@php-wasm/node 2.0.4 → 2.0.7
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/asyncify/7_2_34/php_7_2.wasm +0 -0
- package/asyncify/7_3_33/php_7_3.wasm +0 -0
- package/asyncify/7_4_33/php_7_4.wasm +0 -0
- package/asyncify/8_0_30/php_8_0.wasm +0 -0
- package/asyncify/8_1_33/php_8_1.wasm +0 -0
- package/asyncify/8_2_29/php_8_2.wasm +0 -0
- package/asyncify/8_3_23/php_8_3.wasm +0 -0
- package/asyncify/8_3_24/php_8_3.wasm +0 -0
- package/asyncify/8_4_10/php_8_4.wasm +0 -0
- package/asyncify/8_4_11/php_8_4.wasm +0 -0
- package/asyncify/php_7_2.js +512 -223
- package/asyncify/php_7_3.js +509 -220
- package/asyncify/php_7_4.js +516 -227
- package/asyncify/php_8_0.js +509 -220
- package/asyncify/php_8_1.js +509 -220
- package/asyncify/php_8_2.js +509 -220
- package/asyncify/php_8_3.js +519 -230
- package/asyncify/php_8_4.js +515 -226
- package/index.cjs +657 -1191
- package/index.js +657 -1191
- package/jspi/7_2_34/php_7_2.wasm +0 -0
- package/jspi/7_3_33/php_7_3.wasm +0 -0
- package/jspi/7_4_33/php_7_4.wasm +0 -0
- package/jspi/8_0_30/php_8_0.wasm +0 -0
- package/jspi/8_1_33/php_8_1.wasm +0 -0
- package/jspi/8_2_29/php_8_2.wasm +0 -0
- package/jspi/8_3_23/php_8_3.wasm +0 -0
- package/jspi/8_3_24/php_8_3.wasm +0 -0
- package/jspi/8_4_10/php_8_4.wasm +0 -0
- package/jspi/8_4_11/php_8_4.wasm +0 -0
- package/jspi/php_7_2.js +42 -36
- package/jspi/php_7_3.js +42 -36
- package/jspi/php_7_4.js +42 -36
- package/jspi/php_8_0.js +42 -36
- package/jspi/php_8_1.js +42 -36
- package/jspi/php_8_2.js +42 -36
- package/jspi/php_8_3.js +48 -42
- package/jspi/php_8_4.js +48 -42
- package/lib/file-lock-manager-for-node.d.ts +9 -2
- package/lib/load-runtime.d.ts +2 -1
- package/package.json +7 -7
package/asyncify/php_7_2.js
CHANGED
|
@@ -8,7 +8,7 @@ import path from 'path';
|
|
|
8
8
|
|
|
9
9
|
const dependencyFilename = path.join(__dirname, '7_2_34', 'php_7_2.wasm');
|
|
10
10
|
export { dependencyFilename };
|
|
11
|
-
export const dependenciesTotalSize =
|
|
11
|
+
export const dependenciesTotalSize = 29379142;
|
|
12
12
|
const phpVersionString = '7.2.34';
|
|
13
13
|
export function init(RuntimeName, PHPLoader) {
|
|
14
14
|
// The rest of the code comes from the built php.js file and esm-suffix.js
|
|
@@ -1774,8 +1774,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
1774
1774
|
);
|
|
1775
1775
|
|
|
1776
1776
|
var ___call_sighandler = (fp, sig) =>
|
|
1777
|
-
((
|
|
1778
|
-
|
|
1777
|
+
((
|
|
1778
|
+
a1
|
|
1779
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
1780
|
+
sig
|
|
1779
1781
|
);
|
|
1780
1782
|
___call_sighandler.sig = 'vpi';
|
|
1781
1783
|
|
|
@@ -7101,35 +7103,25 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
7101
7103
|
1: 'exclusive',
|
|
7102
7104
|
2: 'unlocked',
|
|
7103
7105
|
},
|
|
7104
|
-
|
|
7105
|
-
|
|
7106
|
-
|
|
7107
|
-
|
|
7108
|
-
|
|
7109
|
-
|
|
7110
|
-
|
|
7111
|
-
|
|
7112
|
-
|
|
7113
|
-
|
|
7114
|
-
|
|
7106
|
+
is_path_to_shared_fs(path) {
|
|
7107
|
+
_js_wasm_trace('is_path_to_shared_fs(%s)', path);
|
|
7108
|
+
const { node } = FS.lookupPath(path, { noent_okay: true });
|
|
7109
|
+
if (node.mount.type !== PROXYFS) {
|
|
7110
|
+
return !!node.isSharedFS;
|
|
7111
|
+
}
|
|
7112
|
+
|
|
7113
|
+
// This looks like a PROXYFS node. Let's try a lookup.
|
|
7114
|
+
const nodePath = PROXYFS.realPath(node);
|
|
7115
|
+
const backingFs = node?.mount?.opts?.fs;
|
|
7116
|
+
if (backingFs) {
|
|
7117
|
+
// Tolerate ENOENT because looking up a MEMFS node by path always fails.
|
|
7118
|
+
const { node: backingNode } = backingFs.lookupPath(nodePath, {
|
|
7119
|
+
noent_okay: true,
|
|
7120
|
+
});
|
|
7121
|
+
return !!backingNode?.isSharedFS;
|
|
7115
7122
|
}
|
|
7116
7123
|
|
|
7117
|
-
|
|
7118
|
-
if (node.mount.type !== NODEFS) {
|
|
7119
|
-
return false;
|
|
7120
|
-
}
|
|
7121
|
-
const vfsPath = node.mount.type.realPath(node);
|
|
7122
|
-
try {
|
|
7123
|
-
const underlyingNode =
|
|
7124
|
-
node.mount.opts.fs.lookupPath(vfsPath)?.node;
|
|
7125
|
-
return !!underlyingNode?.isSharedFS;
|
|
7126
|
-
} catch (e) {
|
|
7127
|
-
return false;
|
|
7128
|
-
}
|
|
7129
|
-
},
|
|
7130
|
-
is_path_to_shared_fs(path) {
|
|
7131
|
-
const { node } = FS.lookupPath(path);
|
|
7132
|
-
return locking.is_shared_fs_node(node);
|
|
7124
|
+
return false;
|
|
7133
7125
|
},
|
|
7134
7126
|
get_fd_access_mode(fd) {
|
|
7135
7127
|
const emscripten_F_GETFL = Number('3');
|
|
@@ -7147,8 +7139,26 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
7147
7139
|
}
|
|
7148
7140
|
},
|
|
7149
7141
|
get_native_path_from_vfs_path(vfsPath) {
|
|
7150
|
-
|
|
7151
|
-
|
|
7142
|
+
// TODO: Should there be a try/catch here?
|
|
7143
|
+
const { node } = FS.lookupPath(vfsPath, {});
|
|
7144
|
+
if (node.mount.type === NODEFS) {
|
|
7145
|
+
return NODEFS.realPath(node);
|
|
7146
|
+
} else if (node.mount.type === PROXYFS) {
|
|
7147
|
+
// TODO: Tolerate ENOENT here?
|
|
7148
|
+
const { node: backingNode, path: backingPath } =
|
|
7149
|
+
node.mount.opts.fs.lookupPath(vfsPath);
|
|
7150
|
+
_js_wasm_trace(
|
|
7151
|
+
'backingNode for %s: %s',
|
|
7152
|
+
vfsPath,
|
|
7153
|
+
backingPath,
|
|
7154
|
+
backingNode
|
|
7155
|
+
);
|
|
7156
|
+
return backingNode.mount.type.realPath(backingNode);
|
|
7157
|
+
} else {
|
|
7158
|
+
throw new Error(
|
|
7159
|
+
`Unsupported filesystem type for path ${vfsPath}`
|
|
7160
|
+
);
|
|
7161
|
+
}
|
|
7152
7162
|
},
|
|
7153
7163
|
check_lock_params(fd, l_type) {
|
|
7154
7164
|
const emscripten_O_RDONLY = Number('0');
|
|
@@ -7348,6 +7358,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
7348
7358
|
return -ERRNO_CODES.EBADF;
|
|
7349
7359
|
}
|
|
7350
7360
|
|
|
7361
|
+
const flockStructAddr = syscallGetVarargP();
|
|
7362
|
+
|
|
7351
7363
|
if (!locking.is_path_to_shared_fs(vfsPath)) {
|
|
7352
7364
|
_js_wasm_trace(
|
|
7353
7365
|
"fcntl(%d, F_GETLK) locking is not implemented for non-NodeFS path '%s'",
|
|
@@ -7363,7 +7375,6 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
7363
7375
|
return 0;
|
|
7364
7376
|
}
|
|
7365
7377
|
|
|
7366
|
-
const flockStructAddr = syscallGetVarargP();
|
|
7367
7378
|
const flockStruct = read_flock_struct(flockStructAddr);
|
|
7368
7379
|
|
|
7369
7380
|
if (!(flockStruct.l_type in locking.fcntlToLockState)) {
|
|
@@ -8791,8 +8802,11 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
8791
8802
|
dlSetError(`'Could not load dynamic lib: ${filename}\n${e}`);
|
|
8792
8803
|
runtimeKeepalivePop();
|
|
8793
8804
|
callUserCallback(() =>
|
|
8794
|
-
((
|
|
8795
|
-
|
|
8805
|
+
((
|
|
8806
|
+
a1,
|
|
8807
|
+
a2
|
|
8808
|
+
) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
8809
|
+
handle,
|
|
8796
8810
|
user_data
|
|
8797
8811
|
)
|
|
8798
8812
|
);
|
|
@@ -8800,8 +8814,11 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
8800
8814
|
function successCallback() {
|
|
8801
8815
|
runtimeKeepalivePop();
|
|
8802
8816
|
callUserCallback(() =>
|
|
8803
|
-
((
|
|
8804
|
-
|
|
8817
|
+
((
|
|
8818
|
+
a1,
|
|
8819
|
+
a2
|
|
8820
|
+
) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
8821
|
+
handle,
|
|
8805
8822
|
user_data
|
|
8806
8823
|
)
|
|
8807
8824
|
);
|
|
@@ -19459,8 +19476,11 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
19459
19476
|
var trace = getCallstack();
|
|
19460
19477
|
var parts = trace.split('\n');
|
|
19461
19478
|
for (var i = 0; i < parts.length; i++) {
|
|
19462
|
-
var ret = ((
|
|
19463
|
-
|
|
19479
|
+
var ret = ((
|
|
19480
|
+
a1,
|
|
19481
|
+
a2
|
|
19482
|
+
) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
19483
|
+
0,
|
|
19464
19484
|
arg
|
|
19465
19485
|
);
|
|
19466
19486
|
if (ret !== 0) return;
|
|
@@ -20036,8 +20056,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
20036
20056
|
stringToUTF8(e.locale || '', keyEventData + 128, 32);
|
|
20037
20057
|
|
|
20038
20058
|
if (
|
|
20039
|
-
((
|
|
20040
|
-
|
|
20059
|
+
((
|
|
20060
|
+
a1,
|
|
20061
|
+
a2,
|
|
20062
|
+
a3
|
|
20063
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
20064
|
+
eventTypeId,
|
|
20041
20065
|
keyEventData,
|
|
20042
20066
|
userData
|
|
20043
20067
|
)
|
|
@@ -20155,8 +20179,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
20155
20179
|
fillMouseEventData(JSEvents.mouseEvent, e, target);
|
|
20156
20180
|
|
|
20157
20181
|
if (
|
|
20158
|
-
((
|
|
20159
|
-
|
|
20182
|
+
((
|
|
20183
|
+
a1,
|
|
20184
|
+
a2,
|
|
20185
|
+
a3
|
|
20186
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
20187
|
+
eventTypeId,
|
|
20160
20188
|
JSEvents.mouseEvent,
|
|
20161
20189
|
userData
|
|
20162
20190
|
)
|
|
@@ -20370,8 +20398,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
20370
20398
|
HEAPF64[(wheelEvent + 80) >> 3] = e['deltaZ'];
|
|
20371
20399
|
HEAP32[(wheelEvent + 88) >> 2] = e['deltaMode'];
|
|
20372
20400
|
if (
|
|
20373
|
-
((
|
|
20374
|
-
|
|
20401
|
+
((
|
|
20402
|
+
a1,
|
|
20403
|
+
a2,
|
|
20404
|
+
a3
|
|
20405
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
20406
|
+
eventTypeId,
|
|
20375
20407
|
wheelEvent,
|
|
20376
20408
|
userData
|
|
20377
20409
|
)
|
|
@@ -20452,8 +20484,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
20452
20484
|
HEAP32[(uiEvent + 28) >> 2] = pageXOffset | 0; // scroll offsets are float
|
|
20453
20485
|
HEAP32[(uiEvent + 32) >> 2] = pageYOffset | 0;
|
|
20454
20486
|
if (
|
|
20455
|
-
((
|
|
20456
|
-
|
|
20487
|
+
((
|
|
20488
|
+
a1,
|
|
20489
|
+
a2,
|
|
20490
|
+
a3
|
|
20491
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
20492
|
+
eventTypeId,
|
|
20457
20493
|
uiEvent,
|
|
20458
20494
|
userData
|
|
20459
20495
|
)
|
|
@@ -20527,8 +20563,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
20527
20563
|
stringToUTF8(id, focusEvent + 128, 128);
|
|
20528
20564
|
|
|
20529
20565
|
if (
|
|
20530
|
-
((
|
|
20531
|
-
|
|
20566
|
+
((
|
|
20567
|
+
a1,
|
|
20568
|
+
a2,
|
|
20569
|
+
a3
|
|
20570
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
20571
|
+
eventTypeId,
|
|
20532
20572
|
focusEvent,
|
|
20533
20573
|
userData
|
|
20534
20574
|
)
|
|
@@ -20644,8 +20684,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
20644
20684
|
); // TODO: Thread-safety with respect to emscripten_get_deviceorientation_status()
|
|
20645
20685
|
|
|
20646
20686
|
if (
|
|
20647
|
-
((
|
|
20648
|
-
|
|
20687
|
+
((
|
|
20688
|
+
a1,
|
|
20689
|
+
a2,
|
|
20690
|
+
a3
|
|
20691
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
20692
|
+
eventTypeId,
|
|
20649
20693
|
JSEvents.deviceOrientationEvent,
|
|
20650
20694
|
userData
|
|
20651
20695
|
)
|
|
@@ -20728,8 +20772,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
20728
20772
|
fillDeviceMotionEventData(JSEvents.deviceMotionEvent, e, target); // TODO: Thread-safety with respect to emscripten_get_devicemotion_status()
|
|
20729
20773
|
|
|
20730
20774
|
if (
|
|
20731
|
-
((
|
|
20732
|
-
|
|
20775
|
+
((
|
|
20776
|
+
a1,
|
|
20777
|
+
a2,
|
|
20778
|
+
a3
|
|
20779
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
20780
|
+
eventTypeId,
|
|
20733
20781
|
JSEvents.deviceMotionEvent,
|
|
20734
20782
|
userData
|
|
20735
20783
|
)
|
|
@@ -20839,8 +20887,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
20839
20887
|
fillOrientationChangeEventData(orientationChangeEvent);
|
|
20840
20888
|
|
|
20841
20889
|
if (
|
|
20842
|
-
((
|
|
20843
|
-
|
|
20890
|
+
((
|
|
20891
|
+
a1,
|
|
20892
|
+
a2,
|
|
20893
|
+
a3
|
|
20894
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
20895
|
+
eventTypeId,
|
|
20844
20896
|
orientationChangeEvent,
|
|
20845
20897
|
userData
|
|
20846
20898
|
)
|
|
@@ -20973,8 +21025,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
20973
21025
|
fillFullscreenChangeEventData(fullscreenChangeEvent);
|
|
20974
21026
|
|
|
20975
21027
|
if (
|
|
20976
|
-
((
|
|
20977
|
-
|
|
21028
|
+
((
|
|
21029
|
+
a1,
|
|
21030
|
+
a2,
|
|
21031
|
+
a3
|
|
21032
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
21033
|
+
eventTypeId,
|
|
20978
21034
|
fullscreenChangeEvent,
|
|
20979
21035
|
userData
|
|
20980
21036
|
)
|
|
@@ -21138,8 +21194,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
21138
21194
|
);
|
|
21139
21195
|
|
|
21140
21196
|
if (currentFullscreenStrategy.canvasResizedCallback) {
|
|
21141
|
-
((
|
|
21142
|
-
|
|
21197
|
+
((
|
|
21198
|
+
a1,
|
|
21199
|
+
a2,
|
|
21200
|
+
a3
|
|
21201
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
21202
|
+
37,
|
|
21143
21203
|
0,
|
|
21144
21204
|
currentFullscreenStrategy.canvasResizedCallbackUserData
|
|
21145
21205
|
);
|
|
@@ -21245,8 +21305,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
21245
21305
|
currentFullscreenStrategy = strategy;
|
|
21246
21306
|
|
|
21247
21307
|
if (strategy.canvasResizedCallback) {
|
|
21248
|
-
((
|
|
21249
|
-
|
|
21308
|
+
((
|
|
21309
|
+
a1,
|
|
21310
|
+
a2,
|
|
21311
|
+
a3
|
|
21312
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
21313
|
+
37,
|
|
21250
21314
|
0,
|
|
21251
21315
|
strategy.canvasResizedCallbackUserData
|
|
21252
21316
|
);
|
|
@@ -21348,8 +21412,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
21348
21412
|
!inCenteredWithoutScalingFullscreenMode &&
|
|
21349
21413
|
currentFullscreenStrategy.canvasResizedCallback
|
|
21350
21414
|
) {
|
|
21351
|
-
((
|
|
21352
|
-
|
|
21415
|
+
((
|
|
21416
|
+
a1,
|
|
21417
|
+
a2,
|
|
21418
|
+
a3
|
|
21419
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
21420
|
+
37,
|
|
21353
21421
|
0,
|
|
21354
21422
|
currentFullscreenStrategy.canvasResizedCallbackUserData
|
|
21355
21423
|
);
|
|
@@ -21448,8 +21516,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
21448
21516
|
softFullscreenResizeWebGLRenderTarget
|
|
21449
21517
|
);
|
|
21450
21518
|
if (strategy.canvasResizedCallback) {
|
|
21451
|
-
((
|
|
21452
|
-
|
|
21519
|
+
((
|
|
21520
|
+
a1,
|
|
21521
|
+
a2,
|
|
21522
|
+
a3
|
|
21523
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
21524
|
+
37,
|
|
21453
21525
|
0,
|
|
21454
21526
|
strategy.canvasResizedCallbackUserData
|
|
21455
21527
|
);
|
|
@@ -21462,8 +21534,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
21462
21534
|
|
|
21463
21535
|
// Inform the caller that the canvas size has changed.
|
|
21464
21536
|
if (strategy.canvasResizedCallback) {
|
|
21465
|
-
((
|
|
21466
|
-
|
|
21537
|
+
((
|
|
21538
|
+
a1,
|
|
21539
|
+
a2,
|
|
21540
|
+
a3
|
|
21541
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
21542
|
+
37,
|
|
21467
21543
|
0,
|
|
21468
21544
|
strategy.canvasResizedCallbackUserData
|
|
21469
21545
|
);
|
|
@@ -21531,8 +21607,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
21531
21607
|
fillPointerlockChangeEventData(pointerlockChangeEvent);
|
|
21532
21608
|
|
|
21533
21609
|
if (
|
|
21534
|
-
((
|
|
21535
|
-
|
|
21610
|
+
((
|
|
21611
|
+
a1,
|
|
21612
|
+
a2,
|
|
21613
|
+
a3
|
|
21614
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
21615
|
+
eventTypeId,
|
|
21536
21616
|
pointerlockChangeEvent,
|
|
21537
21617
|
userData
|
|
21538
21618
|
)
|
|
@@ -21622,8 +21702,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
21622
21702
|
) => {
|
|
21623
21703
|
var pointerlockErrorEventHandlerFunc = (e = event) => {
|
|
21624
21704
|
if (
|
|
21625
|
-
((
|
|
21626
|
-
|
|
21705
|
+
((
|
|
21706
|
+
a1,
|
|
21707
|
+
a2,
|
|
21708
|
+
a3
|
|
21709
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
21710
|
+
eventTypeId,
|
|
21627
21711
|
0,
|
|
21628
21712
|
userData
|
|
21629
21713
|
)
|
|
@@ -21823,8 +21907,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
21823
21907
|
fillVisibilityChangeEventData(visibilityChangeEvent);
|
|
21824
21908
|
|
|
21825
21909
|
if (
|
|
21826
|
-
((
|
|
21827
|
-
|
|
21910
|
+
((
|
|
21911
|
+
a1,
|
|
21912
|
+
a2,
|
|
21913
|
+
a3
|
|
21914
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
21915
|
+
eventTypeId,
|
|
21828
21916
|
visibilityChangeEvent,
|
|
21829
21917
|
userData
|
|
21830
21918
|
)
|
|
@@ -21944,8 +22032,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
21944
22032
|
HEAP32[(touchEvent + 8) >> 2] = numTouches;
|
|
21945
22033
|
|
|
21946
22034
|
if (
|
|
21947
|
-
((
|
|
21948
|
-
|
|
22035
|
+
((
|
|
22036
|
+
a1,
|
|
22037
|
+
a2,
|
|
22038
|
+
a3
|
|
22039
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22040
|
+
eventTypeId,
|
|
21949
22041
|
touchEvent,
|
|
21950
22042
|
userData
|
|
21951
22043
|
)
|
|
@@ -22083,8 +22175,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22083
22175
|
fillGamepadEventData(gamepadEvent, e['gamepad']);
|
|
22084
22176
|
|
|
22085
22177
|
if (
|
|
22086
|
-
((
|
|
22087
|
-
|
|
22178
|
+
((
|
|
22179
|
+
a1,
|
|
22180
|
+
a2,
|
|
22181
|
+
a3
|
|
22182
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22183
|
+
eventTypeId,
|
|
22088
22184
|
gamepadEvent,
|
|
22089
22185
|
userData
|
|
22090
22186
|
)
|
|
@@ -22186,8 +22282,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22186
22282
|
) => {
|
|
22187
22283
|
var beforeUnloadEventHandlerFunc = (e = event) => {
|
|
22188
22284
|
// Note: This is always called on the main browser thread, since it needs synchronously return a value!
|
|
22189
|
-
var confirmationMessage = ((
|
|
22190
|
-
|
|
22285
|
+
var confirmationMessage = ((
|
|
22286
|
+
a1,
|
|
22287
|
+
a2,
|
|
22288
|
+
a3
|
|
22289
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22290
|
+
eventTypeId,
|
|
22191
22291
|
0,
|
|
22192
22292
|
userData
|
|
22193
22293
|
);
|
|
@@ -22258,8 +22358,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22258
22358
|
fillBatteryEventData(batteryEvent, battery());
|
|
22259
22359
|
|
|
22260
22360
|
if (
|
|
22261
|
-
((
|
|
22262
|
-
|
|
22361
|
+
((
|
|
22362
|
+
a1,
|
|
22363
|
+
a2,
|
|
22364
|
+
a3
|
|
22365
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22366
|
+
eventTypeId,
|
|
22263
22367
|
batteryEvent,
|
|
22264
22368
|
userData
|
|
22265
22369
|
)
|
|
@@ -22349,8 +22453,11 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22349
22453
|
|
|
22350
22454
|
var _emscripten_request_animation_frame = (cb, userData) =>
|
|
22351
22455
|
requestAnimationFrame((timeStamp) =>
|
|
22352
|
-
((
|
|
22353
|
-
|
|
22456
|
+
((
|
|
22457
|
+
a1,
|
|
22458
|
+
a2
|
|
22459
|
+
) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22460
|
+
timeStamp,
|
|
22354
22461
|
userData
|
|
22355
22462
|
)
|
|
22356
22463
|
);
|
|
@@ -22362,8 +22469,11 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22362
22469
|
var _emscripten_request_animation_frame_loop = (cb, userData) => {
|
|
22363
22470
|
function tick(timeStamp) {
|
|
22364
22471
|
if (
|
|
22365
|
-
((
|
|
22366
|
-
|
|
22472
|
+
((
|
|
22473
|
+
a1,
|
|
22474
|
+
a2
|
|
22475
|
+
) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22476
|
+
timeStamp,
|
|
22367
22477
|
userData
|
|
22368
22478
|
)
|
|
22369
22479
|
) {
|
|
@@ -22588,8 +22698,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22588
22698
|
return emSetImmediate(() => {
|
|
22589
22699
|
runtimeKeepalivePop();
|
|
22590
22700
|
callUserCallback(() =>
|
|
22591
|
-
((
|
|
22592
|
-
|
|
22701
|
+
((
|
|
22702
|
+
a1
|
|
22703
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22704
|
+
userData
|
|
22593
22705
|
)
|
|
22594
22706
|
);
|
|
22595
22707
|
});
|
|
@@ -22606,8 +22718,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22606
22718
|
function tick() {
|
|
22607
22719
|
callUserCallback(() => {
|
|
22608
22720
|
if (
|
|
22609
|
-
((
|
|
22610
|
-
|
|
22721
|
+
((
|
|
22722
|
+
a1
|
|
22723
|
+
) => {}) /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22724
|
+
userData
|
|
22611
22725
|
)
|
|
22612
22726
|
) {
|
|
22613
22727
|
emSetImmediate(tick);
|
|
@@ -22624,8 +22738,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22624
22738
|
var _emscripten_set_timeout = (cb, msecs, userData) =>
|
|
22625
22739
|
safeSetTimeout(
|
|
22626
22740
|
() =>
|
|
22627
|
-
((
|
|
22628
|
-
|
|
22741
|
+
((
|
|
22742
|
+
a1
|
|
22743
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22744
|
+
userData
|
|
22629
22745
|
),
|
|
22630
22746
|
msecs
|
|
22631
22747
|
);
|
|
@@ -22641,8 +22757,11 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22641
22757
|
runtimeKeepalivePop();
|
|
22642
22758
|
callUserCallback(() => {
|
|
22643
22759
|
if (
|
|
22644
|
-
((
|
|
22645
|
-
|
|
22760
|
+
((
|
|
22761
|
+
a1,
|
|
22762
|
+
a2
|
|
22763
|
+
) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22764
|
+
t,
|
|
22646
22765
|
userData
|
|
22647
22766
|
)
|
|
22648
22767
|
) {
|
|
@@ -22666,8 +22785,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22666
22785
|
runtimeKeepalivePush();
|
|
22667
22786
|
return setInterval(() => {
|
|
22668
22787
|
callUserCallback(() =>
|
|
22669
|
-
((
|
|
22670
|
-
|
|
22788
|
+
((
|
|
22789
|
+
a1
|
|
22790
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22791
|
+
userData
|
|
22671
22792
|
)
|
|
22672
22793
|
);
|
|
22673
22794
|
}, msecs);
|
|
@@ -22682,8 +22803,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22682
22803
|
|
|
22683
22804
|
var _emscripten_async_call = (func, arg, millis) => {
|
|
22684
22805
|
var wrapper = () =>
|
|
22685
|
-
((
|
|
22686
|
-
|
|
22806
|
+
((
|
|
22807
|
+
a1
|
|
22808
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22809
|
+
arg
|
|
22687
22810
|
);
|
|
22688
22811
|
|
|
22689
22812
|
if (
|
|
@@ -22716,7 +22839,7 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22716
22839
|
|
|
22717
22840
|
var _emscripten_set_main_loop = (func, fps, simulateInfiniteLoop) => {
|
|
22718
22841
|
var iterFunc =
|
|
22719
|
-
() => {}
|
|
22842
|
+
() => {} /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */;
|
|
22720
22843
|
setMainLoop(iterFunc, fps, simulateInfiniteLoop);
|
|
22721
22844
|
};
|
|
22722
22845
|
_emscripten_set_main_loop.sig = 'vpii';
|
|
@@ -22728,8 +22851,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22728
22851
|
simulateInfiniteLoop
|
|
22729
22852
|
) => {
|
|
22730
22853
|
var iterFunc = () =>
|
|
22731
|
-
((
|
|
22732
|
-
|
|
22854
|
+
((
|
|
22855
|
+
a1
|
|
22856
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22857
|
+
arg
|
|
22733
22858
|
);
|
|
22734
22859
|
setMainLoop(iterFunc, fps, simulateInfiniteLoop, arg);
|
|
22735
22860
|
};
|
|
@@ -22750,8 +22875,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22750
22875
|
var __emscripten_push_main_loop_blocker = (func, arg, name) => {
|
|
22751
22876
|
MainLoop.queue.push({
|
|
22752
22877
|
func: () => {
|
|
22753
|
-
((
|
|
22754
|
-
|
|
22878
|
+
((
|
|
22879
|
+
a1
|
|
22880
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22881
|
+
arg
|
|
22755
22882
|
);
|
|
22756
22883
|
},
|
|
22757
22884
|
name: UTF8ToString(name),
|
|
@@ -22764,8 +22891,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22764
22891
|
var __emscripten_push_uncounted_main_loop_blocker = (func, arg, name) => {
|
|
22765
22892
|
MainLoop.queue.push({
|
|
22766
22893
|
func: () => {
|
|
22767
|
-
((
|
|
22768
|
-
|
|
22894
|
+
((
|
|
22895
|
+
a1
|
|
22896
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22897
|
+
arg
|
|
22769
22898
|
);
|
|
22770
22899
|
},
|
|
22771
22900
|
name: UTF8ToString(name),
|
|
@@ -22799,8 +22928,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22799
22928
|
var resultPtr = stackAlloc(POINTER_SIZE);
|
|
22800
22929
|
HEAPU32[resultPtr >> 2] = 0;
|
|
22801
22930
|
try {
|
|
22802
|
-
var result = ((
|
|
22803
|
-
|
|
22931
|
+
var result = ((
|
|
22932
|
+
a1,
|
|
22933
|
+
a2,
|
|
22934
|
+
a3
|
|
22935
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22936
|
+
resultPtr,
|
|
22804
22937
|
userData,
|
|
22805
22938
|
value
|
|
22806
22939
|
);
|
|
@@ -23736,15 +23869,19 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
23736
23869
|
() => {
|
|
23737
23870
|
runtimeKeepalivePop();
|
|
23738
23871
|
if (onload)
|
|
23739
|
-
((
|
|
23740
|
-
|
|
23872
|
+
((
|
|
23873
|
+
a1
|
|
23874
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
23875
|
+
file
|
|
23741
23876
|
);
|
|
23742
23877
|
},
|
|
23743
23878
|
() => {
|
|
23744
23879
|
runtimeKeepalivePop();
|
|
23745
23880
|
if (onerror)
|
|
23746
|
-
((
|
|
23747
|
-
|
|
23881
|
+
((
|
|
23882
|
+
a1
|
|
23883
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
23884
|
+
file
|
|
23748
23885
|
);
|
|
23749
23886
|
},
|
|
23750
23887
|
true // don'tCreateFile - it's already there
|
|
@@ -23778,16 +23915,21 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
23778
23915
|
() => {
|
|
23779
23916
|
runtimeKeepalivePop();
|
|
23780
23917
|
if (onload)
|
|
23781
|
-
((
|
|
23782
|
-
|
|
23918
|
+
((
|
|
23919
|
+
a1,
|
|
23920
|
+
a2
|
|
23921
|
+
) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
23922
|
+
arg,
|
|
23783
23923
|
cname
|
|
23784
23924
|
);
|
|
23785
23925
|
},
|
|
23786
23926
|
() => {
|
|
23787
23927
|
runtimeKeepalivePop();
|
|
23788
23928
|
if (onerror)
|
|
23789
|
-
((
|
|
23790
|
-
|
|
23929
|
+
((
|
|
23930
|
+
a1
|
|
23931
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
23932
|
+
arg
|
|
23791
23933
|
);
|
|
23792
23934
|
},
|
|
23793
23935
|
true // don'tCreateFile - it's already there
|
|
@@ -24060,10 +24202,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24060
24202
|
runtimeKeepalivePop();
|
|
24061
24203
|
callUserCallback(() => {
|
|
24062
24204
|
var sp = stackSave();
|
|
24063
|
-
((
|
|
24064
|
-
|
|
24065
|
-
|
|
24066
|
-
)
|
|
24205
|
+
((
|
|
24206
|
+
a1
|
|
24207
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24208
|
+
stringToUTF8OnStack(_file)
|
|
24067
24209
|
);
|
|
24068
24210
|
stackRestore(sp);
|
|
24069
24211
|
});
|
|
@@ -24107,8 +24249,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24107
24249
|
callUserCallback(() => {
|
|
24108
24250
|
var buffer = _malloc(byteArray.length);
|
|
24109
24251
|
HEAPU8.set(byteArray, buffer);
|
|
24110
|
-
((
|
|
24111
|
-
|
|
24252
|
+
((
|
|
24253
|
+
a1,
|
|
24254
|
+
a2,
|
|
24255
|
+
a3
|
|
24256
|
+
) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24257
|
+
userdata,
|
|
24112
24258
|
buffer,
|
|
24113
24259
|
byteArray.length
|
|
24114
24260
|
);
|
|
@@ -24118,8 +24264,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24118
24264
|
if (onerror) {
|
|
24119
24265
|
runtimeKeepalivePop();
|
|
24120
24266
|
callUserCallback(() => {
|
|
24121
|
-
((
|
|
24122
|
-
|
|
24267
|
+
((
|
|
24268
|
+
a1
|
|
24269
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24270
|
+
userdata
|
|
24123
24271
|
);
|
|
24124
24272
|
});
|
|
24125
24273
|
}
|
|
@@ -24176,8 +24324,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24176
24324
|
);
|
|
24177
24325
|
if (onload) {
|
|
24178
24326
|
var sp = stackSave();
|
|
24179
|
-
((
|
|
24180
|
-
|
|
24327
|
+
((
|
|
24328
|
+
a1,
|
|
24329
|
+
a2,
|
|
24330
|
+
a3
|
|
24331
|
+
) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24332
|
+
handle,
|
|
24181
24333
|
userdata,
|
|
24182
24334
|
stringToUTF8OnStack(_file)
|
|
24183
24335
|
);
|
|
@@ -24185,8 +24337,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24185
24337
|
}
|
|
24186
24338
|
} else {
|
|
24187
24339
|
if (onerror)
|
|
24188
|
-
((
|
|
24189
|
-
|
|
24340
|
+
((
|
|
24341
|
+
a1,
|
|
24342
|
+
a2,
|
|
24343
|
+
a3
|
|
24344
|
+
) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24345
|
+
handle,
|
|
24190
24346
|
userdata,
|
|
24191
24347
|
http.status
|
|
24192
24348
|
);
|
|
@@ -24199,8 +24355,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24199
24355
|
http.onerror = (e) => {
|
|
24200
24356
|
runtimeKeepalivePop();
|
|
24201
24357
|
if (onerror)
|
|
24202
|
-
((
|
|
24203
|
-
|
|
24358
|
+
((
|
|
24359
|
+
a1,
|
|
24360
|
+
a2,
|
|
24361
|
+
a3
|
|
24362
|
+
) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24363
|
+
handle,
|
|
24204
24364
|
userdata,
|
|
24205
24365
|
http.status
|
|
24206
24366
|
);
|
|
@@ -24215,8 +24375,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24215
24375
|
) {
|
|
24216
24376
|
var percentComplete = (e.loaded / e.total) * 100;
|
|
24217
24377
|
if (onprogress)
|
|
24218
|
-
((
|
|
24219
|
-
|
|
24378
|
+
((
|
|
24379
|
+
a1,
|
|
24380
|
+
a2,
|
|
24381
|
+
a3
|
|
24382
|
+
) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24383
|
+
handle,
|
|
24220
24384
|
userdata,
|
|
24221
24385
|
percentComplete
|
|
24222
24386
|
);
|
|
@@ -24273,8 +24437,13 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24273
24437
|
if (http.statusText) {
|
|
24274
24438
|
statusText = stringToUTF8OnStack(http.statusText);
|
|
24275
24439
|
}
|
|
24276
|
-
((
|
|
24277
|
-
|
|
24440
|
+
((
|
|
24441
|
+
a1,
|
|
24442
|
+
a2,
|
|
24443
|
+
a3,
|
|
24444
|
+
a4
|
|
24445
|
+
) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24446
|
+
handle,
|
|
24278
24447
|
userdata,
|
|
24279
24448
|
http.status,
|
|
24280
24449
|
statusText
|
|
@@ -24295,8 +24464,13 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24295
24464
|
var buffer = _malloc(byteArray.length);
|
|
24296
24465
|
HEAPU8.set(byteArray, buffer);
|
|
24297
24466
|
if (onload)
|
|
24298
|
-
((
|
|
24299
|
-
|
|
24467
|
+
((
|
|
24468
|
+
a1,
|
|
24469
|
+
a2,
|
|
24470
|
+
a3,
|
|
24471
|
+
a4
|
|
24472
|
+
) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24473
|
+
handle,
|
|
24300
24474
|
userdata,
|
|
24301
24475
|
buffer,
|
|
24302
24476
|
byteArray.length
|
|
@@ -24317,8 +24491,13 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24317
24491
|
// PROGRESS
|
|
24318
24492
|
http.onprogress = (e) => {
|
|
24319
24493
|
if (onprogress)
|
|
24320
|
-
((
|
|
24321
|
-
|
|
24494
|
+
((
|
|
24495
|
+
a1,
|
|
24496
|
+
a2,
|
|
24497
|
+
a3,
|
|
24498
|
+
a4
|
|
24499
|
+
) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24500
|
+
handle,
|
|
24322
24501
|
userdata,
|
|
24323
24502
|
e.loaded,
|
|
24324
24503
|
e.lengthComputable || e.lengthComputable === undefined
|
|
@@ -24438,16 +24617,24 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24438
24617
|
if (event === 'error') {
|
|
24439
24618
|
withStackSave(() => {
|
|
24440
24619
|
var msg = stringToUTF8OnStack(data[2]);
|
|
24441
|
-
((
|
|
24442
|
-
|
|
24620
|
+
((
|
|
24621
|
+
a1,
|
|
24622
|
+
a2,
|
|
24623
|
+
a3,
|
|
24624
|
+
a4
|
|
24625
|
+
) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24626
|
+
data[0],
|
|
24443
24627
|
data[1],
|
|
24444
24628
|
msg,
|
|
24445
24629
|
userData
|
|
24446
24630
|
);
|
|
24447
24631
|
});
|
|
24448
24632
|
} else {
|
|
24449
|
-
((
|
|
24450
|
-
|
|
24633
|
+
((
|
|
24634
|
+
a1,
|
|
24635
|
+
a2
|
|
24636
|
+
) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24637
|
+
data,
|
|
24451
24638
|
userData
|
|
24452
24639
|
);
|
|
24453
24640
|
}
|
|
@@ -24913,8 +25100,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24913
25100
|
) => {
|
|
24914
25101
|
var webGlEventHandlerFunc = (e = event) => {
|
|
24915
25102
|
if (
|
|
24916
|
-
((
|
|
24917
|
-
|
|
25103
|
+
((
|
|
25104
|
+
a1,
|
|
25105
|
+
a2,
|
|
25106
|
+
a3
|
|
25107
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25108
|
+
eventTypeId,
|
|
24918
25109
|
0,
|
|
24919
25110
|
userData
|
|
24920
25111
|
)
|
|
@@ -25133,15 +25324,21 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25133
25324
|
) {
|
|
25134
25325
|
event.preventDefault();
|
|
25135
25326
|
GLUT.saveModifiers(event);
|
|
25136
|
-
((
|
|
25137
|
-
|
|
25327
|
+
((
|
|
25328
|
+
a1,
|
|
25329
|
+
a2
|
|
25330
|
+
) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25331
|
+
lastX,
|
|
25138
25332
|
lastY
|
|
25139
25333
|
);
|
|
25140
25334
|
} else if (GLUT.buttons != 0 && GLUT.motionFunc) {
|
|
25141
25335
|
event.preventDefault();
|
|
25142
25336
|
GLUT.saveModifiers(event);
|
|
25143
|
-
((
|
|
25144
|
-
|
|
25337
|
+
((
|
|
25338
|
+
a1,
|
|
25339
|
+
a2
|
|
25340
|
+
) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25341
|
+
lastX,
|
|
25145
25342
|
lastY
|
|
25146
25343
|
);
|
|
25147
25344
|
}
|
|
@@ -25302,8 +25499,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25302
25499
|
if (GLUT.specialFunc) {
|
|
25303
25500
|
event.preventDefault();
|
|
25304
25501
|
GLUT.saveModifiers(event);
|
|
25305
|
-
((
|
|
25306
|
-
|
|
25502
|
+
((
|
|
25503
|
+
a1,
|
|
25504
|
+
a2,
|
|
25505
|
+
a3
|
|
25506
|
+
) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25507
|
+
key,
|
|
25307
25508
|
Browser.mouseX,
|
|
25308
25509
|
Browser.mouseY
|
|
25309
25510
|
);
|
|
@@ -25313,8 +25514,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25313
25514
|
if (key !== null && GLUT.keyboardFunc) {
|
|
25314
25515
|
event.preventDefault();
|
|
25315
25516
|
GLUT.saveModifiers(event);
|
|
25316
|
-
((
|
|
25317
|
-
|
|
25517
|
+
((
|
|
25518
|
+
a1,
|
|
25519
|
+
a2,
|
|
25520
|
+
a3
|
|
25521
|
+
) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25522
|
+
key,
|
|
25318
25523
|
Browser.mouseX,
|
|
25319
25524
|
Browser.mouseY
|
|
25320
25525
|
);
|
|
@@ -25329,8 +25534,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25329
25534
|
if (GLUT.specialUpFunc) {
|
|
25330
25535
|
event.preventDefault();
|
|
25331
25536
|
GLUT.saveModifiers(event);
|
|
25332
|
-
((
|
|
25333
|
-
|
|
25537
|
+
((
|
|
25538
|
+
a1,
|
|
25539
|
+
a2,
|
|
25540
|
+
a3
|
|
25541
|
+
) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25542
|
+
key,
|
|
25334
25543
|
Browser.mouseX,
|
|
25335
25544
|
Browser.mouseY
|
|
25336
25545
|
);
|
|
@@ -25340,8 +25549,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25340
25549
|
if (key !== null && GLUT.keyboardUpFunc) {
|
|
25341
25550
|
event.preventDefault();
|
|
25342
25551
|
GLUT.saveModifiers(event);
|
|
25343
|
-
((
|
|
25344
|
-
|
|
25552
|
+
((
|
|
25553
|
+
a1,
|
|
25554
|
+
a2,
|
|
25555
|
+
a3
|
|
25556
|
+
) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25557
|
+
key,
|
|
25345
25558
|
Browser.mouseX,
|
|
25346
25559
|
Browser.mouseY
|
|
25347
25560
|
);
|
|
@@ -25405,10 +25618,13 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25405
25618
|
} catch (e) {}
|
|
25406
25619
|
event.preventDefault();
|
|
25407
25620
|
GLUT.saveModifiers(event);
|
|
25408
|
-
((
|
|
25409
|
-
|
|
25410
|
-
|
|
25411
|
-
|
|
25621
|
+
((
|
|
25622
|
+
a1,
|
|
25623
|
+
a2,
|
|
25624
|
+
a3,
|
|
25625
|
+
a4
|
|
25626
|
+
) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25627
|
+
event['button'],
|
|
25412
25628
|
0 /*GLUT_DOWN*/,
|
|
25413
25629
|
Browser.mouseX,
|
|
25414
25630
|
Browser.mouseY
|
|
@@ -25423,10 +25639,13 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25423
25639
|
if (GLUT.mouseFunc) {
|
|
25424
25640
|
event.preventDefault();
|
|
25425
25641
|
GLUT.saveModifiers(event);
|
|
25426
|
-
((
|
|
25427
|
-
|
|
25428
|
-
|
|
25429
|
-
|
|
25642
|
+
((
|
|
25643
|
+
a1,
|
|
25644
|
+
a2,
|
|
25645
|
+
a3,
|
|
25646
|
+
a4
|
|
25647
|
+
) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25648
|
+
event['button'],
|
|
25430
25649
|
1 /*GLUT_UP*/,
|
|
25431
25650
|
Browser.mouseX,
|
|
25432
25651
|
Browser.mouseY
|
|
@@ -25455,8 +25674,13 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25455
25674
|
if (GLUT.mouseFunc) {
|
|
25456
25675
|
event.preventDefault();
|
|
25457
25676
|
GLUT.saveModifiers(event);
|
|
25458
|
-
((
|
|
25459
|
-
|
|
25677
|
+
((
|
|
25678
|
+
a1,
|
|
25679
|
+
a2,
|
|
25680
|
+
a3,
|
|
25681
|
+
a4
|
|
25682
|
+
) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25683
|
+
button,
|
|
25460
25684
|
0 /*GLUT_DOWN*/,
|
|
25461
25685
|
Browser.mouseX,
|
|
25462
25686
|
Browser.mouseY
|
|
@@ -25499,8 +25723,11 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25499
25723
|
/* Can't call _glutReshapeWindow as that requests cancelling fullscreen. */
|
|
25500
25724
|
if (GLUT.reshapeFunc) {
|
|
25501
25725
|
// out("GLUT.reshapeFunc (from FS): " + width + ", " + height);
|
|
25502
|
-
((
|
|
25503
|
-
|
|
25726
|
+
((
|
|
25727
|
+
a1,
|
|
25728
|
+
a2
|
|
25729
|
+
) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25730
|
+
width,
|
|
25504
25731
|
height
|
|
25505
25732
|
);
|
|
25506
25733
|
}
|
|
@@ -25543,8 +25770,11 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25543
25770
|
|
|
25544
25771
|
Browser.resizeListeners.push((width, height) => {
|
|
25545
25772
|
if (GLUT.reshapeFunc) {
|
|
25546
|
-
((
|
|
25547
|
-
|
|
25773
|
+
((
|
|
25774
|
+
a1,
|
|
25775
|
+
a2
|
|
25776
|
+
) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25777
|
+
width,
|
|
25548
25778
|
height
|
|
25549
25779
|
);
|
|
25550
25780
|
}
|
|
@@ -25657,8 +25887,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25657
25887
|
var _glutTimerFunc = (msec, func, value) =>
|
|
25658
25888
|
safeSetTimeout(
|
|
25659
25889
|
() =>
|
|
25660
|
-
((
|
|
25661
|
-
|
|
25890
|
+
((
|
|
25891
|
+
a1
|
|
25892
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25893
|
+
value
|
|
25662
25894
|
),
|
|
25663
25895
|
msec
|
|
25664
25896
|
);
|
|
@@ -25818,8 +26050,11 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25818
26050
|
Browser.setCanvasSize(width, height, true); // N.B. GLUT.reshapeFunc is also registered as a canvas resize callback.
|
|
25819
26051
|
// Just call it once here.
|
|
25820
26052
|
if (GLUT.reshapeFunc) {
|
|
25821
|
-
((
|
|
25822
|
-
|
|
26053
|
+
((
|
|
26054
|
+
a1,
|
|
26055
|
+
a2
|
|
26056
|
+
) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
26057
|
+
width,
|
|
25823
26058
|
height
|
|
25824
26059
|
);
|
|
25825
26060
|
}
|
|
@@ -26881,15 +27116,21 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
26881
27116
|
callUserCallback(() => {
|
|
26882
27117
|
if (error) {
|
|
26883
27118
|
if (onerror)
|
|
26884
|
-
((
|
|
26885
|
-
|
|
27119
|
+
((
|
|
27120
|
+
a1
|
|
27121
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27122
|
+
arg
|
|
26886
27123
|
);
|
|
26887
27124
|
return;
|
|
26888
27125
|
}
|
|
26889
27126
|
var buffer = _malloc(byteArray.length);
|
|
26890
27127
|
HEAPU8.set(byteArray, buffer);
|
|
26891
|
-
((
|
|
26892
|
-
|
|
27128
|
+
((
|
|
27129
|
+
a1,
|
|
27130
|
+
a2,
|
|
27131
|
+
a3
|
|
27132
|
+
) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27133
|
+
arg,
|
|
26893
27134
|
buffer,
|
|
26894
27135
|
byteArray.length
|
|
26895
27136
|
);
|
|
@@ -26921,14 +27162,18 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
26921
27162
|
callUserCallback(() => {
|
|
26922
27163
|
if (error) {
|
|
26923
27164
|
if (onerror)
|
|
26924
|
-
((
|
|
26925
|
-
|
|
27165
|
+
((
|
|
27166
|
+
a1
|
|
27167
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27168
|
+
arg
|
|
26926
27169
|
);
|
|
26927
27170
|
return;
|
|
26928
27171
|
}
|
|
26929
27172
|
if (onstore)
|
|
26930
|
-
((
|
|
26931
|
-
|
|
27173
|
+
((
|
|
27174
|
+
a1
|
|
27175
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27176
|
+
arg
|
|
26932
27177
|
);
|
|
26933
27178
|
});
|
|
26934
27179
|
}
|
|
@@ -26943,14 +27188,18 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
26943
27188
|
callUserCallback(() => {
|
|
26944
27189
|
if (error) {
|
|
26945
27190
|
if (onerror)
|
|
26946
|
-
((
|
|
26947
|
-
|
|
27191
|
+
((
|
|
27192
|
+
a1
|
|
27193
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27194
|
+
arg
|
|
26948
27195
|
);
|
|
26949
27196
|
return;
|
|
26950
27197
|
}
|
|
26951
27198
|
if (ondelete)
|
|
26952
|
-
((
|
|
26953
|
-
|
|
27199
|
+
((
|
|
27200
|
+
a1
|
|
27201
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27202
|
+
arg
|
|
26954
27203
|
);
|
|
26955
27204
|
});
|
|
26956
27205
|
});
|
|
@@ -26967,14 +27216,19 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
26967
27216
|
callUserCallback(() => {
|
|
26968
27217
|
if (error) {
|
|
26969
27218
|
if (onerror)
|
|
26970
|
-
((
|
|
26971
|
-
|
|
27219
|
+
((
|
|
27220
|
+
a1
|
|
27221
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27222
|
+
arg
|
|
26972
27223
|
);
|
|
26973
27224
|
return;
|
|
26974
27225
|
}
|
|
26975
27226
|
if (oncheck)
|
|
26976
|
-
((
|
|
26977
|
-
|
|
27227
|
+
((
|
|
27228
|
+
a1,
|
|
27229
|
+
a2
|
|
27230
|
+
) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27231
|
+
arg,
|
|
26978
27232
|
exists
|
|
26979
27233
|
);
|
|
26980
27234
|
});
|
|
@@ -26990,14 +27244,18 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
26990
27244
|
callUserCallback(() => {
|
|
26991
27245
|
if (error) {
|
|
26992
27246
|
if (onerror)
|
|
26993
|
-
((
|
|
26994
|
-
|
|
27247
|
+
((
|
|
27248
|
+
a1
|
|
27249
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27250
|
+
arg
|
|
26995
27251
|
);
|
|
26996
27252
|
return;
|
|
26997
27253
|
}
|
|
26998
27254
|
if (onclear)
|
|
26999
|
-
((
|
|
27000
|
-
|
|
27255
|
+
((
|
|
27256
|
+
a1
|
|
27257
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27258
|
+
arg
|
|
27001
27259
|
);
|
|
27002
27260
|
});
|
|
27003
27261
|
});
|
|
@@ -27154,8 +27412,11 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
27154
27412
|
safeSetTimeout(() => {
|
|
27155
27413
|
var stackBegin = Asyncify.currData + 12;
|
|
27156
27414
|
var stackEnd = HEAPU32[Asyncify.currData >> 2];
|
|
27157
|
-
((
|
|
27158
|
-
|
|
27415
|
+
((
|
|
27416
|
+
a1,
|
|
27417
|
+
a2
|
|
27418
|
+
) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27419
|
+
stackBegin,
|
|
27159
27420
|
stackEnd
|
|
27160
27421
|
);
|
|
27161
27422
|
wakeUp();
|
|
@@ -27216,8 +27477,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
27216
27477
|
HEAPU32[(newFiber + 12) >> 2] = 0;
|
|
27217
27478
|
|
|
27218
27479
|
var userData = HEAPU32[(newFiber + 16) >> 2];
|
|
27219
|
-
((
|
|
27220
|
-
|
|
27480
|
+
((
|
|
27481
|
+
a1
|
|
27482
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27483
|
+
userData
|
|
27221
27484
|
);
|
|
27222
27485
|
} else {
|
|
27223
27486
|
var asyncifyData = newFiber + 20;
|
|
@@ -28229,8 +28492,11 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
28229
28492
|
if (!SDL.eventHandler) return;
|
|
28230
28493
|
|
|
28231
28494
|
while (SDL.pollEvent(SDL.eventHandlerTemp)) {
|
|
28232
|
-
((
|
|
28233
|
-
|
|
28495
|
+
((
|
|
28496
|
+
a1,
|
|
28497
|
+
a2
|
|
28498
|
+
) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
28499
|
+
SDL.eventHandlerContext,
|
|
28234
28500
|
SDL.eventHandlerTemp
|
|
28235
28501
|
);
|
|
28236
28502
|
}
|
|
@@ -29863,9 +30129,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
29863
30129
|
return;
|
|
29864
30130
|
|
|
29865
30131
|
// Ask SDL audio data from the user code.
|
|
29866
|
-
((
|
|
29867
|
-
|
|
29868
|
-
|
|
30132
|
+
((
|
|
30133
|
+
a1,
|
|
30134
|
+
a2,
|
|
30135
|
+
a3
|
|
30136
|
+
) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
30137
|
+
SDL.audio.userdata,
|
|
29869
30138
|
SDL.audio.buffer,
|
|
29870
30139
|
SDL.audio.bufferSize
|
|
29871
30140
|
);
|
|
@@ -30323,8 +30592,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
30323
30592
|
info.audio = null;
|
|
30324
30593
|
}
|
|
30325
30594
|
if (SDL.channelFinished) {
|
|
30326
|
-
((
|
|
30327
|
-
|
|
30595
|
+
((
|
|
30596
|
+
a1
|
|
30597
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
30598
|
+
channel
|
|
30328
30599
|
);
|
|
30329
30600
|
}
|
|
30330
30601
|
}
|
|
@@ -30393,8 +30664,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
30393
30664
|
channelInfo.audio = null;
|
|
30394
30665
|
}
|
|
30395
30666
|
if (SDL.channelFinished)
|
|
30396
|
-
((
|
|
30397
|
-
|
|
30667
|
+
((
|
|
30668
|
+
a1
|
|
30669
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
30670
|
+
channel
|
|
30398
30671
|
);
|
|
30399
30672
|
};
|
|
30400
30673
|
if (channelInfo.audio) {
|
|
@@ -31142,8 +31415,11 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
31142
31415
|
var _SDL_AddTimer = (interval, callback, param) =>
|
|
31143
31416
|
safeSetTimeout(
|
|
31144
31417
|
() =>
|
|
31145
|
-
((
|
|
31146
|
-
|
|
31418
|
+
((
|
|
31419
|
+
a1,
|
|
31420
|
+
a2
|
|
31421
|
+
) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
31422
|
+
interval,
|
|
31147
31423
|
param
|
|
31148
31424
|
),
|
|
31149
31425
|
interval
|
|
@@ -31526,8 +31802,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
31526
31802
|
|
|
31527
31803
|
socket.onopen = function (e) {
|
|
31528
31804
|
var eventPtr = WS.getSocketEvent(socketId);
|
|
31529
|
-
((
|
|
31530
|
-
|
|
31805
|
+
((
|
|
31806
|
+
a1,
|
|
31807
|
+
a2,
|
|
31808
|
+
a3
|
|
31809
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
31810
|
+
0 /*TODO*/,
|
|
31531
31811
|
eventPtr,
|
|
31532
31812
|
userData
|
|
31533
31813
|
);
|
|
@@ -31549,8 +31829,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
31549
31829
|
|
|
31550
31830
|
socket.onerror = function (e) {
|
|
31551
31831
|
var eventPtr = WS.getSocketEvent(socketId);
|
|
31552
|
-
((
|
|
31553
|
-
|
|
31832
|
+
((
|
|
31833
|
+
a1,
|
|
31834
|
+
a2,
|
|
31835
|
+
a3
|
|
31836
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
31837
|
+
0 /*TODO*/,
|
|
31554
31838
|
eventPtr,
|
|
31555
31839
|
userData
|
|
31556
31840
|
);
|
|
@@ -31575,8 +31859,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
31575
31859
|
(HEAP8[eventPtr + 4] = e.wasClean),
|
|
31576
31860
|
(HEAP16[(eventPtr + 6) >> 1] = e.code),
|
|
31577
31861
|
stringToUTF8(e.reason, eventPtr + 8, 512);
|
|
31578
|
-
((
|
|
31579
|
-
|
|
31862
|
+
((
|
|
31863
|
+
a1,
|
|
31864
|
+
a2,
|
|
31865
|
+
a3
|
|
31866
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
31867
|
+
0 /*TODO*/,
|
|
31580
31868
|
eventPtr,
|
|
31581
31869
|
userData
|
|
31582
31870
|
);
|
|
@@ -31610,8 +31898,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
31610
31898
|
(HEAPU32[(eventPtr + 4) >> 2] = buf),
|
|
31611
31899
|
(HEAP32[(eventPtr + 8) >> 2] = len),
|
|
31612
31900
|
(HEAP8[eventPtr + 12] = isText),
|
|
31613
|
-
((
|
|
31614
|
-
|
|
31901
|
+
((
|
|
31902
|
+
a1,
|
|
31903
|
+
a2,
|
|
31904
|
+
a3
|
|
31905
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
31906
|
+
0 /*TODO*/,
|
|
31615
31907
|
eventPtr,
|
|
31616
31908
|
userData
|
|
31617
31909
|
);
|
|
@@ -31808,13 +32100,13 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
31808
32100
|
// End JS library code
|
|
31809
32101
|
|
|
31810
32102
|
var ASM_CONSTS = {
|
|
31811
|
-
|
|
32103
|
+
10409405: ($0) => {
|
|
31812
32104
|
if (!$0) {
|
|
31813
32105
|
AL.alcErr = 0xa004;
|
|
31814
32106
|
return 1;
|
|
31815
32107
|
}
|
|
31816
32108
|
},
|
|
31817
|
-
|
|
32109
|
+
10409453: ($0) => {
|
|
31818
32110
|
if (!AL.currentCtx) {
|
|
31819
32111
|
err('alGetProcAddress() called without a valid context');
|
|
31820
32112
|
return 1;
|
|
@@ -35338,19 +35630,16 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
35338
35630
|
// We override NODEFS.createNode() to add an `isSharedFS` flag to all NODEFS
|
|
35339
35631
|
// nodes. This way we can tell whether file-locking is needed and possible
|
|
35340
35632
|
// for an FS node, even if wrapped with PROXYFS.
|
|
35341
|
-
const
|
|
35633
|
+
const originalNodeFsCreateNode = NODEFS.createNode;
|
|
35342
35634
|
NODEFS.createNode = function createNodeWithSharedFlag() {
|
|
35343
|
-
const node =
|
|
35635
|
+
const node = originalNodeFsCreateNode.apply(NODEFS, arguments);
|
|
35344
35636
|
node.isSharedFS = true;
|
|
35345
35637
|
return node;
|
|
35346
35638
|
};
|
|
35347
35639
|
|
|
35348
35640
|
var originalHashAddNode = FS.hashAddNode;
|
|
35349
35641
|
FS.hashAddNode = function hashAddNodeIfNotSharedFS(node) {
|
|
35350
|
-
if (
|
|
35351
|
-
typeof locking === 'object' &&
|
|
35352
|
-
locking?.is_shared_fs_node(node)
|
|
35353
|
-
) {
|
|
35642
|
+
if (node?.isSharedFS) {
|
|
35354
35643
|
// Avoid caching shared VFS nodes so multiple instances
|
|
35355
35644
|
// can access the same underlying filesystem without
|
|
35356
35645
|
// conflicting caches.
|