@php-wasm/node 2.0.4 → 2.0.7

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (41) hide show
  1. package/asyncify/7_2_34/php_7_2.wasm +0 -0
  2. package/asyncify/7_3_33/php_7_3.wasm +0 -0
  3. package/asyncify/7_4_33/php_7_4.wasm +0 -0
  4. package/asyncify/8_0_30/php_8_0.wasm +0 -0
  5. package/asyncify/8_1_33/php_8_1.wasm +0 -0
  6. package/asyncify/8_2_29/php_8_2.wasm +0 -0
  7. package/asyncify/8_3_23/php_8_3.wasm +0 -0
  8. package/asyncify/8_3_24/php_8_3.wasm +0 -0
  9. package/asyncify/8_4_10/php_8_4.wasm +0 -0
  10. package/asyncify/8_4_11/php_8_4.wasm +0 -0
  11. package/asyncify/php_7_2.js +512 -223
  12. package/asyncify/php_7_3.js +509 -220
  13. package/asyncify/php_7_4.js +516 -227
  14. package/asyncify/php_8_0.js +509 -220
  15. package/asyncify/php_8_1.js +509 -220
  16. package/asyncify/php_8_2.js +509 -220
  17. package/asyncify/php_8_3.js +519 -230
  18. package/asyncify/php_8_4.js +515 -226
  19. package/index.cjs +657 -1191
  20. package/index.js +657 -1191
  21. package/jspi/7_2_34/php_7_2.wasm +0 -0
  22. package/jspi/7_3_33/php_7_3.wasm +0 -0
  23. package/jspi/7_4_33/php_7_4.wasm +0 -0
  24. package/jspi/8_0_30/php_8_0.wasm +0 -0
  25. package/jspi/8_1_33/php_8_1.wasm +0 -0
  26. package/jspi/8_2_29/php_8_2.wasm +0 -0
  27. package/jspi/8_3_23/php_8_3.wasm +0 -0
  28. package/jspi/8_3_24/php_8_3.wasm +0 -0
  29. package/jspi/8_4_10/php_8_4.wasm +0 -0
  30. package/jspi/8_4_11/php_8_4.wasm +0 -0
  31. package/jspi/php_7_2.js +42 -36
  32. package/jspi/php_7_3.js +42 -36
  33. package/jspi/php_7_4.js +42 -36
  34. package/jspi/php_8_0.js +42 -36
  35. package/jspi/php_8_1.js +42 -36
  36. package/jspi/php_8_2.js +42 -36
  37. package/jspi/php_8_3.js +48 -42
  38. package/jspi/php_8_4.js +48 -42
  39. package/lib/file-lock-manager-for-node.d.ts +9 -2
  40. package/lib/load-runtime.d.ts +2 -1
  41. package/package.json +7 -7
@@ -6,10 +6,10 @@ const require = createRequire(import.meta.url);
6
6
  // Note: The path module is currently needed by code injected by the php-wasm Dockerfile.
7
7
  import path from 'path';
8
8
 
9
- const dependencyFilename = path.join(__dirname, '8_4_10', 'php_8_4.wasm');
9
+ const dependencyFilename = path.join(__dirname, '8_4_11', 'php_8_4.wasm');
10
10
  export { dependencyFilename };
11
- export const dependenciesTotalSize = 36942485;
12
- const phpVersionString = '8.4.10';
11
+ export const dependenciesTotalSize = 36942530;
12
+ const phpVersionString = '8.4.11';
13
13
  export function init(RuntimeName, PHPLoader) {
14
14
  // The rest of the code comes from the built php.js file and esm-suffix.js
15
15
  // include: shell.js
@@ -995,7 +995,7 @@ export function init(RuntimeName, PHPLoader) {
995
995
 
996
996
  /** @type {WebAssembly.Table} */
997
997
  var wasmTable = new WebAssembly.Table({
998
- initial: 16954,
998
+ initial: 16955,
999
999
  element: 'anyfunc',
1000
1000
  });
1001
1001
  var getWasmTableEntry = (funcPtr) => {
@@ -1774,8 +1774,10 @@ export function init(RuntimeName, PHPLoader) {
1774
1774
  );
1775
1775
 
1776
1776
  var ___call_sighandler = (fp, sig) =>
1777
- ((a1) => {})(
1778
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ sig
1777
+ ((
1778
+ a1
1779
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
1780
+ sig
1779
1781
  );
1780
1782
  ___call_sighandler.sig = 'vpi';
1781
1783
 
@@ -7101,35 +7103,25 @@ export function init(RuntimeName, PHPLoader) {
7101
7103
  1: 'exclusive',
7102
7104
  2: 'unlocked',
7103
7105
  },
7104
- is_shared_fs_node(node) {
7105
- if (node?.isSharedFS) {
7106
- return true;
7107
- }
7108
-
7109
- // Handle PROXYFS nodes which wrap other nodes.
7110
- if (
7111
- !node?.mount?.opts?.fs?.lookupPath ||
7112
- !node?.mount?.type?.realPath
7113
- ) {
7114
- return false;
7106
+ is_path_to_shared_fs(path) {
7107
+ _js_wasm_trace('is_path_to_shared_fs(%s)', path);
7108
+ const { node } = FS.lookupPath(path, { noent_okay: true });
7109
+ if (node.mount.type !== PROXYFS) {
7110
+ return !!node.isSharedFS;
7111
+ }
7112
+
7113
+ // This looks like a PROXYFS node. Let's try a lookup.
7114
+ const nodePath = PROXYFS.realPath(node);
7115
+ const backingFs = node?.mount?.opts?.fs;
7116
+ if (backingFs) {
7117
+ // Tolerate ENOENT because looking up a MEMFS node by path always fails.
7118
+ const { node: backingNode } = backingFs.lookupPath(nodePath, {
7119
+ noent_okay: true,
7120
+ });
7121
+ return !!backingNode?.isSharedFS;
7115
7122
  }
7116
7123
 
7117
- // Only NODEFS can be shared between workers at the moment.
7118
- if (node.mount.type !== NODEFS) {
7119
- return false;
7120
- }
7121
- const vfsPath = node.mount.type.realPath(node);
7122
- try {
7123
- const underlyingNode =
7124
- node.mount.opts.fs.lookupPath(vfsPath)?.node;
7125
- return !!underlyingNode?.isSharedFS;
7126
- } catch (e) {
7127
- return false;
7128
- }
7129
- },
7130
- is_path_to_shared_fs(path) {
7131
- const { node } = FS.lookupPath(path);
7132
- return locking.is_shared_fs_node(node);
7124
+ return false;
7133
7125
  },
7134
7126
  get_fd_access_mode(fd) {
7135
7127
  const emscripten_F_GETFL = Number('3');
@@ -7147,8 +7139,26 @@ export function init(RuntimeName, PHPLoader) {
7147
7139
  }
7148
7140
  },
7149
7141
  get_native_path_from_vfs_path(vfsPath) {
7150
- const { node } = FS.lookupPath(vfsPath);
7151
- return NODEFS.realPath(node);
7142
+ // TODO: Should there be a try/catch here?
7143
+ const { node } = FS.lookupPath(vfsPath, {});
7144
+ if (node.mount.type === NODEFS) {
7145
+ return NODEFS.realPath(node);
7146
+ } else if (node.mount.type === PROXYFS) {
7147
+ // TODO: Tolerate ENOENT here?
7148
+ const { node: backingNode, path: backingPath } =
7149
+ node.mount.opts.fs.lookupPath(vfsPath);
7150
+ _js_wasm_trace(
7151
+ 'backingNode for %s: %s',
7152
+ vfsPath,
7153
+ backingPath,
7154
+ backingNode
7155
+ );
7156
+ return backingNode.mount.type.realPath(backingNode);
7157
+ } else {
7158
+ throw new Error(
7159
+ `Unsupported filesystem type for path ${vfsPath}`
7160
+ );
7161
+ }
7152
7162
  },
7153
7163
  check_lock_params(fd, l_type) {
7154
7164
  const emscripten_O_RDONLY = Number('0');
@@ -7348,6 +7358,8 @@ export function init(RuntimeName, PHPLoader) {
7348
7358
  return -ERRNO_CODES.EBADF;
7349
7359
  }
7350
7360
 
7361
+ const flockStructAddr = syscallGetVarargP();
7362
+
7351
7363
  if (!locking.is_path_to_shared_fs(vfsPath)) {
7352
7364
  _js_wasm_trace(
7353
7365
  "fcntl(%d, F_GETLK) locking is not implemented for non-NodeFS path '%s'",
@@ -7363,7 +7375,6 @@ export function init(RuntimeName, PHPLoader) {
7363
7375
  return 0;
7364
7376
  }
7365
7377
 
7366
- const flockStructAddr = syscallGetVarargP();
7367
7378
  const flockStruct = read_flock_struct(flockStructAddr);
7368
7379
 
7369
7380
  if (!(flockStruct.l_type in locking.fcntlToLockState)) {
@@ -8791,8 +8802,11 @@ export function init(RuntimeName, PHPLoader) {
8791
8802
  dlSetError(`'Could not load dynamic lib: ${filename}\n${e}`);
8792
8803
  runtimeKeepalivePop();
8793
8804
  callUserCallback(() =>
8794
- ((a1, a2) => {})(
8795
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
8805
+ ((
8806
+ a1,
8807
+ a2
8808
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
8809
+ handle,
8796
8810
  user_data
8797
8811
  )
8798
8812
  );
@@ -8800,8 +8814,11 @@ export function init(RuntimeName, PHPLoader) {
8800
8814
  function successCallback() {
8801
8815
  runtimeKeepalivePop();
8802
8816
  callUserCallback(() =>
8803
- ((a1, a2) => {})(
8804
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
8817
+ ((
8818
+ a1,
8819
+ a2
8820
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
8821
+ handle,
8805
8822
  user_data
8806
8823
  )
8807
8824
  );
@@ -19471,8 +19488,11 @@ export function init(RuntimeName, PHPLoader) {
19471
19488
  var trace = getCallstack();
19472
19489
  var parts = trace.split('\n');
19473
19490
  for (var i = 0; i < parts.length; i++) {
19474
- var ret = ((a1, a2) => {})(
19475
- /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0,
19491
+ var ret = ((
19492
+ a1,
19493
+ a2
19494
+ ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19495
+ 0,
19476
19496
  arg
19477
19497
  );
19478
19498
  if (ret !== 0) return;
@@ -20048,8 +20068,12 @@ export function init(RuntimeName, PHPLoader) {
20048
20068
  stringToUTF8(e.locale || '', keyEventData + 128, 32);
20049
20069
 
20050
20070
  if (
20051
- ((a1, a2, a3) => {})(
20052
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20071
+ ((
20072
+ a1,
20073
+ a2,
20074
+ a3
20075
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20076
+ eventTypeId,
20053
20077
  keyEventData,
20054
20078
  userData
20055
20079
  )
@@ -20167,8 +20191,12 @@ export function init(RuntimeName, PHPLoader) {
20167
20191
  fillMouseEventData(JSEvents.mouseEvent, e, target);
20168
20192
 
20169
20193
  if (
20170
- ((a1, a2, a3) => {})(
20171
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20194
+ ((
20195
+ a1,
20196
+ a2,
20197
+ a3
20198
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20199
+ eventTypeId,
20172
20200
  JSEvents.mouseEvent,
20173
20201
  userData
20174
20202
  )
@@ -20382,8 +20410,12 @@ export function init(RuntimeName, PHPLoader) {
20382
20410
  HEAPF64[(wheelEvent + 80) >> 3] = e['deltaZ'];
20383
20411
  HEAP32[(wheelEvent + 88) >> 2] = e['deltaMode'];
20384
20412
  if (
20385
- ((a1, a2, a3) => {})(
20386
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20413
+ ((
20414
+ a1,
20415
+ a2,
20416
+ a3
20417
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20418
+ eventTypeId,
20387
20419
  wheelEvent,
20388
20420
  userData
20389
20421
  )
@@ -20464,8 +20496,12 @@ export function init(RuntimeName, PHPLoader) {
20464
20496
  HEAP32[(uiEvent + 28) >> 2] = pageXOffset | 0; // scroll offsets are float
20465
20497
  HEAP32[(uiEvent + 32) >> 2] = pageYOffset | 0;
20466
20498
  if (
20467
- ((a1, a2, a3) => {})(
20468
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20499
+ ((
20500
+ a1,
20501
+ a2,
20502
+ a3
20503
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20504
+ eventTypeId,
20469
20505
  uiEvent,
20470
20506
  userData
20471
20507
  )
@@ -20539,8 +20575,12 @@ export function init(RuntimeName, PHPLoader) {
20539
20575
  stringToUTF8(id, focusEvent + 128, 128);
20540
20576
 
20541
20577
  if (
20542
- ((a1, a2, a3) => {})(
20543
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20578
+ ((
20579
+ a1,
20580
+ a2,
20581
+ a3
20582
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20583
+ eventTypeId,
20544
20584
  focusEvent,
20545
20585
  userData
20546
20586
  )
@@ -20656,8 +20696,12 @@ export function init(RuntimeName, PHPLoader) {
20656
20696
  ); // TODO: Thread-safety with respect to emscripten_get_deviceorientation_status()
20657
20697
 
20658
20698
  if (
20659
- ((a1, a2, a3) => {})(
20660
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20699
+ ((
20700
+ a1,
20701
+ a2,
20702
+ a3
20703
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20704
+ eventTypeId,
20661
20705
  JSEvents.deviceOrientationEvent,
20662
20706
  userData
20663
20707
  )
@@ -20740,8 +20784,12 @@ export function init(RuntimeName, PHPLoader) {
20740
20784
  fillDeviceMotionEventData(JSEvents.deviceMotionEvent, e, target); // TODO: Thread-safety with respect to emscripten_get_devicemotion_status()
20741
20785
 
20742
20786
  if (
20743
- ((a1, a2, a3) => {})(
20744
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20787
+ ((
20788
+ a1,
20789
+ a2,
20790
+ a3
20791
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20792
+ eventTypeId,
20745
20793
  JSEvents.deviceMotionEvent,
20746
20794
  userData
20747
20795
  )
@@ -20851,8 +20899,12 @@ export function init(RuntimeName, PHPLoader) {
20851
20899
  fillOrientationChangeEventData(orientationChangeEvent);
20852
20900
 
20853
20901
  if (
20854
- ((a1, a2, a3) => {})(
20855
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20902
+ ((
20903
+ a1,
20904
+ a2,
20905
+ a3
20906
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20907
+ eventTypeId,
20856
20908
  orientationChangeEvent,
20857
20909
  userData
20858
20910
  )
@@ -20985,8 +21037,12 @@ export function init(RuntimeName, PHPLoader) {
20985
21037
  fillFullscreenChangeEventData(fullscreenChangeEvent);
20986
21038
 
20987
21039
  if (
20988
- ((a1, a2, a3) => {})(
20989
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
21040
+ ((
21041
+ a1,
21042
+ a2,
21043
+ a3
21044
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21045
+ eventTypeId,
20990
21046
  fullscreenChangeEvent,
20991
21047
  userData
20992
21048
  )
@@ -21150,8 +21206,12 @@ export function init(RuntimeName, PHPLoader) {
21150
21206
  );
21151
21207
 
21152
21208
  if (currentFullscreenStrategy.canvasResizedCallback) {
21153
- ((a1, a2, a3) => {})(
21154
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
21209
+ ((
21210
+ a1,
21211
+ a2,
21212
+ a3
21213
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21214
+ 37,
21155
21215
  0,
21156
21216
  currentFullscreenStrategy.canvasResizedCallbackUserData
21157
21217
  );
@@ -21257,8 +21317,12 @@ export function init(RuntimeName, PHPLoader) {
21257
21317
  currentFullscreenStrategy = strategy;
21258
21318
 
21259
21319
  if (strategy.canvasResizedCallback) {
21260
- ((a1, a2, a3) => {})(
21261
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
21320
+ ((
21321
+ a1,
21322
+ a2,
21323
+ a3
21324
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21325
+ 37,
21262
21326
  0,
21263
21327
  strategy.canvasResizedCallbackUserData
21264
21328
  );
@@ -21360,8 +21424,12 @@ export function init(RuntimeName, PHPLoader) {
21360
21424
  !inCenteredWithoutScalingFullscreenMode &&
21361
21425
  currentFullscreenStrategy.canvasResizedCallback
21362
21426
  ) {
21363
- ((a1, a2, a3) => {})(
21364
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
21427
+ ((
21428
+ a1,
21429
+ a2,
21430
+ a3
21431
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21432
+ 37,
21365
21433
  0,
21366
21434
  currentFullscreenStrategy.canvasResizedCallbackUserData
21367
21435
  );
@@ -21460,8 +21528,12 @@ export function init(RuntimeName, PHPLoader) {
21460
21528
  softFullscreenResizeWebGLRenderTarget
21461
21529
  );
21462
21530
  if (strategy.canvasResizedCallback) {
21463
- ((a1, a2, a3) => {})(
21464
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
21531
+ ((
21532
+ a1,
21533
+ a2,
21534
+ a3
21535
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21536
+ 37,
21465
21537
  0,
21466
21538
  strategy.canvasResizedCallbackUserData
21467
21539
  );
@@ -21474,8 +21546,12 @@ export function init(RuntimeName, PHPLoader) {
21474
21546
 
21475
21547
  // Inform the caller that the canvas size has changed.
21476
21548
  if (strategy.canvasResizedCallback) {
21477
- ((a1, a2, a3) => {})(
21478
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
21549
+ ((
21550
+ a1,
21551
+ a2,
21552
+ a3
21553
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21554
+ 37,
21479
21555
  0,
21480
21556
  strategy.canvasResizedCallbackUserData
21481
21557
  );
@@ -21543,8 +21619,12 @@ export function init(RuntimeName, PHPLoader) {
21543
21619
  fillPointerlockChangeEventData(pointerlockChangeEvent);
21544
21620
 
21545
21621
  if (
21546
- ((a1, a2, a3) => {})(
21547
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
21622
+ ((
21623
+ a1,
21624
+ a2,
21625
+ a3
21626
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21627
+ eventTypeId,
21548
21628
  pointerlockChangeEvent,
21549
21629
  userData
21550
21630
  )
@@ -21634,8 +21714,12 @@ export function init(RuntimeName, PHPLoader) {
21634
21714
  ) => {
21635
21715
  var pointerlockErrorEventHandlerFunc = (e = event) => {
21636
21716
  if (
21637
- ((a1, a2, a3) => {})(
21638
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
21717
+ ((
21718
+ a1,
21719
+ a2,
21720
+ a3
21721
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21722
+ eventTypeId,
21639
21723
  0,
21640
21724
  userData
21641
21725
  )
@@ -21835,8 +21919,12 @@ export function init(RuntimeName, PHPLoader) {
21835
21919
  fillVisibilityChangeEventData(visibilityChangeEvent);
21836
21920
 
21837
21921
  if (
21838
- ((a1, a2, a3) => {})(
21839
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
21922
+ ((
21923
+ a1,
21924
+ a2,
21925
+ a3
21926
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21927
+ eventTypeId,
21840
21928
  visibilityChangeEvent,
21841
21929
  userData
21842
21930
  )
@@ -21956,8 +22044,12 @@ export function init(RuntimeName, PHPLoader) {
21956
22044
  HEAP32[(touchEvent + 8) >> 2] = numTouches;
21957
22045
 
21958
22046
  if (
21959
- ((a1, a2, a3) => {})(
21960
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
22047
+ ((
22048
+ a1,
22049
+ a2,
22050
+ a3
22051
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22052
+ eventTypeId,
21961
22053
  touchEvent,
21962
22054
  userData
21963
22055
  )
@@ -22095,8 +22187,12 @@ export function init(RuntimeName, PHPLoader) {
22095
22187
  fillGamepadEventData(gamepadEvent, e['gamepad']);
22096
22188
 
22097
22189
  if (
22098
- ((a1, a2, a3) => {})(
22099
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
22190
+ ((
22191
+ a1,
22192
+ a2,
22193
+ a3
22194
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22195
+ eventTypeId,
22100
22196
  gamepadEvent,
22101
22197
  userData
22102
22198
  )
@@ -22198,8 +22294,12 @@ export function init(RuntimeName, PHPLoader) {
22198
22294
  ) => {
22199
22295
  var beforeUnloadEventHandlerFunc = (e = event) => {
22200
22296
  // Note: This is always called on the main browser thread, since it needs synchronously return a value!
22201
- var confirmationMessage = ((a1, a2, a3) => {})(
22202
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
22297
+ var confirmationMessage = ((
22298
+ a1,
22299
+ a2,
22300
+ a3
22301
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22302
+ eventTypeId,
22203
22303
  0,
22204
22304
  userData
22205
22305
  );
@@ -22270,8 +22370,12 @@ export function init(RuntimeName, PHPLoader) {
22270
22370
  fillBatteryEventData(batteryEvent, battery());
22271
22371
 
22272
22372
  if (
22273
- ((a1, a2, a3) => {})(
22274
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
22373
+ ((
22374
+ a1,
22375
+ a2,
22376
+ a3
22377
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22378
+ eventTypeId,
22275
22379
  batteryEvent,
22276
22380
  userData
22277
22381
  )
@@ -22361,8 +22465,11 @@ export function init(RuntimeName, PHPLoader) {
22361
22465
 
22362
22466
  var _emscripten_request_animation_frame = (cb, userData) =>
22363
22467
  requestAnimationFrame((timeStamp) =>
22364
- ((a1, a2) => {})(
22365
- /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp,
22468
+ ((
22469
+ a1,
22470
+ a2
22471
+ ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22472
+ timeStamp,
22366
22473
  userData
22367
22474
  )
22368
22475
  );
@@ -22374,8 +22481,11 @@ export function init(RuntimeName, PHPLoader) {
22374
22481
  var _emscripten_request_animation_frame_loop = (cb, userData) => {
22375
22482
  function tick(timeStamp) {
22376
22483
  if (
22377
- ((a1, a2) => {})(
22378
- /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp,
22484
+ ((
22485
+ a1,
22486
+ a2
22487
+ ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22488
+ timeStamp,
22379
22489
  userData
22380
22490
  )
22381
22491
  ) {
@@ -22600,8 +22710,10 @@ export function init(RuntimeName, PHPLoader) {
22600
22710
  return emSetImmediate(() => {
22601
22711
  runtimeKeepalivePop();
22602
22712
  callUserCallback(() =>
22603
- ((a1) => {})(
22604
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
22713
+ ((
22714
+ a1
22715
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22716
+ userData
22605
22717
  )
22606
22718
  );
22607
22719
  });
@@ -22618,8 +22730,10 @@ export function init(RuntimeName, PHPLoader) {
22618
22730
  function tick() {
22619
22731
  callUserCallback(() => {
22620
22732
  if (
22621
- ((a1) => {})(
22622
- /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
22733
+ ((
22734
+ a1
22735
+ ) => {}) /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22736
+ userData
22623
22737
  )
22624
22738
  ) {
22625
22739
  emSetImmediate(tick);
@@ -22636,8 +22750,10 @@ export function init(RuntimeName, PHPLoader) {
22636
22750
  var _emscripten_set_timeout = (cb, msecs, userData) =>
22637
22751
  safeSetTimeout(
22638
22752
  () =>
22639
- ((a1) => {})(
22640
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
22753
+ ((
22754
+ a1
22755
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22756
+ userData
22641
22757
  ),
22642
22758
  msecs
22643
22759
  );
@@ -22653,8 +22769,11 @@ export function init(RuntimeName, PHPLoader) {
22653
22769
  runtimeKeepalivePop();
22654
22770
  callUserCallback(() => {
22655
22771
  if (
22656
- ((a1, a2) => {})(
22657
- /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ t,
22772
+ ((
22773
+ a1,
22774
+ a2
22775
+ ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22776
+ t,
22658
22777
  userData
22659
22778
  )
22660
22779
  ) {
@@ -22678,8 +22797,10 @@ export function init(RuntimeName, PHPLoader) {
22678
22797
  runtimeKeepalivePush();
22679
22798
  return setInterval(() => {
22680
22799
  callUserCallback(() =>
22681
- ((a1) => {})(
22682
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
22800
+ ((
22801
+ a1
22802
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22803
+ userData
22683
22804
  )
22684
22805
  );
22685
22806
  }, msecs);
@@ -22694,8 +22815,10 @@ export function init(RuntimeName, PHPLoader) {
22694
22815
 
22695
22816
  var _emscripten_async_call = (func, arg, millis) => {
22696
22817
  var wrapper = () =>
22697
- ((a1) => {})(
22698
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
22818
+ ((
22819
+ a1
22820
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22821
+ arg
22699
22822
  );
22700
22823
 
22701
22824
  if (
@@ -22728,7 +22851,7 @@ export function init(RuntimeName, PHPLoader) {
22728
22851
 
22729
22852
  var _emscripten_set_main_loop = (func, fps, simulateInfiniteLoop) => {
22730
22853
  var iterFunc =
22731
- () => {}; /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */
22854
+ () => {} /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */;
22732
22855
  setMainLoop(iterFunc, fps, simulateInfiniteLoop);
22733
22856
  };
22734
22857
  _emscripten_set_main_loop.sig = 'vpii';
@@ -22740,8 +22863,10 @@ export function init(RuntimeName, PHPLoader) {
22740
22863
  simulateInfiniteLoop
22741
22864
  ) => {
22742
22865
  var iterFunc = () =>
22743
- ((a1) => {})(
22744
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
22866
+ ((
22867
+ a1
22868
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22869
+ arg
22745
22870
  );
22746
22871
  setMainLoop(iterFunc, fps, simulateInfiniteLoop, arg);
22747
22872
  };
@@ -22762,8 +22887,10 @@ export function init(RuntimeName, PHPLoader) {
22762
22887
  var __emscripten_push_main_loop_blocker = (func, arg, name) => {
22763
22888
  MainLoop.queue.push({
22764
22889
  func: () => {
22765
- ((a1) => {})(
22766
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
22890
+ ((
22891
+ a1
22892
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22893
+ arg
22767
22894
  );
22768
22895
  },
22769
22896
  name: UTF8ToString(name),
@@ -22776,8 +22903,10 @@ export function init(RuntimeName, PHPLoader) {
22776
22903
  var __emscripten_push_uncounted_main_loop_blocker = (func, arg, name) => {
22777
22904
  MainLoop.queue.push({
22778
22905
  func: () => {
22779
- ((a1) => {})(
22780
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
22906
+ ((
22907
+ a1
22908
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22909
+ arg
22781
22910
  );
22782
22911
  },
22783
22912
  name: UTF8ToString(name),
@@ -22811,8 +22940,12 @@ export function init(RuntimeName, PHPLoader) {
22811
22940
  var resultPtr = stackAlloc(POINTER_SIZE);
22812
22941
  HEAPU32[resultPtr >> 2] = 0;
22813
22942
  try {
22814
- var result = ((a1, a2, a3) => {})(
22815
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ resultPtr,
22943
+ var result = ((
22944
+ a1,
22945
+ a2,
22946
+ a3
22947
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22948
+ resultPtr,
22816
22949
  userData,
22817
22950
  value
22818
22951
  );
@@ -23748,15 +23881,19 @@ export function init(RuntimeName, PHPLoader) {
23748
23881
  () => {
23749
23882
  runtimeKeepalivePop();
23750
23883
  if (onload)
23751
- ((a1) => {})(
23752
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file
23884
+ ((
23885
+ a1
23886
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23887
+ file
23753
23888
  );
23754
23889
  },
23755
23890
  () => {
23756
23891
  runtimeKeepalivePop();
23757
23892
  if (onerror)
23758
- ((a1) => {})(
23759
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file
23893
+ ((
23894
+ a1
23895
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23896
+ file
23760
23897
  );
23761
23898
  },
23762
23899
  true // don'tCreateFile - it's already there
@@ -23790,16 +23927,21 @@ export function init(RuntimeName, PHPLoader) {
23790
23927
  () => {
23791
23928
  runtimeKeepalivePop();
23792
23929
  if (onload)
23793
- ((a1, a2) => {})(
23794
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
23930
+ ((
23931
+ a1,
23932
+ a2
23933
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23934
+ arg,
23795
23935
  cname
23796
23936
  );
23797
23937
  },
23798
23938
  () => {
23799
23939
  runtimeKeepalivePop();
23800
23940
  if (onerror)
23801
- ((a1) => {})(
23802
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
23941
+ ((
23942
+ a1
23943
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23944
+ arg
23803
23945
  );
23804
23946
  },
23805
23947
  true // don'tCreateFile - it's already there
@@ -24072,10 +24214,10 @@ export function init(RuntimeName, PHPLoader) {
24072
24214
  runtimeKeepalivePop();
24073
24215
  callUserCallback(() => {
24074
24216
  var sp = stackSave();
24075
- ((a1) => {})(
24076
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stringToUTF8OnStack(
24077
- _file
24078
- )
24217
+ ((
24218
+ a1
24219
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24220
+ stringToUTF8OnStack(_file)
24079
24221
  );
24080
24222
  stackRestore(sp);
24081
24223
  });
@@ -24119,8 +24261,12 @@ export function init(RuntimeName, PHPLoader) {
24119
24261
  callUserCallback(() => {
24120
24262
  var buffer = _malloc(byteArray.length);
24121
24263
  HEAPU8.set(byteArray, buffer);
24122
- ((a1, a2, a3) => {})(
24123
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata,
24264
+ ((
24265
+ a1,
24266
+ a2,
24267
+ a3
24268
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24269
+ userdata,
24124
24270
  buffer,
24125
24271
  byteArray.length
24126
24272
  );
@@ -24130,8 +24276,10 @@ export function init(RuntimeName, PHPLoader) {
24130
24276
  if (onerror) {
24131
24277
  runtimeKeepalivePop();
24132
24278
  callUserCallback(() => {
24133
- ((a1) => {})(
24134
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata
24279
+ ((
24280
+ a1
24281
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24282
+ userdata
24135
24283
  );
24136
24284
  });
24137
24285
  }
@@ -24188,8 +24336,12 @@ export function init(RuntimeName, PHPLoader) {
24188
24336
  );
24189
24337
  if (onload) {
24190
24338
  var sp = stackSave();
24191
- ((a1, a2, a3) => {})(
24192
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24339
+ ((
24340
+ a1,
24341
+ a2,
24342
+ a3
24343
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24344
+ handle,
24193
24345
  userdata,
24194
24346
  stringToUTF8OnStack(_file)
24195
24347
  );
@@ -24197,8 +24349,12 @@ export function init(RuntimeName, PHPLoader) {
24197
24349
  }
24198
24350
  } else {
24199
24351
  if (onerror)
24200
- ((a1, a2, a3) => {})(
24201
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24352
+ ((
24353
+ a1,
24354
+ a2,
24355
+ a3
24356
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24357
+ handle,
24202
24358
  userdata,
24203
24359
  http.status
24204
24360
  );
@@ -24211,8 +24367,12 @@ export function init(RuntimeName, PHPLoader) {
24211
24367
  http.onerror = (e) => {
24212
24368
  runtimeKeepalivePop();
24213
24369
  if (onerror)
24214
- ((a1, a2, a3) => {})(
24215
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24370
+ ((
24371
+ a1,
24372
+ a2,
24373
+ a3
24374
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24375
+ handle,
24216
24376
  userdata,
24217
24377
  http.status
24218
24378
  );
@@ -24227,8 +24387,12 @@ export function init(RuntimeName, PHPLoader) {
24227
24387
  ) {
24228
24388
  var percentComplete = (e.loaded / e.total) * 100;
24229
24389
  if (onprogress)
24230
- ((a1, a2, a3) => {})(
24231
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24390
+ ((
24391
+ a1,
24392
+ a2,
24393
+ a3
24394
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24395
+ handle,
24232
24396
  userdata,
24233
24397
  percentComplete
24234
24398
  );
@@ -24285,8 +24449,13 @@ export function init(RuntimeName, PHPLoader) {
24285
24449
  if (http.statusText) {
24286
24450
  statusText = stringToUTF8OnStack(http.statusText);
24287
24451
  }
24288
- ((a1, a2, a3, a4) => {})(
24289
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24452
+ ((
24453
+ a1,
24454
+ a2,
24455
+ a3,
24456
+ a4
24457
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24458
+ handle,
24290
24459
  userdata,
24291
24460
  http.status,
24292
24461
  statusText
@@ -24307,8 +24476,13 @@ export function init(RuntimeName, PHPLoader) {
24307
24476
  var buffer = _malloc(byteArray.length);
24308
24477
  HEAPU8.set(byteArray, buffer);
24309
24478
  if (onload)
24310
- ((a1, a2, a3, a4) => {})(
24311
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24479
+ ((
24480
+ a1,
24481
+ a2,
24482
+ a3,
24483
+ a4
24484
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24485
+ handle,
24312
24486
  userdata,
24313
24487
  buffer,
24314
24488
  byteArray.length
@@ -24329,8 +24503,13 @@ export function init(RuntimeName, PHPLoader) {
24329
24503
  // PROGRESS
24330
24504
  http.onprogress = (e) => {
24331
24505
  if (onprogress)
24332
- ((a1, a2, a3, a4) => {})(
24333
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24506
+ ((
24507
+ a1,
24508
+ a2,
24509
+ a3,
24510
+ a4
24511
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24512
+ handle,
24334
24513
  userdata,
24335
24514
  e.loaded,
24336
24515
  e.lengthComputable || e.lengthComputable === undefined
@@ -24450,16 +24629,24 @@ export function init(RuntimeName, PHPLoader) {
24450
24629
  if (event === 'error') {
24451
24630
  withStackSave(() => {
24452
24631
  var msg = stringToUTF8OnStack(data[2]);
24453
- ((a1, a2, a3, a4) => {})(
24454
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data[0],
24632
+ ((
24633
+ a1,
24634
+ a2,
24635
+ a3,
24636
+ a4
24637
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24638
+ data[0],
24455
24639
  data[1],
24456
24640
  msg,
24457
24641
  userData
24458
24642
  );
24459
24643
  });
24460
24644
  } else {
24461
- ((a1, a2) => {})(
24462
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data,
24645
+ ((
24646
+ a1,
24647
+ a2
24648
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24649
+ data,
24463
24650
  userData
24464
24651
  );
24465
24652
  }
@@ -24925,8 +25112,12 @@ export function init(RuntimeName, PHPLoader) {
24925
25112
  ) => {
24926
25113
  var webGlEventHandlerFunc = (e = event) => {
24927
25114
  if (
24928
- ((a1, a2, a3) => {})(
24929
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
25115
+ ((
25116
+ a1,
25117
+ a2,
25118
+ a3
25119
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25120
+ eventTypeId,
24930
25121
  0,
24931
25122
  userData
24932
25123
  )
@@ -25145,15 +25336,21 @@ export function init(RuntimeName, PHPLoader) {
25145
25336
  ) {
25146
25337
  event.preventDefault();
25147
25338
  GLUT.saveModifiers(event);
25148
- ((a1, a2) => {})(
25149
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX,
25339
+ ((
25340
+ a1,
25341
+ a2
25342
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25343
+ lastX,
25150
25344
  lastY
25151
25345
  );
25152
25346
  } else if (GLUT.buttons != 0 && GLUT.motionFunc) {
25153
25347
  event.preventDefault();
25154
25348
  GLUT.saveModifiers(event);
25155
- ((a1, a2) => {})(
25156
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX,
25349
+ ((
25350
+ a1,
25351
+ a2
25352
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25353
+ lastX,
25157
25354
  lastY
25158
25355
  );
25159
25356
  }
@@ -25314,8 +25511,12 @@ export function init(RuntimeName, PHPLoader) {
25314
25511
  if (GLUT.specialFunc) {
25315
25512
  event.preventDefault();
25316
25513
  GLUT.saveModifiers(event);
25317
- ((a1, a2, a3) => {})(
25318
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
25514
+ ((
25515
+ a1,
25516
+ a2,
25517
+ a3
25518
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25519
+ key,
25319
25520
  Browser.mouseX,
25320
25521
  Browser.mouseY
25321
25522
  );
@@ -25325,8 +25526,12 @@ export function init(RuntimeName, PHPLoader) {
25325
25526
  if (key !== null && GLUT.keyboardFunc) {
25326
25527
  event.preventDefault();
25327
25528
  GLUT.saveModifiers(event);
25328
- ((a1, a2, a3) => {})(
25329
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
25529
+ ((
25530
+ a1,
25531
+ a2,
25532
+ a3
25533
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25534
+ key,
25330
25535
  Browser.mouseX,
25331
25536
  Browser.mouseY
25332
25537
  );
@@ -25341,8 +25546,12 @@ export function init(RuntimeName, PHPLoader) {
25341
25546
  if (GLUT.specialUpFunc) {
25342
25547
  event.preventDefault();
25343
25548
  GLUT.saveModifiers(event);
25344
- ((a1, a2, a3) => {})(
25345
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
25549
+ ((
25550
+ a1,
25551
+ a2,
25552
+ a3
25553
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25554
+ key,
25346
25555
  Browser.mouseX,
25347
25556
  Browser.mouseY
25348
25557
  );
@@ -25352,8 +25561,12 @@ export function init(RuntimeName, PHPLoader) {
25352
25561
  if (key !== null && GLUT.keyboardUpFunc) {
25353
25562
  event.preventDefault();
25354
25563
  GLUT.saveModifiers(event);
25355
- ((a1, a2, a3) => {})(
25356
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
25564
+ ((
25565
+ a1,
25566
+ a2,
25567
+ a3
25568
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25569
+ key,
25357
25570
  Browser.mouseX,
25358
25571
  Browser.mouseY
25359
25572
  );
@@ -25417,10 +25630,13 @@ export function init(RuntimeName, PHPLoader) {
25417
25630
  } catch (e) {}
25418
25631
  event.preventDefault();
25419
25632
  GLUT.saveModifiers(event);
25420
- ((a1, a2, a3, a4) => {})(
25421
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[
25422
- 'button'
25423
- ],
25633
+ ((
25634
+ a1,
25635
+ a2,
25636
+ a3,
25637
+ a4
25638
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25639
+ event['button'],
25424
25640
  0 /*GLUT_DOWN*/,
25425
25641
  Browser.mouseX,
25426
25642
  Browser.mouseY
@@ -25435,10 +25651,13 @@ export function init(RuntimeName, PHPLoader) {
25435
25651
  if (GLUT.mouseFunc) {
25436
25652
  event.preventDefault();
25437
25653
  GLUT.saveModifiers(event);
25438
- ((a1, a2, a3, a4) => {})(
25439
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[
25440
- 'button'
25441
- ],
25654
+ ((
25655
+ a1,
25656
+ a2,
25657
+ a3,
25658
+ a4
25659
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25660
+ event['button'],
25442
25661
  1 /*GLUT_UP*/,
25443
25662
  Browser.mouseX,
25444
25663
  Browser.mouseY
@@ -25467,8 +25686,13 @@ export function init(RuntimeName, PHPLoader) {
25467
25686
  if (GLUT.mouseFunc) {
25468
25687
  event.preventDefault();
25469
25688
  GLUT.saveModifiers(event);
25470
- ((a1, a2, a3, a4) => {})(
25471
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ button,
25689
+ ((
25690
+ a1,
25691
+ a2,
25692
+ a3,
25693
+ a4
25694
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25695
+ button,
25472
25696
  0 /*GLUT_DOWN*/,
25473
25697
  Browser.mouseX,
25474
25698
  Browser.mouseY
@@ -25511,8 +25735,11 @@ export function init(RuntimeName, PHPLoader) {
25511
25735
  /* Can't call _glutReshapeWindow as that requests cancelling fullscreen. */
25512
25736
  if (GLUT.reshapeFunc) {
25513
25737
  // out("GLUT.reshapeFunc (from FS): " + width + ", " + height);
25514
- ((a1, a2) => {})(
25515
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
25738
+ ((
25739
+ a1,
25740
+ a2
25741
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25742
+ width,
25516
25743
  height
25517
25744
  );
25518
25745
  }
@@ -25555,8 +25782,11 @@ export function init(RuntimeName, PHPLoader) {
25555
25782
 
25556
25783
  Browser.resizeListeners.push((width, height) => {
25557
25784
  if (GLUT.reshapeFunc) {
25558
- ((a1, a2) => {})(
25559
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
25785
+ ((
25786
+ a1,
25787
+ a2
25788
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25789
+ width,
25560
25790
  height
25561
25791
  );
25562
25792
  }
@@ -25669,8 +25899,10 @@ export function init(RuntimeName, PHPLoader) {
25669
25899
  var _glutTimerFunc = (msec, func, value) =>
25670
25900
  safeSetTimeout(
25671
25901
  () =>
25672
- ((a1) => {})(
25673
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ value
25902
+ ((
25903
+ a1
25904
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25905
+ value
25674
25906
  ),
25675
25907
  msec
25676
25908
  );
@@ -25830,8 +26062,11 @@ export function init(RuntimeName, PHPLoader) {
25830
26062
  Browser.setCanvasSize(width, height, true); // N.B. GLUT.reshapeFunc is also registered as a canvas resize callback.
25831
26063
  // Just call it once here.
25832
26064
  if (GLUT.reshapeFunc) {
25833
- ((a1, a2) => {})(
25834
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
26065
+ ((
26066
+ a1,
26067
+ a2
26068
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26069
+ width,
25835
26070
  height
25836
26071
  );
25837
26072
  }
@@ -26893,15 +27128,21 @@ export function init(RuntimeName, PHPLoader) {
26893
27128
  callUserCallback(() => {
26894
27129
  if (error) {
26895
27130
  if (onerror)
26896
- ((a1) => {})(
26897
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27131
+ ((
27132
+ a1
27133
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27134
+ arg
26898
27135
  );
26899
27136
  return;
26900
27137
  }
26901
27138
  var buffer = _malloc(byteArray.length);
26902
27139
  HEAPU8.set(byteArray, buffer);
26903
- ((a1, a2, a3) => {})(
26904
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
27140
+ ((
27141
+ a1,
27142
+ a2,
27143
+ a3
27144
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27145
+ arg,
26905
27146
  buffer,
26906
27147
  byteArray.length
26907
27148
  );
@@ -26933,14 +27174,18 @@ export function init(RuntimeName, PHPLoader) {
26933
27174
  callUserCallback(() => {
26934
27175
  if (error) {
26935
27176
  if (onerror)
26936
- ((a1) => {})(
26937
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27177
+ ((
27178
+ a1
27179
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27180
+ arg
26938
27181
  );
26939
27182
  return;
26940
27183
  }
26941
27184
  if (onstore)
26942
- ((a1) => {})(
26943
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27185
+ ((
27186
+ a1
27187
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27188
+ arg
26944
27189
  );
26945
27190
  });
26946
27191
  }
@@ -26955,14 +27200,18 @@ export function init(RuntimeName, PHPLoader) {
26955
27200
  callUserCallback(() => {
26956
27201
  if (error) {
26957
27202
  if (onerror)
26958
- ((a1) => {})(
26959
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27203
+ ((
27204
+ a1
27205
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27206
+ arg
26960
27207
  );
26961
27208
  return;
26962
27209
  }
26963
27210
  if (ondelete)
26964
- ((a1) => {})(
26965
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27211
+ ((
27212
+ a1
27213
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27214
+ arg
26966
27215
  );
26967
27216
  });
26968
27217
  });
@@ -26979,14 +27228,19 @@ export function init(RuntimeName, PHPLoader) {
26979
27228
  callUserCallback(() => {
26980
27229
  if (error) {
26981
27230
  if (onerror)
26982
- ((a1) => {})(
26983
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27231
+ ((
27232
+ a1
27233
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27234
+ arg
26984
27235
  );
26985
27236
  return;
26986
27237
  }
26987
27238
  if (oncheck)
26988
- ((a1, a2) => {})(
26989
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
27239
+ ((
27240
+ a1,
27241
+ a2
27242
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27243
+ arg,
26990
27244
  exists
26991
27245
  );
26992
27246
  });
@@ -27002,14 +27256,18 @@ export function init(RuntimeName, PHPLoader) {
27002
27256
  callUserCallback(() => {
27003
27257
  if (error) {
27004
27258
  if (onerror)
27005
- ((a1) => {})(
27006
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27259
+ ((
27260
+ a1
27261
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27262
+ arg
27007
27263
  );
27008
27264
  return;
27009
27265
  }
27010
27266
  if (onclear)
27011
- ((a1) => {})(
27012
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27267
+ ((
27268
+ a1
27269
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27270
+ arg
27013
27271
  );
27014
27272
  });
27015
27273
  });
@@ -27166,8 +27424,11 @@ export function init(RuntimeName, PHPLoader) {
27166
27424
  safeSetTimeout(() => {
27167
27425
  var stackBegin = Asyncify.currData + 12;
27168
27426
  var stackEnd = HEAPU32[Asyncify.currData >> 2];
27169
- ((a1, a2) => {})(
27170
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stackBegin,
27427
+ ((
27428
+ a1,
27429
+ a2
27430
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27431
+ stackBegin,
27171
27432
  stackEnd
27172
27433
  );
27173
27434
  wakeUp();
@@ -27228,8 +27489,10 @@ export function init(RuntimeName, PHPLoader) {
27228
27489
  HEAPU32[(newFiber + 12) >> 2] = 0;
27229
27490
 
27230
27491
  var userData = HEAPU32[(newFiber + 16) >> 2];
27231
- ((a1) => {})(
27232
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
27492
+ ((
27493
+ a1
27494
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27495
+ userData
27233
27496
  );
27234
27497
  } else {
27235
27498
  var asyncifyData = newFiber + 20;
@@ -28241,8 +28504,11 @@ export function init(RuntimeName, PHPLoader) {
28241
28504
  if (!SDL.eventHandler) return;
28242
28505
 
28243
28506
  while (SDL.pollEvent(SDL.eventHandlerTemp)) {
28244
- ((a1, a2) => {})(
28245
- /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL.eventHandlerContext,
28507
+ ((
28508
+ a1,
28509
+ a2
28510
+ ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
28511
+ SDL.eventHandlerContext,
28246
28512
  SDL.eventHandlerTemp
28247
28513
  );
28248
28514
  }
@@ -29875,9 +30141,12 @@ export function init(RuntimeName, PHPLoader) {
29875
30141
  return;
29876
30142
 
29877
30143
  // Ask SDL audio data from the user code.
29878
- ((a1, a2, a3) => {})(
29879
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL
29880
- .audio.userdata,
30144
+ ((
30145
+ a1,
30146
+ a2,
30147
+ a3
30148
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
30149
+ SDL.audio.userdata,
29881
30150
  SDL.audio.buffer,
29882
30151
  SDL.audio.bufferSize
29883
30152
  );
@@ -30335,8 +30604,10 @@ export function init(RuntimeName, PHPLoader) {
30335
30604
  info.audio = null;
30336
30605
  }
30337
30606
  if (SDL.channelFinished) {
30338
- ((a1) => {})(
30339
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel
30607
+ ((
30608
+ a1
30609
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
30610
+ channel
30340
30611
  );
30341
30612
  }
30342
30613
  }
@@ -30405,8 +30676,10 @@ export function init(RuntimeName, PHPLoader) {
30405
30676
  channelInfo.audio = null;
30406
30677
  }
30407
30678
  if (SDL.channelFinished)
30408
- ((a1) => {})(
30409
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel
30679
+ ((
30680
+ a1
30681
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
30682
+ channel
30410
30683
  );
30411
30684
  };
30412
30685
  if (channelInfo.audio) {
@@ -31154,8 +31427,11 @@ export function init(RuntimeName, PHPLoader) {
31154
31427
  var _SDL_AddTimer = (interval, callback, param) =>
31155
31428
  safeSetTimeout(
31156
31429
  () =>
31157
- ((a1, a2) => {})(
31158
- /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ interval,
31430
+ ((
31431
+ a1,
31432
+ a2
31433
+ ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31434
+ interval,
31159
31435
  param
31160
31436
  ),
31161
31437
  interval
@@ -31526,8 +31802,12 @@ export function init(RuntimeName, PHPLoader) {
31526
31802
 
31527
31803
  socket.onopen = function (e) {
31528
31804
  var eventPtr = WS.getSocketEvent(socketId);
31529
- ((a1, a2, a3) => {})(
31530
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31805
+ ((
31806
+ a1,
31807
+ a2,
31808
+ a3
31809
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31810
+ 0 /*TODO*/,
31531
31811
  eventPtr,
31532
31812
  userData
31533
31813
  );
@@ -31549,8 +31829,12 @@ export function init(RuntimeName, PHPLoader) {
31549
31829
 
31550
31830
  socket.onerror = function (e) {
31551
31831
  var eventPtr = WS.getSocketEvent(socketId);
31552
- ((a1, a2, a3) => {})(
31553
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31832
+ ((
31833
+ a1,
31834
+ a2,
31835
+ a3
31836
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31837
+ 0 /*TODO*/,
31554
31838
  eventPtr,
31555
31839
  userData
31556
31840
  );
@@ -31575,8 +31859,12 @@ export function init(RuntimeName, PHPLoader) {
31575
31859
  (HEAP8[eventPtr + 4] = e.wasClean),
31576
31860
  (HEAP16[(eventPtr + 6) >> 1] = e.code),
31577
31861
  stringToUTF8(e.reason, eventPtr + 8, 512);
31578
- ((a1, a2, a3) => {})(
31579
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31862
+ ((
31863
+ a1,
31864
+ a2,
31865
+ a3
31866
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31867
+ 0 /*TODO*/,
31580
31868
  eventPtr,
31581
31869
  userData
31582
31870
  );
@@ -31610,8 +31898,12 @@ export function init(RuntimeName, PHPLoader) {
31610
31898
  (HEAPU32[(eventPtr + 4) >> 2] = buf),
31611
31899
  (HEAP32[(eventPtr + 8) >> 2] = len),
31612
31900
  (HEAP8[eventPtr + 12] = isText),
31613
- ((a1, a2, a3) => {})(
31614
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31901
+ ((
31902
+ a1,
31903
+ a2,
31904
+ a3
31905
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31906
+ 0 /*TODO*/,
31615
31907
  eventPtr,
31616
31908
  userData
31617
31909
  );
@@ -31808,13 +32100,13 @@ export function init(RuntimeName, PHPLoader) {
31808
32100
  // End JS library code
31809
32101
 
31810
32102
  var ASM_CONSTS = {
31811
- 16327533: ($0) => {
32103
+ 16327421: ($0) => {
31812
32104
  if (!$0) {
31813
32105
  AL.alcErr = 0xa004;
31814
32106
  return 1;
31815
32107
  }
31816
32108
  },
31817
- 16327581: ($0) => {
32109
+ 16327469: ($0) => {
31818
32110
  if (!AL.currentCtx) {
31819
32111
  err('alGetProcAddress() called without a valid context');
31820
32112
  return 1;
@@ -35378,19 +35670,16 @@ export function init(RuntimeName, PHPLoader) {
35378
35670
  // We override NODEFS.createNode() to add an `isSharedFS` flag to all NODEFS
35379
35671
  // nodes. This way we can tell whether file-locking is needed and possible
35380
35672
  // for an FS node, even if wrapped with PROXYFS.
35381
- const originalCreateNode = NODEFS.createNode;
35673
+ const originalNodeFsCreateNode = NODEFS.createNode;
35382
35674
  NODEFS.createNode = function createNodeWithSharedFlag() {
35383
- const node = originalCreateNode.apply(NODEFS, arguments);
35675
+ const node = originalNodeFsCreateNode.apply(NODEFS, arguments);
35384
35676
  node.isSharedFS = true;
35385
35677
  return node;
35386
35678
  };
35387
35679
 
35388
35680
  var originalHashAddNode = FS.hashAddNode;
35389
35681
  FS.hashAddNode = function hashAddNodeIfNotSharedFS(node) {
35390
- if (
35391
- typeof locking === 'object' &&
35392
- locking?.is_shared_fs_node(node)
35393
- ) {
35682
+ if (node?.isSharedFS) {
35394
35683
  // Avoid caching shared VFS nodes so multiple instances
35395
35684
  // can access the same underlying filesystem without
35396
35685
  // conflicting caches.