@php-wasm/node 2.0.4 → 2.0.7

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (41) hide show
  1. package/asyncify/7_2_34/php_7_2.wasm +0 -0
  2. package/asyncify/7_3_33/php_7_3.wasm +0 -0
  3. package/asyncify/7_4_33/php_7_4.wasm +0 -0
  4. package/asyncify/8_0_30/php_8_0.wasm +0 -0
  5. package/asyncify/8_1_33/php_8_1.wasm +0 -0
  6. package/asyncify/8_2_29/php_8_2.wasm +0 -0
  7. package/asyncify/8_3_23/php_8_3.wasm +0 -0
  8. package/asyncify/8_3_24/php_8_3.wasm +0 -0
  9. package/asyncify/8_4_10/php_8_4.wasm +0 -0
  10. package/asyncify/8_4_11/php_8_4.wasm +0 -0
  11. package/asyncify/php_7_2.js +512 -223
  12. package/asyncify/php_7_3.js +509 -220
  13. package/asyncify/php_7_4.js +516 -227
  14. package/asyncify/php_8_0.js +509 -220
  15. package/asyncify/php_8_1.js +509 -220
  16. package/asyncify/php_8_2.js +509 -220
  17. package/asyncify/php_8_3.js +519 -230
  18. package/asyncify/php_8_4.js +515 -226
  19. package/index.cjs +657 -1191
  20. package/index.js +657 -1191
  21. package/jspi/7_2_34/php_7_2.wasm +0 -0
  22. package/jspi/7_3_33/php_7_3.wasm +0 -0
  23. package/jspi/7_4_33/php_7_4.wasm +0 -0
  24. package/jspi/8_0_30/php_8_0.wasm +0 -0
  25. package/jspi/8_1_33/php_8_1.wasm +0 -0
  26. package/jspi/8_2_29/php_8_2.wasm +0 -0
  27. package/jspi/8_3_23/php_8_3.wasm +0 -0
  28. package/jspi/8_3_24/php_8_3.wasm +0 -0
  29. package/jspi/8_4_10/php_8_4.wasm +0 -0
  30. package/jspi/8_4_11/php_8_4.wasm +0 -0
  31. package/jspi/php_7_2.js +42 -36
  32. package/jspi/php_7_3.js +42 -36
  33. package/jspi/php_7_4.js +42 -36
  34. package/jspi/php_8_0.js +42 -36
  35. package/jspi/php_8_1.js +42 -36
  36. package/jspi/php_8_2.js +42 -36
  37. package/jspi/php_8_3.js +48 -42
  38. package/jspi/php_8_4.js +48 -42
  39. package/lib/file-lock-manager-for-node.d.ts +9 -2
  40. package/lib/load-runtime.d.ts +2 -1
  41. package/package.json +7 -7
@@ -1774,8 +1774,10 @@ export function init(RuntimeName, PHPLoader) {
1774
1774
  );
1775
1775
 
1776
1776
  var ___call_sighandler = (fp, sig) =>
1777
- ((a1) => {})(
1778
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ sig
1777
+ ((
1778
+ a1
1779
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
1780
+ sig
1779
1781
  );
1780
1782
  ___call_sighandler.sig = 'vpi';
1781
1783
 
@@ -7101,35 +7103,25 @@ export function init(RuntimeName, PHPLoader) {
7101
7103
  1: 'exclusive',
7102
7104
  2: 'unlocked',
7103
7105
  },
7104
- is_shared_fs_node(node) {
7105
- if (node?.isSharedFS) {
7106
- return true;
7107
- }
7108
-
7109
- // Handle PROXYFS nodes which wrap other nodes.
7110
- if (
7111
- !node?.mount?.opts?.fs?.lookupPath ||
7112
- !node?.mount?.type?.realPath
7113
- ) {
7114
- return false;
7106
+ is_path_to_shared_fs(path) {
7107
+ _js_wasm_trace('is_path_to_shared_fs(%s)', path);
7108
+ const { node } = FS.lookupPath(path, { noent_okay: true });
7109
+ if (node.mount.type !== PROXYFS) {
7110
+ return !!node.isSharedFS;
7111
+ }
7112
+
7113
+ // This looks like a PROXYFS node. Let's try a lookup.
7114
+ const nodePath = PROXYFS.realPath(node);
7115
+ const backingFs = node?.mount?.opts?.fs;
7116
+ if (backingFs) {
7117
+ // Tolerate ENOENT because looking up a MEMFS node by path always fails.
7118
+ const { node: backingNode } = backingFs.lookupPath(nodePath, {
7119
+ noent_okay: true,
7120
+ });
7121
+ return !!backingNode?.isSharedFS;
7115
7122
  }
7116
7123
 
7117
- // Only NODEFS can be shared between workers at the moment.
7118
- if (node.mount.type !== NODEFS) {
7119
- return false;
7120
- }
7121
- const vfsPath = node.mount.type.realPath(node);
7122
- try {
7123
- const underlyingNode =
7124
- node.mount.opts.fs.lookupPath(vfsPath)?.node;
7125
- return !!underlyingNode?.isSharedFS;
7126
- } catch (e) {
7127
- return false;
7128
- }
7129
- },
7130
- is_path_to_shared_fs(path) {
7131
- const { node } = FS.lookupPath(path);
7132
- return locking.is_shared_fs_node(node);
7124
+ return false;
7133
7125
  },
7134
7126
  get_fd_access_mode(fd) {
7135
7127
  const emscripten_F_GETFL = Number('3');
@@ -7147,8 +7139,26 @@ export function init(RuntimeName, PHPLoader) {
7147
7139
  }
7148
7140
  },
7149
7141
  get_native_path_from_vfs_path(vfsPath) {
7150
- const { node } = FS.lookupPath(vfsPath);
7151
- return NODEFS.realPath(node);
7142
+ // TODO: Should there be a try/catch here?
7143
+ const { node } = FS.lookupPath(vfsPath, {});
7144
+ if (node.mount.type === NODEFS) {
7145
+ return NODEFS.realPath(node);
7146
+ } else if (node.mount.type === PROXYFS) {
7147
+ // TODO: Tolerate ENOENT here?
7148
+ const { node: backingNode, path: backingPath } =
7149
+ node.mount.opts.fs.lookupPath(vfsPath);
7150
+ _js_wasm_trace(
7151
+ 'backingNode for %s: %s',
7152
+ vfsPath,
7153
+ backingPath,
7154
+ backingNode
7155
+ );
7156
+ return backingNode.mount.type.realPath(backingNode);
7157
+ } else {
7158
+ throw new Error(
7159
+ `Unsupported filesystem type for path ${vfsPath}`
7160
+ );
7161
+ }
7152
7162
  },
7153
7163
  check_lock_params(fd, l_type) {
7154
7164
  const emscripten_O_RDONLY = Number('0');
@@ -7348,6 +7358,8 @@ export function init(RuntimeName, PHPLoader) {
7348
7358
  return -ERRNO_CODES.EBADF;
7349
7359
  }
7350
7360
 
7361
+ const flockStructAddr = syscallGetVarargP();
7362
+
7351
7363
  if (!locking.is_path_to_shared_fs(vfsPath)) {
7352
7364
  _js_wasm_trace(
7353
7365
  "fcntl(%d, F_GETLK) locking is not implemented for non-NodeFS path '%s'",
@@ -7363,7 +7375,6 @@ export function init(RuntimeName, PHPLoader) {
7363
7375
  return 0;
7364
7376
  }
7365
7377
 
7366
- const flockStructAddr = syscallGetVarargP();
7367
7378
  const flockStruct = read_flock_struct(flockStructAddr);
7368
7379
 
7369
7380
  if (!(flockStruct.l_type in locking.fcntlToLockState)) {
@@ -8791,8 +8802,11 @@ export function init(RuntimeName, PHPLoader) {
8791
8802
  dlSetError(`'Could not load dynamic lib: ${filename}\n${e}`);
8792
8803
  runtimeKeepalivePop();
8793
8804
  callUserCallback(() =>
8794
- ((a1, a2) => {})(
8795
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
8805
+ ((
8806
+ a1,
8807
+ a2
8808
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
8809
+ handle,
8796
8810
  user_data
8797
8811
  )
8798
8812
  );
@@ -8800,8 +8814,11 @@ export function init(RuntimeName, PHPLoader) {
8800
8814
  function successCallback() {
8801
8815
  runtimeKeepalivePop();
8802
8816
  callUserCallback(() =>
8803
- ((a1, a2) => {})(
8804
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
8817
+ ((
8818
+ a1,
8819
+ a2
8820
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
8821
+ handle,
8805
8822
  user_data
8806
8823
  )
8807
8824
  );
@@ -19459,8 +19476,11 @@ export function init(RuntimeName, PHPLoader) {
19459
19476
  var trace = getCallstack();
19460
19477
  var parts = trace.split('\n');
19461
19478
  for (var i = 0; i < parts.length; i++) {
19462
- var ret = ((a1, a2) => {})(
19463
- /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0,
19479
+ var ret = ((
19480
+ a1,
19481
+ a2
19482
+ ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19483
+ 0,
19464
19484
  arg
19465
19485
  );
19466
19486
  if (ret !== 0) return;
@@ -20036,8 +20056,12 @@ export function init(RuntimeName, PHPLoader) {
20036
20056
  stringToUTF8(e.locale || '', keyEventData + 128, 32);
20037
20057
 
20038
20058
  if (
20039
- ((a1, a2, a3) => {})(
20040
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20059
+ ((
20060
+ a1,
20061
+ a2,
20062
+ a3
20063
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20064
+ eventTypeId,
20041
20065
  keyEventData,
20042
20066
  userData
20043
20067
  )
@@ -20155,8 +20179,12 @@ export function init(RuntimeName, PHPLoader) {
20155
20179
  fillMouseEventData(JSEvents.mouseEvent, e, target);
20156
20180
 
20157
20181
  if (
20158
- ((a1, a2, a3) => {})(
20159
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20182
+ ((
20183
+ a1,
20184
+ a2,
20185
+ a3
20186
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20187
+ eventTypeId,
20160
20188
  JSEvents.mouseEvent,
20161
20189
  userData
20162
20190
  )
@@ -20370,8 +20398,12 @@ export function init(RuntimeName, PHPLoader) {
20370
20398
  HEAPF64[(wheelEvent + 80) >> 3] = e['deltaZ'];
20371
20399
  HEAP32[(wheelEvent + 88) >> 2] = e['deltaMode'];
20372
20400
  if (
20373
- ((a1, a2, a3) => {})(
20374
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20401
+ ((
20402
+ a1,
20403
+ a2,
20404
+ a3
20405
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20406
+ eventTypeId,
20375
20407
  wheelEvent,
20376
20408
  userData
20377
20409
  )
@@ -20452,8 +20484,12 @@ export function init(RuntimeName, PHPLoader) {
20452
20484
  HEAP32[(uiEvent + 28) >> 2] = pageXOffset | 0; // scroll offsets are float
20453
20485
  HEAP32[(uiEvent + 32) >> 2] = pageYOffset | 0;
20454
20486
  if (
20455
- ((a1, a2, a3) => {})(
20456
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20487
+ ((
20488
+ a1,
20489
+ a2,
20490
+ a3
20491
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20492
+ eventTypeId,
20457
20493
  uiEvent,
20458
20494
  userData
20459
20495
  )
@@ -20527,8 +20563,12 @@ export function init(RuntimeName, PHPLoader) {
20527
20563
  stringToUTF8(id, focusEvent + 128, 128);
20528
20564
 
20529
20565
  if (
20530
- ((a1, a2, a3) => {})(
20531
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20566
+ ((
20567
+ a1,
20568
+ a2,
20569
+ a3
20570
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20571
+ eventTypeId,
20532
20572
  focusEvent,
20533
20573
  userData
20534
20574
  )
@@ -20644,8 +20684,12 @@ export function init(RuntimeName, PHPLoader) {
20644
20684
  ); // TODO: Thread-safety with respect to emscripten_get_deviceorientation_status()
20645
20685
 
20646
20686
  if (
20647
- ((a1, a2, a3) => {})(
20648
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20687
+ ((
20688
+ a1,
20689
+ a2,
20690
+ a3
20691
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20692
+ eventTypeId,
20649
20693
  JSEvents.deviceOrientationEvent,
20650
20694
  userData
20651
20695
  )
@@ -20728,8 +20772,12 @@ export function init(RuntimeName, PHPLoader) {
20728
20772
  fillDeviceMotionEventData(JSEvents.deviceMotionEvent, e, target); // TODO: Thread-safety with respect to emscripten_get_devicemotion_status()
20729
20773
 
20730
20774
  if (
20731
- ((a1, a2, a3) => {})(
20732
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20775
+ ((
20776
+ a1,
20777
+ a2,
20778
+ a3
20779
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20780
+ eventTypeId,
20733
20781
  JSEvents.deviceMotionEvent,
20734
20782
  userData
20735
20783
  )
@@ -20839,8 +20887,12 @@ export function init(RuntimeName, PHPLoader) {
20839
20887
  fillOrientationChangeEventData(orientationChangeEvent);
20840
20888
 
20841
20889
  if (
20842
- ((a1, a2, a3) => {})(
20843
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20890
+ ((
20891
+ a1,
20892
+ a2,
20893
+ a3
20894
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20895
+ eventTypeId,
20844
20896
  orientationChangeEvent,
20845
20897
  userData
20846
20898
  )
@@ -20973,8 +21025,12 @@ export function init(RuntimeName, PHPLoader) {
20973
21025
  fillFullscreenChangeEventData(fullscreenChangeEvent);
20974
21026
 
20975
21027
  if (
20976
- ((a1, a2, a3) => {})(
20977
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
21028
+ ((
21029
+ a1,
21030
+ a2,
21031
+ a3
21032
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21033
+ eventTypeId,
20978
21034
  fullscreenChangeEvent,
20979
21035
  userData
20980
21036
  )
@@ -21138,8 +21194,12 @@ export function init(RuntimeName, PHPLoader) {
21138
21194
  );
21139
21195
 
21140
21196
  if (currentFullscreenStrategy.canvasResizedCallback) {
21141
- ((a1, a2, a3) => {})(
21142
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
21197
+ ((
21198
+ a1,
21199
+ a2,
21200
+ a3
21201
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21202
+ 37,
21143
21203
  0,
21144
21204
  currentFullscreenStrategy.canvasResizedCallbackUserData
21145
21205
  );
@@ -21245,8 +21305,12 @@ export function init(RuntimeName, PHPLoader) {
21245
21305
  currentFullscreenStrategy = strategy;
21246
21306
 
21247
21307
  if (strategy.canvasResizedCallback) {
21248
- ((a1, a2, a3) => {})(
21249
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
21308
+ ((
21309
+ a1,
21310
+ a2,
21311
+ a3
21312
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21313
+ 37,
21250
21314
  0,
21251
21315
  strategy.canvasResizedCallbackUserData
21252
21316
  );
@@ -21348,8 +21412,12 @@ export function init(RuntimeName, PHPLoader) {
21348
21412
  !inCenteredWithoutScalingFullscreenMode &&
21349
21413
  currentFullscreenStrategy.canvasResizedCallback
21350
21414
  ) {
21351
- ((a1, a2, a3) => {})(
21352
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
21415
+ ((
21416
+ a1,
21417
+ a2,
21418
+ a3
21419
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21420
+ 37,
21353
21421
  0,
21354
21422
  currentFullscreenStrategy.canvasResizedCallbackUserData
21355
21423
  );
@@ -21448,8 +21516,12 @@ export function init(RuntimeName, PHPLoader) {
21448
21516
  softFullscreenResizeWebGLRenderTarget
21449
21517
  );
21450
21518
  if (strategy.canvasResizedCallback) {
21451
- ((a1, a2, a3) => {})(
21452
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
21519
+ ((
21520
+ a1,
21521
+ a2,
21522
+ a3
21523
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21524
+ 37,
21453
21525
  0,
21454
21526
  strategy.canvasResizedCallbackUserData
21455
21527
  );
@@ -21462,8 +21534,12 @@ export function init(RuntimeName, PHPLoader) {
21462
21534
 
21463
21535
  // Inform the caller that the canvas size has changed.
21464
21536
  if (strategy.canvasResizedCallback) {
21465
- ((a1, a2, a3) => {})(
21466
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
21537
+ ((
21538
+ a1,
21539
+ a2,
21540
+ a3
21541
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21542
+ 37,
21467
21543
  0,
21468
21544
  strategy.canvasResizedCallbackUserData
21469
21545
  );
@@ -21531,8 +21607,12 @@ export function init(RuntimeName, PHPLoader) {
21531
21607
  fillPointerlockChangeEventData(pointerlockChangeEvent);
21532
21608
 
21533
21609
  if (
21534
- ((a1, a2, a3) => {})(
21535
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
21610
+ ((
21611
+ a1,
21612
+ a2,
21613
+ a3
21614
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21615
+ eventTypeId,
21536
21616
  pointerlockChangeEvent,
21537
21617
  userData
21538
21618
  )
@@ -21622,8 +21702,12 @@ export function init(RuntimeName, PHPLoader) {
21622
21702
  ) => {
21623
21703
  var pointerlockErrorEventHandlerFunc = (e = event) => {
21624
21704
  if (
21625
- ((a1, a2, a3) => {})(
21626
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
21705
+ ((
21706
+ a1,
21707
+ a2,
21708
+ a3
21709
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21710
+ eventTypeId,
21627
21711
  0,
21628
21712
  userData
21629
21713
  )
@@ -21823,8 +21907,12 @@ export function init(RuntimeName, PHPLoader) {
21823
21907
  fillVisibilityChangeEventData(visibilityChangeEvent);
21824
21908
 
21825
21909
  if (
21826
- ((a1, a2, a3) => {})(
21827
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
21910
+ ((
21911
+ a1,
21912
+ a2,
21913
+ a3
21914
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21915
+ eventTypeId,
21828
21916
  visibilityChangeEvent,
21829
21917
  userData
21830
21918
  )
@@ -21944,8 +22032,12 @@ export function init(RuntimeName, PHPLoader) {
21944
22032
  HEAP32[(touchEvent + 8) >> 2] = numTouches;
21945
22033
 
21946
22034
  if (
21947
- ((a1, a2, a3) => {})(
21948
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
22035
+ ((
22036
+ a1,
22037
+ a2,
22038
+ a3
22039
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22040
+ eventTypeId,
21949
22041
  touchEvent,
21950
22042
  userData
21951
22043
  )
@@ -22083,8 +22175,12 @@ export function init(RuntimeName, PHPLoader) {
22083
22175
  fillGamepadEventData(gamepadEvent, e['gamepad']);
22084
22176
 
22085
22177
  if (
22086
- ((a1, a2, a3) => {})(
22087
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
22178
+ ((
22179
+ a1,
22180
+ a2,
22181
+ a3
22182
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22183
+ eventTypeId,
22088
22184
  gamepadEvent,
22089
22185
  userData
22090
22186
  )
@@ -22186,8 +22282,12 @@ export function init(RuntimeName, PHPLoader) {
22186
22282
  ) => {
22187
22283
  var beforeUnloadEventHandlerFunc = (e = event) => {
22188
22284
  // Note: This is always called on the main browser thread, since it needs synchronously return a value!
22189
- var confirmationMessage = ((a1, a2, a3) => {})(
22190
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
22285
+ var confirmationMessage = ((
22286
+ a1,
22287
+ a2,
22288
+ a3
22289
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22290
+ eventTypeId,
22191
22291
  0,
22192
22292
  userData
22193
22293
  );
@@ -22258,8 +22358,12 @@ export function init(RuntimeName, PHPLoader) {
22258
22358
  fillBatteryEventData(batteryEvent, battery());
22259
22359
 
22260
22360
  if (
22261
- ((a1, a2, a3) => {})(
22262
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
22361
+ ((
22362
+ a1,
22363
+ a2,
22364
+ a3
22365
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22366
+ eventTypeId,
22263
22367
  batteryEvent,
22264
22368
  userData
22265
22369
  )
@@ -22349,8 +22453,11 @@ export function init(RuntimeName, PHPLoader) {
22349
22453
 
22350
22454
  var _emscripten_request_animation_frame = (cb, userData) =>
22351
22455
  requestAnimationFrame((timeStamp) =>
22352
- ((a1, a2) => {})(
22353
- /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp,
22456
+ ((
22457
+ a1,
22458
+ a2
22459
+ ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22460
+ timeStamp,
22354
22461
  userData
22355
22462
  )
22356
22463
  );
@@ -22362,8 +22469,11 @@ export function init(RuntimeName, PHPLoader) {
22362
22469
  var _emscripten_request_animation_frame_loop = (cb, userData) => {
22363
22470
  function tick(timeStamp) {
22364
22471
  if (
22365
- ((a1, a2) => {})(
22366
- /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp,
22472
+ ((
22473
+ a1,
22474
+ a2
22475
+ ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22476
+ timeStamp,
22367
22477
  userData
22368
22478
  )
22369
22479
  ) {
@@ -22588,8 +22698,10 @@ export function init(RuntimeName, PHPLoader) {
22588
22698
  return emSetImmediate(() => {
22589
22699
  runtimeKeepalivePop();
22590
22700
  callUserCallback(() =>
22591
- ((a1) => {})(
22592
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
22701
+ ((
22702
+ a1
22703
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22704
+ userData
22593
22705
  )
22594
22706
  );
22595
22707
  });
@@ -22606,8 +22718,10 @@ export function init(RuntimeName, PHPLoader) {
22606
22718
  function tick() {
22607
22719
  callUserCallback(() => {
22608
22720
  if (
22609
- ((a1) => {})(
22610
- /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
22721
+ ((
22722
+ a1
22723
+ ) => {}) /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22724
+ userData
22611
22725
  )
22612
22726
  ) {
22613
22727
  emSetImmediate(tick);
@@ -22624,8 +22738,10 @@ export function init(RuntimeName, PHPLoader) {
22624
22738
  var _emscripten_set_timeout = (cb, msecs, userData) =>
22625
22739
  safeSetTimeout(
22626
22740
  () =>
22627
- ((a1) => {})(
22628
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
22741
+ ((
22742
+ a1
22743
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22744
+ userData
22629
22745
  ),
22630
22746
  msecs
22631
22747
  );
@@ -22641,8 +22757,11 @@ export function init(RuntimeName, PHPLoader) {
22641
22757
  runtimeKeepalivePop();
22642
22758
  callUserCallback(() => {
22643
22759
  if (
22644
- ((a1, a2) => {})(
22645
- /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ t,
22760
+ ((
22761
+ a1,
22762
+ a2
22763
+ ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22764
+ t,
22646
22765
  userData
22647
22766
  )
22648
22767
  ) {
@@ -22666,8 +22785,10 @@ export function init(RuntimeName, PHPLoader) {
22666
22785
  runtimeKeepalivePush();
22667
22786
  return setInterval(() => {
22668
22787
  callUserCallback(() =>
22669
- ((a1) => {})(
22670
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
22788
+ ((
22789
+ a1
22790
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22791
+ userData
22671
22792
  )
22672
22793
  );
22673
22794
  }, msecs);
@@ -22682,8 +22803,10 @@ export function init(RuntimeName, PHPLoader) {
22682
22803
 
22683
22804
  var _emscripten_async_call = (func, arg, millis) => {
22684
22805
  var wrapper = () =>
22685
- ((a1) => {})(
22686
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
22806
+ ((
22807
+ a1
22808
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22809
+ arg
22687
22810
  );
22688
22811
 
22689
22812
  if (
@@ -22716,7 +22839,7 @@ export function init(RuntimeName, PHPLoader) {
22716
22839
 
22717
22840
  var _emscripten_set_main_loop = (func, fps, simulateInfiniteLoop) => {
22718
22841
  var iterFunc =
22719
- () => {}; /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */
22842
+ () => {} /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */;
22720
22843
  setMainLoop(iterFunc, fps, simulateInfiniteLoop);
22721
22844
  };
22722
22845
  _emscripten_set_main_loop.sig = 'vpii';
@@ -22728,8 +22851,10 @@ export function init(RuntimeName, PHPLoader) {
22728
22851
  simulateInfiniteLoop
22729
22852
  ) => {
22730
22853
  var iterFunc = () =>
22731
- ((a1) => {})(
22732
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
22854
+ ((
22855
+ a1
22856
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22857
+ arg
22733
22858
  );
22734
22859
  setMainLoop(iterFunc, fps, simulateInfiniteLoop, arg);
22735
22860
  };
@@ -22750,8 +22875,10 @@ export function init(RuntimeName, PHPLoader) {
22750
22875
  var __emscripten_push_main_loop_blocker = (func, arg, name) => {
22751
22876
  MainLoop.queue.push({
22752
22877
  func: () => {
22753
- ((a1) => {})(
22754
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
22878
+ ((
22879
+ a1
22880
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22881
+ arg
22755
22882
  );
22756
22883
  },
22757
22884
  name: UTF8ToString(name),
@@ -22764,8 +22891,10 @@ export function init(RuntimeName, PHPLoader) {
22764
22891
  var __emscripten_push_uncounted_main_loop_blocker = (func, arg, name) => {
22765
22892
  MainLoop.queue.push({
22766
22893
  func: () => {
22767
- ((a1) => {})(
22768
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
22894
+ ((
22895
+ a1
22896
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22897
+ arg
22769
22898
  );
22770
22899
  },
22771
22900
  name: UTF8ToString(name),
@@ -22799,8 +22928,12 @@ export function init(RuntimeName, PHPLoader) {
22799
22928
  var resultPtr = stackAlloc(POINTER_SIZE);
22800
22929
  HEAPU32[resultPtr >> 2] = 0;
22801
22930
  try {
22802
- var result = ((a1, a2, a3) => {})(
22803
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ resultPtr,
22931
+ var result = ((
22932
+ a1,
22933
+ a2,
22934
+ a3
22935
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22936
+ resultPtr,
22804
22937
  userData,
22805
22938
  value
22806
22939
  );
@@ -23736,15 +23869,19 @@ export function init(RuntimeName, PHPLoader) {
23736
23869
  () => {
23737
23870
  runtimeKeepalivePop();
23738
23871
  if (onload)
23739
- ((a1) => {})(
23740
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file
23872
+ ((
23873
+ a1
23874
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23875
+ file
23741
23876
  );
23742
23877
  },
23743
23878
  () => {
23744
23879
  runtimeKeepalivePop();
23745
23880
  if (onerror)
23746
- ((a1) => {})(
23747
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file
23881
+ ((
23882
+ a1
23883
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23884
+ file
23748
23885
  );
23749
23886
  },
23750
23887
  true // don'tCreateFile - it's already there
@@ -23778,16 +23915,21 @@ export function init(RuntimeName, PHPLoader) {
23778
23915
  () => {
23779
23916
  runtimeKeepalivePop();
23780
23917
  if (onload)
23781
- ((a1, a2) => {})(
23782
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
23918
+ ((
23919
+ a1,
23920
+ a2
23921
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23922
+ arg,
23783
23923
  cname
23784
23924
  );
23785
23925
  },
23786
23926
  () => {
23787
23927
  runtimeKeepalivePop();
23788
23928
  if (onerror)
23789
- ((a1) => {})(
23790
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
23929
+ ((
23930
+ a1
23931
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23932
+ arg
23791
23933
  );
23792
23934
  },
23793
23935
  true // don'tCreateFile - it's already there
@@ -24060,10 +24202,10 @@ export function init(RuntimeName, PHPLoader) {
24060
24202
  runtimeKeepalivePop();
24061
24203
  callUserCallback(() => {
24062
24204
  var sp = stackSave();
24063
- ((a1) => {})(
24064
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stringToUTF8OnStack(
24065
- _file
24066
- )
24205
+ ((
24206
+ a1
24207
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24208
+ stringToUTF8OnStack(_file)
24067
24209
  );
24068
24210
  stackRestore(sp);
24069
24211
  });
@@ -24107,8 +24249,12 @@ export function init(RuntimeName, PHPLoader) {
24107
24249
  callUserCallback(() => {
24108
24250
  var buffer = _malloc(byteArray.length);
24109
24251
  HEAPU8.set(byteArray, buffer);
24110
- ((a1, a2, a3) => {})(
24111
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata,
24252
+ ((
24253
+ a1,
24254
+ a2,
24255
+ a3
24256
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24257
+ userdata,
24112
24258
  buffer,
24113
24259
  byteArray.length
24114
24260
  );
@@ -24118,8 +24264,10 @@ export function init(RuntimeName, PHPLoader) {
24118
24264
  if (onerror) {
24119
24265
  runtimeKeepalivePop();
24120
24266
  callUserCallback(() => {
24121
- ((a1) => {})(
24122
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata
24267
+ ((
24268
+ a1
24269
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24270
+ userdata
24123
24271
  );
24124
24272
  });
24125
24273
  }
@@ -24176,8 +24324,12 @@ export function init(RuntimeName, PHPLoader) {
24176
24324
  );
24177
24325
  if (onload) {
24178
24326
  var sp = stackSave();
24179
- ((a1, a2, a3) => {})(
24180
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24327
+ ((
24328
+ a1,
24329
+ a2,
24330
+ a3
24331
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24332
+ handle,
24181
24333
  userdata,
24182
24334
  stringToUTF8OnStack(_file)
24183
24335
  );
@@ -24185,8 +24337,12 @@ export function init(RuntimeName, PHPLoader) {
24185
24337
  }
24186
24338
  } else {
24187
24339
  if (onerror)
24188
- ((a1, a2, a3) => {})(
24189
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24340
+ ((
24341
+ a1,
24342
+ a2,
24343
+ a3
24344
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24345
+ handle,
24190
24346
  userdata,
24191
24347
  http.status
24192
24348
  );
@@ -24199,8 +24355,12 @@ export function init(RuntimeName, PHPLoader) {
24199
24355
  http.onerror = (e) => {
24200
24356
  runtimeKeepalivePop();
24201
24357
  if (onerror)
24202
- ((a1, a2, a3) => {})(
24203
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24358
+ ((
24359
+ a1,
24360
+ a2,
24361
+ a3
24362
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24363
+ handle,
24204
24364
  userdata,
24205
24365
  http.status
24206
24366
  );
@@ -24215,8 +24375,12 @@ export function init(RuntimeName, PHPLoader) {
24215
24375
  ) {
24216
24376
  var percentComplete = (e.loaded / e.total) * 100;
24217
24377
  if (onprogress)
24218
- ((a1, a2, a3) => {})(
24219
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24378
+ ((
24379
+ a1,
24380
+ a2,
24381
+ a3
24382
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24383
+ handle,
24220
24384
  userdata,
24221
24385
  percentComplete
24222
24386
  );
@@ -24273,8 +24437,13 @@ export function init(RuntimeName, PHPLoader) {
24273
24437
  if (http.statusText) {
24274
24438
  statusText = stringToUTF8OnStack(http.statusText);
24275
24439
  }
24276
- ((a1, a2, a3, a4) => {})(
24277
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24440
+ ((
24441
+ a1,
24442
+ a2,
24443
+ a3,
24444
+ a4
24445
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24446
+ handle,
24278
24447
  userdata,
24279
24448
  http.status,
24280
24449
  statusText
@@ -24295,8 +24464,13 @@ export function init(RuntimeName, PHPLoader) {
24295
24464
  var buffer = _malloc(byteArray.length);
24296
24465
  HEAPU8.set(byteArray, buffer);
24297
24466
  if (onload)
24298
- ((a1, a2, a3, a4) => {})(
24299
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24467
+ ((
24468
+ a1,
24469
+ a2,
24470
+ a3,
24471
+ a4
24472
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24473
+ handle,
24300
24474
  userdata,
24301
24475
  buffer,
24302
24476
  byteArray.length
@@ -24317,8 +24491,13 @@ export function init(RuntimeName, PHPLoader) {
24317
24491
  // PROGRESS
24318
24492
  http.onprogress = (e) => {
24319
24493
  if (onprogress)
24320
- ((a1, a2, a3, a4) => {})(
24321
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24494
+ ((
24495
+ a1,
24496
+ a2,
24497
+ a3,
24498
+ a4
24499
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24500
+ handle,
24322
24501
  userdata,
24323
24502
  e.loaded,
24324
24503
  e.lengthComputable || e.lengthComputable === undefined
@@ -24438,16 +24617,24 @@ export function init(RuntimeName, PHPLoader) {
24438
24617
  if (event === 'error') {
24439
24618
  withStackSave(() => {
24440
24619
  var msg = stringToUTF8OnStack(data[2]);
24441
- ((a1, a2, a3, a4) => {})(
24442
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data[0],
24620
+ ((
24621
+ a1,
24622
+ a2,
24623
+ a3,
24624
+ a4
24625
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24626
+ data[0],
24443
24627
  data[1],
24444
24628
  msg,
24445
24629
  userData
24446
24630
  );
24447
24631
  });
24448
24632
  } else {
24449
- ((a1, a2) => {})(
24450
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data,
24633
+ ((
24634
+ a1,
24635
+ a2
24636
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24637
+ data,
24451
24638
  userData
24452
24639
  );
24453
24640
  }
@@ -24913,8 +25100,12 @@ export function init(RuntimeName, PHPLoader) {
24913
25100
  ) => {
24914
25101
  var webGlEventHandlerFunc = (e = event) => {
24915
25102
  if (
24916
- ((a1, a2, a3) => {})(
24917
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
25103
+ ((
25104
+ a1,
25105
+ a2,
25106
+ a3
25107
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25108
+ eventTypeId,
24918
25109
  0,
24919
25110
  userData
24920
25111
  )
@@ -25133,15 +25324,21 @@ export function init(RuntimeName, PHPLoader) {
25133
25324
  ) {
25134
25325
  event.preventDefault();
25135
25326
  GLUT.saveModifiers(event);
25136
- ((a1, a2) => {})(
25137
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX,
25327
+ ((
25328
+ a1,
25329
+ a2
25330
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25331
+ lastX,
25138
25332
  lastY
25139
25333
  );
25140
25334
  } else if (GLUT.buttons != 0 && GLUT.motionFunc) {
25141
25335
  event.preventDefault();
25142
25336
  GLUT.saveModifiers(event);
25143
- ((a1, a2) => {})(
25144
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX,
25337
+ ((
25338
+ a1,
25339
+ a2
25340
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25341
+ lastX,
25145
25342
  lastY
25146
25343
  );
25147
25344
  }
@@ -25302,8 +25499,12 @@ export function init(RuntimeName, PHPLoader) {
25302
25499
  if (GLUT.specialFunc) {
25303
25500
  event.preventDefault();
25304
25501
  GLUT.saveModifiers(event);
25305
- ((a1, a2, a3) => {})(
25306
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
25502
+ ((
25503
+ a1,
25504
+ a2,
25505
+ a3
25506
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25507
+ key,
25307
25508
  Browser.mouseX,
25308
25509
  Browser.mouseY
25309
25510
  );
@@ -25313,8 +25514,12 @@ export function init(RuntimeName, PHPLoader) {
25313
25514
  if (key !== null && GLUT.keyboardFunc) {
25314
25515
  event.preventDefault();
25315
25516
  GLUT.saveModifiers(event);
25316
- ((a1, a2, a3) => {})(
25317
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
25517
+ ((
25518
+ a1,
25519
+ a2,
25520
+ a3
25521
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25522
+ key,
25318
25523
  Browser.mouseX,
25319
25524
  Browser.mouseY
25320
25525
  );
@@ -25329,8 +25534,12 @@ export function init(RuntimeName, PHPLoader) {
25329
25534
  if (GLUT.specialUpFunc) {
25330
25535
  event.preventDefault();
25331
25536
  GLUT.saveModifiers(event);
25332
- ((a1, a2, a3) => {})(
25333
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
25537
+ ((
25538
+ a1,
25539
+ a2,
25540
+ a3
25541
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25542
+ key,
25334
25543
  Browser.mouseX,
25335
25544
  Browser.mouseY
25336
25545
  );
@@ -25340,8 +25549,12 @@ export function init(RuntimeName, PHPLoader) {
25340
25549
  if (key !== null && GLUT.keyboardUpFunc) {
25341
25550
  event.preventDefault();
25342
25551
  GLUT.saveModifiers(event);
25343
- ((a1, a2, a3) => {})(
25344
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
25552
+ ((
25553
+ a1,
25554
+ a2,
25555
+ a3
25556
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25557
+ key,
25345
25558
  Browser.mouseX,
25346
25559
  Browser.mouseY
25347
25560
  );
@@ -25405,10 +25618,13 @@ export function init(RuntimeName, PHPLoader) {
25405
25618
  } catch (e) {}
25406
25619
  event.preventDefault();
25407
25620
  GLUT.saveModifiers(event);
25408
- ((a1, a2, a3, a4) => {})(
25409
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[
25410
- 'button'
25411
- ],
25621
+ ((
25622
+ a1,
25623
+ a2,
25624
+ a3,
25625
+ a4
25626
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25627
+ event['button'],
25412
25628
  0 /*GLUT_DOWN*/,
25413
25629
  Browser.mouseX,
25414
25630
  Browser.mouseY
@@ -25423,10 +25639,13 @@ export function init(RuntimeName, PHPLoader) {
25423
25639
  if (GLUT.mouseFunc) {
25424
25640
  event.preventDefault();
25425
25641
  GLUT.saveModifiers(event);
25426
- ((a1, a2, a3, a4) => {})(
25427
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[
25428
- 'button'
25429
- ],
25642
+ ((
25643
+ a1,
25644
+ a2,
25645
+ a3,
25646
+ a4
25647
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25648
+ event['button'],
25430
25649
  1 /*GLUT_UP*/,
25431
25650
  Browser.mouseX,
25432
25651
  Browser.mouseY
@@ -25455,8 +25674,13 @@ export function init(RuntimeName, PHPLoader) {
25455
25674
  if (GLUT.mouseFunc) {
25456
25675
  event.preventDefault();
25457
25676
  GLUT.saveModifiers(event);
25458
- ((a1, a2, a3, a4) => {})(
25459
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ button,
25677
+ ((
25678
+ a1,
25679
+ a2,
25680
+ a3,
25681
+ a4
25682
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25683
+ button,
25460
25684
  0 /*GLUT_DOWN*/,
25461
25685
  Browser.mouseX,
25462
25686
  Browser.mouseY
@@ -25499,8 +25723,11 @@ export function init(RuntimeName, PHPLoader) {
25499
25723
  /* Can't call _glutReshapeWindow as that requests cancelling fullscreen. */
25500
25724
  if (GLUT.reshapeFunc) {
25501
25725
  // out("GLUT.reshapeFunc (from FS): " + width + ", " + height);
25502
- ((a1, a2) => {})(
25503
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
25726
+ ((
25727
+ a1,
25728
+ a2
25729
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25730
+ width,
25504
25731
  height
25505
25732
  );
25506
25733
  }
@@ -25543,8 +25770,11 @@ export function init(RuntimeName, PHPLoader) {
25543
25770
 
25544
25771
  Browser.resizeListeners.push((width, height) => {
25545
25772
  if (GLUT.reshapeFunc) {
25546
- ((a1, a2) => {})(
25547
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
25773
+ ((
25774
+ a1,
25775
+ a2
25776
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25777
+ width,
25548
25778
  height
25549
25779
  );
25550
25780
  }
@@ -25657,8 +25887,10 @@ export function init(RuntimeName, PHPLoader) {
25657
25887
  var _glutTimerFunc = (msec, func, value) =>
25658
25888
  safeSetTimeout(
25659
25889
  () =>
25660
- ((a1) => {})(
25661
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ value
25890
+ ((
25891
+ a1
25892
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25893
+ value
25662
25894
  ),
25663
25895
  msec
25664
25896
  );
@@ -25818,8 +26050,11 @@ export function init(RuntimeName, PHPLoader) {
25818
26050
  Browser.setCanvasSize(width, height, true); // N.B. GLUT.reshapeFunc is also registered as a canvas resize callback.
25819
26051
  // Just call it once here.
25820
26052
  if (GLUT.reshapeFunc) {
25821
- ((a1, a2) => {})(
25822
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
26053
+ ((
26054
+ a1,
26055
+ a2
26056
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26057
+ width,
25823
26058
  height
25824
26059
  );
25825
26060
  }
@@ -26881,15 +27116,21 @@ export function init(RuntimeName, PHPLoader) {
26881
27116
  callUserCallback(() => {
26882
27117
  if (error) {
26883
27118
  if (onerror)
26884
- ((a1) => {})(
26885
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27119
+ ((
27120
+ a1
27121
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27122
+ arg
26886
27123
  );
26887
27124
  return;
26888
27125
  }
26889
27126
  var buffer = _malloc(byteArray.length);
26890
27127
  HEAPU8.set(byteArray, buffer);
26891
- ((a1, a2, a3) => {})(
26892
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
27128
+ ((
27129
+ a1,
27130
+ a2,
27131
+ a3
27132
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27133
+ arg,
26893
27134
  buffer,
26894
27135
  byteArray.length
26895
27136
  );
@@ -26921,14 +27162,18 @@ export function init(RuntimeName, PHPLoader) {
26921
27162
  callUserCallback(() => {
26922
27163
  if (error) {
26923
27164
  if (onerror)
26924
- ((a1) => {})(
26925
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27165
+ ((
27166
+ a1
27167
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27168
+ arg
26926
27169
  );
26927
27170
  return;
26928
27171
  }
26929
27172
  if (onstore)
26930
- ((a1) => {})(
26931
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27173
+ ((
27174
+ a1
27175
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27176
+ arg
26932
27177
  );
26933
27178
  });
26934
27179
  }
@@ -26943,14 +27188,18 @@ export function init(RuntimeName, PHPLoader) {
26943
27188
  callUserCallback(() => {
26944
27189
  if (error) {
26945
27190
  if (onerror)
26946
- ((a1) => {})(
26947
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27191
+ ((
27192
+ a1
27193
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27194
+ arg
26948
27195
  );
26949
27196
  return;
26950
27197
  }
26951
27198
  if (ondelete)
26952
- ((a1) => {})(
26953
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27199
+ ((
27200
+ a1
27201
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27202
+ arg
26954
27203
  );
26955
27204
  });
26956
27205
  });
@@ -26967,14 +27216,19 @@ export function init(RuntimeName, PHPLoader) {
26967
27216
  callUserCallback(() => {
26968
27217
  if (error) {
26969
27218
  if (onerror)
26970
- ((a1) => {})(
26971
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27219
+ ((
27220
+ a1
27221
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27222
+ arg
26972
27223
  );
26973
27224
  return;
26974
27225
  }
26975
27226
  if (oncheck)
26976
- ((a1, a2) => {})(
26977
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
27227
+ ((
27228
+ a1,
27229
+ a2
27230
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27231
+ arg,
26978
27232
  exists
26979
27233
  );
26980
27234
  });
@@ -26990,14 +27244,18 @@ export function init(RuntimeName, PHPLoader) {
26990
27244
  callUserCallback(() => {
26991
27245
  if (error) {
26992
27246
  if (onerror)
26993
- ((a1) => {})(
26994
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27247
+ ((
27248
+ a1
27249
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27250
+ arg
26995
27251
  );
26996
27252
  return;
26997
27253
  }
26998
27254
  if (onclear)
26999
- ((a1) => {})(
27000
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27255
+ ((
27256
+ a1
27257
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27258
+ arg
27001
27259
  );
27002
27260
  });
27003
27261
  });
@@ -27154,8 +27412,11 @@ export function init(RuntimeName, PHPLoader) {
27154
27412
  safeSetTimeout(() => {
27155
27413
  var stackBegin = Asyncify.currData + 12;
27156
27414
  var stackEnd = HEAPU32[Asyncify.currData >> 2];
27157
- ((a1, a2) => {})(
27158
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stackBegin,
27415
+ ((
27416
+ a1,
27417
+ a2
27418
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27419
+ stackBegin,
27159
27420
  stackEnd
27160
27421
  );
27161
27422
  wakeUp();
@@ -27216,8 +27477,10 @@ export function init(RuntimeName, PHPLoader) {
27216
27477
  HEAPU32[(newFiber + 12) >> 2] = 0;
27217
27478
 
27218
27479
  var userData = HEAPU32[(newFiber + 16) >> 2];
27219
- ((a1) => {})(
27220
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
27480
+ ((
27481
+ a1
27482
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27483
+ userData
27221
27484
  );
27222
27485
  } else {
27223
27486
  var asyncifyData = newFiber + 20;
@@ -28229,8 +28492,11 @@ export function init(RuntimeName, PHPLoader) {
28229
28492
  if (!SDL.eventHandler) return;
28230
28493
 
28231
28494
  while (SDL.pollEvent(SDL.eventHandlerTemp)) {
28232
- ((a1, a2) => {})(
28233
- /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL.eventHandlerContext,
28495
+ ((
28496
+ a1,
28497
+ a2
28498
+ ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
28499
+ SDL.eventHandlerContext,
28234
28500
  SDL.eventHandlerTemp
28235
28501
  );
28236
28502
  }
@@ -29863,9 +30129,12 @@ export function init(RuntimeName, PHPLoader) {
29863
30129
  return;
29864
30130
 
29865
30131
  // Ask SDL audio data from the user code.
29866
- ((a1, a2, a3) => {})(
29867
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL
29868
- .audio.userdata,
30132
+ ((
30133
+ a1,
30134
+ a2,
30135
+ a3
30136
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
30137
+ SDL.audio.userdata,
29869
30138
  SDL.audio.buffer,
29870
30139
  SDL.audio.bufferSize
29871
30140
  );
@@ -30323,8 +30592,10 @@ export function init(RuntimeName, PHPLoader) {
30323
30592
  info.audio = null;
30324
30593
  }
30325
30594
  if (SDL.channelFinished) {
30326
- ((a1) => {})(
30327
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel
30595
+ ((
30596
+ a1
30597
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
30598
+ channel
30328
30599
  );
30329
30600
  }
30330
30601
  }
@@ -30393,8 +30664,10 @@ export function init(RuntimeName, PHPLoader) {
30393
30664
  channelInfo.audio = null;
30394
30665
  }
30395
30666
  if (SDL.channelFinished)
30396
- ((a1) => {})(
30397
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel
30667
+ ((
30668
+ a1
30669
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
30670
+ channel
30398
30671
  );
30399
30672
  };
30400
30673
  if (channelInfo.audio) {
@@ -31142,8 +31415,11 @@ export function init(RuntimeName, PHPLoader) {
31142
31415
  var _SDL_AddTimer = (interval, callback, param) =>
31143
31416
  safeSetTimeout(
31144
31417
  () =>
31145
- ((a1, a2) => {})(
31146
- /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ interval,
31418
+ ((
31419
+ a1,
31420
+ a2
31421
+ ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31422
+ interval,
31147
31423
  param
31148
31424
  ),
31149
31425
  interval
@@ -31526,8 +31802,12 @@ export function init(RuntimeName, PHPLoader) {
31526
31802
 
31527
31803
  socket.onopen = function (e) {
31528
31804
  var eventPtr = WS.getSocketEvent(socketId);
31529
- ((a1, a2, a3) => {})(
31530
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31805
+ ((
31806
+ a1,
31807
+ a2,
31808
+ a3
31809
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31810
+ 0 /*TODO*/,
31531
31811
  eventPtr,
31532
31812
  userData
31533
31813
  );
@@ -31549,8 +31829,12 @@ export function init(RuntimeName, PHPLoader) {
31549
31829
 
31550
31830
  socket.onerror = function (e) {
31551
31831
  var eventPtr = WS.getSocketEvent(socketId);
31552
- ((a1, a2, a3) => {})(
31553
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31832
+ ((
31833
+ a1,
31834
+ a2,
31835
+ a3
31836
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31837
+ 0 /*TODO*/,
31554
31838
  eventPtr,
31555
31839
  userData
31556
31840
  );
@@ -31575,8 +31859,12 @@ export function init(RuntimeName, PHPLoader) {
31575
31859
  (HEAP8[eventPtr + 4] = e.wasClean),
31576
31860
  (HEAP16[(eventPtr + 6) >> 1] = e.code),
31577
31861
  stringToUTF8(e.reason, eventPtr + 8, 512);
31578
- ((a1, a2, a3) => {})(
31579
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31862
+ ((
31863
+ a1,
31864
+ a2,
31865
+ a3
31866
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31867
+ 0 /*TODO*/,
31580
31868
  eventPtr,
31581
31869
  userData
31582
31870
  );
@@ -31610,8 +31898,12 @@ export function init(RuntimeName, PHPLoader) {
31610
31898
  (HEAPU32[(eventPtr + 4) >> 2] = buf),
31611
31899
  (HEAP32[(eventPtr + 8) >> 2] = len),
31612
31900
  (HEAP8[eventPtr + 12] = isText),
31613
- ((a1, a2, a3) => {})(
31614
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31901
+ ((
31902
+ a1,
31903
+ a2,
31904
+ a3
31905
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31906
+ 0 /*TODO*/,
31615
31907
  eventPtr,
31616
31908
  userData
31617
31909
  );
@@ -35352,19 +35644,16 @@ export function init(RuntimeName, PHPLoader) {
35352
35644
  // We override NODEFS.createNode() to add an `isSharedFS` flag to all NODEFS
35353
35645
  // nodes. This way we can tell whether file-locking is needed and possible
35354
35646
  // for an FS node, even if wrapped with PROXYFS.
35355
- const originalCreateNode = NODEFS.createNode;
35647
+ const originalNodeFsCreateNode = NODEFS.createNode;
35356
35648
  NODEFS.createNode = function createNodeWithSharedFlag() {
35357
- const node = originalCreateNode.apply(NODEFS, arguments);
35649
+ const node = originalNodeFsCreateNode.apply(NODEFS, arguments);
35358
35650
  node.isSharedFS = true;
35359
35651
  return node;
35360
35652
  };
35361
35653
 
35362
35654
  var originalHashAddNode = FS.hashAddNode;
35363
35655
  FS.hashAddNode = function hashAddNodeIfNotSharedFS(node) {
35364
- if (
35365
- typeof locking === 'object' &&
35366
- locking?.is_shared_fs_node(node)
35367
- ) {
35656
+ if (node?.isSharedFS) {
35368
35657
  // Avoid caching shared VFS nodes so multiple instances
35369
35658
  // can access the same underlying filesystem without
35370
35659
  // conflicting caches.