@php-wasm/node 2.0.4 → 2.0.7

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (41) hide show
  1. package/asyncify/7_2_34/php_7_2.wasm +0 -0
  2. package/asyncify/7_3_33/php_7_3.wasm +0 -0
  3. package/asyncify/7_4_33/php_7_4.wasm +0 -0
  4. package/asyncify/8_0_30/php_8_0.wasm +0 -0
  5. package/asyncify/8_1_33/php_8_1.wasm +0 -0
  6. package/asyncify/8_2_29/php_8_2.wasm +0 -0
  7. package/asyncify/8_3_23/php_8_3.wasm +0 -0
  8. package/asyncify/8_3_24/php_8_3.wasm +0 -0
  9. package/asyncify/8_4_10/php_8_4.wasm +0 -0
  10. package/asyncify/8_4_11/php_8_4.wasm +0 -0
  11. package/asyncify/php_7_2.js +512 -223
  12. package/asyncify/php_7_3.js +509 -220
  13. package/asyncify/php_7_4.js +516 -227
  14. package/asyncify/php_8_0.js +509 -220
  15. package/asyncify/php_8_1.js +509 -220
  16. package/asyncify/php_8_2.js +509 -220
  17. package/asyncify/php_8_3.js +519 -230
  18. package/asyncify/php_8_4.js +515 -226
  19. package/index.cjs +657 -1191
  20. package/index.js +657 -1191
  21. package/jspi/7_2_34/php_7_2.wasm +0 -0
  22. package/jspi/7_3_33/php_7_3.wasm +0 -0
  23. package/jspi/7_4_33/php_7_4.wasm +0 -0
  24. package/jspi/8_0_30/php_8_0.wasm +0 -0
  25. package/jspi/8_1_33/php_8_1.wasm +0 -0
  26. package/jspi/8_2_29/php_8_2.wasm +0 -0
  27. package/jspi/8_3_23/php_8_3.wasm +0 -0
  28. package/jspi/8_3_24/php_8_3.wasm +0 -0
  29. package/jspi/8_4_10/php_8_4.wasm +0 -0
  30. package/jspi/8_4_11/php_8_4.wasm +0 -0
  31. package/jspi/php_7_2.js +42 -36
  32. package/jspi/php_7_3.js +42 -36
  33. package/jspi/php_7_4.js +42 -36
  34. package/jspi/php_8_0.js +42 -36
  35. package/jspi/php_8_1.js +42 -36
  36. package/jspi/php_8_2.js +42 -36
  37. package/jspi/php_8_3.js +48 -42
  38. package/jspi/php_8_4.js +48 -42
  39. package/lib/file-lock-manager-for-node.d.ts +9 -2
  40. package/lib/load-runtime.d.ts +2 -1
  41. package/package.json +7 -7
@@ -1774,8 +1774,10 @@ export function init(RuntimeName, PHPLoader) {
1774
1774
  );
1775
1775
 
1776
1776
  var ___call_sighandler = (fp, sig) =>
1777
- ((a1) => {})(
1778
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ sig
1777
+ ((
1778
+ a1
1779
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
1780
+ sig
1779
1781
  );
1780
1782
  ___call_sighandler.sig = 'vpi';
1781
1783
 
@@ -7101,35 +7103,25 @@ export function init(RuntimeName, PHPLoader) {
7101
7103
  1: 'exclusive',
7102
7104
  2: 'unlocked',
7103
7105
  },
7104
- is_shared_fs_node(node) {
7105
- if (node?.isSharedFS) {
7106
- return true;
7107
- }
7108
-
7109
- // Handle PROXYFS nodes which wrap other nodes.
7110
- if (
7111
- !node?.mount?.opts?.fs?.lookupPath ||
7112
- !node?.mount?.type?.realPath
7113
- ) {
7114
- return false;
7106
+ is_path_to_shared_fs(path) {
7107
+ _js_wasm_trace('is_path_to_shared_fs(%s)', path);
7108
+ const { node } = FS.lookupPath(path, { noent_okay: true });
7109
+ if (node.mount.type !== PROXYFS) {
7110
+ return !!node.isSharedFS;
7111
+ }
7112
+
7113
+ // This looks like a PROXYFS node. Let's try a lookup.
7114
+ const nodePath = PROXYFS.realPath(node);
7115
+ const backingFs = node?.mount?.opts?.fs;
7116
+ if (backingFs) {
7117
+ // Tolerate ENOENT because looking up a MEMFS node by path always fails.
7118
+ const { node: backingNode } = backingFs.lookupPath(nodePath, {
7119
+ noent_okay: true,
7120
+ });
7121
+ return !!backingNode?.isSharedFS;
7115
7122
  }
7116
7123
 
7117
- // Only NODEFS can be shared between workers at the moment.
7118
- if (node.mount.type !== NODEFS) {
7119
- return false;
7120
- }
7121
- const vfsPath = node.mount.type.realPath(node);
7122
- try {
7123
- const underlyingNode =
7124
- node.mount.opts.fs.lookupPath(vfsPath)?.node;
7125
- return !!underlyingNode?.isSharedFS;
7126
- } catch (e) {
7127
- return false;
7128
- }
7129
- },
7130
- is_path_to_shared_fs(path) {
7131
- const { node } = FS.lookupPath(path);
7132
- return locking.is_shared_fs_node(node);
7124
+ return false;
7133
7125
  },
7134
7126
  get_fd_access_mode(fd) {
7135
7127
  const emscripten_F_GETFL = Number('3');
@@ -7147,8 +7139,26 @@ export function init(RuntimeName, PHPLoader) {
7147
7139
  }
7148
7140
  },
7149
7141
  get_native_path_from_vfs_path(vfsPath) {
7150
- const { node } = FS.lookupPath(vfsPath);
7151
- return NODEFS.realPath(node);
7142
+ // TODO: Should there be a try/catch here?
7143
+ const { node } = FS.lookupPath(vfsPath, {});
7144
+ if (node.mount.type === NODEFS) {
7145
+ return NODEFS.realPath(node);
7146
+ } else if (node.mount.type === PROXYFS) {
7147
+ // TODO: Tolerate ENOENT here?
7148
+ const { node: backingNode, path: backingPath } =
7149
+ node.mount.opts.fs.lookupPath(vfsPath);
7150
+ _js_wasm_trace(
7151
+ 'backingNode for %s: %s',
7152
+ vfsPath,
7153
+ backingPath,
7154
+ backingNode
7155
+ );
7156
+ return backingNode.mount.type.realPath(backingNode);
7157
+ } else {
7158
+ throw new Error(
7159
+ `Unsupported filesystem type for path ${vfsPath}`
7160
+ );
7161
+ }
7152
7162
  },
7153
7163
  check_lock_params(fd, l_type) {
7154
7164
  const emscripten_O_RDONLY = Number('0');
@@ -7348,6 +7358,8 @@ export function init(RuntimeName, PHPLoader) {
7348
7358
  return -ERRNO_CODES.EBADF;
7349
7359
  }
7350
7360
 
7361
+ const flockStructAddr = syscallGetVarargP();
7362
+
7351
7363
  if (!locking.is_path_to_shared_fs(vfsPath)) {
7352
7364
  _js_wasm_trace(
7353
7365
  "fcntl(%d, F_GETLK) locking is not implemented for non-NodeFS path '%s'",
@@ -7363,7 +7375,6 @@ export function init(RuntimeName, PHPLoader) {
7363
7375
  return 0;
7364
7376
  }
7365
7377
 
7366
- const flockStructAddr = syscallGetVarargP();
7367
7378
  const flockStruct = read_flock_struct(flockStructAddr);
7368
7379
 
7369
7380
  if (!(flockStruct.l_type in locking.fcntlToLockState)) {
@@ -8791,8 +8802,11 @@ export function init(RuntimeName, PHPLoader) {
8791
8802
  dlSetError(`'Could not load dynamic lib: ${filename}\n${e}`);
8792
8803
  runtimeKeepalivePop();
8793
8804
  callUserCallback(() =>
8794
- ((a1, a2) => {})(
8795
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
8805
+ ((
8806
+ a1,
8807
+ a2
8808
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
8809
+ handle,
8796
8810
  user_data
8797
8811
  )
8798
8812
  );
@@ -8800,8 +8814,11 @@ export function init(RuntimeName, PHPLoader) {
8800
8814
  function successCallback() {
8801
8815
  runtimeKeepalivePop();
8802
8816
  callUserCallback(() =>
8803
- ((a1, a2) => {})(
8804
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
8817
+ ((
8818
+ a1,
8819
+ a2
8820
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
8821
+ handle,
8805
8822
  user_data
8806
8823
  )
8807
8824
  );
@@ -19469,8 +19486,11 @@ export function init(RuntimeName, PHPLoader) {
19469
19486
  var trace = getCallstack();
19470
19487
  var parts = trace.split('\n');
19471
19488
  for (var i = 0; i < parts.length; i++) {
19472
- var ret = ((a1, a2) => {})(
19473
- /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0,
19489
+ var ret = ((
19490
+ a1,
19491
+ a2
19492
+ ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19493
+ 0,
19474
19494
  arg
19475
19495
  );
19476
19496
  if (ret !== 0) return;
@@ -20046,8 +20066,12 @@ export function init(RuntimeName, PHPLoader) {
20046
20066
  stringToUTF8(e.locale || '', keyEventData + 128, 32);
20047
20067
 
20048
20068
  if (
20049
- ((a1, a2, a3) => {})(
20050
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20069
+ ((
20070
+ a1,
20071
+ a2,
20072
+ a3
20073
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20074
+ eventTypeId,
20051
20075
  keyEventData,
20052
20076
  userData
20053
20077
  )
@@ -20165,8 +20189,12 @@ export function init(RuntimeName, PHPLoader) {
20165
20189
  fillMouseEventData(JSEvents.mouseEvent, e, target);
20166
20190
 
20167
20191
  if (
20168
- ((a1, a2, a3) => {})(
20169
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20192
+ ((
20193
+ a1,
20194
+ a2,
20195
+ a3
20196
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20197
+ eventTypeId,
20170
20198
  JSEvents.mouseEvent,
20171
20199
  userData
20172
20200
  )
@@ -20380,8 +20408,12 @@ export function init(RuntimeName, PHPLoader) {
20380
20408
  HEAPF64[(wheelEvent + 80) >> 3] = e['deltaZ'];
20381
20409
  HEAP32[(wheelEvent + 88) >> 2] = e['deltaMode'];
20382
20410
  if (
20383
- ((a1, a2, a3) => {})(
20384
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20411
+ ((
20412
+ a1,
20413
+ a2,
20414
+ a3
20415
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20416
+ eventTypeId,
20385
20417
  wheelEvent,
20386
20418
  userData
20387
20419
  )
@@ -20462,8 +20494,12 @@ export function init(RuntimeName, PHPLoader) {
20462
20494
  HEAP32[(uiEvent + 28) >> 2] = pageXOffset | 0; // scroll offsets are float
20463
20495
  HEAP32[(uiEvent + 32) >> 2] = pageYOffset | 0;
20464
20496
  if (
20465
- ((a1, a2, a3) => {})(
20466
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20497
+ ((
20498
+ a1,
20499
+ a2,
20500
+ a3
20501
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20502
+ eventTypeId,
20467
20503
  uiEvent,
20468
20504
  userData
20469
20505
  )
@@ -20537,8 +20573,12 @@ export function init(RuntimeName, PHPLoader) {
20537
20573
  stringToUTF8(id, focusEvent + 128, 128);
20538
20574
 
20539
20575
  if (
20540
- ((a1, a2, a3) => {})(
20541
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20576
+ ((
20577
+ a1,
20578
+ a2,
20579
+ a3
20580
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20581
+ eventTypeId,
20542
20582
  focusEvent,
20543
20583
  userData
20544
20584
  )
@@ -20654,8 +20694,12 @@ export function init(RuntimeName, PHPLoader) {
20654
20694
  ); // TODO: Thread-safety with respect to emscripten_get_deviceorientation_status()
20655
20695
 
20656
20696
  if (
20657
- ((a1, a2, a3) => {})(
20658
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20697
+ ((
20698
+ a1,
20699
+ a2,
20700
+ a3
20701
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20702
+ eventTypeId,
20659
20703
  JSEvents.deviceOrientationEvent,
20660
20704
  userData
20661
20705
  )
@@ -20738,8 +20782,12 @@ export function init(RuntimeName, PHPLoader) {
20738
20782
  fillDeviceMotionEventData(JSEvents.deviceMotionEvent, e, target); // TODO: Thread-safety with respect to emscripten_get_devicemotion_status()
20739
20783
 
20740
20784
  if (
20741
- ((a1, a2, a3) => {})(
20742
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20785
+ ((
20786
+ a1,
20787
+ a2,
20788
+ a3
20789
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20790
+ eventTypeId,
20743
20791
  JSEvents.deviceMotionEvent,
20744
20792
  userData
20745
20793
  )
@@ -20849,8 +20897,12 @@ export function init(RuntimeName, PHPLoader) {
20849
20897
  fillOrientationChangeEventData(orientationChangeEvent);
20850
20898
 
20851
20899
  if (
20852
- ((a1, a2, a3) => {})(
20853
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20900
+ ((
20901
+ a1,
20902
+ a2,
20903
+ a3
20904
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20905
+ eventTypeId,
20854
20906
  orientationChangeEvent,
20855
20907
  userData
20856
20908
  )
@@ -20983,8 +21035,12 @@ export function init(RuntimeName, PHPLoader) {
20983
21035
  fillFullscreenChangeEventData(fullscreenChangeEvent);
20984
21036
 
20985
21037
  if (
20986
- ((a1, a2, a3) => {})(
20987
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
21038
+ ((
21039
+ a1,
21040
+ a2,
21041
+ a3
21042
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21043
+ eventTypeId,
20988
21044
  fullscreenChangeEvent,
20989
21045
  userData
20990
21046
  )
@@ -21148,8 +21204,12 @@ export function init(RuntimeName, PHPLoader) {
21148
21204
  );
21149
21205
 
21150
21206
  if (currentFullscreenStrategy.canvasResizedCallback) {
21151
- ((a1, a2, a3) => {})(
21152
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
21207
+ ((
21208
+ a1,
21209
+ a2,
21210
+ a3
21211
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21212
+ 37,
21153
21213
  0,
21154
21214
  currentFullscreenStrategy.canvasResizedCallbackUserData
21155
21215
  );
@@ -21255,8 +21315,12 @@ export function init(RuntimeName, PHPLoader) {
21255
21315
  currentFullscreenStrategy = strategy;
21256
21316
 
21257
21317
  if (strategy.canvasResizedCallback) {
21258
- ((a1, a2, a3) => {})(
21259
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
21318
+ ((
21319
+ a1,
21320
+ a2,
21321
+ a3
21322
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21323
+ 37,
21260
21324
  0,
21261
21325
  strategy.canvasResizedCallbackUserData
21262
21326
  );
@@ -21358,8 +21422,12 @@ export function init(RuntimeName, PHPLoader) {
21358
21422
  !inCenteredWithoutScalingFullscreenMode &&
21359
21423
  currentFullscreenStrategy.canvasResizedCallback
21360
21424
  ) {
21361
- ((a1, a2, a3) => {})(
21362
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
21425
+ ((
21426
+ a1,
21427
+ a2,
21428
+ a3
21429
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21430
+ 37,
21363
21431
  0,
21364
21432
  currentFullscreenStrategy.canvasResizedCallbackUserData
21365
21433
  );
@@ -21458,8 +21526,12 @@ export function init(RuntimeName, PHPLoader) {
21458
21526
  softFullscreenResizeWebGLRenderTarget
21459
21527
  );
21460
21528
  if (strategy.canvasResizedCallback) {
21461
- ((a1, a2, a3) => {})(
21462
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
21529
+ ((
21530
+ a1,
21531
+ a2,
21532
+ a3
21533
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21534
+ 37,
21463
21535
  0,
21464
21536
  strategy.canvasResizedCallbackUserData
21465
21537
  );
@@ -21472,8 +21544,12 @@ export function init(RuntimeName, PHPLoader) {
21472
21544
 
21473
21545
  // Inform the caller that the canvas size has changed.
21474
21546
  if (strategy.canvasResizedCallback) {
21475
- ((a1, a2, a3) => {})(
21476
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
21547
+ ((
21548
+ a1,
21549
+ a2,
21550
+ a3
21551
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21552
+ 37,
21477
21553
  0,
21478
21554
  strategy.canvasResizedCallbackUserData
21479
21555
  );
@@ -21541,8 +21617,12 @@ export function init(RuntimeName, PHPLoader) {
21541
21617
  fillPointerlockChangeEventData(pointerlockChangeEvent);
21542
21618
 
21543
21619
  if (
21544
- ((a1, a2, a3) => {})(
21545
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
21620
+ ((
21621
+ a1,
21622
+ a2,
21623
+ a3
21624
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21625
+ eventTypeId,
21546
21626
  pointerlockChangeEvent,
21547
21627
  userData
21548
21628
  )
@@ -21632,8 +21712,12 @@ export function init(RuntimeName, PHPLoader) {
21632
21712
  ) => {
21633
21713
  var pointerlockErrorEventHandlerFunc = (e = event) => {
21634
21714
  if (
21635
- ((a1, a2, a3) => {})(
21636
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
21715
+ ((
21716
+ a1,
21717
+ a2,
21718
+ a3
21719
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21720
+ eventTypeId,
21637
21721
  0,
21638
21722
  userData
21639
21723
  )
@@ -21833,8 +21917,12 @@ export function init(RuntimeName, PHPLoader) {
21833
21917
  fillVisibilityChangeEventData(visibilityChangeEvent);
21834
21918
 
21835
21919
  if (
21836
- ((a1, a2, a3) => {})(
21837
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
21920
+ ((
21921
+ a1,
21922
+ a2,
21923
+ a3
21924
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21925
+ eventTypeId,
21838
21926
  visibilityChangeEvent,
21839
21927
  userData
21840
21928
  )
@@ -21954,8 +22042,12 @@ export function init(RuntimeName, PHPLoader) {
21954
22042
  HEAP32[(touchEvent + 8) >> 2] = numTouches;
21955
22043
 
21956
22044
  if (
21957
- ((a1, a2, a3) => {})(
21958
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
22045
+ ((
22046
+ a1,
22047
+ a2,
22048
+ a3
22049
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22050
+ eventTypeId,
21959
22051
  touchEvent,
21960
22052
  userData
21961
22053
  )
@@ -22093,8 +22185,12 @@ export function init(RuntimeName, PHPLoader) {
22093
22185
  fillGamepadEventData(gamepadEvent, e['gamepad']);
22094
22186
 
22095
22187
  if (
22096
- ((a1, a2, a3) => {})(
22097
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
22188
+ ((
22189
+ a1,
22190
+ a2,
22191
+ a3
22192
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22193
+ eventTypeId,
22098
22194
  gamepadEvent,
22099
22195
  userData
22100
22196
  )
@@ -22196,8 +22292,12 @@ export function init(RuntimeName, PHPLoader) {
22196
22292
  ) => {
22197
22293
  var beforeUnloadEventHandlerFunc = (e = event) => {
22198
22294
  // Note: This is always called on the main browser thread, since it needs synchronously return a value!
22199
- var confirmationMessage = ((a1, a2, a3) => {})(
22200
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
22295
+ var confirmationMessage = ((
22296
+ a1,
22297
+ a2,
22298
+ a3
22299
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22300
+ eventTypeId,
22201
22301
  0,
22202
22302
  userData
22203
22303
  );
@@ -22268,8 +22368,12 @@ export function init(RuntimeName, PHPLoader) {
22268
22368
  fillBatteryEventData(batteryEvent, battery());
22269
22369
 
22270
22370
  if (
22271
- ((a1, a2, a3) => {})(
22272
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
22371
+ ((
22372
+ a1,
22373
+ a2,
22374
+ a3
22375
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22376
+ eventTypeId,
22273
22377
  batteryEvent,
22274
22378
  userData
22275
22379
  )
@@ -22359,8 +22463,11 @@ export function init(RuntimeName, PHPLoader) {
22359
22463
 
22360
22464
  var _emscripten_request_animation_frame = (cb, userData) =>
22361
22465
  requestAnimationFrame((timeStamp) =>
22362
- ((a1, a2) => {})(
22363
- /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp,
22466
+ ((
22467
+ a1,
22468
+ a2
22469
+ ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22470
+ timeStamp,
22364
22471
  userData
22365
22472
  )
22366
22473
  );
@@ -22372,8 +22479,11 @@ export function init(RuntimeName, PHPLoader) {
22372
22479
  var _emscripten_request_animation_frame_loop = (cb, userData) => {
22373
22480
  function tick(timeStamp) {
22374
22481
  if (
22375
- ((a1, a2) => {})(
22376
- /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp,
22482
+ ((
22483
+ a1,
22484
+ a2
22485
+ ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22486
+ timeStamp,
22377
22487
  userData
22378
22488
  )
22379
22489
  ) {
@@ -22598,8 +22708,10 @@ export function init(RuntimeName, PHPLoader) {
22598
22708
  return emSetImmediate(() => {
22599
22709
  runtimeKeepalivePop();
22600
22710
  callUserCallback(() =>
22601
- ((a1) => {})(
22602
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
22711
+ ((
22712
+ a1
22713
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22714
+ userData
22603
22715
  )
22604
22716
  );
22605
22717
  });
@@ -22616,8 +22728,10 @@ export function init(RuntimeName, PHPLoader) {
22616
22728
  function tick() {
22617
22729
  callUserCallback(() => {
22618
22730
  if (
22619
- ((a1) => {})(
22620
- /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
22731
+ ((
22732
+ a1
22733
+ ) => {}) /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22734
+ userData
22621
22735
  )
22622
22736
  ) {
22623
22737
  emSetImmediate(tick);
@@ -22634,8 +22748,10 @@ export function init(RuntimeName, PHPLoader) {
22634
22748
  var _emscripten_set_timeout = (cb, msecs, userData) =>
22635
22749
  safeSetTimeout(
22636
22750
  () =>
22637
- ((a1) => {})(
22638
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
22751
+ ((
22752
+ a1
22753
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22754
+ userData
22639
22755
  ),
22640
22756
  msecs
22641
22757
  );
@@ -22651,8 +22767,11 @@ export function init(RuntimeName, PHPLoader) {
22651
22767
  runtimeKeepalivePop();
22652
22768
  callUserCallback(() => {
22653
22769
  if (
22654
- ((a1, a2) => {})(
22655
- /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ t,
22770
+ ((
22771
+ a1,
22772
+ a2
22773
+ ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22774
+ t,
22656
22775
  userData
22657
22776
  )
22658
22777
  ) {
@@ -22676,8 +22795,10 @@ export function init(RuntimeName, PHPLoader) {
22676
22795
  runtimeKeepalivePush();
22677
22796
  return setInterval(() => {
22678
22797
  callUserCallback(() =>
22679
- ((a1) => {})(
22680
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
22798
+ ((
22799
+ a1
22800
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22801
+ userData
22681
22802
  )
22682
22803
  );
22683
22804
  }, msecs);
@@ -22692,8 +22813,10 @@ export function init(RuntimeName, PHPLoader) {
22692
22813
 
22693
22814
  var _emscripten_async_call = (func, arg, millis) => {
22694
22815
  var wrapper = () =>
22695
- ((a1) => {})(
22696
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
22816
+ ((
22817
+ a1
22818
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22819
+ arg
22697
22820
  );
22698
22821
 
22699
22822
  if (
@@ -22726,7 +22849,7 @@ export function init(RuntimeName, PHPLoader) {
22726
22849
 
22727
22850
  var _emscripten_set_main_loop = (func, fps, simulateInfiniteLoop) => {
22728
22851
  var iterFunc =
22729
- () => {}; /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */
22852
+ () => {} /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */;
22730
22853
  setMainLoop(iterFunc, fps, simulateInfiniteLoop);
22731
22854
  };
22732
22855
  _emscripten_set_main_loop.sig = 'vpii';
@@ -22738,8 +22861,10 @@ export function init(RuntimeName, PHPLoader) {
22738
22861
  simulateInfiniteLoop
22739
22862
  ) => {
22740
22863
  var iterFunc = () =>
22741
- ((a1) => {})(
22742
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
22864
+ ((
22865
+ a1
22866
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22867
+ arg
22743
22868
  );
22744
22869
  setMainLoop(iterFunc, fps, simulateInfiniteLoop, arg);
22745
22870
  };
@@ -22760,8 +22885,10 @@ export function init(RuntimeName, PHPLoader) {
22760
22885
  var __emscripten_push_main_loop_blocker = (func, arg, name) => {
22761
22886
  MainLoop.queue.push({
22762
22887
  func: () => {
22763
- ((a1) => {})(
22764
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
22888
+ ((
22889
+ a1
22890
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22891
+ arg
22765
22892
  );
22766
22893
  },
22767
22894
  name: UTF8ToString(name),
@@ -22774,8 +22901,10 @@ export function init(RuntimeName, PHPLoader) {
22774
22901
  var __emscripten_push_uncounted_main_loop_blocker = (func, arg, name) => {
22775
22902
  MainLoop.queue.push({
22776
22903
  func: () => {
22777
- ((a1) => {})(
22778
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
22904
+ ((
22905
+ a1
22906
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22907
+ arg
22779
22908
  );
22780
22909
  },
22781
22910
  name: UTF8ToString(name),
@@ -22809,8 +22938,12 @@ export function init(RuntimeName, PHPLoader) {
22809
22938
  var resultPtr = stackAlloc(POINTER_SIZE);
22810
22939
  HEAPU32[resultPtr >> 2] = 0;
22811
22940
  try {
22812
- var result = ((a1, a2, a3) => {})(
22813
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ resultPtr,
22941
+ var result = ((
22942
+ a1,
22943
+ a2,
22944
+ a3
22945
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22946
+ resultPtr,
22814
22947
  userData,
22815
22948
  value
22816
22949
  );
@@ -23746,15 +23879,19 @@ export function init(RuntimeName, PHPLoader) {
23746
23879
  () => {
23747
23880
  runtimeKeepalivePop();
23748
23881
  if (onload)
23749
- ((a1) => {})(
23750
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file
23882
+ ((
23883
+ a1
23884
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23885
+ file
23751
23886
  );
23752
23887
  },
23753
23888
  () => {
23754
23889
  runtimeKeepalivePop();
23755
23890
  if (onerror)
23756
- ((a1) => {})(
23757
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file
23891
+ ((
23892
+ a1
23893
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23894
+ file
23758
23895
  );
23759
23896
  },
23760
23897
  true // don'tCreateFile - it's already there
@@ -23788,16 +23925,21 @@ export function init(RuntimeName, PHPLoader) {
23788
23925
  () => {
23789
23926
  runtimeKeepalivePop();
23790
23927
  if (onload)
23791
- ((a1, a2) => {})(
23792
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
23928
+ ((
23929
+ a1,
23930
+ a2
23931
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23932
+ arg,
23793
23933
  cname
23794
23934
  );
23795
23935
  },
23796
23936
  () => {
23797
23937
  runtimeKeepalivePop();
23798
23938
  if (onerror)
23799
- ((a1) => {})(
23800
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
23939
+ ((
23940
+ a1
23941
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23942
+ arg
23801
23943
  );
23802
23944
  },
23803
23945
  true // don'tCreateFile - it's already there
@@ -24070,10 +24212,10 @@ export function init(RuntimeName, PHPLoader) {
24070
24212
  runtimeKeepalivePop();
24071
24213
  callUserCallback(() => {
24072
24214
  var sp = stackSave();
24073
- ((a1) => {})(
24074
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stringToUTF8OnStack(
24075
- _file
24076
- )
24215
+ ((
24216
+ a1
24217
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24218
+ stringToUTF8OnStack(_file)
24077
24219
  );
24078
24220
  stackRestore(sp);
24079
24221
  });
@@ -24117,8 +24259,12 @@ export function init(RuntimeName, PHPLoader) {
24117
24259
  callUserCallback(() => {
24118
24260
  var buffer = _malloc(byteArray.length);
24119
24261
  HEAPU8.set(byteArray, buffer);
24120
- ((a1, a2, a3) => {})(
24121
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata,
24262
+ ((
24263
+ a1,
24264
+ a2,
24265
+ a3
24266
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24267
+ userdata,
24122
24268
  buffer,
24123
24269
  byteArray.length
24124
24270
  );
@@ -24128,8 +24274,10 @@ export function init(RuntimeName, PHPLoader) {
24128
24274
  if (onerror) {
24129
24275
  runtimeKeepalivePop();
24130
24276
  callUserCallback(() => {
24131
- ((a1) => {})(
24132
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata
24277
+ ((
24278
+ a1
24279
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24280
+ userdata
24133
24281
  );
24134
24282
  });
24135
24283
  }
@@ -24186,8 +24334,12 @@ export function init(RuntimeName, PHPLoader) {
24186
24334
  );
24187
24335
  if (onload) {
24188
24336
  var sp = stackSave();
24189
- ((a1, a2, a3) => {})(
24190
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24337
+ ((
24338
+ a1,
24339
+ a2,
24340
+ a3
24341
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24342
+ handle,
24191
24343
  userdata,
24192
24344
  stringToUTF8OnStack(_file)
24193
24345
  );
@@ -24195,8 +24347,12 @@ export function init(RuntimeName, PHPLoader) {
24195
24347
  }
24196
24348
  } else {
24197
24349
  if (onerror)
24198
- ((a1, a2, a3) => {})(
24199
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24350
+ ((
24351
+ a1,
24352
+ a2,
24353
+ a3
24354
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24355
+ handle,
24200
24356
  userdata,
24201
24357
  http.status
24202
24358
  );
@@ -24209,8 +24365,12 @@ export function init(RuntimeName, PHPLoader) {
24209
24365
  http.onerror = (e) => {
24210
24366
  runtimeKeepalivePop();
24211
24367
  if (onerror)
24212
- ((a1, a2, a3) => {})(
24213
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24368
+ ((
24369
+ a1,
24370
+ a2,
24371
+ a3
24372
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24373
+ handle,
24214
24374
  userdata,
24215
24375
  http.status
24216
24376
  );
@@ -24225,8 +24385,12 @@ export function init(RuntimeName, PHPLoader) {
24225
24385
  ) {
24226
24386
  var percentComplete = (e.loaded / e.total) * 100;
24227
24387
  if (onprogress)
24228
- ((a1, a2, a3) => {})(
24229
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24388
+ ((
24389
+ a1,
24390
+ a2,
24391
+ a3
24392
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24393
+ handle,
24230
24394
  userdata,
24231
24395
  percentComplete
24232
24396
  );
@@ -24283,8 +24447,13 @@ export function init(RuntimeName, PHPLoader) {
24283
24447
  if (http.statusText) {
24284
24448
  statusText = stringToUTF8OnStack(http.statusText);
24285
24449
  }
24286
- ((a1, a2, a3, a4) => {})(
24287
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24450
+ ((
24451
+ a1,
24452
+ a2,
24453
+ a3,
24454
+ a4
24455
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24456
+ handle,
24288
24457
  userdata,
24289
24458
  http.status,
24290
24459
  statusText
@@ -24305,8 +24474,13 @@ export function init(RuntimeName, PHPLoader) {
24305
24474
  var buffer = _malloc(byteArray.length);
24306
24475
  HEAPU8.set(byteArray, buffer);
24307
24476
  if (onload)
24308
- ((a1, a2, a3, a4) => {})(
24309
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24477
+ ((
24478
+ a1,
24479
+ a2,
24480
+ a3,
24481
+ a4
24482
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24483
+ handle,
24310
24484
  userdata,
24311
24485
  buffer,
24312
24486
  byteArray.length
@@ -24327,8 +24501,13 @@ export function init(RuntimeName, PHPLoader) {
24327
24501
  // PROGRESS
24328
24502
  http.onprogress = (e) => {
24329
24503
  if (onprogress)
24330
- ((a1, a2, a3, a4) => {})(
24331
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24504
+ ((
24505
+ a1,
24506
+ a2,
24507
+ a3,
24508
+ a4
24509
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24510
+ handle,
24332
24511
  userdata,
24333
24512
  e.loaded,
24334
24513
  e.lengthComputable || e.lengthComputable === undefined
@@ -24448,16 +24627,24 @@ export function init(RuntimeName, PHPLoader) {
24448
24627
  if (event === 'error') {
24449
24628
  withStackSave(() => {
24450
24629
  var msg = stringToUTF8OnStack(data[2]);
24451
- ((a1, a2, a3, a4) => {})(
24452
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data[0],
24630
+ ((
24631
+ a1,
24632
+ a2,
24633
+ a3,
24634
+ a4
24635
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24636
+ data[0],
24453
24637
  data[1],
24454
24638
  msg,
24455
24639
  userData
24456
24640
  );
24457
24641
  });
24458
24642
  } else {
24459
- ((a1, a2) => {})(
24460
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data,
24643
+ ((
24644
+ a1,
24645
+ a2
24646
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24647
+ data,
24461
24648
  userData
24462
24649
  );
24463
24650
  }
@@ -24923,8 +25110,12 @@ export function init(RuntimeName, PHPLoader) {
24923
25110
  ) => {
24924
25111
  var webGlEventHandlerFunc = (e = event) => {
24925
25112
  if (
24926
- ((a1, a2, a3) => {})(
24927
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
25113
+ ((
25114
+ a1,
25115
+ a2,
25116
+ a3
25117
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25118
+ eventTypeId,
24928
25119
  0,
24929
25120
  userData
24930
25121
  )
@@ -25143,15 +25334,21 @@ export function init(RuntimeName, PHPLoader) {
25143
25334
  ) {
25144
25335
  event.preventDefault();
25145
25336
  GLUT.saveModifiers(event);
25146
- ((a1, a2) => {})(
25147
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX,
25337
+ ((
25338
+ a1,
25339
+ a2
25340
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25341
+ lastX,
25148
25342
  lastY
25149
25343
  );
25150
25344
  } else if (GLUT.buttons != 0 && GLUT.motionFunc) {
25151
25345
  event.preventDefault();
25152
25346
  GLUT.saveModifiers(event);
25153
- ((a1, a2) => {})(
25154
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX,
25347
+ ((
25348
+ a1,
25349
+ a2
25350
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25351
+ lastX,
25155
25352
  lastY
25156
25353
  );
25157
25354
  }
@@ -25312,8 +25509,12 @@ export function init(RuntimeName, PHPLoader) {
25312
25509
  if (GLUT.specialFunc) {
25313
25510
  event.preventDefault();
25314
25511
  GLUT.saveModifiers(event);
25315
- ((a1, a2, a3) => {})(
25316
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
25512
+ ((
25513
+ a1,
25514
+ a2,
25515
+ a3
25516
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25517
+ key,
25317
25518
  Browser.mouseX,
25318
25519
  Browser.mouseY
25319
25520
  );
@@ -25323,8 +25524,12 @@ export function init(RuntimeName, PHPLoader) {
25323
25524
  if (key !== null && GLUT.keyboardFunc) {
25324
25525
  event.preventDefault();
25325
25526
  GLUT.saveModifiers(event);
25326
- ((a1, a2, a3) => {})(
25327
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
25527
+ ((
25528
+ a1,
25529
+ a2,
25530
+ a3
25531
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25532
+ key,
25328
25533
  Browser.mouseX,
25329
25534
  Browser.mouseY
25330
25535
  );
@@ -25339,8 +25544,12 @@ export function init(RuntimeName, PHPLoader) {
25339
25544
  if (GLUT.specialUpFunc) {
25340
25545
  event.preventDefault();
25341
25546
  GLUT.saveModifiers(event);
25342
- ((a1, a2, a3) => {})(
25343
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
25547
+ ((
25548
+ a1,
25549
+ a2,
25550
+ a3
25551
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25552
+ key,
25344
25553
  Browser.mouseX,
25345
25554
  Browser.mouseY
25346
25555
  );
@@ -25350,8 +25559,12 @@ export function init(RuntimeName, PHPLoader) {
25350
25559
  if (key !== null && GLUT.keyboardUpFunc) {
25351
25560
  event.preventDefault();
25352
25561
  GLUT.saveModifiers(event);
25353
- ((a1, a2, a3) => {})(
25354
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
25562
+ ((
25563
+ a1,
25564
+ a2,
25565
+ a3
25566
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25567
+ key,
25355
25568
  Browser.mouseX,
25356
25569
  Browser.mouseY
25357
25570
  );
@@ -25415,10 +25628,13 @@ export function init(RuntimeName, PHPLoader) {
25415
25628
  } catch (e) {}
25416
25629
  event.preventDefault();
25417
25630
  GLUT.saveModifiers(event);
25418
- ((a1, a2, a3, a4) => {})(
25419
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[
25420
- 'button'
25421
- ],
25631
+ ((
25632
+ a1,
25633
+ a2,
25634
+ a3,
25635
+ a4
25636
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25637
+ event['button'],
25422
25638
  0 /*GLUT_DOWN*/,
25423
25639
  Browser.mouseX,
25424
25640
  Browser.mouseY
@@ -25433,10 +25649,13 @@ export function init(RuntimeName, PHPLoader) {
25433
25649
  if (GLUT.mouseFunc) {
25434
25650
  event.preventDefault();
25435
25651
  GLUT.saveModifiers(event);
25436
- ((a1, a2, a3, a4) => {})(
25437
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[
25438
- 'button'
25439
- ],
25652
+ ((
25653
+ a1,
25654
+ a2,
25655
+ a3,
25656
+ a4
25657
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25658
+ event['button'],
25440
25659
  1 /*GLUT_UP*/,
25441
25660
  Browser.mouseX,
25442
25661
  Browser.mouseY
@@ -25465,8 +25684,13 @@ export function init(RuntimeName, PHPLoader) {
25465
25684
  if (GLUT.mouseFunc) {
25466
25685
  event.preventDefault();
25467
25686
  GLUT.saveModifiers(event);
25468
- ((a1, a2, a3, a4) => {})(
25469
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ button,
25687
+ ((
25688
+ a1,
25689
+ a2,
25690
+ a3,
25691
+ a4
25692
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25693
+ button,
25470
25694
  0 /*GLUT_DOWN*/,
25471
25695
  Browser.mouseX,
25472
25696
  Browser.mouseY
@@ -25509,8 +25733,11 @@ export function init(RuntimeName, PHPLoader) {
25509
25733
  /* Can't call _glutReshapeWindow as that requests cancelling fullscreen. */
25510
25734
  if (GLUT.reshapeFunc) {
25511
25735
  // out("GLUT.reshapeFunc (from FS): " + width + ", " + height);
25512
- ((a1, a2) => {})(
25513
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
25736
+ ((
25737
+ a1,
25738
+ a2
25739
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25740
+ width,
25514
25741
  height
25515
25742
  );
25516
25743
  }
@@ -25553,8 +25780,11 @@ export function init(RuntimeName, PHPLoader) {
25553
25780
 
25554
25781
  Browser.resizeListeners.push((width, height) => {
25555
25782
  if (GLUT.reshapeFunc) {
25556
- ((a1, a2) => {})(
25557
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
25783
+ ((
25784
+ a1,
25785
+ a2
25786
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25787
+ width,
25558
25788
  height
25559
25789
  );
25560
25790
  }
@@ -25667,8 +25897,10 @@ export function init(RuntimeName, PHPLoader) {
25667
25897
  var _glutTimerFunc = (msec, func, value) =>
25668
25898
  safeSetTimeout(
25669
25899
  () =>
25670
- ((a1) => {})(
25671
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ value
25900
+ ((
25901
+ a1
25902
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25903
+ value
25672
25904
  ),
25673
25905
  msec
25674
25906
  );
@@ -25828,8 +26060,11 @@ export function init(RuntimeName, PHPLoader) {
25828
26060
  Browser.setCanvasSize(width, height, true); // N.B. GLUT.reshapeFunc is also registered as a canvas resize callback.
25829
26061
  // Just call it once here.
25830
26062
  if (GLUT.reshapeFunc) {
25831
- ((a1, a2) => {})(
25832
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
26063
+ ((
26064
+ a1,
26065
+ a2
26066
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26067
+ width,
25833
26068
  height
25834
26069
  );
25835
26070
  }
@@ -26891,15 +27126,21 @@ export function init(RuntimeName, PHPLoader) {
26891
27126
  callUserCallback(() => {
26892
27127
  if (error) {
26893
27128
  if (onerror)
26894
- ((a1) => {})(
26895
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27129
+ ((
27130
+ a1
27131
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27132
+ arg
26896
27133
  );
26897
27134
  return;
26898
27135
  }
26899
27136
  var buffer = _malloc(byteArray.length);
26900
27137
  HEAPU8.set(byteArray, buffer);
26901
- ((a1, a2, a3) => {})(
26902
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
27138
+ ((
27139
+ a1,
27140
+ a2,
27141
+ a3
27142
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27143
+ arg,
26903
27144
  buffer,
26904
27145
  byteArray.length
26905
27146
  );
@@ -26931,14 +27172,18 @@ export function init(RuntimeName, PHPLoader) {
26931
27172
  callUserCallback(() => {
26932
27173
  if (error) {
26933
27174
  if (onerror)
26934
- ((a1) => {})(
26935
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27175
+ ((
27176
+ a1
27177
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27178
+ arg
26936
27179
  );
26937
27180
  return;
26938
27181
  }
26939
27182
  if (onstore)
26940
- ((a1) => {})(
26941
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27183
+ ((
27184
+ a1
27185
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27186
+ arg
26942
27187
  );
26943
27188
  });
26944
27189
  }
@@ -26953,14 +27198,18 @@ export function init(RuntimeName, PHPLoader) {
26953
27198
  callUserCallback(() => {
26954
27199
  if (error) {
26955
27200
  if (onerror)
26956
- ((a1) => {})(
26957
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27201
+ ((
27202
+ a1
27203
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27204
+ arg
26958
27205
  );
26959
27206
  return;
26960
27207
  }
26961
27208
  if (ondelete)
26962
- ((a1) => {})(
26963
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27209
+ ((
27210
+ a1
27211
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27212
+ arg
26964
27213
  );
26965
27214
  });
26966
27215
  });
@@ -26977,14 +27226,19 @@ export function init(RuntimeName, PHPLoader) {
26977
27226
  callUserCallback(() => {
26978
27227
  if (error) {
26979
27228
  if (onerror)
26980
- ((a1) => {})(
26981
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27229
+ ((
27230
+ a1
27231
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27232
+ arg
26982
27233
  );
26983
27234
  return;
26984
27235
  }
26985
27236
  if (oncheck)
26986
- ((a1, a2) => {})(
26987
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
27237
+ ((
27238
+ a1,
27239
+ a2
27240
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27241
+ arg,
26988
27242
  exists
26989
27243
  );
26990
27244
  });
@@ -27000,14 +27254,18 @@ export function init(RuntimeName, PHPLoader) {
27000
27254
  callUserCallback(() => {
27001
27255
  if (error) {
27002
27256
  if (onerror)
27003
- ((a1) => {})(
27004
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27257
+ ((
27258
+ a1
27259
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27260
+ arg
27005
27261
  );
27006
27262
  return;
27007
27263
  }
27008
27264
  if (onclear)
27009
- ((a1) => {})(
27010
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27265
+ ((
27266
+ a1
27267
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27268
+ arg
27011
27269
  );
27012
27270
  });
27013
27271
  });
@@ -27164,8 +27422,11 @@ export function init(RuntimeName, PHPLoader) {
27164
27422
  safeSetTimeout(() => {
27165
27423
  var stackBegin = Asyncify.currData + 12;
27166
27424
  var stackEnd = HEAPU32[Asyncify.currData >> 2];
27167
- ((a1, a2) => {})(
27168
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stackBegin,
27425
+ ((
27426
+ a1,
27427
+ a2
27428
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27429
+ stackBegin,
27169
27430
  stackEnd
27170
27431
  );
27171
27432
  wakeUp();
@@ -27226,8 +27487,10 @@ export function init(RuntimeName, PHPLoader) {
27226
27487
  HEAPU32[(newFiber + 12) >> 2] = 0;
27227
27488
 
27228
27489
  var userData = HEAPU32[(newFiber + 16) >> 2];
27229
- ((a1) => {})(
27230
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
27490
+ ((
27491
+ a1
27492
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27493
+ userData
27231
27494
  );
27232
27495
  } else {
27233
27496
  var asyncifyData = newFiber + 20;
@@ -28239,8 +28502,11 @@ export function init(RuntimeName, PHPLoader) {
28239
28502
  if (!SDL.eventHandler) return;
28240
28503
 
28241
28504
  while (SDL.pollEvent(SDL.eventHandlerTemp)) {
28242
- ((a1, a2) => {})(
28243
- /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL.eventHandlerContext,
28505
+ ((
28506
+ a1,
28507
+ a2
28508
+ ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
28509
+ SDL.eventHandlerContext,
28244
28510
  SDL.eventHandlerTemp
28245
28511
  );
28246
28512
  }
@@ -29873,9 +30139,12 @@ export function init(RuntimeName, PHPLoader) {
29873
30139
  return;
29874
30140
 
29875
30141
  // Ask SDL audio data from the user code.
29876
- ((a1, a2, a3) => {})(
29877
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL
29878
- .audio.userdata,
30142
+ ((
30143
+ a1,
30144
+ a2,
30145
+ a3
30146
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
30147
+ SDL.audio.userdata,
29879
30148
  SDL.audio.buffer,
29880
30149
  SDL.audio.bufferSize
29881
30150
  );
@@ -30333,8 +30602,10 @@ export function init(RuntimeName, PHPLoader) {
30333
30602
  info.audio = null;
30334
30603
  }
30335
30604
  if (SDL.channelFinished) {
30336
- ((a1) => {})(
30337
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel
30605
+ ((
30606
+ a1
30607
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
30608
+ channel
30338
30609
  );
30339
30610
  }
30340
30611
  }
@@ -30403,8 +30674,10 @@ export function init(RuntimeName, PHPLoader) {
30403
30674
  channelInfo.audio = null;
30404
30675
  }
30405
30676
  if (SDL.channelFinished)
30406
- ((a1) => {})(
30407
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel
30677
+ ((
30678
+ a1
30679
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
30680
+ channel
30408
30681
  );
30409
30682
  };
30410
30683
  if (channelInfo.audio) {
@@ -31152,8 +31425,11 @@ export function init(RuntimeName, PHPLoader) {
31152
31425
  var _SDL_AddTimer = (interval, callback, param) =>
31153
31426
  safeSetTimeout(
31154
31427
  () =>
31155
- ((a1, a2) => {})(
31156
- /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ interval,
31428
+ ((
31429
+ a1,
31430
+ a2
31431
+ ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31432
+ interval,
31157
31433
  param
31158
31434
  ),
31159
31435
  interval
@@ -31526,8 +31802,12 @@ export function init(RuntimeName, PHPLoader) {
31526
31802
 
31527
31803
  socket.onopen = function (e) {
31528
31804
  var eventPtr = WS.getSocketEvent(socketId);
31529
- ((a1, a2, a3) => {})(
31530
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31805
+ ((
31806
+ a1,
31807
+ a2,
31808
+ a3
31809
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31810
+ 0 /*TODO*/,
31531
31811
  eventPtr,
31532
31812
  userData
31533
31813
  );
@@ -31549,8 +31829,12 @@ export function init(RuntimeName, PHPLoader) {
31549
31829
 
31550
31830
  socket.onerror = function (e) {
31551
31831
  var eventPtr = WS.getSocketEvent(socketId);
31552
- ((a1, a2, a3) => {})(
31553
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31832
+ ((
31833
+ a1,
31834
+ a2,
31835
+ a3
31836
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31837
+ 0 /*TODO*/,
31554
31838
  eventPtr,
31555
31839
  userData
31556
31840
  );
@@ -31575,8 +31859,12 @@ export function init(RuntimeName, PHPLoader) {
31575
31859
  (HEAP8[eventPtr + 4] = e.wasClean),
31576
31860
  (HEAP16[(eventPtr + 6) >> 1] = e.code),
31577
31861
  stringToUTF8(e.reason, eventPtr + 8, 512);
31578
- ((a1, a2, a3) => {})(
31579
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31862
+ ((
31863
+ a1,
31864
+ a2,
31865
+ a3
31866
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31867
+ 0 /*TODO*/,
31580
31868
  eventPtr,
31581
31869
  userData
31582
31870
  );
@@ -31610,8 +31898,12 @@ export function init(RuntimeName, PHPLoader) {
31610
31898
  (HEAPU32[(eventPtr + 4) >> 2] = buf),
31611
31899
  (HEAP32[(eventPtr + 8) >> 2] = len),
31612
31900
  (HEAP8[eventPtr + 12] = isText),
31613
- ((a1, a2, a3) => {})(
31614
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31901
+ ((
31902
+ a1,
31903
+ a2,
31904
+ a3
31905
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31906
+ 0 /*TODO*/,
31615
31907
  eventPtr,
31616
31908
  userData
31617
31909
  );
@@ -35391,19 +35683,16 @@ export function init(RuntimeName, PHPLoader) {
35391
35683
  // We override NODEFS.createNode() to add an `isSharedFS` flag to all NODEFS
35392
35684
  // nodes. This way we can tell whether file-locking is needed and possible
35393
35685
  // for an FS node, even if wrapped with PROXYFS.
35394
- const originalCreateNode = NODEFS.createNode;
35686
+ const originalNodeFsCreateNode = NODEFS.createNode;
35395
35687
  NODEFS.createNode = function createNodeWithSharedFlag() {
35396
- const node = originalCreateNode.apply(NODEFS, arguments);
35688
+ const node = originalNodeFsCreateNode.apply(NODEFS, arguments);
35397
35689
  node.isSharedFS = true;
35398
35690
  return node;
35399
35691
  };
35400
35692
 
35401
35693
  var originalHashAddNode = FS.hashAddNode;
35402
35694
  FS.hashAddNode = function hashAddNodeIfNotSharedFS(node) {
35403
- if (
35404
- typeof locking === 'object' &&
35405
- locking?.is_shared_fs_node(node)
35406
- ) {
35695
+ if (node?.isSharedFS) {
35407
35696
  // Avoid caching shared VFS nodes so multiple instances
35408
35697
  // can access the same underlying filesystem without
35409
35698
  // conflicting caches.