25759
  if (GLUT.reshapeFunc) {
25535
- ((a1, a2) => {})(
25536
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
25760
+ ((
25761
+ a1,
25762
+ a2
25763
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25764
+ width,
25537
25765
  height
25538
25766
  );
25539
25767
  }
@@ -26587,15 +26815,21 @@ export function init(RuntimeName, PHPLoader) {
26587
26815
  callUserCallback(() => {
26588
26816
  if (error) {
26589
26817
  if (onerror)
26590
- ((a1) => {})(
26591
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26818
+ ((
26819
+ a1
26820
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26821
+ arg
26592
26822
  );
26593
26823
  return;
26594
26824
  }
26595
26825
  var buffer = _malloc(byteArray.length);
26596
26826
  HEAPU8.set(byteArray, buffer);
26597
- ((a1, a2, a3) => {})(
26598
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
26827
+ ((
26828
+ a1,
26829
+ a2,
26830
+ a3
26831
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26832
+ arg,
26599
26833
  buffer,
26600
26834
  byteArray.length
26601
26835
  );
@@ -26627,14 +26861,18 @@ export function init(RuntimeName, PHPLoader) {
26627
26861
  callUserCallback(() => {
26628
26862
  if (error) {
26629
26863
  if (onerror)
26630
- ((a1) => {})(
26631
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26864
+ ((
26865
+ a1
26866
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26867
+ arg
26632
26868
  );
26633
26869
  return;
26634
26870
  }
26635
26871
  if (onstore)
26636
- ((a1) => {})(
26637
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26872
+ ((
26873
+ a1
26874
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26875
+ arg
26638
26876
  );
26639
26877
  });
26640
26878
  }
@@ -26649,14 +26887,18 @@ export function init(RuntimeName, PHPLoader) {
26649
26887
  callUserCallback(() => {
26650
26888
  if (error) {
26651
26889
  if (onerror)
26652
- ((a1) => {})(
26653
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26890
+ ((
26891
+ a1
26892
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26893
+ arg
26654
26894
  );
26655
26895
  return;
26656
26896
  }
26657
26897
  if (ondelete)
26658
- ((a1) => {})(
26659
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26898
+ ((
26899
+ a1
26900
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26901
+ arg
26660
26902
  );
26661
26903
  });
26662
26904
  });
@@ -26673,14 +26915,19 @@ export function init(RuntimeName, PHPLoader) {
26673
26915
  callUserCallback(() => {
26674
26916
  if (error) {
26675
26917
  if (onerror)
26676
- ((a1) => {})(
26677
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26918
+ ((
26919
+ a1
26920
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26921
+ arg
26678
26922
  );
26679
26923
  return;
26680
26924
  }
26681
26925
  if (oncheck)
26682
- ((a1, a2) => {})(
26683
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
26926
+ ((
26927
+ a1,
26928
+ a2
26929
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26930
+ arg,
26684
26931
  exists
26685
26932
  );
26686
26933
  });
@@ -26696,14 +26943,18 @@ export function init(RuntimeName, PHPLoader) {
26696
26943
  callUserCallback(() => {
26697
26944
  if (error) {
26698
26945
  if (onerror)
26699
- ((a1) => {})(
26700
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26946
+ ((
26947
+ a1
26948
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26949
+ arg
26701
26950
  );
26702
26951
  return;
26703
26952
  }
26704
26953
  if (onclear)
26705
- ((a1) => {})(
26706
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26954
+ ((
26955
+ a1
26956
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26957
+ arg
26707
26958
  );
26708
26959
  });
26709
26960
  });
@@ -26860,8 +27111,11 @@ export function init(RuntimeName, PHPLoader) {
26860
27111
  safeSetTimeout(() => {
26861
27112
  var stackBegin = Asyncify.currData + 12;
26862
27113
  var stackEnd = HEAPU32[Asyncify.currData >> 2];
26863
- ((a1, a2) => {})(
26864
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stackBegin,
27114
+ ((
27115
+ a1,
27116
+ a2
27117
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27118
+ stackBegin,
26865
27119
  stackEnd
26866
27120
  );
26867
27121
  wakeUp();
@@ -26910,8 +27164,10 @@ export function init(RuntimeName, PHPLoader) {
26910
27164
  HEAPU32[(newFiber + 12) >> 2] = 0;
26911
27165
 
26912
27166
  var userData = HEAPU32[(newFiber + 16) >> 2];
26913
- ((a1) => {})(
26914
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
27167
+ ((
27168
+ a1
27169
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27170
+ userData
26915
27171
  );
26916
27172
  } else {
26917
27173
  var asyncifyData = newFiber + 20;
@@ -27922,8 +28178,11 @@ export function init(RuntimeName, PHPLoader) {
27922
28178
  if (!SDL.eventHandler) return;
27923
28179
 
27924
28180
  while (SDL.pollEvent(SDL.eventHandlerTemp)) {
27925
- ((a1, a2) => {})(
27926
- /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL.eventHandlerContext,
28181
+ ((
28182
+ a1,
28183
+ a2
28184
+ ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
28185
+ SDL.eventHandlerContext,
27927
28186
  SDL.eventHandlerTemp
27928
28187
  );
27929
28188
  }
@@ -29547,9 +29806,12 @@ export function init(RuntimeName, PHPLoader) {
29547
29806
  return;
29548
29807
 
29549
29808
  // Ask SDL audio data from the user code.
29550
- ((a1, a2, a3) => {})(
29551
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL
29552
- .audio.userdata,
29809
+ ((
29810
+ a1,
29811
+ a2,
29812
+ a3
29813
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
29814
+ SDL.audio.userdata,
29553
29815
  SDL.audio.buffer,
29554
29816
  SDL.audio.bufferSize
29555
29817
  );
@@ -30007,8 +30269,10 @@ export function init(RuntimeName, PHPLoader) {
30007
30269
  info.audio = null;
30008
30270
  }
30009
30271
  if (SDL.channelFinished) {
30010
- ((a1) => {})(
30011
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel
30272
+ ((
30273
+ a1
30274
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
30275
+ channel
30012
30276
  );
30013
30277
  }
30014
30278
  }
@@ -30076,8 +30340,10 @@ export function init(RuntimeName, PHPLoader) {
30076
30340
  channelInfo.audio = null;
30077
30341
  }
30078
30342
  if (SDL.channelFinished)
30079
- ((a1) => {})(
30080
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel
30343
+ ((
30344
+ a1
30345
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
30346
+ channel
30081
30347
  );
30082
30348
  };
30083
30349
  if (channelInfo.audio) {
@@ -30812,8 +31078,11 @@ export function init(RuntimeName, PHPLoader) {
30812
31078
  var _SDL_AddTimer = (interval, callback, param) =>
30813
31079
  safeSetTimeout(
30814
31080
  () =>
30815
- ((a1, a2) => {})(
30816
- /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ interval,
31081
+ ((
31082
+ a1,
31083
+ a2
31084
+ ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31085
+ interval,
30817
31086
  param
30818
31087
  ),
30819
31088
  interval
@@ -31198,8 +31467,12 @@ export function init(RuntimeName, PHPLoader) {
31198
31467
 
31199
31468
  socket.onopen = function (e) {
31200
31469
  var eventPtr = WS.getSocketEvent(socketId);
31201
- ((a1, a2, a3) => {})(
31202
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31470
+ ((
31471
+ a1,
31472
+ a2,
31473
+ a3
31474
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31475
+ 0 /*TODO*/,
31203
31476
  eventPtr,
31204
31477
  userData
31205
31478
  );
@@ -31221,8 +31494,12 @@ export function init(RuntimeName, PHPLoader) {
31221
31494
 
31222
31495
  socket.onerror = function (e) {
31223
31496
  var eventPtr = WS.getSocketEvent(socketId);
31224
- ((a1, a2, a3) => {})(
31225
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31497
+ ((
31498
+ a1,
31499
+ a2,
31500
+ a3
31501
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31502
+ 0 /*TODO*/,
31226
31503
  eventPtr,
31227
31504
  userData
31228
31505
  );
@@ -31247,8 +31524,12 @@ export function init(RuntimeName, PHPLoader) {
31247
31524
  ((HEAP8[eventPtr + 4] = e.wasClean),
31248
31525
  (HEAP16[(eventPtr + 6) >> 1] = e.code),
31249
31526
  stringToUTF8(e.reason, eventPtr + 8, 512));
31250
- ((a1, a2, a3) => {})(
31251
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31527
+ ((
31528
+ a1,
31529
+ a2,
31530
+ a3
31531
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31532
+ 0 /*TODO*/,
31252
31533
  eventPtr,
31253
31534
  userData
31254
31535
  );
@@ -31282,8 +31563,12 @@ export function init(RuntimeName, PHPLoader) {
31282
31563
  ((HEAPU32[(eventPtr + 4) >> 2] = buf),
31283
31564
  (HEAP32[(eventPtr + 8) >> 2] = len),
31284
31565
  (HEAP8[eventPtr + 12] = isText),
31285
- ((a1, a2, a3) => {})(
31286
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31566
+ ((
31567
+ a1,
31568
+ a2,
31569
+ a3
31570
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31571
+ 0 /*TODO*/,
31287
31572
  eventPtr,
31288
31573
  userData
31289
31574
  ));
Binary file
package/jspi/php_7_3.js CHANGED
@@ -3,13 +3,15 @@
3
3
  // this code in Node.js as an ES module.
4
4
  import { createRequire } from 'module';
5
5
  const require = createRequire(import.meta.url);
6
- // Note: The path module is currently needed by code injected by the php-wasm Dockerfile.
7
- import { fileURLToPath } from 'url';
6
+ // Note: The path and url modules are currently needed by code injected by the php-wasm Dockerfile.
8
7
  import path from 'path';
9
- const __filename = fileURLToPath(import.meta.url);
10
- const __dirname = path.dirname(__filename);
8
+ import { fileURLToPath } from 'url';
11
9
 
12
- const dependencyFilename = path.join(__dirname, '7_3_33', 'php_7_3.wasm');
10
+ const currentDirPath =
11
+ typeof __dirname !== 'undefined'
12
+ ? __dirname
13
+ : path.dirname(fileURLToPath(import.meta.url));
14
+ const dependencyFilename = path.join(currentDirPath, '7_3_33', 'php_7_3.wasm');
13
15
  export { dependencyFilename };
14
16
  export const dependenciesTotalSize = 22198114;
15
17
  const phpVersionString = '7.3.33';
@@ -75,7 +77,7 @@ export function init(RuntimeName, PHPLoader) {
75
77
  // the complexity of lazy-loading.
76
78
  var fs = require('fs');
77
79
 
78
- scriptDirectory = __dirname + '/';
80
+ scriptDirectory = currentDirPath + '/';
79
81
 
80
82
  // include: node_shell_read.js
81
83
  readBinary = (filename) => {
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@php-wasm/node-7-3",
3
- "version": "3.0.35",
3
+ "version": "3.0.37",
4
4
  "description": "PHP 7.3 WebAssembly binaries for node",
5
5
  "repository": {
6
6
  "type": "git",
@@ -35,12 +35,12 @@
35
35
  "node": ">=20.18.3",
36
36
  "npm": ">=10.1.0"
37
37
  },
38
- "gitHead": "9ab661ec8c217023fef7dd97781a751551aafa2a",
38
+ "gitHead": "1ac56b78f05f1c517f6b56beb527d6826b53aa82",
39
39
  "dependencies": {
40
40
  "ini": "4.1.2",
41
41
  "wasm-feature-detect": "1.8.0",
42
42
  "ws": "8.18.3",
43
- "@php-wasm/universal": "3.0.35"
43
+ "@php-wasm/universal": "3.0.37"
44
44
  },
45
45
  "packageManager": "npm@10.9.2",
46
46
  "overrides": {