@php-wasm/node-7-4 3.0.35 → 3.0.37

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -3,15 +3,17 @@
3
3
  // this code in Node.js as an ES module.
4
4
  import { createRequire } from 'module';
5
5
  const require = createRequire(import.meta.url);
6
- // Note: The path module is currently needed by code injected by the php-wasm Dockerfile.
7
- import { fileURLToPath } from 'url';
6
+ // Note: The path and url modules are currently needed by code injected by the php-wasm Dockerfile.
8
7
  import path from 'path';
9
- const __filename = fileURLToPath(import.meta.url);
10
- const __dirname = path.dirname(__filename);
8
+ import { fileURLToPath } from 'url';
11
9
 
12
- const dependencyFilename = path.join(__dirname, '7_4_33', 'php_7_4.wasm');
10
+ const currentDirPath =
11
+ typeof __dirname !== 'undefined'
12
+ ? __dirname
13
+ : path.dirname(fileURLToPath(import.meta.url));
14
+ const dependencyFilename = path.join(currentDirPath, '7_4_33', 'php_7_4.wasm');
13
15
  export { dependencyFilename };
14
- export const dependenciesTotalSize = 22934580;
16
+ export const dependenciesTotalSize = 22934485;
15
17
  const phpVersionString = '7.4.33';
16
18
  export function init(RuntimeName, PHPLoader) {
17
19
  // The rest of the code comes from the built php.js file and esm-suffix.js
@@ -75,7 +77,7 @@ export function init(RuntimeName, PHPLoader) {
75
77
  // the complexity of lazy-loading.
76
78
  var fs = require('fs');
77
79
 
78
- scriptDirectory = __dirname + '/';
80
+ scriptDirectory = currentDirPath + '/';
79
81
 
80
82
  // include: node_shell_read.js
81
83
  readBinary = (filename) => {
@@ -5121,8 +5123,10 @@ export function init(RuntimeName, PHPLoader) {
5121
5123
  );
5122
5124
 
5123
5125
  var ___call_sighandler = (fp, sig) =>
5124
- ((a1) => {})(
5125
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ sig
5126
+ ((
5127
+ a1
5128
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
5129
+ sig
5126
5130
  );
5127
5131
  ___call_sighandler.sig = 'vpi';
5128
5132
 
@@ -8988,8 +8992,11 @@ export function init(RuntimeName, PHPLoader) {
8988
8992
  dlSetError(`'Could not load dynamic lib: ${filename}\n${e}`);
8989
8993
  runtimeKeepalivePop();
8990
8994
  callUserCallback(() =>
8991
- ((a1, a2) => {})(
8992
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
8995
+ ((
8996
+ a1,
8997
+ a2
8998
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
8999
+ handle,
8993
9000
  user_data
8994
9001
  )
8995
9002
  );
@@ -8997,8 +9004,11 @@ export function init(RuntimeName, PHPLoader) {
8997
9004
  function successCallback() {
8998
9005
  runtimeKeepalivePop();
8999
9006
  callUserCallback(() =>
9000
- ((a1, a2) => {})(
9001
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
9007
+ ((
9008
+ a1,
9009
+ a2
9010
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
9011
+ handle,
9002
9012
  user_data
9003
9013
  )
9004
9014
  );
@@ -18682,8 +18692,11 @@ export function init(RuntimeName, PHPLoader) {
18682
18692
  var trace = getCallstack();
18683
18693
  var parts = trace.split('\n');
18684
18694
  for (var i = 0; i < parts.length; i++) {
18685
- var ret = ((a1, a2) => {})(
18686
- /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0,
18695
+ var ret = ((
18696
+ a1,
18697
+ a2
18698
+ ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
18699
+ 0,
18687
18700
  arg
18688
18701
  );
18689
18702
  if (ret !== 0) return;
@@ -19227,8 +19240,12 @@ export function init(RuntimeName, PHPLoader) {
19227
19240
  stringToUTF8(e.locale || '', keyEventData + 128, 32);
19228
19241
 
19229
19242
  if (
19230
- ((a1, a2, a3) => {})(
19231
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
19243
+ ((
19244
+ a1,
19245
+ a2,
19246
+ a3
19247
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19248
+ eventTypeId,
19232
19249
  keyEventData,
19233
19250
  userData
19234
19251
  )
@@ -19346,8 +19363,12 @@ export function init(RuntimeName, PHPLoader) {
19346
19363
  fillMouseEventData(JSEvents.mouseEvent, e, target);
19347
19364
 
19348
19365
  if (
19349
- ((a1, a2, a3) => {})(
19350
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
19366
+ ((
19367
+ a1,
19368
+ a2,
19369
+ a3
19370
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19371
+ eventTypeId,
19351
19372
  JSEvents.mouseEvent,
19352
19373
  userData
19353
19374
  )
@@ -19561,8 +19582,12 @@ export function init(RuntimeName, PHPLoader) {
19561
19582
  HEAPF64[(wheelEvent + 80) >> 3] = e['deltaZ'];
19562
19583
  HEAP32[(wheelEvent + 88) >> 2] = e['deltaMode'];
19563
19584
  if (
19564
- ((a1, a2, a3) => {})(
19565
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
19585
+ ((
19586
+ a1,
19587
+ a2,
19588
+ a3
19589
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19590
+ eventTypeId,
19566
19591
  wheelEvent,
19567
19592
  userData
19568
19593
  )
@@ -19643,8 +19668,12 @@ export function init(RuntimeName, PHPLoader) {
19643
19668
  HEAP32[(uiEvent + 28) >> 2] = pageXOffset | 0; // scroll offsets are float
19644
19669
  HEAP32[(uiEvent + 32) >> 2] = pageYOffset | 0;
19645
19670
  if (
19646
- ((a1, a2, a3) => {})(
19647
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
19671
+ ((
19672
+ a1,
19673
+ a2,
19674
+ a3
19675
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19676
+ eventTypeId,
19648
19677
  uiEvent,
19649
19678
  userData
19650
19679
  )
@@ -19718,8 +19747,12 @@ export function init(RuntimeName, PHPLoader) {
19718
19747
  stringToUTF8(id, focusEvent + 128, 128);
19719
19748
 
19720
19749
  if (
19721
- ((a1, a2, a3) => {})(
19722
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
19750
+ ((
19751
+ a1,
19752
+ a2,
19753
+ a3
19754
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19755
+ eventTypeId,
19723
19756
  focusEvent,
19724
19757
  userData
19725
19758
  )
@@ -19835,8 +19868,12 @@ export function init(RuntimeName, PHPLoader) {
19835
19868
  ); // TODO: Thread-safety with respect to emscripten_get_deviceorientation_status()
19836
19869
 
19837
19870
  if (
19838
- ((a1, a2, a3) => {})(
19839
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
19871
+ ((
19872
+ a1,
19873
+ a2,
19874
+ a3
19875
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19876
+ eventTypeId,
19840
19877
  JSEvents.deviceOrientationEvent,
19841
19878
  userData
19842
19879
  )
@@ -19920,8 +19957,12 @@ export function init(RuntimeName, PHPLoader) {
19920
19957
  fillDeviceMotionEventData(JSEvents.deviceMotionEvent, e, target); // TODO: Thread-safety with respect to emscripten_get_devicemotion_status()
19921
19958
 
19922
19959
  if (
19923
- ((a1, a2, a3) => {})(
19924
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
19960
+ ((
19961
+ a1,
19962
+ a2,
19963
+ a3
19964
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19965
+ eventTypeId,
19925
19966
  JSEvents.deviceMotionEvent,
19926
19967
  userData
19927
19968
  )
@@ -20028,8 +20069,12 @@ export function init(RuntimeName, PHPLoader) {
20028
20069
  fillOrientationChangeEventData(orientationChangeEvent);
20029
20070
 
20030
20071
  if (
20031
- ((a1, a2, a3) => {})(
20032
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20072
+ ((
20073
+ a1,
20074
+ a2,
20075
+ a3
20076
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20077
+ eventTypeId,
20033
20078
  orientationChangeEvent,
20034
20079
  userData
20035
20080
  )
@@ -20158,8 +20203,12 @@ export function init(RuntimeName, PHPLoader) {
20158
20203
  fillFullscreenChangeEventData(fullscreenChangeEvent);
20159
20204
 
20160
20205
  if (
20161
- ((a1, a2, a3) => {})(
20162
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20206
+ ((
20207
+ a1,
20208
+ a2,
20209
+ a3
20210
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20211
+ eventTypeId,
20163
20212
  fullscreenChangeEvent,
20164
20213
  userData
20165
20214
  )
@@ -20304,8 +20353,12 @@ export function init(RuntimeName, PHPLoader) {
20304
20353
  );
20305
20354
 
20306
20355
  if (currentFullscreenStrategy.canvasResizedCallback) {
20307
- ((a1, a2, a3) => {})(
20308
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
20356
+ ((
20357
+ a1,
20358
+ a2,
20359
+ a3
20360
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20361
+ 37,
20309
20362
  0,
20310
20363
  currentFullscreenStrategy.canvasResizedCallbackUserData
20311
20364
  );
@@ -20406,8 +20459,12 @@ export function init(RuntimeName, PHPLoader) {
20406
20459
  currentFullscreenStrategy = strategy;
20407
20460
 
20408
20461
  if (strategy.canvasResizedCallback) {
20409
- ((a1, a2, a3) => {})(
20410
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
20462
+ ((
20463
+ a1,
20464
+ a2,
20465
+ a3
20466
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20467
+ 37,
20411
20468
  0,
20412
20469
  strategy.canvasResizedCallbackUserData
20413
20470
  );
@@ -20507,8 +20564,12 @@ export function init(RuntimeName, PHPLoader) {
20507
20564
  !inCenteredWithoutScalingFullscreenMode &&
20508
20565
  currentFullscreenStrategy.canvasResizedCallback
20509
20566
  ) {
20510
- ((a1, a2, a3) => {})(
20511
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
20567
+ ((
20568
+ a1,
20569
+ a2,
20570
+ a3
20571
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20572
+ 37,
20512
20573
  0,
20513
20574
  currentFullscreenStrategy.canvasResizedCallbackUserData
20514
20575
  );
@@ -20607,8 +20668,12 @@ export function init(RuntimeName, PHPLoader) {
20607
20668
  softFullscreenResizeWebGLRenderTarget
20608
20669
  );
20609
20670
  if (strategy.canvasResizedCallback) {
20610
- ((a1, a2, a3) => {})(
20611
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
20671
+ ((
20672
+ a1,
20673
+ a2,
20674
+ a3
20675
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20676
+ 37,
20612
20677
  0,
20613
20678
  strategy.canvasResizedCallbackUserData
20614
20679
  );
@@ -20621,8 +20686,12 @@ export function init(RuntimeName, PHPLoader) {
20621
20686
 
20622
20687
  // Inform the caller that the canvas size has changed.
20623
20688
  if (strategy.canvasResizedCallback) {
20624
- ((a1, a2, a3) => {})(
20625
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
20689
+ ((
20690
+ a1,
20691
+ a2,
20692
+ a3
20693
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20694
+ 37,
20626
20695
  0,
20627
20696
  strategy.canvasResizedCallbackUserData
20628
20697
  );
@@ -20684,8 +20753,12 @@ export function init(RuntimeName, PHPLoader) {
20684
20753
  fillPointerlockChangeEventData(pointerlockChangeEvent);
20685
20754
 
20686
20755
  if (
20687
- ((a1, a2, a3) => {})(
20688
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20756
+ ((
20757
+ a1,
20758
+ a2,
20759
+ a3
20760
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20761
+ eventTypeId,
20689
20762
  pointerlockChangeEvent,
20690
20763
  userData
20691
20764
  )
@@ -20739,8 +20812,12 @@ export function init(RuntimeName, PHPLoader) {
20739
20812
  ) => {
20740
20813
  var pointerlockErrorEventHandlerFunc = (e = event) => {
20741
20814
  if (
20742
- ((a1, a2, a3) => {})(
20743
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20815
+ ((
20816
+ a1,
20817
+ a2,
20818
+ a3
20819
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20820
+ eventTypeId,
20744
20821
  0,
20745
20822
  userData
20746
20823
  )
@@ -20894,8 +20971,12 @@ export function init(RuntimeName, PHPLoader) {
20894
20971
  fillVisibilityChangeEventData(visibilityChangeEvent);
20895
20972
 
20896
20973
  if (
20897
- ((a1, a2, a3) => {})(
20898
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20974
+ ((
20975
+ a1,
20976
+ a2,
20977
+ a3
20978
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20979
+ eventTypeId,
20899
20980
  visibilityChangeEvent,
20900
20981
  userData
20901
20982
  )
@@ -21015,8 +21096,12 @@ export function init(RuntimeName, PHPLoader) {
21015
21096
  HEAP32[(touchEvent + 8) >> 2] = numTouches;
21016
21097
 
21017
21098
  if (
21018
- ((a1, a2, a3) => {})(
21019
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
21099
+ ((
21100
+ a1,
21101
+ a2,
21102
+ a3
21103
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21104
+ eventTypeId,
21020
21105
  touchEvent,
21021
21106
  userData
21022
21107
  )
@@ -21154,8 +21239,12 @@ export function init(RuntimeName, PHPLoader) {
21154
21239
  fillGamepadEventData(gamepadEvent, e['gamepad']);
21155
21240
 
21156
21241
  if (
21157
- ((a1, a2, a3) => {})(
21158
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
21242
+ ((
21243
+ a1,
21244
+ a2,
21245
+ a3
21246
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21247
+ eventTypeId,
21159
21248
  gamepadEvent,
21160
21249
  userData
21161
21250
  )
@@ -21257,8 +21346,12 @@ export function init(RuntimeName, PHPLoader) {
21257
21346
  ) => {
21258
21347
  var beforeUnloadEventHandlerFunc = (e = event) => {
21259
21348
  // Note: This is always called on the main browser thread, since it needs synchronously return a value!
21260
- var confirmationMessage = ((a1, a2, a3) => {})(
21261
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
21349
+ var confirmationMessage = ((
21350
+ a1,
21351
+ a2,
21352
+ a3
21353
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21354
+ eventTypeId,
21262
21355
  0,
21263
21356
  userData
21264
21357
  );
@@ -21329,8 +21422,12 @@ export function init(RuntimeName, PHPLoader) {
21329
21422
  fillBatteryEventData(batteryEvent, battery);
21330
21423
 
21331
21424
  if (
21332
- ((a1, a2, a3) => {})(
21333
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
21425
+ ((
21426
+ a1,
21427
+ a2,
21428
+ a3
21429
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21430
+ eventTypeId,
21334
21431
  batteryEvent,
21335
21432
  userData
21336
21433
  )
@@ -21432,8 +21529,11 @@ export function init(RuntimeName, PHPLoader) {
21432
21529
 
21433
21530
  var _emscripten_request_animation_frame = (cb, userData) =>
21434
21531
  requestAnimationFrame((timeStamp) =>
21435
- ((a1, a2) => {})(
21436
- /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp,
21532
+ ((
21533
+ a1,
21534
+ a2
21535
+ ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21536
+ timeStamp,
21437
21537
  userData
21438
21538
  )
21439
21539
  );
@@ -21445,8 +21545,11 @@ export function init(RuntimeName, PHPLoader) {
21445
21545
  var _emscripten_request_animation_frame_loop = (cb, userData) => {
21446
21546
  function tick(timeStamp) {
21447
21547
  if (
21448
- ((a1, a2) => {})(
21449
- /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp,
21548
+ ((
21549
+ a1,
21550
+ a2
21551
+ ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21552
+ timeStamp,
21450
21553
  userData
21451
21554
  )
21452
21555
  ) {
@@ -21703,8 +21806,10 @@ export function init(RuntimeName, PHPLoader) {
21703
21806
  return emSetImmediate(() => {
21704
21807
  runtimeKeepalivePop();
21705
21808
  callUserCallback(() =>
21706
- ((a1) => {})(
21707
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
21809
+ ((
21810
+ a1
21811
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21812
+ userData
21708
21813
  )
21709
21814
  );
21710
21815
  });
@@ -21721,8 +21826,10 @@ export function init(RuntimeName, PHPLoader) {
21721
21826
  function tick() {
21722
21827
  callUserCallback(() => {
21723
21828
  if (
21724
- ((a1) => {})(
21725
- /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
21829
+ ((
21830
+ a1
21831
+ ) => {}) /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21832
+ userData
21726
21833
  )
21727
21834
  ) {
21728
21835
  emSetImmediate(tick);
@@ -21739,8 +21846,10 @@ export function init(RuntimeName, PHPLoader) {
21739
21846
  var _emscripten_set_timeout = (cb, msecs, userData) =>
21740
21847
  safeSetTimeout(
21741
21848
  () =>
21742
- ((a1) => {})(
21743
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
21849
+ ((
21850
+ a1
21851
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21852
+ userData
21744
21853
  ),
21745
21854
  msecs
21746
21855
  );
@@ -21756,8 +21865,11 @@ export function init(RuntimeName, PHPLoader) {
21756
21865
  runtimeKeepalivePop();
21757
21866
  callUserCallback(() => {
21758
21867
  if (
21759
- ((a1, a2) => {})(
21760
- /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ t,
21868
+ ((
21869
+ a1,
21870
+ a2
21871
+ ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21872
+ t,
21761
21873
  userData
21762
21874
  )
21763
21875
  ) {
@@ -21781,8 +21893,10 @@ export function init(RuntimeName, PHPLoader) {
21781
21893
  runtimeKeepalivePush();
21782
21894
  return setInterval(() => {
21783
21895
  callUserCallback(() =>
21784
- ((a1) => {})(
21785
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
21896
+ ((
21897
+ a1
21898
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21899
+ userData
21786
21900
  )
21787
21901
  );
21788
21902
  }, msecs);
@@ -21797,8 +21911,10 @@ export function init(RuntimeName, PHPLoader) {
21797
21911
 
21798
21912
  var _emscripten_async_call = (func, arg, millis) => {
21799
21913
  var wrapper = () =>
21800
- ((a1) => {})(
21801
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
21914
+ ((
21915
+ a1
21916
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21917
+ arg
21802
21918
  );
21803
21919
 
21804
21920
  if (
@@ -21831,7 +21947,7 @@ export function init(RuntimeName, PHPLoader) {
21831
21947
 
21832
21948
  var _emscripten_set_main_loop = (func, fps, simulateInfiniteLoop) => {
21833
21949
  var iterFunc =
21834
- () => {}; /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */
21950
+ () => {} /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */;
21835
21951
  setMainLoop(iterFunc, fps, simulateInfiniteLoop);
21836
21952
  };
21837
21953
  _emscripten_set_main_loop.sig = 'vpii';
@@ -21843,8 +21959,10 @@ export function init(RuntimeName, PHPLoader) {
21843
21959
  simulateInfiniteLoop
21844
21960
  ) => {
21845
21961
  var iterFunc = () =>
21846
- ((a1) => {})(
21847
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
21962
+ ((
21963
+ a1
21964
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21965
+ arg
21848
21966
  );
21849
21967
  setMainLoop(iterFunc, fps, simulateInfiniteLoop, arg);
21850
21968
  };
@@ -21865,8 +21983,10 @@ export function init(RuntimeName, PHPLoader) {
21865
21983
  var __emscripten_push_main_loop_blocker = (func, arg, name) => {
21866
21984
  MainLoop.queue.push({
21867
21985
  func: () => {
21868
- ((a1) => {})(
21869
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
21986
+ ((
21987
+ a1
21988
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21989
+ arg
21870
21990
  );
21871
21991
  },
21872
21992
  name: UTF8ToString(name),
@@ -21879,8 +21999,10 @@ export function init(RuntimeName, PHPLoader) {
21879
21999
  var __emscripten_push_uncounted_main_loop_blocker = (func, arg, name) => {
21880
22000
  MainLoop.queue.push({
21881
22001
  func: () => {
21882
- ((a1) => {})(
21883
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
22002
+ ((
22003
+ a1
22004
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22005
+ arg
21884
22006
  );
21885
22007
  },
21886
22008
  name: UTF8ToString(name),
@@ -21914,8 +22036,12 @@ export function init(RuntimeName, PHPLoader) {
21914
22036
  var resultPtr = stackAlloc(POINTER_SIZE);
21915
22037
  HEAPU32[resultPtr >> 2] = 0;
21916
22038
  try {
21917
- var result = ((a1, a2, a3) => {})(
21918
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ resultPtr,
22039
+ var result = ((
22040
+ a1,
22041
+ a2,
22042
+ a3
22043
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22044
+ resultPtr,
21919
22045
  userData,
21920
22046
  value
21921
22047
  );
@@ -22752,15 +22878,19 @@ export function init(RuntimeName, PHPLoader) {
22752
22878
  () => {
22753
22879
  runtimeKeepalivePop();
22754
22880
  if (onload)
22755
- ((a1) => {})(
22756
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file
22881
+ ((
22882
+ a1
22883
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22884
+ file
22757
22885
  );
22758
22886
  },
22759
22887
  () => {
22760
22888
  runtimeKeepalivePop();
22761
22889
  if (onerror)
22762
- ((a1) => {})(
22763
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file
22890
+ ((
22891
+ a1
22892
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22893
+ file
22764
22894
  );
22765
22895
  },
22766
22896
  true // don'tCreateFile - it's already there
@@ -22794,16 +22924,21 @@ export function init(RuntimeName, PHPLoader) {
22794
22924
  () => {
22795
22925
  runtimeKeepalivePop();
22796
22926
  if (onload)
22797
- ((a1, a2) => {})(
22798
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
22927
+ ((
22928
+ a1,
22929
+ a2
22930
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22931
+ arg,
22799
22932
  cname
22800
22933
  );
22801
22934
  },
22802
22935
  () => {
22803
22936
  runtimeKeepalivePop();
22804
22937
  if (onerror)
22805
- ((a1) => {})(
22806
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
22938
+ ((
22939
+ a1
22940
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22941
+ arg
22807
22942
  );
22808
22943
  },
22809
22944
  true // don'tCreateFile - it's already there
@@ -23071,10 +23206,10 @@ export function init(RuntimeName, PHPLoader) {
23071
23206
  runtimeKeepalivePop();
23072
23207
  callUserCallback(() =>
23073
23208
  withStackSave(() =>
23074
- ((a1) => {})(
23075
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stringToUTF8OnStack(
23076
- _file
23077
- )
23209
+ ((
23210
+ a1
23211
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23212
+ stringToUTF8OnStack(_file)
23078
23213
  )
23079
23214
  )
23080
23215
  );
@@ -23118,8 +23253,12 @@ export function init(RuntimeName, PHPLoader) {
23118
23253
  callUserCallback(() => {
23119
23254
  var buffer = _malloc(byteArray.length);
23120
23255
  HEAPU8.set(byteArray, buffer);
23121
- ((a1, a2, a3) => {})(
23122
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata,
23256
+ ((
23257
+ a1,
23258
+ a2,
23259
+ a3
23260
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23261
+ userdata,
23123
23262
  buffer,
23124
23263
  byteArray.length
23125
23264
  );
@@ -23129,8 +23268,10 @@ export function init(RuntimeName, PHPLoader) {
23129
23268
  if (onerror) {
23130
23269
  runtimeKeepalivePop();
23131
23270
  callUserCallback(() => {
23132
- ((a1) => {})(
23133
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata
23271
+ ((
23272
+ a1
23273
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23274
+ userdata
23134
23275
  );
23135
23276
  });
23136
23277
  }
@@ -23186,8 +23327,12 @@ export function init(RuntimeName, PHPLoader) {
23186
23327
  );
23187
23328
  if (onload) {
23188
23329
  var sp = stackSave();
23189
- ((a1, a2, a3) => {})(
23190
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
23330
+ ((
23331
+ a1,
23332
+ a2,
23333
+ a3
23334
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23335
+ handle,
23191
23336
  userdata,
23192
23337
  stringToUTF8OnStack(_file)
23193
23338
  );
@@ -23195,8 +23340,12 @@ export function init(RuntimeName, PHPLoader) {
23195
23340
  }
23196
23341
  } else {
23197
23342
  if (onerror)
23198
- ((a1, a2, a3) => {})(
23199
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
23343
+ ((
23344
+ a1,
23345
+ a2,
23346
+ a3
23347
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23348
+ handle,
23200
23349
  userdata,
23201
23350
  http.status
23202
23351
  );
@@ -23209,8 +23358,12 @@ export function init(RuntimeName, PHPLoader) {
23209
23358
  http.onerror = (e) => {
23210
23359
  runtimeKeepalivePop();
23211
23360
  if (onerror)
23212
- ((a1, a2, a3) => {})(
23213
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
23361
+ ((
23362
+ a1,
23363
+ a2,
23364
+ a3
23365
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23366
+ handle,
23214
23367
  userdata,
23215
23368
  http.status
23216
23369
  );
@@ -23225,8 +23378,12 @@ export function init(RuntimeName, PHPLoader) {
23225
23378
  ) {
23226
23379
  var percentComplete = (e.loaded / e.total) * 100;
23227
23380
  if (onprogress)
23228
- ((a1, a2, a3) => {})(
23229
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
23381
+ ((
23382
+ a1,
23383
+ a2,
23384
+ a3
23385
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23386
+ handle,
23230
23387
  userdata,
23231
23388
  percentComplete
23232
23389
  );
@@ -23283,8 +23440,13 @@ export function init(RuntimeName, PHPLoader) {
23283
23440
  if (http.statusText) {
23284
23441
  statusText = stringToUTF8OnStack(http.statusText);
23285
23442
  }
23286
- ((a1, a2, a3, a4) => {})(
23287
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
23443
+ ((
23444
+ a1,
23445
+ a2,
23446
+ a3,
23447
+ a4
23448
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23449
+ handle,
23288
23450
  userdata,
23289
23451
  http.status,
23290
23452
  statusText
@@ -23305,8 +23467,13 @@ export function init(RuntimeName, PHPLoader) {
23305
23467
  var buffer = _malloc(byteArray.length);
23306
23468
  HEAPU8.set(byteArray, buffer);
23307
23469
  if (onload)
23308
- ((a1, a2, a3, a4) => {})(
23309
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
23470
+ ((
23471
+ a1,
23472
+ a2,
23473
+ a3,
23474
+ a4
23475
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23476
+ handle,
23310
23477
  userdata,
23311
23478
  buffer,
23312
23479
  byteArray.length
@@ -23327,8 +23494,13 @@ export function init(RuntimeName, PHPLoader) {
23327
23494
  // PROGRESS
23328
23495
  http.onprogress = (e) => {
23329
23496
  if (onprogress)
23330
- ((a1, a2, a3, a4) => {})(
23331
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
23497
+ ((
23498
+ a1,
23499
+ a2,
23500
+ a3,
23501
+ a4
23502
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23503
+ handle,
23332
23504
  userdata,
23333
23505
  e.loaded,
23334
23506
  e.lengthComputable || e.lengthComputable === undefined
@@ -23659,16 +23831,24 @@ export function init(RuntimeName, PHPLoader) {
23659
23831
  if (event === 'error') {
23660
23832
  withStackSave(() => {
23661
23833
  var msg = stringToUTF8OnStack(data[2]);
23662
- ((a1, a2, a3, a4) => {})(
23663
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data[0],
23834
+ ((
23835
+ a1,
23836
+ a2,
23837
+ a3,
23838
+ a4
23839
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23840
+ data[0],
23664
23841
  data[1],
23665
23842
  msg,
23666
23843
  userData
23667
23844
  );
23668
23845
  });
23669
23846
  } else {
23670
- ((a1, a2) => {})(
23671
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data,
23847
+ ((
23848
+ a1,
23849
+ a2
23850
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23851
+ data,
23672
23852
  userData
23673
23853
  );
23674
23854
  }
@@ -24621,8 +24801,12 @@ export function init(RuntimeName, PHPLoader) {
24621
24801
  ) => {
24622
24802
  var webGlEventHandlerFunc = (e = event) => {
24623
24803
  if (
24624
- ((a1, a2, a3) => {})(
24625
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
24804
+ ((
24805
+ a1,
24806
+ a2,
24807
+ a3
24808
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24809
+ eventTypeId,
24626
24810
  0,
24627
24811
  userData
24628
24812
  )
@@ -24841,15 +25025,21 @@ export function init(RuntimeName, PHPLoader) {
24841
25025
  ) {
24842
25026
  event.preventDefault();
24843
25027
  GLUT.saveModifiers(event);
24844
- ((a1, a2) => {})(
24845
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX,
25028
+ ((
25029
+ a1,
25030
+ a2
25031
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25032
+ lastX,
24846
25033
  lastY
24847
25034
  );
24848
25035
  } else if (GLUT.buttons != 0 && GLUT.motionFunc) {
24849
25036
  event.preventDefault();
24850
25037
  GLUT.saveModifiers(event);
24851
- ((a1, a2) => {})(
24852
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX,
25038
+ ((
25039
+ a1,
25040
+ a2
25041
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25042
+ lastX,
24853
25043
  lastY
24854
25044
  );
24855
25045
  }
@@ -25010,8 +25200,12 @@ export function init(RuntimeName, PHPLoader) {
25010
25200
  if (GLUT.specialFunc) {
25011
25201
  event.preventDefault();
25012
25202
  GLUT.saveModifiers(event);
25013
- ((a1, a2, a3) => {})(
25014
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
25203
+ ((
25204
+ a1,
25205
+ a2,
25206
+ a3
25207
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25208
+ key,
25015
25209
  Browser.mouseX,
25016
25210
  Browser.mouseY
25017
25211
  );
@@ -25021,8 +25215,12 @@ export function init(RuntimeName, PHPLoader) {
25021
25215
  if (key !== null && GLUT.keyboardFunc) {
25022
25216
  event.preventDefault();
25023
25217
  GLUT.saveModifiers(event);
25024
- ((a1, a2, a3) => {})(
25025
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
25218
+ ((
25219
+ a1,
25220
+ a2,
25221
+ a3
25222
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25223
+ key,
25026
25224
  Browser.mouseX,
25027
25225
  Browser.mouseY
25028
25226
  );
@@ -25037,8 +25235,12 @@ export function init(RuntimeName, PHPLoader) {
25037
25235
  if (GLUT.specialUpFunc) {
25038
25236
  event.preventDefault();
25039
25237
  GLUT.saveModifiers(event);
25040
- ((a1, a2, a3) => {})(
25041
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
25238
+ ((
25239
+ a1,
25240
+ a2,
25241
+ a3
25242
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25243
+ key,
25042
25244
  Browser.mouseX,
25043
25245
  Browser.mouseY
25044
25246
  );
@@ -25048,8 +25250,12 @@ export function init(RuntimeName, PHPLoader) {
25048
25250
  if (key !== null && GLUT.keyboardUpFunc) {
25049
25251
  event.preventDefault();
25050
25252
  GLUT.saveModifiers(event);
25051
- ((a1, a2, a3) => {})(
25052
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
25253
+ ((
25254
+ a1,
25255
+ a2,
25256
+ a3
25257
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25258
+ key,
25053
25259
  Browser.mouseX,
25054
25260
  Browser.mouseY
25055
25261
  );
@@ -25113,10 +25319,13 @@ export function init(RuntimeName, PHPLoader) {
25113
25319
  } catch (e) {}
25114
25320
  event.preventDefault();
25115
25321
  GLUT.saveModifiers(event);
25116
- ((a1, a2, a3, a4) => {})(
25117
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[
25118
- 'button'
25119
- ],
25322
+ ((
25323
+ a1,
25324
+ a2,
25325
+ a3,
25326
+ a4
25327
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25328
+ event['button'],
25120
25329
  0 /*GLUT_DOWN*/,
25121
25330
  Browser.mouseX,
25122
25331
  Browser.mouseY
@@ -25131,10 +25340,13 @@ export function init(RuntimeName, PHPLoader) {
25131
25340
  if (GLUT.mouseFunc) {
25132
25341
  event.preventDefault();
25133
25342
  GLUT.saveModifiers(event);
25134
- ((a1, a2, a3, a4) => {})(
25135
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[
25136
- 'button'
25137
- ],
25343
+ ((
25344
+ a1,
25345
+ a2,
25346
+ a3,
25347
+ a4
25348
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25349
+ event['button'],
25138
25350
  1 /*GLUT_UP*/,
25139
25351
  Browser.mouseX,
25140
25352
  Browser.mouseY
@@ -25163,8 +25375,13 @@ export function init(RuntimeName, PHPLoader) {
25163
25375
  if (GLUT.mouseFunc) {
25164
25376
  event.preventDefault();
25165
25377
  GLUT.saveModifiers(event);
25166
- ((a1, a2, a3, a4) => {})(
25167
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ button,
25378
+ ((
25379
+ a1,
25380
+ a2,
25381
+ a3,
25382
+ a4
25383
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25384
+ button,
25168
25385
  0 /*GLUT_DOWN*/,
25169
25386
  Browser.mouseX,
25170
25387
  Browser.mouseY
@@ -25202,8 +25419,11 @@ export function init(RuntimeName, PHPLoader) {
25202
25419
  /* Can't call _glutReshapeWindow as that requests cancelling fullscreen. */
25203
25420
  if (GLUT.reshapeFunc) {
25204
25421
  // out("GLUT.reshapeFunc (from FS): " + width + ", " + height);
25205
- ((a1, a2) => {})(
25206
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
25422
+ ((
25423
+ a1,
25424
+ a2
25425
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25426
+ width,
25207
25427
  height
25208
25428
  );
25209
25429
  }
@@ -25259,8 +25479,11 @@ export function init(RuntimeName, PHPLoader) {
25259
25479
  // Resize callback stage 2: updateResizeListeners notifies reshapeFunc
25260
25480
  Browser.resizeListeners.push((width, height) => {
25261
25481
  if (GLUT.reshapeFunc) {
25262
- ((a1, a2) => {})(
25263
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
25482
+ ((
25483
+ a1,
25484
+ a2
25485
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25486
+ width,
25264
25487
  height
25265
25488
  );
25266
25489
  }
@@ -25375,8 +25598,10 @@ export function init(RuntimeName, PHPLoader) {
25375
25598
  var _glutTimerFunc = (msec, func, value) =>
25376
25599
  safeSetTimeout(
25377
25600
  () =>
25378
- ((a1) => {})(
25379
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ value
25601
+ ((
25602
+ a1
25603
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25604
+ value
25380
25605
  ),
25381
25606
  msec
25382
25607
  );
@@ -25536,8 +25761,11 @@ export function init(RuntimeName, PHPLoader) {
25536
25761
  Browser.setCanvasSize(width, height, true); // N.B. GLUT.reshapeFunc is also registered as a canvas resize callback.
25537
25762
  // Just call it once here.
25538
25763
  if (GLUT.reshapeFunc) {
25539
- ((a1, a2) => {})(
25540
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
25764
+ ((
25765
+ a1,
25766
+ a2
25767
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25768
+ width,
25541
25769
  height
25542
25770
  );
25543
25771
  }
@@ -26591,15 +26819,21 @@ export function init(RuntimeName, PHPLoader) {
26591
26819
  callUserCallback(() => {
26592
26820
  if (error) {
26593
26821
  if (onerror)
26594
- ((a1) => {})(
26595
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26822
+ ((
26823
+ a1
26824
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26825
+ arg
26596
26826
  );
26597
26827
  return;
26598
26828
  }
26599
26829
  var buffer = _malloc(byteArray.length);
26600
26830
  HEAPU8.set(byteArray, buffer);
26601
- ((a1, a2, a3) => {})(
26602
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
26831
+ ((
26832
+ a1,
26833
+ a2,
26834
+ a3
26835
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26836
+ arg,
26603
26837
  buffer,
26604
26838
  byteArray.length
26605
26839
  );
@@ -26631,14 +26865,18 @@ export function init(RuntimeName, PHPLoader) {
26631
26865
  callUserCallback(() => {
26632
26866
  if (error) {
26633
26867
  if (onerror)
26634
- ((a1) => {})(
26635
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26868
+ ((
26869
+ a1
26870
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26871
+ arg
26636
26872
  );
26637
26873
  return;
26638
26874
  }
26639
26875
  if (onstore)
26640
- ((a1) => {})(
26641
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26876
+ ((
26877
+ a1
26878
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26879
+ arg
26642
26880
  );
26643
26881
  });
26644
26882
  }
@@ -26653,14 +26891,18 @@ export function init(RuntimeName, PHPLoader) {
26653
26891
  callUserCallback(() => {
26654
26892
  if (error) {
26655
26893
  if (onerror)
26656
- ((a1) => {})(
26657
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26894
+ ((
26895
+ a1
26896
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26897
+ arg
26658
26898
  );
26659
26899
  return;
26660
26900
  }
26661
26901
  if (ondelete)
26662
- ((a1) => {})(
26663
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26902
+ ((
26903
+ a1
26904
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26905
+ arg
26664
26906
  );
26665
26907
  });
26666
26908
  });
@@ -26677,14 +26919,19 @@ export function init(RuntimeName, PHPLoader) {
26677
26919
  callUserCallback(() => {
26678
26920
  if (error) {
26679
26921
  if (onerror)
26680
- ((a1) => {})(
26681
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26922
+ ((
26923
+ a1
26924
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26925
+ arg
26682
26926
  );
26683
26927
  return;
26684
26928
  }
26685
26929
  if (oncheck)
26686
- ((a1, a2) => {})(
26687
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
26930
+ ((
26931
+ a1,
26932
+ a2
26933
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26934
+ arg,
26688
26935
  exists
26689
26936
  );
26690
26937
  });
@@ -26700,14 +26947,18 @@ export function init(RuntimeName, PHPLoader) {
26700
26947
  callUserCallback(() => {
26701
26948
  if (error) {
26702
26949
  if (onerror)
26703
- ((a1) => {})(
26704
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26950
+ ((
26951
+ a1
26952
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26953
+ arg
26705
26954
  );
26706
26955
  return;
26707
26956
  }
26708
26957
  if (onclear)
26709
- ((a1) => {})(
26710
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26958
+ ((
26959
+ a1
26960
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26961
+ arg
26711
26962
  );
26712
26963
  });
26713
26964
  });
@@ -26864,8 +27115,11 @@ export function init(RuntimeName, PHPLoader) {
26864
27115
  safeSetTimeout(() => {
26865
27116
  var stackBegin = Asyncify.currData + 12;
26866
27117
  var stackEnd = HEAPU32[Asyncify.currData >> 2];
26867
- ((a1, a2) => {})(
26868
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stackBegin,
27118
+ ((
27119
+ a1,
27120
+ a2
27121
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27122
+ stackBegin,
26869
27123
  stackEnd
26870
27124
  );
26871
27125
  wakeUp();
@@ -26914,8 +27168,10 @@ export function init(RuntimeName, PHPLoader) {
26914
27168
  HEAPU32[(newFiber + 12) >> 2] = 0;
26915
27169
 
26916
27170
  var userData = HEAPU32[(newFiber + 16) >> 2];
26917
- ((a1) => {})(
26918
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
27171
+ ((
27172
+ a1
27173
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27174
+ userData
26919
27175
  );
26920
27176
  } else {
26921
27177
  var asyncifyData = newFiber + 20;
@@ -27926,8 +28182,11 @@ export function init(RuntimeName, PHPLoader) {
27926
28182
  if (!SDL.eventHandler) return;
27927
28183
 
27928
28184
  while (SDL.pollEvent(SDL.eventHandlerTemp)) {
27929
- ((a1, a2) => {})(
27930
- /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL.eventHandlerContext,
28185
+ ((
28186
+ a1,
28187
+ a2
28188
+ ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
28189
+ SDL.eventHandlerContext,
27931
28190
  SDL.eventHandlerTemp
27932
28191
  );
27933
28192
  }
@@ -29551,9 +29810,12 @@ export function init(RuntimeName, PHPLoader) {
29551
29810
  return;
29552
29811
 
29553
29812
  // Ask SDL audio data from the user code.
29554
- ((a1, a2, a3) => {})(
29555
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL
29556
- .audio.userdata,
29813
+ ((
29814
+ a1,
29815
+ a2,
29816
+ a3
29817
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
29818
+ SDL.audio.userdata,
29557
29819
  SDL.audio.buffer,
29558
29820
  SDL.audio.bufferSize
29559
29821
  );
@@ -30011,8 +30273,10 @@ export function init(RuntimeName, PHPLoader) {
30011
30273
  info.audio = null;
30012
30274
  }
30013
30275
  if (SDL.channelFinished) {
30014
- ((a1) => {})(
30015
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel
30276
+ ((
30277
+ a1
30278
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
30279
+ channel
30016
30280
  );
30017
30281
  }
30018
30282
  }
@@ -30080,8 +30344,10 @@ export function init(RuntimeName, PHPLoader) {
30080
30344
  channelInfo.audio = null;
30081
30345
  }
30082
30346
  if (SDL.channelFinished)
30083
- ((a1) => {})(
30084
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel
30347
+ ((
30348
+ a1
30349
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
30350
+ channel
30085
30351
  );
30086
30352
  };
30087
30353
  if (channelInfo.audio) {
@@ -30816,8 +31082,11 @@ export function init(RuntimeName, PHPLoader) {
30816
31082
  var _SDL_AddTimer = (interval, callback, param) =>
30817
31083
  safeSetTimeout(
30818
31084
  () =>
30819
- ((a1, a2) => {})(
30820
- /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ interval,
31085
+ ((
31086
+ a1,
31087
+ a2
31088
+ ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31089
+ interval,
30821
31090
  param
30822
31091
  ),
30823
31092
  interval
@@ -31198,8 +31467,12 @@ export function init(RuntimeName, PHPLoader) {
31198
31467
 
31199
31468
  socket.onopen = function (e) {
31200
31469
  var eventPtr = WS.getSocketEvent(socketId);
31201
- ((a1, a2, a3) => {})(
31202
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31470
+ ((
31471
+ a1,
31472
+ a2,
31473
+ a3
31474
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31475
+ 0 /*TODO*/,
31203
31476
  eventPtr,
31204
31477
  userData
31205
31478
  );
@@ -31221,8 +31494,12 @@ export function init(RuntimeName, PHPLoader) {
31221
31494
 
31222
31495
  socket.onerror = function (e) {
31223
31496
  var eventPtr = WS.getSocketEvent(socketId);
31224
- ((a1, a2, a3) => {})(
31225
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31497
+ ((
31498
+ a1,
31499
+ a2,
31500
+ a3
31501
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31502
+ 0 /*TODO*/,
31226
31503
  eventPtr,
31227
31504
  userData
31228
31505
  );
@@ -31247,8 +31524,12 @@ export function init(RuntimeName, PHPLoader) {
31247
31524
  ((HEAP8[eventPtr + 4] = e.wasClean),
31248
31525
  (HEAP16[(eventPtr + 6) >> 1] = e.code),
31249
31526
  stringToUTF8(e.reason, eventPtr + 8, 512));
31250
- ((a1, a2, a3) => {})(
31251
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31527
+ ((
31528
+ a1,
31529
+ a2,
31530
+ a3
31531
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31532
+ 0 /*TODO*/,
31252
31533
  eventPtr,
31253
31534
  userData
31254
31535
  );
@@ -31282,8 +31563,12 @@ export function init(RuntimeName, PHPLoader) {
31282
31563
  ((HEAPU32[(eventPtr + 4) >> 2] = buf),
31283
31564
  (HEAP32[(eventPtr + 8) >> 2] = len),
31284
31565
  (HEAP8[eventPtr + 12] = isText),
31285
- ((a1, a2, a3) => {})(
31286
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31566
+ ((
31567
+ a1,
31568
+ a2,
31569
+ a3
31570
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31571
+ 0 /*TODO*/,
31287
31572
  eventPtr,
31288
31573
  userData
31289
31574
  ));
@@ -31525,13 +31810,13 @@ export function init(RuntimeName, PHPLoader) {
31525
31810
  // end include: postlibrary.js
31526
31811
 
31527
31812
  var ASM_CONSTS = {
31528
- 11305409: ($0) => {
31813
+ 11305393: ($0) => {
31529
31814
  if (!$0) {
31530
31815
  AL.alcErr = 0xa004;
31531
31816
  return 1;
31532
31817
  }
31533
31818
  },
31534
- 11305457: ($0) => {
31819
+ 11305441: ($0) => {
31535
31820
  if (!AL.currentCtx) {
31536
31821
  err('alGetProcAddress() called without a valid context');
31537
31822
  return 1;
@@ -32014,7 +32299,7 @@ export function init(RuntimeName, PHPLoader) {
32014
32299
  wasmExports['__indirect_function_table'];
32015
32300
  }
32016
32301
 
32017
- var ___heap_base = 12520384;
32302
+ var ___heap_base = 12520320;
32018
32303
 
32019
32304
  var wasmImports = {
32020
32305
  /** @export */