@php-wasm/node 2.0.4 → 2.0.7

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (41) hide show
  1. package/asyncify/7_2_34/php_7_2.wasm +0 -0
  2. package/asyncify/7_3_33/php_7_3.wasm +0 -0
  3. package/asyncify/7_4_33/php_7_4.wasm +0 -0
  4. package/asyncify/8_0_30/php_8_0.wasm +0 -0
  5. package/asyncify/8_1_33/php_8_1.wasm +0 -0
  6. package/asyncify/8_2_29/php_8_2.wasm +0 -0
  7. package/asyncify/8_3_23/php_8_3.wasm +0 -0
  8. package/asyncify/8_3_24/php_8_3.wasm +0 -0
  9. package/asyncify/8_4_10/php_8_4.wasm +0 -0
  10. package/asyncify/8_4_11/php_8_4.wasm +0 -0
  11. package/asyncify/php_7_2.js +512 -223
  12. package/asyncify/php_7_3.js +509 -220
  13. package/asyncify/php_7_4.js +516 -227
  14. package/asyncify/php_8_0.js +509 -220
  15. package/asyncify/php_8_1.js +509 -220
  16. package/asyncify/php_8_2.js +509 -220
  17. package/asyncify/php_8_3.js +519 -230
  18. package/asyncify/php_8_4.js +515 -226
  19. package/index.cjs +657 -1191
  20. package/index.js +657 -1191
  21. package/jspi/7_2_34/php_7_2.wasm +0 -0
  22. package/jspi/7_3_33/php_7_3.wasm +0 -0
  23. package/jspi/7_4_33/php_7_4.wasm +0 -0
  24. package/jspi/8_0_30/php_8_0.wasm +0 -0
  25. package/jspi/8_1_33/php_8_1.wasm +0 -0
  26. package/jspi/8_2_29/php_8_2.wasm +0 -0
  27. package/jspi/8_3_23/php_8_3.wasm +0 -0
  28. package/jspi/8_3_24/php_8_3.wasm +0 -0
  29. package/jspi/8_4_10/php_8_4.wasm +0 -0
  30. package/jspi/8_4_11/php_8_4.wasm +0 -0
  31. package/jspi/php_7_2.js +42 -36
  32. package/jspi/php_7_3.js +42 -36
  33. package/jspi/php_7_4.js +42 -36
  34. package/jspi/php_8_0.js +42 -36
  35. package/jspi/php_8_1.js +42 -36
  36. package/jspi/php_8_2.js +42 -36
  37. package/jspi/php_8_3.js +48 -42
  38. package/jspi/php_8_4.js +48 -42
  39. package/lib/file-lock-manager-for-node.d.ts +9 -2
  40. package/lib/load-runtime.d.ts +2 -1
  41. package/package.json +7 -7
@@ -1774,8 +1774,10 @@ export function init(RuntimeName, PHPLoader) {
1774
1774
  );
1775
1775
 
1776
1776
  var ___call_sighandler = (fp, sig) =>
1777
- ((a1) => {})(
1778
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ sig
1777
+ ((
1778
+ a1
1779
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
1780
+ sig
1779
1781
  );
1780
1782
  ___call_sighandler.sig = 'vpi';
1781
1783
 
@@ -7101,35 +7103,25 @@ export function init(RuntimeName, PHPLoader) {
7101
7103
  1: 'exclusive',
7102
7104
  2: 'unlocked',
7103
7105
  },
7104
- is_shared_fs_node(node) {
7105
- if (node?.isSharedFS) {
7106
- return true;
7107
- }
7108
-
7109
- // Handle PROXYFS nodes which wrap other nodes.
7110
- if (
7111
- !node?.mount?.opts?.fs?.lookupPath ||
7112
- !node?.mount?.type?.realPath
7113
- ) {
7114
- return false;
7106
+ is_path_to_shared_fs(path) {
7107
+ _js_wasm_trace('is_path_to_shared_fs(%s)', path);
7108
+ const { node } = FS.lookupPath(path, { noent_okay: true });
7109
+ if (node.mount.type !== PROXYFS) {
7110
+ return !!node.isSharedFS;
7111
+ }
7112
+
7113
+ // This looks like a PROXYFS node. Let's try a lookup.
7114
+ const nodePath = PROXYFS.realPath(node);
7115
+ const backingFs = node?.mount?.opts?.fs;
7116
+ if (backingFs) {
7117
+ // Tolerate ENOENT because looking up a MEMFS node by path always fails.
7118
+ const { node: backingNode } = backingFs.lookupPath(nodePath, {
7119
+ noent_okay: true,
7120
+ });
7121
+ return !!backingNode?.isSharedFS;
7115
7122
  }
7116
7123
 
7117
- // Only NODEFS can be shared between workers at the moment.
7118
- if (node.mount.type !== NODEFS) {
7119
- return false;
7120
- }
7121
- const vfsPath = node.mount.type.realPath(node);
7122
- try {
7123
- const underlyingNode =
7124
- node.mount.opts.fs.lookupPath(vfsPath)?.node;
7125
- return !!underlyingNode?.isSharedFS;
7126
- } catch (e) {
7127
- return false;
7128
- }
7129
- },
7130
- is_path_to_shared_fs(path) {
7131
- const { node } = FS.lookupPath(path);
7132
- return locking.is_shared_fs_node(node);
7124
+ return false;
7133
7125
  },
7134
7126
  get_fd_access_mode(fd) {
7135
7127
  const emscripten_F_GETFL = Number('3');
@@ -7147,8 +7139,26 @@ export function init(RuntimeName, PHPLoader) {
7147
7139
  }
7148
7140
  },
7149
7141
  get_native_path_from_vfs_path(vfsPath) {
7150
- const { node } = FS.lookupPath(vfsPath);
7151
- return NODEFS.realPath(node);
7142
+ // TODO: Should there be a try/catch here?
7143
+ const { node } = FS.lookupPath(vfsPath, {});
7144
+ if (node.mount.type === NODEFS) {
7145
+ return NODEFS.realPath(node);
7146
+ } else if (node.mount.type === PROXYFS) {
7147
+ // TODO: Tolerate ENOENT here?
7148
+ const { node: backingNode, path: backingPath } =
7149
+ node.mount.opts.fs.lookupPath(vfsPath);
7150
+ _js_wasm_trace(
7151
+ 'backingNode for %s: %s',
7152
+ vfsPath,
7153
+ backingPath,
7154
+ backingNode
7155
+ );
7156
+ return backingNode.mount.type.realPath(backingNode);
7157
+ } else {
7158
+ throw new Error(
7159
+ `Unsupported filesystem type for path ${vfsPath}`
7160
+ );
7161
+ }
7152
7162
  },
7153
7163
  check_lock_params(fd, l_type) {
7154
7164
  const emscripten_O_RDONLY = Number('0');
@@ -7348,6 +7358,8 @@ export function init(RuntimeName, PHPLoader) {
7348
7358
  return -ERRNO_CODES.EBADF;
7349
7359
  }
7350
7360
 
7361
+ const flockStructAddr = syscallGetVarargP();
7362
+
7351
7363
  if (!locking.is_path_to_shared_fs(vfsPath)) {
7352
7364
  _js_wasm_trace(
7353
7365
  "fcntl(%d, F_GETLK) locking is not implemented for non-NodeFS path '%s'",
@@ -7363,7 +7375,6 @@ export function init(RuntimeName, PHPLoader) {
7363
7375
  return 0;
7364
7376
  }
7365
7377
 
7366
- const flockStructAddr = syscallGetVarargP();
7367
7378
  const flockStruct = read_flock_struct(flockStructAddr);
7368
7379
 
7369
7380
  if (!(flockStruct.l_type in locking.fcntlToLockState)) {
@@ -8791,8 +8802,11 @@ export function init(RuntimeName, PHPLoader) {
8791
8802
  dlSetError(`'Could not load dynamic lib: ${filename}\n${e}`);
8792
8803
  runtimeKeepalivePop();
8793
8804
  callUserCallback(() =>
8794
- ((a1, a2) => {})(
8795
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
8805
+ ((
8806
+ a1,
8807
+ a2
8808
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
8809
+ handle,
8796
8810
  user_data
8797
8811
  )
8798
8812
  );
@@ -8800,8 +8814,11 @@ export function init(RuntimeName, PHPLoader) {
8800
8814
  function successCallback() {
8801
8815
  runtimeKeepalivePop();
8802
8816
  callUserCallback(() =>
8803
- ((a1, a2) => {})(
8804
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
8817
+ ((
8818
+ a1,
8819
+ a2
8820
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
8821
+ handle,
8805
8822
  user_data
8806
8823
  )
8807
8824
  );
@@ -19463,8 +19480,11 @@ export function init(RuntimeName, PHPLoader) {
19463
19480
  var trace = getCallstack();
19464
19481
  var parts = trace.split('\n');
19465
19482
  for (var i = 0; i < parts.length; i++) {
19466
- var ret = ((a1, a2) => {})(
19467
- /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0,
19483
+ var ret = ((
19484
+ a1,
19485
+ a2
19486
+ ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19487
+ 0,
19468
19488
  arg
19469
19489
  );
19470
19490
  if (ret !== 0) return;
@@ -20040,8 +20060,12 @@ export function init(RuntimeName, PHPLoader) {
20040
20060
  stringToUTF8(e.locale || '', keyEventData + 128, 32);
20041
20061
 
20042
20062
  if (
20043
- ((a1, a2, a3) => {})(
20044
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20063
+ ((
20064
+ a1,
20065
+ a2,
20066
+ a3
20067
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20068
+ eventTypeId,
20045
20069
  keyEventData,
20046
20070
  userData
20047
20071
  )
@@ -20159,8 +20183,12 @@ export function init(RuntimeName, PHPLoader) {
20159
20183
  fillMouseEventData(JSEvents.mouseEvent, e, target);
20160
20184
 
20161
20185
  if (
20162
- ((a1, a2, a3) => {})(
20163
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20186
+ ((
20187
+ a1,
20188
+ a2,
20189
+ a3
20190
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20191
+ eventTypeId,
20164
20192
  JSEvents.mouseEvent,
20165
20193
  userData
20166
20194
  )
@@ -20374,8 +20402,12 @@ export function init(RuntimeName, PHPLoader) {
20374
20402
  HEAPF64[(wheelEvent + 80) >> 3] = e['deltaZ'];
20375
20403
  HEAP32[(wheelEvent + 88) >> 2] = e['deltaMode'];
20376
20404
  if (
20377
- ((a1, a2, a3) => {})(
20378
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20405
+ ((
20406
+ a1,
20407
+ a2,
20408
+ a3
20409
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20410
+ eventTypeId,
20379
20411
  wheelEvent,
20380
20412
  userData
20381
20413
  )
@@ -20456,8 +20488,12 @@ export function init(RuntimeName, PHPLoader) {
20456
20488
  HEAP32[(uiEvent + 28) >> 2] = pageXOffset | 0; // scroll offsets are float
20457
20489
  HEAP32[(uiEvent + 32) >> 2] = pageYOffset | 0;
20458
20490
  if (
20459
- ((a1, a2, a3) => {})(
20460
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20491
+ ((
20492
+ a1,
20493
+ a2,
20494
+ a3
20495
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20496
+ eventTypeId,
20461
20497
  uiEvent,
20462
20498
  userData
20463
20499
  )
@@ -20531,8 +20567,12 @@ export function init(RuntimeName, PHPLoader) {
20531
20567
  stringToUTF8(id, focusEvent + 128, 128);
20532
20568
 
20533
20569
  if (
20534
- ((a1, a2, a3) => {})(
20535
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20570
+ ((
20571
+ a1,
20572
+ a2,
20573
+ a3
20574
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20575
+ eventTypeId,
20536
20576
  focusEvent,
20537
20577
  userData
20538
20578
  )
@@ -20648,8 +20688,12 @@ export function init(RuntimeName, PHPLoader) {
20648
20688
  ); // TODO: Thread-safety with respect to emscripten_get_deviceorientation_status()
20649
20689
 
20650
20690
  if (
20651
- ((a1, a2, a3) => {})(
20652
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20691
+ ((
20692
+ a1,
20693
+ a2,
20694
+ a3
20695
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20696
+ eventTypeId,
20653
20697
  JSEvents.deviceOrientationEvent,
20654
20698
  userData
20655
20699
  )
@@ -20732,8 +20776,12 @@ export function init(RuntimeName, PHPLoader) {
20732
20776
  fillDeviceMotionEventData(JSEvents.deviceMotionEvent, e, target); // TODO: Thread-safety with respect to emscripten_get_devicemotion_status()
20733
20777
 
20734
20778
  if (
20735
- ((a1, a2, a3) => {})(
20736
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20779
+ ((
20780
+ a1,
20781
+ a2,
20782
+ a3
20783
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20784
+ eventTypeId,
20737
20785
  JSEvents.deviceMotionEvent,
20738
20786
  userData
20739
20787
  )
@@ -20843,8 +20891,12 @@ export function init(RuntimeName, PHPLoader) {
20843
20891
  fillOrientationChangeEventData(orientationChangeEvent);
20844
20892
 
20845
20893
  if (
20846
- ((a1, a2, a3) => {})(
20847
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20894
+ ((
20895
+ a1,
20896
+ a2,
20897
+ a3
20898
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20899
+ eventTypeId,
20848
20900
  orientationChangeEvent,
20849
20901
  userData
20850
20902
  )
@@ -20977,8 +21029,12 @@ export function init(RuntimeName, PHPLoader) {
20977
21029
  fillFullscreenChangeEventData(fullscreenChangeEvent);
20978
21030
 
20979
21031
  if (
20980
- ((a1, a2, a3) => {})(
20981
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
21032
+ ((
21033
+ a1,
21034
+ a2,
21035
+ a3
21036
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21037
+ eventTypeId,
20982
21038
  fullscreenChangeEvent,
20983
21039
  userData
20984
21040
  )
@@ -21142,8 +21198,12 @@ export function init(RuntimeName, PHPLoader) {
21142
21198
  );
21143
21199
 
21144
21200
  if (currentFullscreenStrategy.canvasResizedCallback) {
21145
- ((a1, a2, a3) => {})(
21146
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
21201
+ ((
21202
+ a1,
21203
+ a2,
21204
+ a3
21205
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21206
+ 37,
21147
21207
  0,
21148
21208
  currentFullscreenStrategy.canvasResizedCallbackUserData
21149
21209
  );
@@ -21249,8 +21309,12 @@ export function init(RuntimeName, PHPLoader) {
21249
21309
  currentFullscreenStrategy = strategy;
21250
21310
 
21251
21311
  if (strategy.canvasResizedCallback) {
21252
- ((a1, a2, a3) => {})(
21253
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
21312
+ ((
21313
+ a1,
21314
+ a2,
21315
+ a3
21316
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21317
+ 37,
21254
21318
  0,
21255
21319
  strategy.canvasResizedCallbackUserData
21256
21320
  );
@@ -21352,8 +21416,12 @@ export function init(RuntimeName, PHPLoader) {
21352
21416
  !inCenteredWithoutScalingFullscreenMode &&
21353
21417
  currentFullscreenStrategy.canvasResizedCallback
21354
21418
  ) {
21355
- ((a1, a2, a3) => {})(
21356
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
21419
+ ((
21420
+ a1,
21421
+ a2,
21422
+ a3
21423
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21424
+ 37,
21357
21425
  0,
21358
21426
  currentFullscreenStrategy.canvasResizedCallbackUserData
21359
21427
  );
@@ -21452,8 +21520,12 @@ export function init(RuntimeName, PHPLoader) {
21452
21520
  softFullscreenResizeWebGLRenderTarget
21453
21521
  );
21454
21522
  if (strategy.canvasResizedCallback) {
21455
- ((a1, a2, a3) => {})(
21456
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
21523
+ ((
21524
+ a1,
21525
+ a2,
21526
+ a3
21527
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21528
+ 37,
21457
21529
  0,
21458
21530
  strategy.canvasResizedCallbackUserData
21459
21531
  );
@@ -21466,8 +21538,12 @@ export function init(RuntimeName, PHPLoader) {
21466
21538
 
21467
21539
  // Inform the caller that the canvas size has changed.
21468
21540
  if (strategy.canvasResizedCallback) {
21469
- ((a1, a2, a3) => {})(
21470
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
21541
+ ((
21542
+ a1,
21543
+ a2,
21544
+ a3
21545
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21546
+ 37,
21471
21547
  0,
21472
21548
  strategy.canvasResizedCallbackUserData
21473
21549
  );
@@ -21535,8 +21611,12 @@ export function init(RuntimeName, PHPLoader) {
21535
21611
  fillPointerlockChangeEventData(pointerlockChangeEvent);
21536
21612
 
21537
21613
  if (
21538
- ((a1, a2, a3) => {})(
21539
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
21614
+ ((
21615
+ a1,
21616
+ a2,
21617
+ a3
21618
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21619
+ eventTypeId,
21540
21620
  pointerlockChangeEvent,
21541
21621
  userData
21542
21622
  )
@@ -21626,8 +21706,12 @@ export function init(RuntimeName, PHPLoader) {
21626
21706
  ) => {
21627
21707
  var pointerlockErrorEventHandlerFunc = (e = event) => {
21628
21708
  if (
21629
- ((a1, a2, a3) => {})(
21630
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
21709
+ ((
21710
+ a1,
21711
+ a2,
21712
+ a3
21713
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21714
+ eventTypeId,
21631
21715
  0,
21632
21716
  userData
21633
21717
  )
@@ -21827,8 +21911,12 @@ export function init(RuntimeName, PHPLoader) {
21827
21911
  fillVisibilityChangeEventData(visibilityChangeEvent);
21828
21912
 
21829
21913
  if (
21830
- ((a1, a2, a3) => {})(
21831
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
21914
+ ((
21915
+ a1,
21916
+ a2,
21917
+ a3
21918
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21919
+ eventTypeId,
21832
21920
  visibilityChangeEvent,
21833
21921
  userData
21834
21922
  )
@@ -21948,8 +22036,12 @@ export function init(RuntimeName, PHPLoader) {
21948
22036
  HEAP32[(touchEvent + 8) >> 2] = numTouches;
21949
22037
 
21950
22038
  if (
21951
- ((a1, a2, a3) => {})(
21952
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
22039
+ ((
22040
+ a1,
22041
+ a2,
22042
+ a3
22043
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22044
+ eventTypeId,
21953
22045
  touchEvent,
21954
22046
  userData
21955
22047
  )
@@ -22087,8 +22179,12 @@ export function init(RuntimeName, PHPLoader) {
22087
22179
  fillGamepadEventData(gamepadEvent, e['gamepad']);
22088
22180
 
22089
22181
  if (
22090
- ((a1, a2, a3) => {})(
22091
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
22182
+ ((
22183
+ a1,
22184
+ a2,
22185
+ a3
22186
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22187
+ eventTypeId,
22092
22188
  gamepadEvent,
22093
22189
  userData
22094
22190
  )
@@ -22190,8 +22286,12 @@ export function init(RuntimeName, PHPLoader) {
22190
22286
  ) => {
22191
22287
  var beforeUnloadEventHandlerFunc = (e = event) => {
22192
22288
  // Note: This is always called on the main browser thread, since it needs synchronously return a value!
22193
- var confirmationMessage = ((a1, a2, a3) => {})(
22194
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
22289
+ var confirmationMessage = ((
22290
+ a1,
22291
+ a2,
22292
+ a3
22293
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22294
+ eventTypeId,
22195
22295
  0,
22196
22296
  userData
22197
22297
  );
@@ -22262,8 +22362,12 @@ export function init(RuntimeName, PHPLoader) {
22262
22362
  fillBatteryEventData(batteryEvent, battery());
22263
22363
 
22264
22364
  if (
22265
- ((a1, a2, a3) => {})(
22266
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
22365
+ ((
22366
+ a1,
22367
+ a2,
22368
+ a3
22369
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22370
+ eventTypeId,
22267
22371
  batteryEvent,
22268
22372
  userData
22269
22373
  )
@@ -22353,8 +22457,11 @@ export function init(RuntimeName, PHPLoader) {
22353
22457
 
22354
22458
  var _emscripten_request_animation_frame = (cb, userData) =>
22355
22459
  requestAnimationFrame((timeStamp) =>
22356
- ((a1, a2) => {})(
22357
- /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp,
22460
+ ((
22461
+ a1,
22462
+ a2
22463
+ ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22464
+ timeStamp,
22358
22465
  userData
22359
22466
  )
22360
22467
  );
@@ -22366,8 +22473,11 @@ export function init(RuntimeName, PHPLoader) {
22366
22473
  var _emscripten_request_animation_frame_loop = (cb, userData) => {
22367
22474
  function tick(timeStamp) {
22368
22475
  if (
22369
- ((a1, a2) => {})(
22370
- /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp,
22476
+ ((
22477
+ a1,
22478
+ a2
22479
+ ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22480
+ timeStamp,
22371
22481
  userData
22372
22482
  )
22373
22483
  ) {
@@ -22592,8 +22702,10 @@ export function init(RuntimeName, PHPLoader) {
22592
22702
  return emSetImmediate(() => {
22593
22703
  runtimeKeepalivePop();
22594
22704
  callUserCallback(() =>
22595
- ((a1) => {})(
22596
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
22705
+ ((
22706
+ a1
22707
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22708
+ userData
22597
22709
  )
22598
22710
  );
22599
22711
  });
@@ -22610,8 +22722,10 @@ export function init(RuntimeName, PHPLoader) {
22610
22722
  function tick() {
22611
22723
  callUserCallback(() => {
22612
22724
  if (
22613
- ((a1) => {})(
22614
- /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
22725
+ ((
22726
+ a1
22727
+ ) => {}) /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22728
+ userData
22615
22729
  )
22616
22730
  ) {
22617
22731
  emSetImmediate(tick);
@@ -22628,8 +22742,10 @@ export function init(RuntimeName, PHPLoader) {
22628
22742
  var _emscripten_set_timeout = (cb, msecs, userData) =>
22629
22743
  safeSetTimeout(
22630
22744
  () =>
22631
- ((a1) => {})(
22632
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
22745
+ ((
22746
+ a1
22747
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22748
+ userData
22633
22749
  ),
22634
22750
  msecs
22635
22751
  );
@@ -22645,8 +22761,11 @@ export function init(RuntimeName, PHPLoader) {
22645
22761
  runtimeKeepalivePop();
22646
22762
  callUserCallback(() => {
22647
22763
  if (
22648
- ((a1, a2) => {})(
22649
- /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ t,
22764
+ ((
22765
+ a1,
22766
+ a2
22767
+ ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22768
+ t,
22650
22769
  userData
22651
22770
  )
22652
22771
  ) {
@@ -22670,8 +22789,10 @@ export function init(RuntimeName, PHPLoader) {
22670
22789
  runtimeKeepalivePush();
22671
22790
  return setInterval(() => {
22672
22791
  callUserCallback(() =>
22673
- ((a1) => {})(
22674
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
22792
+ ((
22793
+ a1
22794
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22795
+ userData
22675
22796
  )
22676
22797
  );
22677
22798
  }, msecs);
@@ -22686,8 +22807,10 @@ export function init(RuntimeName, PHPLoader) {
22686
22807
 
22687
22808
  var _emscripten_async_call = (func, arg, millis) => {
22688
22809
  var wrapper = () =>
22689
- ((a1) => {})(
22690
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
22810
+ ((
22811
+ a1
22812
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22813
+ arg
22691
22814
  );
22692
22815
 
22693
22816
  if (
@@ -22720,7 +22843,7 @@ export function init(RuntimeName, PHPLoader) {
22720
22843
 
22721
22844
  var _emscripten_set_main_loop = (func, fps, simulateInfiniteLoop) => {
22722
22845
  var iterFunc =
22723
- () => {}; /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */
22846
+ () => {} /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */;
22724
22847
  setMainLoop(iterFunc, fps, simulateInfiniteLoop);
22725
22848
  };
22726
22849
  _emscripten_set_main_loop.sig = 'vpii';
@@ -22732,8 +22855,10 @@ export function init(RuntimeName, PHPLoader) {
22732
22855
  simulateInfiniteLoop
22733
22856
  ) => {
22734
22857
  var iterFunc = () =>
22735
- ((a1) => {})(
22736
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
22858
+ ((
22859
+ a1
22860
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22861
+ arg
22737
22862
  );
22738
22863
  setMainLoop(iterFunc, fps, simulateInfiniteLoop, arg);
22739
22864
  };
@@ -22754,8 +22879,10 @@ export function init(RuntimeName, PHPLoader) {
22754
22879
  var __emscripten_push_main_loop_blocker = (func, arg, name) => {
22755
22880
  MainLoop.queue.push({
22756
22881
  func: () => {
22757
- ((a1) => {})(
22758
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
22882
+ ((
22883
+ a1
22884
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22885
+ arg
22759
22886
  );
22760
22887
  },
22761
22888
  name: UTF8ToString(name),
@@ -22768,8 +22895,10 @@ export function init(RuntimeName, PHPLoader) {
22768
22895
  var __emscripten_push_uncounted_main_loop_blocker = (func, arg, name) => {
22769
22896
  MainLoop.queue.push({
22770
22897
  func: () => {
22771
- ((a1) => {})(
22772
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
22898
+ ((
22899
+ a1
22900
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22901
+ arg
22773
22902
  );
22774
22903
  },
22775
22904
  name: UTF8ToString(name),
@@ -22803,8 +22932,12 @@ export function init(RuntimeName, PHPLoader) {
22803
22932
  var resultPtr = stackAlloc(POINTER_SIZE);
22804
22933
  HEAPU32[resultPtr >> 2] = 0;
22805
22934
  try {
22806
- var result = ((a1, a2, a3) => {})(
22807
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ resultPtr,
22935
+ var result = ((
22936
+ a1,
22937
+ a2,
22938
+ a3
22939
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22940
+ resultPtr,
22808
22941
  userData,
22809
22942
  value
22810
22943
  );
@@ -23740,15 +23873,19 @@ export function init(RuntimeName, PHPLoader) {
23740
23873
  () => {
23741
23874
  runtimeKeepalivePop();
23742
23875
  if (onload)
23743
- ((a1) => {})(
23744
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file
23876
+ ((
23877
+ a1
23878
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23879
+ file
23745
23880
  );
23746
23881
  },
23747
23882
  () => {
23748
23883
  runtimeKeepalivePop();
23749
23884
  if (onerror)
23750
- ((a1) => {})(
23751
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file
23885
+ ((
23886
+ a1
23887
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23888
+ file
23752
23889
  );
23753
23890
  },
23754
23891
  true // don'tCreateFile - it's already there
@@ -23782,16 +23919,21 @@ export function init(RuntimeName, PHPLoader) {
23782
23919
  () => {
23783
23920
  runtimeKeepalivePop();
23784
23921
  if (onload)
23785
- ((a1, a2) => {})(
23786
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
23922
+ ((
23923
+ a1,
23924
+ a2
23925
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23926
+ arg,
23787
23927
  cname
23788
23928
  );
23789
23929
  },
23790
23930
  () => {
23791
23931
  runtimeKeepalivePop();
23792
23932
  if (onerror)
23793
- ((a1) => {})(
23794
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
23933
+ ((
23934
+ a1
23935
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23936
+ arg
23795
23937
  );
23796
23938
  },
23797
23939
  true // don'tCreateFile - it's already there
@@ -24064,10 +24206,10 @@ export function init(RuntimeName, PHPLoader) {
24064
24206
  runtimeKeepalivePop();
24065
24207
  callUserCallback(() => {
24066
24208
  var sp = stackSave();
24067
- ((a1) => {})(
24068
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stringToUTF8OnStack(
24069
- _file
24070
- )
24209
+ ((
24210
+ a1
24211
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24212
+ stringToUTF8OnStack(_file)
24071
24213
  );
24072
24214
  stackRestore(sp);
24073
24215
  });
@@ -24111,8 +24253,12 @@ export function init(RuntimeName, PHPLoader) {
24111
24253
  callUserCallback(() => {
24112
24254
  var buffer = _malloc(byteArray.length);
24113
24255
  HEAPU8.set(byteArray, buffer);
24114
- ((a1, a2, a3) => {})(
24115
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata,
24256
+ ((
24257
+ a1,
24258
+ a2,
24259
+ a3
24260
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24261
+ userdata,
24116
24262
  buffer,
24117
24263
  byteArray.length
24118
24264
  );
@@ -24122,8 +24268,10 @@ export function init(RuntimeName, PHPLoader) {
24122
24268
  if (onerror) {
24123
24269
  runtimeKeepalivePop();
24124
24270
  callUserCallback(() => {
24125
- ((a1) => {})(
24126
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata
24271
+ ((
24272
+ a1
24273
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24274
+ userdata
24127
24275
  );
24128
24276
  });
24129
24277
  }
@@ -24180,8 +24328,12 @@ export function init(RuntimeName, PHPLoader) {
24180
24328
  );
24181
24329
  if (onload) {
24182
24330
  var sp = stackSave();
24183
- ((a1, a2, a3) => {})(
24184
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24331
+ ((
24332
+ a1,
24333
+ a2,
24334
+ a3
24335
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24336
+ handle,
24185
24337
  userdata,
24186
24338
  stringToUTF8OnStack(_file)
24187
24339
  );
@@ -24189,8 +24341,12 @@ export function init(RuntimeName, PHPLoader) {
24189
24341
  }
24190
24342
  } else {
24191
24343
  if (onerror)
24192
- ((a1, a2, a3) => {})(
24193
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24344
+ ((
24345
+ a1,
24346
+ a2,
24347
+ a3
24348
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24349
+ handle,
24194
24350
  userdata,
24195
24351
  http.status
24196
24352
  );
@@ -24203,8 +24359,12 @@ export function init(RuntimeName, PHPLoader) {
24203
24359
  http.onerror = (e) => {
24204
24360
  runtimeKeepalivePop();
24205
24361
  if (onerror)
24206
- ((a1, a2, a3) => {})(
24207
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24362
+ ((
24363
+ a1,
24364
+ a2,
24365
+ a3
24366
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24367
+ handle,
24208
24368
  userdata,
24209
24369
  http.status
24210
24370
  );
@@ -24219,8 +24379,12 @@ export function init(RuntimeName, PHPLoader) {
24219
24379
  ) {
24220
24380
  var percentComplete = (e.loaded / e.total) * 100;
24221
24381
  if (onprogress)
24222
- ((a1, a2, a3) => {})(
24223
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24382
+ ((
24383
+ a1,
24384
+ a2,
24385
+ a3
24386
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24387
+ handle,
24224
24388
  userdata,
24225
24389
  percentComplete
24226
24390
  );
@@ -24277,8 +24441,13 @@ export function init(RuntimeName, PHPLoader) {
24277
24441
  if (http.statusText) {
24278
24442
  statusText = stringToUTF8OnStack(http.statusText);
24279
24443
  }
24280
- ((a1, a2, a3, a4) => {})(
24281
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24444
+ ((
24445
+ a1,
24446
+ a2,
24447
+ a3,
24448
+ a4
24449
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24450
+ handle,
24282
24451
  userdata,
24283
24452
  http.status,
24284
24453
  statusText
@@ -24299,8 +24468,13 @@ export function init(RuntimeName, PHPLoader) {
24299
24468
  var buffer = _malloc(byteArray.length);
24300
24469
  HEAPU8.set(byteArray, buffer);
24301
24470
  if (onload)
24302
- ((a1, a2, a3, a4) => {})(
24303
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24471
+ ((
24472
+ a1,
24473
+ a2,
24474
+ a3,
24475
+ a4
24476
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24477
+ handle,
24304
24478
  userdata,
24305
24479
  buffer,
24306
24480
  byteArray.length
@@ -24321,8 +24495,13 @@ export function init(RuntimeName, PHPLoader) {
24321
24495
  // PROGRESS
24322
24496
  http.onprogress = (e) => {
24323
24497
  if (onprogress)
24324
- ((a1, a2, a3, a4) => {})(
24325
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24498
+ ((
24499
+ a1,
24500
+ a2,
24501
+ a3,
24502
+ a4
24503
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24504
+ handle,
24326
24505
  userdata,
24327
24506
  e.loaded,
24328
24507
  e.lengthComputable || e.lengthComputable === undefined
@@ -24442,16 +24621,24 @@ export function init(RuntimeName, PHPLoader) {
24442
24621
  if (event === 'error') {
24443
24622
  withStackSave(() => {
24444
24623
  var msg = stringToUTF8OnStack(data[2]);
24445
- ((a1, a2, a3, a4) => {})(
24446
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data[0],
24624
+ ((
24625
+ a1,
24626
+ a2,
24627
+ a3,
24628
+ a4
24629
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24630
+ data[0],
24447
24631
  data[1],
24448
24632
  msg,
24449
24633
  userData
24450
24634
  );
24451
24635
  });
24452
24636
  } else {
24453
- ((a1, a2) => {})(
24454
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data,
24637
+ ((
24638
+ a1,
24639
+ a2
24640
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24641
+ data,
24455
24642
  userData
24456
24643
  );
24457
24644
  }
@@ -24917,8 +25104,12 @@ export function init(RuntimeName, PHPLoader) {
24917
25104
  ) => {
24918
25105
  var webGlEventHandlerFunc = (e = event) => {
24919
25106
  if (
24920
- ((a1, a2, a3) => {})(
24921
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
25107
+ ((
25108
+ a1,
25109
+ a2,
25110
+ a3
25111
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25112
+ eventTypeId,
24922
25113
  0,
24923
25114
  userData
24924
25115
  )
@@ -25137,15 +25328,21 @@ export function init(RuntimeName, PHPLoader) {
25137
25328
  ) {
25138
25329
  event.preventDefault();
25139
25330
  GLUT.saveModifiers(event);
25140
- ((a1, a2) => {})(
25141
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX,
25331
+ ((
25332
+ a1,
25333
+ a2
25334
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25335
+ lastX,
25142
25336
  lastY
25143
25337
  );
25144
25338
  } else if (GLUT.buttons != 0 && GLUT.motionFunc) {
25145
25339
  event.preventDefault();
25146
25340
  GLUT.saveModifiers(event);
25147
- ((a1, a2) => {})(
25148
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX,
25341
+ ((
25342
+ a1,
25343
+ a2
25344
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25345
+ lastX,
25149
25346
  lastY
25150
25347
  );
25151
25348
  }
@@ -25306,8 +25503,12 @@ export function init(RuntimeName, PHPLoader) {
25306
25503
  if (GLUT.specialFunc) {
25307
25504
  event.preventDefault();
25308
25505
  GLUT.saveModifiers(event);
25309
- ((a1, a2, a3) => {})(
25310
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
25506
+ ((
25507
+ a1,
25508
+ a2,
25509
+ a3
25510
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25511
+ key,
25311
25512
  Browser.mouseX,
25312
25513
  Browser.mouseY
25313
25514
  );
@@ -25317,8 +25518,12 @@ export function init(RuntimeName, PHPLoader) {
25317
25518
  if (key !== null && GLUT.keyboardFunc) {
25318
25519
  event.preventDefault();
25319
25520
  GLUT.saveModifiers(event);
25320
- ((a1, a2, a3) => {})(
25321
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
25521
+ ((
25522
+ a1,
25523
+ a2,
25524
+ a3
25525
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25526
+ key,
25322
25527
  Browser.mouseX,
25323
25528
  Browser.mouseY
25324
25529
  );
@@ -25333,8 +25538,12 @@ export function init(RuntimeName, PHPLoader) {
25333
25538
  if (GLUT.specialUpFunc) {
25334
25539
  event.preventDefault();
25335
25540
  GLUT.saveModifiers(event);
25336
- ((a1, a2, a3) => {})(
25337
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
25541
+ ((
25542
+ a1,
25543
+ a2,
25544
+ a3
25545
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25546
+ key,
25338
25547
  Browser.mouseX,
25339
25548
  Browser.mouseY
25340
25549
  );
@@ -25344,8 +25553,12 @@ export function init(RuntimeName, PHPLoader) {
25344
25553
  if (key !== null && GLUT.keyboardUpFunc) {
25345
25554
  event.preventDefault();
25346
25555
  GLUT.saveModifiers(event);
25347
- ((a1, a2, a3) => {})(
25348
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
25556
+ ((
25557
+ a1,
25558
+ a2,
25559
+ a3
25560
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25561
+ key,
25349
25562
  Browser.mouseX,
25350
25563
  Browser.mouseY
25351
25564
  );
@@ -25409,10 +25622,13 @@ export function init(RuntimeName, PHPLoader) {
25409
25622
  } catch (e) {}
25410
25623
  event.preventDefault();
25411
25624
  GLUT.saveModifiers(event);
25412
- ((a1, a2, a3, a4) => {})(
25413
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[
25414
- 'button'
25415
- ],
25625
+ ((
25626
+ a1,
25627
+ a2,
25628
+ a3,
25629
+ a4
25630
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25631
+ event['button'],
25416
25632
  0 /*GLUT_DOWN*/,
25417
25633
  Browser.mouseX,
25418
25634
  Browser.mouseY
@@ -25427,10 +25643,13 @@ export function init(RuntimeName, PHPLoader) {
25427
25643
  if (GLUT.mouseFunc) {
25428
25644
  event.preventDefault();
25429
25645
  GLUT.saveModifiers(event);
25430
- ((a1, a2, a3, a4) => {})(
25431
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[
25432
- 'button'
25433
- ],
25646
+ ((
25647
+ a1,
25648
+ a2,
25649
+ a3,
25650
+ a4
25651
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25652
+ event['button'],
25434
25653
  1 /*GLUT_UP*/,
25435
25654
  Browser.mouseX,
25436
25655
  Browser.mouseY
@@ -25459,8 +25678,13 @@ export function init(RuntimeName, PHPLoader) {
25459
25678
  if (GLUT.mouseFunc) {
25460
25679
  event.preventDefault();
25461
25680
  GLUT.saveModifiers(event);
25462
- ((a1, a2, a3, a4) => {})(
25463
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ button,
25681
+ ((
25682
+ a1,
25683
+ a2,
25684
+ a3,
25685
+ a4
25686
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25687
+ button,
25464
25688
  0 /*GLUT_DOWN*/,
25465
25689
  Browser.mouseX,
25466
25690
  Browser.mouseY
@@ -25503,8 +25727,11 @@ export function init(RuntimeName, PHPLoader) {
25503
25727
  /* Can't call _glutReshapeWindow as that requests cancelling fullscreen. */
25504
25728
  if (GLUT.reshapeFunc) {
25505
25729
  // out("GLUT.reshapeFunc (from FS): " + width + ", " + height);
25506
- ((a1, a2) => {})(
25507
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
25730
+ ((
25731
+ a1,
25732
+ a2
25733
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25734
+ width,
25508
25735
  height
25509
25736
  );
25510
25737
  }
@@ -25547,8 +25774,11 @@ export function init(RuntimeName, PHPLoader) {
25547
25774
 
25548
25775
  Browser.resizeListeners.push((width, height) => {
25549
25776
  if (GLUT.reshapeFunc) {
25550
- ((a1, a2) => {})(
25551
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
25777
+ ((
25778
+ a1,
25779
+ a2
25780
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25781
+ width,
25552
25782
  height
25553
25783
  );
25554
25784
  }
@@ -25661,8 +25891,10 @@ export function init(RuntimeName, PHPLoader) {
25661
25891
  var _glutTimerFunc = (msec, func, value) =>
25662
25892
  safeSetTimeout(
25663
25893
  () =>
25664
- ((a1) => {})(
25665
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ value
25894
+ ((
25895
+ a1
25896
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25897
+ value
25666
25898
  ),
25667
25899
  msec
25668
25900
  );
@@ -25822,8 +26054,11 @@ export function init(RuntimeName, PHPLoader) {
25822
26054
  Browser.setCanvasSize(width, height, true); // N.B. GLUT.reshapeFunc is also registered as a canvas resize callback.
25823
26055
  // Just call it once here.
25824
26056
  if (GLUT.reshapeFunc) {
25825
- ((a1, a2) => {})(
25826
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
26057
+ ((
26058
+ a1,
26059
+ a2
26060
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26061
+ width,
25827
26062
  height
25828
26063
  );
25829
26064
  }
@@ -26885,15 +27120,21 @@ export function init(RuntimeName, PHPLoader) {
26885
27120
  callUserCallback(() => {
26886
27121
  if (error) {
26887
27122
  if (onerror)
26888
- ((a1) => {})(
26889
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27123
+ ((
27124
+ a1
27125
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27126
+ arg
26890
27127
  );
26891
27128
  return;
26892
27129
  }
26893
27130
  var buffer = _malloc(byteArray.length);
26894
27131
  HEAPU8.set(byteArray, buffer);
26895
- ((a1, a2, a3) => {})(
26896
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
27132
+ ((
27133
+ a1,
27134
+ a2,
27135
+ a3
27136
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27137
+ arg,
26897
27138
  buffer,
26898
27139
  byteArray.length
26899
27140
  );
@@ -26925,14 +27166,18 @@ export function init(RuntimeName, PHPLoader) {
26925
27166
  callUserCallback(() => {
26926
27167
  if (error) {
26927
27168
  if (onerror)
26928
- ((a1) => {})(
26929
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27169
+ ((
27170
+ a1
27171
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27172
+ arg
26930
27173
  );
26931
27174
  return;
26932
27175
  }
26933
27176
  if (onstore)
26934
- ((a1) => {})(
26935
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27177
+ ((
27178
+ a1
27179
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27180
+ arg
26936
27181
  );
26937
27182
  });
26938
27183
  }
@@ -26947,14 +27192,18 @@ export function init(RuntimeName, PHPLoader) {
26947
27192
  callUserCallback(() => {
26948
27193
  if (error) {
26949
27194
  if (onerror)
26950
- ((a1) => {})(
26951
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27195
+ ((
27196
+ a1
27197
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27198
+ arg
26952
27199
  );
26953
27200
  return;
26954
27201
  }
26955
27202
  if (ondelete)
26956
- ((a1) => {})(
26957
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27203
+ ((
27204
+ a1
27205
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27206
+ arg
26958
27207
  );
26959
27208
  });
26960
27209
  });
@@ -26971,14 +27220,19 @@ export function init(RuntimeName, PHPLoader) {
26971
27220
  callUserCallback(() => {
26972
27221
  if (error) {
26973
27222
  if (onerror)
26974
- ((a1) => {})(
26975
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27223
+ ((
27224
+ a1
27225
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27226
+ arg
26976
27227
  );
26977
27228
  return;
26978
27229
  }
26979
27230
  if (oncheck)
26980
- ((a1, a2) => {})(
26981
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
27231
+ ((
27232
+ a1,
27233
+ a2
27234
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27235
+ arg,
26982
27236
  exists
26983
27237
  );
26984
27238
  });
@@ -26994,14 +27248,18 @@ export function init(RuntimeName, PHPLoader) {
26994
27248
  callUserCallback(() => {
26995
27249
  if (error) {
26996
27250
  if (onerror)
26997
- ((a1) => {})(
26998
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27251
+ ((
27252
+ a1
27253
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27254
+ arg
26999
27255
  );
27000
27256
  return;
27001
27257
  }
27002
27258
  if (onclear)
27003
- ((a1) => {})(
27004
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27259
+ ((
27260
+ a1
27261
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27262
+ arg
27005
27263
  );
27006
27264
  });
27007
27265
  });
@@ -27158,8 +27416,11 @@ export function init(RuntimeName, PHPLoader) {
27158
27416
  safeSetTimeout(() => {
27159
27417
  var stackBegin = Asyncify.currData + 12;
27160
27418
  var stackEnd = HEAPU32[Asyncify.currData >> 2];
27161
- ((a1, a2) => {})(
27162
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stackBegin,
27419
+ ((
27420
+ a1,
27421
+ a2
27422
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27423
+ stackBegin,
27163
27424
  stackEnd
27164
27425
  );
27165
27426
  wakeUp();
@@ -27220,8 +27481,10 @@ export function init(RuntimeName, PHPLoader) {
27220
27481
  HEAPU32[(newFiber + 12) >> 2] = 0;
27221
27482
 
27222
27483
  var userData = HEAPU32[(newFiber + 16) >> 2];
27223
- ((a1) => {})(
27224
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
27484
+ ((
27485
+ a1
27486
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27487
+ userData
27225
27488
  );
27226
27489
  } else {
27227
27490
  var asyncifyData = newFiber + 20;
@@ -28233,8 +28496,11 @@ export function init(RuntimeName, PHPLoader) {
28233
28496
  if (!SDL.eventHandler) return;
28234
28497
 
28235
28498
  while (SDL.pollEvent(SDL.eventHandlerTemp)) {
28236
- ((a1, a2) => {})(
28237
- /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL.eventHandlerContext,
28499
+ ((
28500
+ a1,
28501
+ a2
28502
+ ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
28503
+ SDL.eventHandlerContext,
28238
28504
  SDL.eventHandlerTemp
28239
28505
  );
28240
28506
  }
@@ -29867,9 +30133,12 @@ export function init(RuntimeName, PHPLoader) {
29867
30133
  return;
29868
30134
 
29869
30135
  // Ask SDL audio data from the user code.
29870
- ((a1, a2, a3) => {})(
29871
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL
29872
- .audio.userdata,
30136
+ ((
30137
+ a1,
30138
+ a2,
30139
+ a3
30140
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
30141
+ SDL.audio.userdata,
29873
30142
  SDL.audio.buffer,
29874
30143
  SDL.audio.bufferSize
29875
30144
  );
@@ -30327,8 +30596,10 @@ export function init(RuntimeName, PHPLoader) {
30327
30596
  info.audio = null;
30328
30597
  }
30329
30598
  if (SDL.channelFinished) {
30330
- ((a1) => {})(
30331
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel
30599
+ ((
30600
+ a1
30601
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
30602
+ channel
30332
30603
  );
30333
30604
  }
30334
30605
  }
@@ -30397,8 +30668,10 @@ export function init(RuntimeName, PHPLoader) {
30397
30668
  channelInfo.audio = null;
30398
30669
  }
30399
30670
  if (SDL.channelFinished)
30400
- ((a1) => {})(
30401
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel
30671
+ ((
30672
+ a1
30673
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
30674
+ channel
30402
30675
  );
30403
30676
  };
30404
30677
  if (channelInfo.audio) {
@@ -31146,8 +31419,11 @@ export function init(RuntimeName, PHPLoader) {
31146
31419
  var _SDL_AddTimer = (interval, callback, param) =>
31147
31420
  safeSetTimeout(
31148
31421
  () =>
31149
- ((a1, a2) => {})(
31150
- /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ interval,
31422
+ ((
31423
+ a1,
31424
+ a2
31425
+ ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31426
+ interval,
31151
31427
  param
31152
31428
  ),
31153
31429
  interval
@@ -31526,8 +31802,12 @@ export function init(RuntimeName, PHPLoader) {
31526
31802
 
31527
31803
  socket.onopen = function (e) {
31528
31804
  var eventPtr = WS.getSocketEvent(socketId);
31529
- ((a1, a2, a3) => {})(
31530
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31805
+ ((
31806
+ a1,
31807
+ a2,
31808
+ a3
31809
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31810
+ 0 /*TODO*/,
31531
31811
  eventPtr,
31532
31812
  userData
31533
31813
  );
@@ -31549,8 +31829,12 @@ export function init(RuntimeName, PHPLoader) {
31549
31829
 
31550
31830
  socket.onerror = function (e) {
31551
31831
  var eventPtr = WS.getSocketEvent(socketId);
31552
- ((a1, a2, a3) => {})(
31553
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31832
+ ((
31833
+ a1,
31834
+ a2,
31835
+ a3
31836
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31837
+ 0 /*TODO*/,
31554
31838
  eventPtr,
31555
31839
  userData
31556
31840
  );
@@ -31575,8 +31859,12 @@ export function init(RuntimeName, PHPLoader) {
31575
31859
  (HEAP8[eventPtr + 4] = e.wasClean),
31576
31860
  (HEAP16[(eventPtr + 6) >> 1] = e.code),
31577
31861
  stringToUTF8(e.reason, eventPtr + 8, 512);
31578
- ((a1, a2, a3) => {})(
31579
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31862
+ ((
31863
+ a1,
31864
+ a2,
31865
+ a3
31866
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31867
+ 0 /*TODO*/,
31580
31868
  eventPtr,
31581
31869
  userData
31582
31870
  );
@@ -31610,8 +31898,12 @@ export function init(RuntimeName, PHPLoader) {
31610
31898
  (HEAPU32[(eventPtr + 4) >> 2] = buf),
31611
31899
  (HEAP32[(eventPtr + 8) >> 2] = len),
31612
31900
  (HEAP8[eventPtr + 12] = isText),
31613
- ((a1, a2, a3) => {})(
31614
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31901
+ ((
31902
+ a1,
31903
+ a2,
31904
+ a3
31905
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31906
+ 0 /*TODO*/,
31615
31907
  eventPtr,
31616
31908
  userData
31617
31909
  );
@@ -35378,19 +35670,16 @@ export function init(RuntimeName, PHPLoader) {
35378
35670
  // We override NODEFS.createNode() to add an `isSharedFS` flag to all NODEFS
35379
35671
  // nodes. This way we can tell whether file-locking is needed and possible
35380
35672
  // for an FS node, even if wrapped with PROXYFS.
35381
- const originalCreateNode = NODEFS.createNode;
35673
+ const originalNodeFsCreateNode = NODEFS.createNode;
35382
35674
  NODEFS.createNode = function createNodeWithSharedFlag() {
35383
- const node = originalCreateNode.apply(NODEFS, arguments);
35675
+ const node = originalNodeFsCreateNode.apply(NODEFS, arguments);
35384
35676
  node.isSharedFS = true;
35385
35677
  return node;
35386
35678
  };
35387
35679
 
35388
35680
  var originalHashAddNode = FS.hashAddNode;
35389
35681
  FS.hashAddNode = function hashAddNodeIfNotSharedFS(node) {
35390
- if (
35391
- typeof locking === 'object' &&
35392
- locking?.is_shared_fs_node(node)
35393
- ) {
35682
+ if (node?.isSharedFS) {
35394
35683
  // Avoid caching shared VFS nodes so multiple instances
35395
35684
  // can access the same underlying filesystem without
35396
35685
  // conflicting caches.