diff --git a/blueprint.json b/blueprint.json new file mode 100644 index 0000000000..2343ab9777 --- /dev/null +++ b/blueprint.json @@ -0,0 +1,18 @@ +{ + "preferredVersions": { + "php": "8.0", + "wp": "6.7" + }, + "steps": [ + { + "step": "defineWpConfigConsts", + "consts": { + "DISABLE_WP_CRON": false + } + }, + { + "step": "activatePlugin", + "pluginPath": "/wordpress/wp-content/plugins/plugin" + } + ] +} diff --git a/packages/php-wasm/node/asyncify/php_7_2.js b/packages/php-wasm/node/asyncify/php_7_2.js index bb948cb641..dd0f8c81f1 100644 --- a/packages/php-wasm/node/asyncify/php_7_2.js +++ b/packages/php-wasm/node/asyncify/php_7_2.js @@ -1773,10 +1773,8 @@ export function init(RuntimeName, PHPLoader) { ); var ___call_sighandler = (fp, sig) => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - sig + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ sig ); ___call_sighandler.sig = 'vpi'; @@ -8792,11 +8790,8 @@ export function init(RuntimeName, PHPLoader) { dlSetError(`'Could not load dynamic lib: ${filename}\n${e}`); runtimeKeepalivePop(); callUserCallback(() => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, user_data ) ); @@ -8804,11 +8799,8 @@ export function init(RuntimeName, PHPLoader) { function successCallback() { runtimeKeepalivePop(); callUserCallback(() => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, user_data ) ); @@ -19466,11 +19458,8 @@ export function init(RuntimeName, PHPLoader) { var trace = getCallstack(); var parts = trace.split('\n'); for (var i = 0; i < parts.length; i++) { - var ret = (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0, + var ret = ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0, arg ); if (ret !== 0) return; @@ -20046,12 +20035,8 @@ export function init(RuntimeName, PHPLoader) { stringToUTF8(e.locale || '', keyEventData + 128, 32); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, keyEventData, userData ) @@ -20169,12 +20154,8 @@ export function init(RuntimeName, PHPLoader) { fillMouseEventData(JSEvents.mouseEvent, e, target); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.mouseEvent, userData ) @@ -20388,12 +20369,8 @@ export function init(RuntimeName, PHPLoader) { HEAPF64[(wheelEvent + 80) >> 3] = e['deltaZ']; HEAP32[(wheelEvent + 88) >> 2] = e['deltaMode']; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, wheelEvent, userData ) @@ -20474,12 +20451,8 @@ export function init(RuntimeName, PHPLoader) { HEAP32[(uiEvent + 28) >> 2] = pageXOffset | 0; // scroll offsets are float HEAP32[(uiEvent + 32) >> 2] = pageYOffset | 0; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, uiEvent, userData ) @@ -20553,12 +20526,8 @@ export function init(RuntimeName, PHPLoader) { stringToUTF8(id, focusEvent + 128, 128); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, focusEvent, userData ) @@ -20674,12 +20643,8 @@ export function init(RuntimeName, PHPLoader) { ); // TODO: Thread-safety with respect to emscripten_get_deviceorientation_status() if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.deviceOrientationEvent, userData ) @@ -20762,12 +20727,8 @@ export function init(RuntimeName, PHPLoader) { fillDeviceMotionEventData(JSEvents.deviceMotionEvent, e, target); // TODO: Thread-safety with respect to emscripten_get_devicemotion_status() if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.deviceMotionEvent, userData ) @@ -20877,12 +20838,8 @@ export function init(RuntimeName, PHPLoader) { fillOrientationChangeEventData(orientationChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, orientationChangeEvent, userData ) @@ -21015,12 +20972,8 @@ export function init(RuntimeName, PHPLoader) { fillFullscreenChangeEventData(fullscreenChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, fullscreenChangeEvent, userData ) @@ -21184,12 +21137,8 @@ export function init(RuntimeName, PHPLoader) { ); if (currentFullscreenStrategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, currentFullscreenStrategy.canvasResizedCallbackUserData ); @@ -21295,12 +21244,8 @@ export function init(RuntimeName, PHPLoader) { currentFullscreenStrategy = strategy; if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21402,12 +21347,8 @@ export function init(RuntimeName, PHPLoader) { !inCenteredWithoutScalingFullscreenMode && currentFullscreenStrategy.canvasResizedCallback ) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, currentFullscreenStrategy.canvasResizedCallbackUserData ); @@ -21506,12 +21447,8 @@ export function init(RuntimeName, PHPLoader) { softFullscreenResizeWebGLRenderTarget ); if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21524,12 +21461,8 @@ export function init(RuntimeName, PHPLoader) { // Inform the caller that the canvas size has changed. if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21597,12 +21530,8 @@ export function init(RuntimeName, PHPLoader) { fillPointerlockChangeEventData(pointerlockChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, pointerlockChangeEvent, userData ) @@ -21692,12 +21621,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var pointerlockErrorEventHandlerFunc = (e = event) => { if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ) @@ -21897,12 +21822,8 @@ export function init(RuntimeName, PHPLoader) { fillVisibilityChangeEventData(visibilityChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, visibilityChangeEvent, userData ) @@ -22022,12 +21943,8 @@ export function init(RuntimeName, PHPLoader) { HEAP32[(touchEvent + 8) >> 2] = numTouches; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, touchEvent, userData ) @@ -22165,12 +22082,8 @@ export function init(RuntimeName, PHPLoader) { fillGamepadEventData(gamepadEvent, e['gamepad']); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, gamepadEvent, userData ) @@ -22272,12 +22185,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var beforeUnloadEventHandlerFunc = (e = event) => { // Note: This is always called on the main browser thread, since it needs synchronously return a value! - var confirmationMessage = (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + var confirmationMessage = ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ); @@ -22348,12 +22257,8 @@ export function init(RuntimeName, PHPLoader) { fillBatteryEventData(batteryEvent, battery()); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, batteryEvent, userData ) @@ -22443,11 +22348,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_request_animation_frame = (cb, userData) => requestAnimationFrame((timeStamp) => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - timeStamp, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp, userData ) ); @@ -22459,11 +22361,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_request_animation_frame_loop = (cb, userData) => { function tick(timeStamp) { if ( - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - timeStamp, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp, userData ) ) { @@ -22688,10 +22587,8 @@ export function init(RuntimeName, PHPLoader) { return emSetImmediate(() => { runtimeKeepalivePop(); callUserCallback(() => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ); }); @@ -22708,10 +22605,8 @@ export function init(RuntimeName, PHPLoader) { function tick() { callUserCallback(() => { if ( - (( - a1 - ) => {}) /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ) { emSetImmediate(tick); @@ -22728,10 +22623,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_set_timeout = (cb, msecs, userData) => safeSetTimeout( () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ), msecs ); @@ -22747,11 +22640,8 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePop(); callUserCallback(() => { if ( - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - t, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ t, userData ) ) { @@ -22775,10 +22665,8 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePush(); return setInterval(() => { callUserCallback(() => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ); }, msecs); @@ -22793,10 +22681,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_async_call = (func, arg, millis) => { var wrapper = () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); if ( @@ -22829,7 +22715,7 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_set_main_loop = (func, fps, simulateInfiniteLoop) => { var iterFunc = - () => {} /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */; + () => {}; /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ setMainLoop(iterFunc, fps, simulateInfiniteLoop); }; _emscripten_set_main_loop.sig = 'vpii'; @@ -22841,10 +22727,8 @@ export function init(RuntimeName, PHPLoader) { simulateInfiniteLoop ) => { var iterFunc = () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); setMainLoop(iterFunc, fps, simulateInfiniteLoop, arg); }; @@ -22865,10 +22749,8 @@ export function init(RuntimeName, PHPLoader) { var __emscripten_push_main_loop_blocker = (func, arg, name) => { MainLoop.queue.push({ func: () => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, name: UTF8ToString(name), @@ -22881,10 +22763,8 @@ export function init(RuntimeName, PHPLoader) { var __emscripten_push_uncounted_main_loop_blocker = (func, arg, name) => { MainLoop.queue.push({ func: () => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, name: UTF8ToString(name), @@ -22918,12 +22798,8 @@ export function init(RuntimeName, PHPLoader) { var resultPtr = stackAlloc(POINTER_SIZE); HEAPU32[resultPtr >> 2] = 0; try { - var result = (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - resultPtr, + var result = ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ resultPtr, userData, value ); @@ -23859,19 +23735,15 @@ export function init(RuntimeName, PHPLoader) { () => { runtimeKeepalivePop(); if (onload) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - file + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file ); }, () => { runtimeKeepalivePop(); if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - file + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file ); }, true // don'tCreateFile - it's already there @@ -23905,21 +23777,16 @@ export function init(RuntimeName, PHPLoader) { () => { runtimeKeepalivePop(); if (onload) - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, cname ); }, () => { runtimeKeepalivePop(); if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, true // don'tCreateFile - it's already there @@ -24192,10 +24059,10 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePop(); callUserCallback(() => { var sp = stackSave(); - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - stringToUTF8OnStack(_file) + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stringToUTF8OnStack( + _file + ) ); stackRestore(sp); }); @@ -24239,12 +24106,8 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userdata, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata, buffer, byteArray.length ); @@ -24254,10 +24117,8 @@ export function init(RuntimeName, PHPLoader) { if (onerror) { runtimeKeepalivePop(); callUserCallback(() => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userdata + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata ); }); } @@ -24314,12 +24175,8 @@ export function init(RuntimeName, PHPLoader) { ); if (onload) { var sp = stackSave(); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, stringToUTF8OnStack(_file) ); @@ -24327,12 +24184,8 @@ export function init(RuntimeName, PHPLoader) { } } else { if (onerror) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status ); @@ -24345,12 +24198,8 @@ export function init(RuntimeName, PHPLoader) { http.onerror = (e) => { runtimeKeepalivePop(); if (onerror) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status ); @@ -24365,12 +24214,8 @@ export function init(RuntimeName, PHPLoader) { ) { var percentComplete = (e.loaded / e.total) * 100; if (onprogress) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, percentComplete ); @@ -24427,13 +24272,8 @@ export function init(RuntimeName, PHPLoader) { if (http.statusText) { statusText = stringToUTF8OnStack(http.statusText); } - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status, statusText @@ -24454,13 +24294,8 @@ export function init(RuntimeName, PHPLoader) { var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); if (onload) - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, buffer, byteArray.length @@ -24481,13 +24316,8 @@ export function init(RuntimeName, PHPLoader) { // PROGRESS http.onprogress = (e) => { if (onprogress) - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, e.loaded, e.lengthComputable || e.lengthComputable === undefined @@ -24607,24 +24437,16 @@ export function init(RuntimeName, PHPLoader) { if (event === 'error') { withStackSave(() => { var msg = stringToUTF8OnStack(data[2]); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - data[0], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data[0], data[1], msg, userData ); }); } else { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - data, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data, userData ); } @@ -25090,12 +24912,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var webGlEventHandlerFunc = (e = event) => { if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ) @@ -25314,21 +25132,15 @@ export function init(RuntimeName, PHPLoader) { ) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - lastX, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX, lastY ); } else if (GLUT.buttons != 0 && GLUT.motionFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - lastX, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX, lastY ); } @@ -25489,12 +25301,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.specialFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25504,12 +25312,8 @@ export function init(RuntimeName, PHPLoader) { if (key !== null && GLUT.keyboardFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25524,12 +25328,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.specialUpFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25539,12 +25339,8 @@ export function init(RuntimeName, PHPLoader) { if (key !== null && GLUT.keyboardUpFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25608,13 +25404,10 @@ export function init(RuntimeName, PHPLoader) { } catch (e) {} event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - event['button'], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[ + 'button' + ], 0 /*GLUT_DOWN*/, Browser.mouseX, Browser.mouseY @@ -25629,13 +25422,10 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.mouseFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - event['button'], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[ + 'button' + ], 1 /*GLUT_UP*/, Browser.mouseX, Browser.mouseY @@ -25664,13 +25454,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.mouseFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - button, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ button, 0 /*GLUT_DOWN*/, Browser.mouseX, Browser.mouseY @@ -25713,11 +25498,8 @@ export function init(RuntimeName, PHPLoader) { /* Can't call _glutReshapeWindow as that requests cancelling fullscreen. */ if (GLUT.reshapeFunc) { // out("GLUT.reshapeFunc (from FS): " + width + ", " + height); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -25760,11 +25542,8 @@ export function init(RuntimeName, PHPLoader) { Browser.resizeListeners.push((width, height) => { if (GLUT.reshapeFunc) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -25877,10 +25656,8 @@ export function init(RuntimeName, PHPLoader) { var _glutTimerFunc = (msec, func, value) => safeSetTimeout( () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - value + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ value ), msec ); @@ -26040,11 +25817,8 @@ export function init(RuntimeName, PHPLoader) { Browser.setCanvasSize(width, height, true); // N.B. GLUT.reshapeFunc is also registered as a canvas resize callback. // Just call it once here. if (GLUT.reshapeFunc) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -27106,21 +26880,15 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, buffer, byteArray.length ); @@ -27152,18 +26920,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (onstore) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); } @@ -27178,18 +26942,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (ondelete) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); }); @@ -27206,19 +26966,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (oncheck) - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, exists ); }); @@ -27234,18 +26989,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (onclear) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); }); @@ -27402,11 +27153,8 @@ export function init(RuntimeName, PHPLoader) { safeSetTimeout(() => { var stackBegin = Asyncify.currData + 12; var stackEnd = HEAPU32[Asyncify.currData >> 2]; - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - stackBegin, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stackBegin, stackEnd ); wakeUp(); @@ -27467,10 +27215,8 @@ export function init(RuntimeName, PHPLoader) { HEAPU32[(newFiber + 12) >> 2] = 0; var userData = HEAPU32[(newFiber + 16) >> 2]; - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ); } else { var asyncifyData = newFiber + 20; @@ -28482,11 +28228,8 @@ export function init(RuntimeName, PHPLoader) { if (!SDL.eventHandler) return; while (SDL.pollEvent(SDL.eventHandlerTemp)) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - SDL.eventHandlerContext, + ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL.eventHandlerContext, SDL.eventHandlerTemp ); } @@ -30119,12 +29862,9 @@ export function init(RuntimeName, PHPLoader) { return; // Ask SDL audio data from the user code. - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - SDL.audio.userdata, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL + .audio.userdata, SDL.audio.buffer, SDL.audio.bufferSize ); @@ -30582,10 +30322,8 @@ export function init(RuntimeName, PHPLoader) { info.audio = null; } if (SDL.channelFinished) { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - channel + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel ); } } @@ -30654,10 +30392,8 @@ export function init(RuntimeName, PHPLoader) { channelInfo.audio = null; } if (SDL.channelFinished) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - channel + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel ); }; if (channelInfo.audio) { @@ -31405,11 +31141,8 @@ export function init(RuntimeName, PHPLoader) { var _SDL_AddTimer = (interval, callback, param) => safeSetTimeout( () => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - interval, + ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ interval, param ), interval @@ -31792,12 +31525,8 @@ export function init(RuntimeName, PHPLoader) { socket.onopen = function (e) { var eventPtr = WS.getSocketEvent(socketId); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31819,12 +31548,8 @@ export function init(RuntimeName, PHPLoader) { socket.onerror = function (e) { var eventPtr = WS.getSocketEvent(socketId); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31849,12 +31574,8 @@ export function init(RuntimeName, PHPLoader) { (HEAP8[eventPtr + 4] = e.wasClean), (HEAP16[(eventPtr + 6) >> 1] = e.code), stringToUTF8(e.reason, eventPtr + 8, 512); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31888,12 +31609,8 @@ export function init(RuntimeName, PHPLoader) { (HEAPU32[(eventPtr + 4) >> 2] = buf), (HEAP32[(eventPtr + 8) >> 2] = len), (HEAP8[eventPtr + 12] = isText), - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); diff --git a/packages/php-wasm/node/asyncify/php_7_3.js b/packages/php-wasm/node/asyncify/php_7_3.js index 8a7b96d40f..41abcca618 100644 --- a/packages/php-wasm/node/asyncify/php_7_3.js +++ b/packages/php-wasm/node/asyncify/php_7_3.js @@ -1773,10 +1773,8 @@ export function init(RuntimeName, PHPLoader) { ); var ___call_sighandler = (fp, sig) => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - sig + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ sig ); ___call_sighandler.sig = 'vpi'; @@ -8792,11 +8790,8 @@ export function init(RuntimeName, PHPLoader) { dlSetError(`'Could not load dynamic lib: ${filename}\n${e}`); runtimeKeepalivePop(); callUserCallback(() => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, user_data ) ); @@ -8804,11 +8799,8 @@ export function init(RuntimeName, PHPLoader) { function successCallback() { runtimeKeepalivePop(); callUserCallback(() => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, user_data ) ); @@ -19466,11 +19458,8 @@ export function init(RuntimeName, PHPLoader) { var trace = getCallstack(); var parts = trace.split('\n'); for (var i = 0; i < parts.length; i++) { - var ret = (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0, + var ret = ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0, arg ); if (ret !== 0) return; @@ -20046,12 +20035,8 @@ export function init(RuntimeName, PHPLoader) { stringToUTF8(e.locale || '', keyEventData + 128, 32); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, keyEventData, userData ) @@ -20169,12 +20154,8 @@ export function init(RuntimeName, PHPLoader) { fillMouseEventData(JSEvents.mouseEvent, e, target); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.mouseEvent, userData ) @@ -20388,12 +20369,8 @@ export function init(RuntimeName, PHPLoader) { HEAPF64[(wheelEvent + 80) >> 3] = e['deltaZ']; HEAP32[(wheelEvent + 88) >> 2] = e['deltaMode']; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, wheelEvent, userData ) @@ -20474,12 +20451,8 @@ export function init(RuntimeName, PHPLoader) { HEAP32[(uiEvent + 28) >> 2] = pageXOffset | 0; // scroll offsets are float HEAP32[(uiEvent + 32) >> 2] = pageYOffset | 0; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, uiEvent, userData ) @@ -20553,12 +20526,8 @@ export function init(RuntimeName, PHPLoader) { stringToUTF8(id, focusEvent + 128, 128); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, focusEvent, userData ) @@ -20674,12 +20643,8 @@ export function init(RuntimeName, PHPLoader) { ); // TODO: Thread-safety with respect to emscripten_get_deviceorientation_status() if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.deviceOrientationEvent, userData ) @@ -20762,12 +20727,8 @@ export function init(RuntimeName, PHPLoader) { fillDeviceMotionEventData(JSEvents.deviceMotionEvent, e, target); // TODO: Thread-safety with respect to emscripten_get_devicemotion_status() if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.deviceMotionEvent, userData ) @@ -20877,12 +20838,8 @@ export function init(RuntimeName, PHPLoader) { fillOrientationChangeEventData(orientationChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, orientationChangeEvent, userData ) @@ -21015,12 +20972,8 @@ export function init(RuntimeName, PHPLoader) { fillFullscreenChangeEventData(fullscreenChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, fullscreenChangeEvent, userData ) @@ -21184,12 +21137,8 @@ export function init(RuntimeName, PHPLoader) { ); if (currentFullscreenStrategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, currentFullscreenStrategy.canvasResizedCallbackUserData ); @@ -21295,12 +21244,8 @@ export function init(RuntimeName, PHPLoader) { currentFullscreenStrategy = strategy; if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21402,12 +21347,8 @@ export function init(RuntimeName, PHPLoader) { !inCenteredWithoutScalingFullscreenMode && currentFullscreenStrategy.canvasResizedCallback ) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, currentFullscreenStrategy.canvasResizedCallbackUserData ); @@ -21506,12 +21447,8 @@ export function init(RuntimeName, PHPLoader) { softFullscreenResizeWebGLRenderTarget ); if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21524,12 +21461,8 @@ export function init(RuntimeName, PHPLoader) { // Inform the caller that the canvas size has changed. if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21597,12 +21530,8 @@ export function init(RuntimeName, PHPLoader) { fillPointerlockChangeEventData(pointerlockChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, pointerlockChangeEvent, userData ) @@ -21692,12 +21621,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var pointerlockErrorEventHandlerFunc = (e = event) => { if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ) @@ -21897,12 +21822,8 @@ export function init(RuntimeName, PHPLoader) { fillVisibilityChangeEventData(visibilityChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, visibilityChangeEvent, userData ) @@ -22022,12 +21943,8 @@ export function init(RuntimeName, PHPLoader) { HEAP32[(touchEvent + 8) >> 2] = numTouches; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, touchEvent, userData ) @@ -22165,12 +22082,8 @@ export function init(RuntimeName, PHPLoader) { fillGamepadEventData(gamepadEvent, e['gamepad']); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, gamepadEvent, userData ) @@ -22272,12 +22185,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var beforeUnloadEventHandlerFunc = (e = event) => { // Note: This is always called on the main browser thread, since it needs synchronously return a value! - var confirmationMessage = (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + var confirmationMessage = ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ); @@ -22348,12 +22257,8 @@ export function init(RuntimeName, PHPLoader) { fillBatteryEventData(batteryEvent, battery()); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, batteryEvent, userData ) @@ -22443,11 +22348,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_request_animation_frame = (cb, userData) => requestAnimationFrame((timeStamp) => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - timeStamp, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp, userData ) ); @@ -22459,11 +22361,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_request_animation_frame_loop = (cb, userData) => { function tick(timeStamp) { if ( - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - timeStamp, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp, userData ) ) { @@ -22688,10 +22587,8 @@ export function init(RuntimeName, PHPLoader) { return emSetImmediate(() => { runtimeKeepalivePop(); callUserCallback(() => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ); }); @@ -22708,10 +22605,8 @@ export function init(RuntimeName, PHPLoader) { function tick() { callUserCallback(() => { if ( - (( - a1 - ) => {}) /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ) { emSetImmediate(tick); @@ -22728,10 +22623,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_set_timeout = (cb, msecs, userData) => safeSetTimeout( () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ), msecs ); @@ -22747,11 +22640,8 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePop(); callUserCallback(() => { if ( - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - t, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ t, userData ) ) { @@ -22775,10 +22665,8 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePush(); return setInterval(() => { callUserCallback(() => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ); }, msecs); @@ -22793,10 +22681,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_async_call = (func, arg, millis) => { var wrapper = () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); if ( @@ -22829,7 +22715,7 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_set_main_loop = (func, fps, simulateInfiniteLoop) => { var iterFunc = - () => {} /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */; + () => {}; /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ setMainLoop(iterFunc, fps, simulateInfiniteLoop); }; _emscripten_set_main_loop.sig = 'vpii'; @@ -22841,10 +22727,8 @@ export function init(RuntimeName, PHPLoader) { simulateInfiniteLoop ) => { var iterFunc = () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); setMainLoop(iterFunc, fps, simulateInfiniteLoop, arg); }; @@ -22865,10 +22749,8 @@ export function init(RuntimeName, PHPLoader) { var __emscripten_push_main_loop_blocker = (func, arg, name) => { MainLoop.queue.push({ func: () => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, name: UTF8ToString(name), @@ -22881,10 +22763,8 @@ export function init(RuntimeName, PHPLoader) { var __emscripten_push_uncounted_main_loop_blocker = (func, arg, name) => { MainLoop.queue.push({ func: () => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, name: UTF8ToString(name), @@ -22918,12 +22798,8 @@ export function init(RuntimeName, PHPLoader) { var resultPtr = stackAlloc(POINTER_SIZE); HEAPU32[resultPtr >> 2] = 0; try { - var result = (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - resultPtr, + var result = ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ resultPtr, userData, value ); @@ -23859,19 +23735,15 @@ export function init(RuntimeName, PHPLoader) { () => { runtimeKeepalivePop(); if (onload) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - file + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file ); }, () => { runtimeKeepalivePop(); if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - file + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file ); }, true // don'tCreateFile - it's already there @@ -23905,21 +23777,16 @@ export function init(RuntimeName, PHPLoader) { () => { runtimeKeepalivePop(); if (onload) - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, cname ); }, () => { runtimeKeepalivePop(); if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, true // don'tCreateFile - it's already there @@ -24192,10 +24059,10 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePop(); callUserCallback(() => { var sp = stackSave(); - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - stringToUTF8OnStack(_file) + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stringToUTF8OnStack( + _file + ) ); stackRestore(sp); }); @@ -24239,12 +24106,8 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userdata, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata, buffer, byteArray.length ); @@ -24254,10 +24117,8 @@ export function init(RuntimeName, PHPLoader) { if (onerror) { runtimeKeepalivePop(); callUserCallback(() => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userdata + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata ); }); } @@ -24314,12 +24175,8 @@ export function init(RuntimeName, PHPLoader) { ); if (onload) { var sp = stackSave(); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, stringToUTF8OnStack(_file) ); @@ -24327,12 +24184,8 @@ export function init(RuntimeName, PHPLoader) { } } else { if (onerror) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status ); @@ -24345,12 +24198,8 @@ export function init(RuntimeName, PHPLoader) { http.onerror = (e) => { runtimeKeepalivePop(); if (onerror) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status ); @@ -24365,12 +24214,8 @@ export function init(RuntimeName, PHPLoader) { ) { var percentComplete = (e.loaded / e.total) * 100; if (onprogress) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, percentComplete ); @@ -24427,13 +24272,8 @@ export function init(RuntimeName, PHPLoader) { if (http.statusText) { statusText = stringToUTF8OnStack(http.statusText); } - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status, statusText @@ -24454,13 +24294,8 @@ export function init(RuntimeName, PHPLoader) { var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); if (onload) - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, buffer, byteArray.length @@ -24481,13 +24316,8 @@ export function init(RuntimeName, PHPLoader) { // PROGRESS http.onprogress = (e) => { if (onprogress) - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, e.loaded, e.lengthComputable || e.lengthComputable === undefined @@ -24607,24 +24437,16 @@ export function init(RuntimeName, PHPLoader) { if (event === 'error') { withStackSave(() => { var msg = stringToUTF8OnStack(data[2]); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - data[0], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data[0], data[1], msg, userData ); }); } else { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - data, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data, userData ); } @@ -25090,12 +24912,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var webGlEventHandlerFunc = (e = event) => { if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ) @@ -25314,21 +25132,15 @@ export function init(RuntimeName, PHPLoader) { ) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - lastX, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX, lastY ); } else if (GLUT.buttons != 0 && GLUT.motionFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - lastX, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX, lastY ); } @@ -25489,12 +25301,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.specialFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25504,12 +25312,8 @@ export function init(RuntimeName, PHPLoader) { if (key !== null && GLUT.keyboardFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25524,12 +25328,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.specialUpFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25539,12 +25339,8 @@ export function init(RuntimeName, PHPLoader) { if (key !== null && GLUT.keyboardUpFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25608,13 +25404,10 @@ export function init(RuntimeName, PHPLoader) { } catch (e) {} event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - event['button'], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[ + 'button' + ], 0 /*GLUT_DOWN*/, Browser.mouseX, Browser.mouseY @@ -25629,13 +25422,10 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.mouseFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - event['button'], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[ + 'button' + ], 1 /*GLUT_UP*/, Browser.mouseX, Browser.mouseY @@ -25664,13 +25454,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.mouseFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - button, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ button, 0 /*GLUT_DOWN*/, Browser.mouseX, Browser.mouseY @@ -25713,11 +25498,8 @@ export function init(RuntimeName, PHPLoader) { /* Can't call _glutReshapeWindow as that requests cancelling fullscreen. */ if (GLUT.reshapeFunc) { // out("GLUT.reshapeFunc (from FS): " + width + ", " + height); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -25760,11 +25542,8 @@ export function init(RuntimeName, PHPLoader) { Browser.resizeListeners.push((width, height) => { if (GLUT.reshapeFunc) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -25877,10 +25656,8 @@ export function init(RuntimeName, PHPLoader) { var _glutTimerFunc = (msec, func, value) => safeSetTimeout( () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - value + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ value ), msec ); @@ -26040,11 +25817,8 @@ export function init(RuntimeName, PHPLoader) { Browser.setCanvasSize(width, height, true); // N.B. GLUT.reshapeFunc is also registered as a canvas resize callback. // Just call it once here. if (GLUT.reshapeFunc) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -27106,21 +26880,15 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, buffer, byteArray.length ); @@ -27152,18 +26920,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (onstore) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); } @@ -27178,18 +26942,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (ondelete) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); }); @@ -27206,19 +26966,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (oncheck) - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, exists ); }); @@ -27234,18 +26989,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (onclear) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); }); @@ -27402,11 +27153,8 @@ export function init(RuntimeName, PHPLoader) { safeSetTimeout(() => { var stackBegin = Asyncify.currData + 12; var stackEnd = HEAPU32[Asyncify.currData >> 2]; - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - stackBegin, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stackBegin, stackEnd ); wakeUp(); @@ -27467,10 +27215,8 @@ export function init(RuntimeName, PHPLoader) { HEAPU32[(newFiber + 12) >> 2] = 0; var userData = HEAPU32[(newFiber + 16) >> 2]; - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ); } else { var asyncifyData = newFiber + 20; @@ -28482,11 +28228,8 @@ export function init(RuntimeName, PHPLoader) { if (!SDL.eventHandler) return; while (SDL.pollEvent(SDL.eventHandlerTemp)) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - SDL.eventHandlerContext, + ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL.eventHandlerContext, SDL.eventHandlerTemp ); } @@ -30119,12 +29862,9 @@ export function init(RuntimeName, PHPLoader) { return; // Ask SDL audio data from the user code. - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - SDL.audio.userdata, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL + .audio.userdata, SDL.audio.buffer, SDL.audio.bufferSize ); @@ -30582,10 +30322,8 @@ export function init(RuntimeName, PHPLoader) { info.audio = null; } if (SDL.channelFinished) { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - channel + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel ); } } @@ -30654,10 +30392,8 @@ export function init(RuntimeName, PHPLoader) { channelInfo.audio = null; } if (SDL.channelFinished) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - channel + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel ); }; if (channelInfo.audio) { @@ -31405,11 +31141,8 @@ export function init(RuntimeName, PHPLoader) { var _SDL_AddTimer = (interval, callback, param) => safeSetTimeout( () => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - interval, + ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ interval, param ), interval @@ -31792,12 +31525,8 @@ export function init(RuntimeName, PHPLoader) { socket.onopen = function (e) { var eventPtr = WS.getSocketEvent(socketId); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31819,12 +31548,8 @@ export function init(RuntimeName, PHPLoader) { socket.onerror = function (e) { var eventPtr = WS.getSocketEvent(socketId); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31849,12 +31574,8 @@ export function init(RuntimeName, PHPLoader) { (HEAP8[eventPtr + 4] = e.wasClean), (HEAP16[(eventPtr + 6) >> 1] = e.code), stringToUTF8(e.reason, eventPtr + 8, 512); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31888,12 +31609,8 @@ export function init(RuntimeName, PHPLoader) { (HEAPU32[(eventPtr + 4) >> 2] = buf), (HEAP32[(eventPtr + 8) >> 2] = len), (HEAP8[eventPtr + 12] = isText), - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); diff --git a/packages/php-wasm/node/asyncify/php_7_4.js b/packages/php-wasm/node/asyncify/php_7_4.js index cf3a6ecabd..8ad9322dae 100644 --- a/packages/php-wasm/node/asyncify/php_7_4.js +++ b/packages/php-wasm/node/asyncify/php_7_4.js @@ -1773,10 +1773,8 @@ export function init(RuntimeName, PHPLoader) { ); var ___call_sighandler = (fp, sig) => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - sig + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ sig ); ___call_sighandler.sig = 'vpi'; @@ -8792,11 +8790,8 @@ export function init(RuntimeName, PHPLoader) { dlSetError(`'Could not load dynamic lib: ${filename}\n${e}`); runtimeKeepalivePop(); callUserCallback(() => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, user_data ) ); @@ -8804,11 +8799,8 @@ export function init(RuntimeName, PHPLoader) { function successCallback() { runtimeKeepalivePop(); callUserCallback(() => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, user_data ) ); @@ -19470,11 +19462,8 @@ export function init(RuntimeName, PHPLoader) { var trace = getCallstack(); var parts = trace.split('\n'); for (var i = 0; i < parts.length; i++) { - var ret = (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0, + var ret = ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0, arg ); if (ret !== 0) return; @@ -20050,12 +20039,8 @@ export function init(RuntimeName, PHPLoader) { stringToUTF8(e.locale || '', keyEventData + 128, 32); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, keyEventData, userData ) @@ -20173,12 +20158,8 @@ export function init(RuntimeName, PHPLoader) { fillMouseEventData(JSEvents.mouseEvent, e, target); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.mouseEvent, userData ) @@ -20392,12 +20373,8 @@ export function init(RuntimeName, PHPLoader) { HEAPF64[(wheelEvent + 80) >> 3] = e['deltaZ']; HEAP32[(wheelEvent + 88) >> 2] = e['deltaMode']; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, wheelEvent, userData ) @@ -20478,12 +20455,8 @@ export function init(RuntimeName, PHPLoader) { HEAP32[(uiEvent + 28) >> 2] = pageXOffset | 0; // scroll offsets are float HEAP32[(uiEvent + 32) >> 2] = pageYOffset | 0; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, uiEvent, userData ) @@ -20557,12 +20530,8 @@ export function init(RuntimeName, PHPLoader) { stringToUTF8(id, focusEvent + 128, 128); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, focusEvent, userData ) @@ -20678,12 +20647,8 @@ export function init(RuntimeName, PHPLoader) { ); // TODO: Thread-safety with respect to emscripten_get_deviceorientation_status() if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.deviceOrientationEvent, userData ) @@ -20766,12 +20731,8 @@ export function init(RuntimeName, PHPLoader) { fillDeviceMotionEventData(JSEvents.deviceMotionEvent, e, target); // TODO: Thread-safety with respect to emscripten_get_devicemotion_status() if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.deviceMotionEvent, userData ) @@ -20881,12 +20842,8 @@ export function init(RuntimeName, PHPLoader) { fillOrientationChangeEventData(orientationChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, orientationChangeEvent, userData ) @@ -21019,12 +20976,8 @@ export function init(RuntimeName, PHPLoader) { fillFullscreenChangeEventData(fullscreenChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, fullscreenChangeEvent, userData ) @@ -21188,12 +21141,8 @@ export function init(RuntimeName, PHPLoader) { ); if (currentFullscreenStrategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, currentFullscreenStrategy.canvasResizedCallbackUserData ); @@ -21299,12 +21248,8 @@ export function init(RuntimeName, PHPLoader) { currentFullscreenStrategy = strategy; if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21406,12 +21351,8 @@ export function init(RuntimeName, PHPLoader) { !inCenteredWithoutScalingFullscreenMode && currentFullscreenStrategy.canvasResizedCallback ) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, currentFullscreenStrategy.canvasResizedCallbackUserData ); @@ -21510,12 +21451,8 @@ export function init(RuntimeName, PHPLoader) { softFullscreenResizeWebGLRenderTarget ); if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21528,12 +21465,8 @@ export function init(RuntimeName, PHPLoader) { // Inform the caller that the canvas size has changed. if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21601,12 +21534,8 @@ export function init(RuntimeName, PHPLoader) { fillPointerlockChangeEventData(pointerlockChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, pointerlockChangeEvent, userData ) @@ -21696,12 +21625,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var pointerlockErrorEventHandlerFunc = (e = event) => { if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ) @@ -21901,12 +21826,8 @@ export function init(RuntimeName, PHPLoader) { fillVisibilityChangeEventData(visibilityChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, visibilityChangeEvent, userData ) @@ -22026,12 +21947,8 @@ export function init(RuntimeName, PHPLoader) { HEAP32[(touchEvent + 8) >> 2] = numTouches; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, touchEvent, userData ) @@ -22169,12 +22086,8 @@ export function init(RuntimeName, PHPLoader) { fillGamepadEventData(gamepadEvent, e['gamepad']); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, gamepadEvent, userData ) @@ -22276,12 +22189,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var beforeUnloadEventHandlerFunc = (e = event) => { // Note: This is always called on the main browser thread, since it needs synchronously return a value! - var confirmationMessage = (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + var confirmationMessage = ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ); @@ -22352,12 +22261,8 @@ export function init(RuntimeName, PHPLoader) { fillBatteryEventData(batteryEvent, battery()); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, batteryEvent, userData ) @@ -22447,11 +22352,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_request_animation_frame = (cb, userData) => requestAnimationFrame((timeStamp) => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - timeStamp, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp, userData ) ); @@ -22463,11 +22365,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_request_animation_frame_loop = (cb, userData) => { function tick(timeStamp) { if ( - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - timeStamp, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp, userData ) ) { @@ -22692,10 +22591,8 @@ export function init(RuntimeName, PHPLoader) { return emSetImmediate(() => { runtimeKeepalivePop(); callUserCallback(() => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ); }); @@ -22712,10 +22609,8 @@ export function init(RuntimeName, PHPLoader) { function tick() { callUserCallback(() => { if ( - (( - a1 - ) => {}) /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ) { emSetImmediate(tick); @@ -22732,10 +22627,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_set_timeout = (cb, msecs, userData) => safeSetTimeout( () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ), msecs ); @@ -22751,11 +22644,8 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePop(); callUserCallback(() => { if ( - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - t, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ t, userData ) ) { @@ -22779,10 +22669,8 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePush(); return setInterval(() => { callUserCallback(() => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ); }, msecs); @@ -22797,10 +22685,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_async_call = (func, arg, millis) => { var wrapper = () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); if ( @@ -22833,7 +22719,7 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_set_main_loop = (func, fps, simulateInfiniteLoop) => { var iterFunc = - () => {} /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */; + () => {}; /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ setMainLoop(iterFunc, fps, simulateInfiniteLoop); }; _emscripten_set_main_loop.sig = 'vpii'; @@ -22845,10 +22731,8 @@ export function init(RuntimeName, PHPLoader) { simulateInfiniteLoop ) => { var iterFunc = () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); setMainLoop(iterFunc, fps, simulateInfiniteLoop, arg); }; @@ -22869,10 +22753,8 @@ export function init(RuntimeName, PHPLoader) { var __emscripten_push_main_loop_blocker = (func, arg, name) => { MainLoop.queue.push({ func: () => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, name: UTF8ToString(name), @@ -22885,10 +22767,8 @@ export function init(RuntimeName, PHPLoader) { var __emscripten_push_uncounted_main_loop_blocker = (func, arg, name) => { MainLoop.queue.push({ func: () => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, name: UTF8ToString(name), @@ -22922,12 +22802,8 @@ export function init(RuntimeName, PHPLoader) { var resultPtr = stackAlloc(POINTER_SIZE); HEAPU32[resultPtr >> 2] = 0; try { - var result = (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - resultPtr, + var result = ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ resultPtr, userData, value ); @@ -23863,19 +23739,15 @@ export function init(RuntimeName, PHPLoader) { () => { runtimeKeepalivePop(); if (onload) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - file + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file ); }, () => { runtimeKeepalivePop(); if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - file + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file ); }, true // don'tCreateFile - it's already there @@ -23909,21 +23781,16 @@ export function init(RuntimeName, PHPLoader) { () => { runtimeKeepalivePop(); if (onload) - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, cname ); }, () => { runtimeKeepalivePop(); if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, true // don'tCreateFile - it's already there @@ -24196,10 +24063,10 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePop(); callUserCallback(() => { var sp = stackSave(); - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - stringToUTF8OnStack(_file) + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stringToUTF8OnStack( + _file + ) ); stackRestore(sp); }); @@ -24243,12 +24110,8 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userdata, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata, buffer, byteArray.length ); @@ -24258,10 +24121,8 @@ export function init(RuntimeName, PHPLoader) { if (onerror) { runtimeKeepalivePop(); callUserCallback(() => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userdata + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata ); }); } @@ -24318,12 +24179,8 @@ export function init(RuntimeName, PHPLoader) { ); if (onload) { var sp = stackSave(); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, stringToUTF8OnStack(_file) ); @@ -24331,12 +24188,8 @@ export function init(RuntimeName, PHPLoader) { } } else { if (onerror) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status ); @@ -24349,12 +24202,8 @@ export function init(RuntimeName, PHPLoader) { http.onerror = (e) => { runtimeKeepalivePop(); if (onerror) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status ); @@ -24369,12 +24218,8 @@ export function init(RuntimeName, PHPLoader) { ) { var percentComplete = (e.loaded / e.total) * 100; if (onprogress) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, percentComplete ); @@ -24431,13 +24276,8 @@ export function init(RuntimeName, PHPLoader) { if (http.statusText) { statusText = stringToUTF8OnStack(http.statusText); } - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status, statusText @@ -24458,13 +24298,8 @@ export function init(RuntimeName, PHPLoader) { var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); if (onload) - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, buffer, byteArray.length @@ -24485,13 +24320,8 @@ export function init(RuntimeName, PHPLoader) { // PROGRESS http.onprogress = (e) => { if (onprogress) - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, e.loaded, e.lengthComputable || e.lengthComputable === undefined @@ -24611,24 +24441,16 @@ export function init(RuntimeName, PHPLoader) { if (event === 'error') { withStackSave(() => { var msg = stringToUTF8OnStack(data[2]); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - data[0], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data[0], data[1], msg, userData ); }); } else { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - data, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data, userData ); } @@ -25094,12 +24916,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var webGlEventHandlerFunc = (e = event) => { if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ) @@ -25318,21 +25136,15 @@ export function init(RuntimeName, PHPLoader) { ) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - lastX, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX, lastY ); } else if (GLUT.buttons != 0 && GLUT.motionFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - lastX, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX, lastY ); } @@ -25493,12 +25305,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.specialFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25508,12 +25316,8 @@ export function init(RuntimeName, PHPLoader) { if (key !== null && GLUT.keyboardFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25528,12 +25332,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.specialUpFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25543,12 +25343,8 @@ export function init(RuntimeName, PHPLoader) { if (key !== null && GLUT.keyboardUpFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25612,13 +25408,10 @@ export function init(RuntimeName, PHPLoader) { } catch (e) {} event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - event['button'], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[ + 'button' + ], 0 /*GLUT_DOWN*/, Browser.mouseX, Browser.mouseY @@ -25633,13 +25426,10 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.mouseFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - event['button'], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[ + 'button' + ], 1 /*GLUT_UP*/, Browser.mouseX, Browser.mouseY @@ -25668,13 +25458,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.mouseFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - button, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ button, 0 /*GLUT_DOWN*/, Browser.mouseX, Browser.mouseY @@ -25717,11 +25502,8 @@ export function init(RuntimeName, PHPLoader) { /* Can't call _glutReshapeWindow as that requests cancelling fullscreen. */ if (GLUT.reshapeFunc) { // out("GLUT.reshapeFunc (from FS): " + width + ", " + height); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -25764,11 +25546,8 @@ export function init(RuntimeName, PHPLoader) { Browser.resizeListeners.push((width, height) => { if (GLUT.reshapeFunc) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -25881,10 +25660,8 @@ export function init(RuntimeName, PHPLoader) { var _glutTimerFunc = (msec, func, value) => safeSetTimeout( () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - value + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ value ), msec ); @@ -26044,11 +25821,8 @@ export function init(RuntimeName, PHPLoader) { Browser.setCanvasSize(width, height, true); // N.B. GLUT.reshapeFunc is also registered as a canvas resize callback. // Just call it once here. if (GLUT.reshapeFunc) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -27110,21 +26884,15 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, buffer, byteArray.length ); @@ -27156,18 +26924,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (onstore) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); } @@ -27182,18 +26946,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (ondelete) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); }); @@ -27210,19 +26970,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (oncheck) - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, exists ); }); @@ -27238,18 +26993,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (onclear) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); }); @@ -27406,11 +27157,8 @@ export function init(RuntimeName, PHPLoader) { safeSetTimeout(() => { var stackBegin = Asyncify.currData + 12; var stackEnd = HEAPU32[Asyncify.currData >> 2]; - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - stackBegin, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stackBegin, stackEnd ); wakeUp(); @@ -27471,10 +27219,8 @@ export function init(RuntimeName, PHPLoader) { HEAPU32[(newFiber + 12) >> 2] = 0; var userData = HEAPU32[(newFiber + 16) >> 2]; - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ); } else { var asyncifyData = newFiber + 20; @@ -28486,11 +28232,8 @@ export function init(RuntimeName, PHPLoader) { if (!SDL.eventHandler) return; while (SDL.pollEvent(SDL.eventHandlerTemp)) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - SDL.eventHandlerContext, + ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL.eventHandlerContext, SDL.eventHandlerTemp ); } @@ -30123,12 +29866,9 @@ export function init(RuntimeName, PHPLoader) { return; // Ask SDL audio data from the user code. - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - SDL.audio.userdata, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL + .audio.userdata, SDL.audio.buffer, SDL.audio.bufferSize ); @@ -30586,10 +30326,8 @@ export function init(RuntimeName, PHPLoader) { info.audio = null; } if (SDL.channelFinished) { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - channel + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel ); } } @@ -30658,10 +30396,8 @@ export function init(RuntimeName, PHPLoader) { channelInfo.audio = null; } if (SDL.channelFinished) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - channel + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel ); }; if (channelInfo.audio) { @@ -31409,11 +31145,8 @@ export function init(RuntimeName, PHPLoader) { var _SDL_AddTimer = (interval, callback, param) => safeSetTimeout( () => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - interval, + ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ interval, param ), interval @@ -31792,12 +31525,8 @@ export function init(RuntimeName, PHPLoader) { socket.onopen = function (e) { var eventPtr = WS.getSocketEvent(socketId); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31819,12 +31548,8 @@ export function init(RuntimeName, PHPLoader) { socket.onerror = function (e) { var eventPtr = WS.getSocketEvent(socketId); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31849,12 +31574,8 @@ export function init(RuntimeName, PHPLoader) { (HEAP8[eventPtr + 4] = e.wasClean), (HEAP16[(eventPtr + 6) >> 1] = e.code), stringToUTF8(e.reason, eventPtr + 8, 512); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31888,12 +31609,8 @@ export function init(RuntimeName, PHPLoader) { (HEAPU32[(eventPtr + 4) >> 2] = buf), (HEAP32[(eventPtr + 8) >> 2] = len), (HEAP8[eventPtr + 12] = isText), - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); diff --git a/packages/php-wasm/node/asyncify/php_8_0.js b/packages/php-wasm/node/asyncify/php_8_0.js index 1b9e6d6485..08d093f9ee 100644 --- a/packages/php-wasm/node/asyncify/php_8_0.js +++ b/packages/php-wasm/node/asyncify/php_8_0.js @@ -1773,10 +1773,8 @@ export function init(RuntimeName, PHPLoader) { ); var ___call_sighandler = (fp, sig) => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - sig + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ sig ); ___call_sighandler.sig = 'vpi'; @@ -8792,11 +8790,8 @@ export function init(RuntimeName, PHPLoader) { dlSetError(`'Could not load dynamic lib: ${filename}\n${e}`); runtimeKeepalivePop(); callUserCallback(() => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, user_data ) ); @@ -8804,11 +8799,8 @@ export function init(RuntimeName, PHPLoader) { function successCallback() { runtimeKeepalivePop(); callUserCallback(() => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, user_data ) ); @@ -19470,11 +19462,8 @@ export function init(RuntimeName, PHPLoader) { var trace = getCallstack(); var parts = trace.split('\n'); for (var i = 0; i < parts.length; i++) { - var ret = (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0, + var ret = ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0, arg ); if (ret !== 0) return; @@ -20050,12 +20039,8 @@ export function init(RuntimeName, PHPLoader) { stringToUTF8(e.locale || '', keyEventData + 128, 32); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, keyEventData, userData ) @@ -20173,12 +20158,8 @@ export function init(RuntimeName, PHPLoader) { fillMouseEventData(JSEvents.mouseEvent, e, target); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.mouseEvent, userData ) @@ -20392,12 +20373,8 @@ export function init(RuntimeName, PHPLoader) { HEAPF64[(wheelEvent + 80) >> 3] = e['deltaZ']; HEAP32[(wheelEvent + 88) >> 2] = e['deltaMode']; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, wheelEvent, userData ) @@ -20478,12 +20455,8 @@ export function init(RuntimeName, PHPLoader) { HEAP32[(uiEvent + 28) >> 2] = pageXOffset | 0; // scroll offsets are float HEAP32[(uiEvent + 32) >> 2] = pageYOffset | 0; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, uiEvent, userData ) @@ -20557,12 +20530,8 @@ export function init(RuntimeName, PHPLoader) { stringToUTF8(id, focusEvent + 128, 128); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, focusEvent, userData ) @@ -20678,12 +20647,8 @@ export function init(RuntimeName, PHPLoader) { ); // TODO: Thread-safety with respect to emscripten_get_deviceorientation_status() if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.deviceOrientationEvent, userData ) @@ -20766,12 +20731,8 @@ export function init(RuntimeName, PHPLoader) { fillDeviceMotionEventData(JSEvents.deviceMotionEvent, e, target); // TODO: Thread-safety with respect to emscripten_get_devicemotion_status() if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.deviceMotionEvent, userData ) @@ -20881,12 +20842,8 @@ export function init(RuntimeName, PHPLoader) { fillOrientationChangeEventData(orientationChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, orientationChangeEvent, userData ) @@ -21019,12 +20976,8 @@ export function init(RuntimeName, PHPLoader) { fillFullscreenChangeEventData(fullscreenChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, fullscreenChangeEvent, userData ) @@ -21188,12 +21141,8 @@ export function init(RuntimeName, PHPLoader) { ); if (currentFullscreenStrategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, currentFullscreenStrategy.canvasResizedCallbackUserData ); @@ -21299,12 +21248,8 @@ export function init(RuntimeName, PHPLoader) { currentFullscreenStrategy = strategy; if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21406,12 +21351,8 @@ export function init(RuntimeName, PHPLoader) { !inCenteredWithoutScalingFullscreenMode && currentFullscreenStrategy.canvasResizedCallback ) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, currentFullscreenStrategy.canvasResizedCallbackUserData ); @@ -21510,12 +21451,8 @@ export function init(RuntimeName, PHPLoader) { softFullscreenResizeWebGLRenderTarget ); if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21528,12 +21465,8 @@ export function init(RuntimeName, PHPLoader) { // Inform the caller that the canvas size has changed. if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21601,12 +21534,8 @@ export function init(RuntimeName, PHPLoader) { fillPointerlockChangeEventData(pointerlockChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, pointerlockChangeEvent, userData ) @@ -21696,12 +21625,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var pointerlockErrorEventHandlerFunc = (e = event) => { if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ) @@ -21901,12 +21826,8 @@ export function init(RuntimeName, PHPLoader) { fillVisibilityChangeEventData(visibilityChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, visibilityChangeEvent, userData ) @@ -22026,12 +21947,8 @@ export function init(RuntimeName, PHPLoader) { HEAP32[(touchEvent + 8) >> 2] = numTouches; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, touchEvent, userData ) @@ -22169,12 +22086,8 @@ export function init(RuntimeName, PHPLoader) { fillGamepadEventData(gamepadEvent, e['gamepad']); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, gamepadEvent, userData ) @@ -22276,12 +22189,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var beforeUnloadEventHandlerFunc = (e = event) => { // Note: This is always called on the main browser thread, since it needs synchronously return a value! - var confirmationMessage = (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + var confirmationMessage = ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ); @@ -22352,12 +22261,8 @@ export function init(RuntimeName, PHPLoader) { fillBatteryEventData(batteryEvent, battery()); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, batteryEvent, userData ) @@ -22447,11 +22352,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_request_animation_frame = (cb, userData) => requestAnimationFrame((timeStamp) => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - timeStamp, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp, userData ) ); @@ -22463,11 +22365,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_request_animation_frame_loop = (cb, userData) => { function tick(timeStamp) { if ( - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - timeStamp, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp, userData ) ) { @@ -22692,10 +22591,8 @@ export function init(RuntimeName, PHPLoader) { return emSetImmediate(() => { runtimeKeepalivePop(); callUserCallback(() => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ); }); @@ -22712,10 +22609,8 @@ export function init(RuntimeName, PHPLoader) { function tick() { callUserCallback(() => { if ( - (( - a1 - ) => {}) /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ) { emSetImmediate(tick); @@ -22732,10 +22627,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_set_timeout = (cb, msecs, userData) => safeSetTimeout( () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ), msecs ); @@ -22751,11 +22644,8 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePop(); callUserCallback(() => { if ( - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - t, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ t, userData ) ) { @@ -22779,10 +22669,8 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePush(); return setInterval(() => { callUserCallback(() => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ); }, msecs); @@ -22797,10 +22685,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_async_call = (func, arg, millis) => { var wrapper = () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); if ( @@ -22833,7 +22719,7 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_set_main_loop = (func, fps, simulateInfiniteLoop) => { var iterFunc = - () => {} /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */; + () => {}; /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ setMainLoop(iterFunc, fps, simulateInfiniteLoop); }; _emscripten_set_main_loop.sig = 'vpii'; @@ -22845,10 +22731,8 @@ export function init(RuntimeName, PHPLoader) { simulateInfiniteLoop ) => { var iterFunc = () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); setMainLoop(iterFunc, fps, simulateInfiniteLoop, arg); }; @@ -22869,10 +22753,8 @@ export function init(RuntimeName, PHPLoader) { var __emscripten_push_main_loop_blocker = (func, arg, name) => { MainLoop.queue.push({ func: () => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, name: UTF8ToString(name), @@ -22885,10 +22767,8 @@ export function init(RuntimeName, PHPLoader) { var __emscripten_push_uncounted_main_loop_blocker = (func, arg, name) => { MainLoop.queue.push({ func: () => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, name: UTF8ToString(name), @@ -22922,12 +22802,8 @@ export function init(RuntimeName, PHPLoader) { var resultPtr = stackAlloc(POINTER_SIZE); HEAPU32[resultPtr >> 2] = 0; try { - var result = (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - resultPtr, + var result = ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ resultPtr, userData, value ); @@ -23863,19 +23739,15 @@ export function init(RuntimeName, PHPLoader) { () => { runtimeKeepalivePop(); if (onload) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - file + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file ); }, () => { runtimeKeepalivePop(); if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - file + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file ); }, true // don'tCreateFile - it's already there @@ -23909,21 +23781,16 @@ export function init(RuntimeName, PHPLoader) { () => { runtimeKeepalivePop(); if (onload) - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, cname ); }, () => { runtimeKeepalivePop(); if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, true // don'tCreateFile - it's already there @@ -24196,10 +24063,10 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePop(); callUserCallback(() => { var sp = stackSave(); - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - stringToUTF8OnStack(_file) + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stringToUTF8OnStack( + _file + ) ); stackRestore(sp); }); @@ -24243,12 +24110,8 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userdata, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata, buffer, byteArray.length ); @@ -24258,10 +24121,8 @@ export function init(RuntimeName, PHPLoader) { if (onerror) { runtimeKeepalivePop(); callUserCallback(() => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userdata + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata ); }); } @@ -24318,12 +24179,8 @@ export function init(RuntimeName, PHPLoader) { ); if (onload) { var sp = stackSave(); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, stringToUTF8OnStack(_file) ); @@ -24331,12 +24188,8 @@ export function init(RuntimeName, PHPLoader) { } } else { if (onerror) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status ); @@ -24349,12 +24202,8 @@ export function init(RuntimeName, PHPLoader) { http.onerror = (e) => { runtimeKeepalivePop(); if (onerror) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status ); @@ -24369,12 +24218,8 @@ export function init(RuntimeName, PHPLoader) { ) { var percentComplete = (e.loaded / e.total) * 100; if (onprogress) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, percentComplete ); @@ -24431,13 +24276,8 @@ export function init(RuntimeName, PHPLoader) { if (http.statusText) { statusText = stringToUTF8OnStack(http.statusText); } - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status, statusText @@ -24458,13 +24298,8 @@ export function init(RuntimeName, PHPLoader) { var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); if (onload) - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, buffer, byteArray.length @@ -24485,13 +24320,8 @@ export function init(RuntimeName, PHPLoader) { // PROGRESS http.onprogress = (e) => { if (onprogress) - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, e.loaded, e.lengthComputable || e.lengthComputable === undefined @@ -24611,24 +24441,16 @@ export function init(RuntimeName, PHPLoader) { if (event === 'error') { withStackSave(() => { var msg = stringToUTF8OnStack(data[2]); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - data[0], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data[0], data[1], msg, userData ); }); } else { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - data, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data, userData ); } @@ -25094,12 +24916,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var webGlEventHandlerFunc = (e = event) => { if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ) @@ -25318,21 +25136,15 @@ export function init(RuntimeName, PHPLoader) { ) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - lastX, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX, lastY ); } else if (GLUT.buttons != 0 && GLUT.motionFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - lastX, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX, lastY ); } @@ -25493,12 +25305,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.specialFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25508,12 +25316,8 @@ export function init(RuntimeName, PHPLoader) { if (key !== null && GLUT.keyboardFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25528,12 +25332,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.specialUpFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25543,12 +25343,8 @@ export function init(RuntimeName, PHPLoader) { if (key !== null && GLUT.keyboardUpFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25612,13 +25408,10 @@ export function init(RuntimeName, PHPLoader) { } catch (e) {} event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - event['button'], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[ + 'button' + ], 0 /*GLUT_DOWN*/, Browser.mouseX, Browser.mouseY @@ -25633,13 +25426,10 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.mouseFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - event['button'], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[ + 'button' + ], 1 /*GLUT_UP*/, Browser.mouseX, Browser.mouseY @@ -25668,13 +25458,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.mouseFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - button, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ button, 0 /*GLUT_DOWN*/, Browser.mouseX, Browser.mouseY @@ -25717,11 +25502,8 @@ export function init(RuntimeName, PHPLoader) { /* Can't call _glutReshapeWindow as that requests cancelling fullscreen. */ if (GLUT.reshapeFunc) { // out("GLUT.reshapeFunc (from FS): " + width + ", " + height); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -25764,11 +25546,8 @@ export function init(RuntimeName, PHPLoader) { Browser.resizeListeners.push((width, height) => { if (GLUT.reshapeFunc) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -25881,10 +25660,8 @@ export function init(RuntimeName, PHPLoader) { var _glutTimerFunc = (msec, func, value) => safeSetTimeout( () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - value + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ value ), msec ); @@ -26044,11 +25821,8 @@ export function init(RuntimeName, PHPLoader) { Browser.setCanvasSize(width, height, true); // N.B. GLUT.reshapeFunc is also registered as a canvas resize callback. // Just call it once here. if (GLUT.reshapeFunc) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -27110,21 +26884,15 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, buffer, byteArray.length ); @@ -27156,18 +26924,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (onstore) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); } @@ -27182,18 +26946,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (ondelete) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); }); @@ -27210,19 +26970,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (oncheck) - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, exists ); }); @@ -27238,18 +26993,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (onclear) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); }); @@ -27406,11 +27157,8 @@ export function init(RuntimeName, PHPLoader) { safeSetTimeout(() => { var stackBegin = Asyncify.currData + 12; var stackEnd = HEAPU32[Asyncify.currData >> 2]; - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - stackBegin, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stackBegin, stackEnd ); wakeUp(); @@ -27471,10 +27219,8 @@ export function init(RuntimeName, PHPLoader) { HEAPU32[(newFiber + 12) >> 2] = 0; var userData = HEAPU32[(newFiber + 16) >> 2]; - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ); } else { var asyncifyData = newFiber + 20; @@ -28486,11 +28232,8 @@ export function init(RuntimeName, PHPLoader) { if (!SDL.eventHandler) return; while (SDL.pollEvent(SDL.eventHandlerTemp)) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - SDL.eventHandlerContext, + ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL.eventHandlerContext, SDL.eventHandlerTemp ); } @@ -30123,12 +29866,9 @@ export function init(RuntimeName, PHPLoader) { return; // Ask SDL audio data from the user code. - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - SDL.audio.userdata, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL + .audio.userdata, SDL.audio.buffer, SDL.audio.bufferSize ); @@ -30586,10 +30326,8 @@ export function init(RuntimeName, PHPLoader) { info.audio = null; } if (SDL.channelFinished) { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - channel + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel ); } } @@ -30658,10 +30396,8 @@ export function init(RuntimeName, PHPLoader) { channelInfo.audio = null; } if (SDL.channelFinished) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - channel + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel ); }; if (channelInfo.audio) { @@ -31409,11 +31145,8 @@ export function init(RuntimeName, PHPLoader) { var _SDL_AddTimer = (interval, callback, param) => safeSetTimeout( () => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - interval, + ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ interval, param ), interval @@ -31792,12 +31525,8 @@ export function init(RuntimeName, PHPLoader) { socket.onopen = function (e) { var eventPtr = WS.getSocketEvent(socketId); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31819,12 +31548,8 @@ export function init(RuntimeName, PHPLoader) { socket.onerror = function (e) { var eventPtr = WS.getSocketEvent(socketId); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31849,12 +31574,8 @@ export function init(RuntimeName, PHPLoader) { (HEAP8[eventPtr + 4] = e.wasClean), (HEAP16[(eventPtr + 6) >> 1] = e.code), stringToUTF8(e.reason, eventPtr + 8, 512); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31888,12 +31609,8 @@ export function init(RuntimeName, PHPLoader) { (HEAPU32[(eventPtr + 4) >> 2] = buf), (HEAP32[(eventPtr + 8) >> 2] = len), (HEAP8[eventPtr + 12] = isText), - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); diff --git a/packages/php-wasm/node/asyncify/php_8_1.js b/packages/php-wasm/node/asyncify/php_8_1.js index ded3fa616a..7c19dbd662 100644 --- a/packages/php-wasm/node/asyncify/php_8_1.js +++ b/packages/php-wasm/node/asyncify/php_8_1.js @@ -1773,10 +1773,8 @@ export function init(RuntimeName, PHPLoader) { ); var ___call_sighandler = (fp, sig) => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - sig + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ sig ); ___call_sighandler.sig = 'vpi'; @@ -8792,11 +8790,8 @@ export function init(RuntimeName, PHPLoader) { dlSetError(`'Could not load dynamic lib: ${filename}\n${e}`); runtimeKeepalivePop(); callUserCallback(() => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, user_data ) ); @@ -8804,11 +8799,8 @@ export function init(RuntimeName, PHPLoader) { function successCallback() { runtimeKeepalivePop(); callUserCallback(() => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, user_data ) ); @@ -19476,11 +19468,8 @@ export function init(RuntimeName, PHPLoader) { var trace = getCallstack(); var parts = trace.split('\n'); for (var i = 0; i < parts.length; i++) { - var ret = (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0, + var ret = ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0, arg ); if (ret !== 0) return; @@ -20056,12 +20045,8 @@ export function init(RuntimeName, PHPLoader) { stringToUTF8(e.locale || '', keyEventData + 128, 32); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, keyEventData, userData ) @@ -20179,12 +20164,8 @@ export function init(RuntimeName, PHPLoader) { fillMouseEventData(JSEvents.mouseEvent, e, target); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.mouseEvent, userData ) @@ -20398,12 +20379,8 @@ export function init(RuntimeName, PHPLoader) { HEAPF64[(wheelEvent + 80) >> 3] = e['deltaZ']; HEAP32[(wheelEvent + 88) >> 2] = e['deltaMode']; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, wheelEvent, userData ) @@ -20484,12 +20461,8 @@ export function init(RuntimeName, PHPLoader) { HEAP32[(uiEvent + 28) >> 2] = pageXOffset | 0; // scroll offsets are float HEAP32[(uiEvent + 32) >> 2] = pageYOffset | 0; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, uiEvent, userData ) @@ -20563,12 +20536,8 @@ export function init(RuntimeName, PHPLoader) { stringToUTF8(id, focusEvent + 128, 128); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, focusEvent, userData ) @@ -20684,12 +20653,8 @@ export function init(RuntimeName, PHPLoader) { ); // TODO: Thread-safety with respect to emscripten_get_deviceorientation_status() if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.deviceOrientationEvent, userData ) @@ -20772,12 +20737,8 @@ export function init(RuntimeName, PHPLoader) { fillDeviceMotionEventData(JSEvents.deviceMotionEvent, e, target); // TODO: Thread-safety with respect to emscripten_get_devicemotion_status() if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.deviceMotionEvent, userData ) @@ -20887,12 +20848,8 @@ export function init(RuntimeName, PHPLoader) { fillOrientationChangeEventData(orientationChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, orientationChangeEvent, userData ) @@ -21025,12 +20982,8 @@ export function init(RuntimeName, PHPLoader) { fillFullscreenChangeEventData(fullscreenChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, fullscreenChangeEvent, userData ) @@ -21194,12 +21147,8 @@ export function init(RuntimeName, PHPLoader) { ); if (currentFullscreenStrategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, currentFullscreenStrategy.canvasResizedCallbackUserData ); @@ -21305,12 +21254,8 @@ export function init(RuntimeName, PHPLoader) { currentFullscreenStrategy = strategy; if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21412,12 +21357,8 @@ export function init(RuntimeName, PHPLoader) { !inCenteredWithoutScalingFullscreenMode && currentFullscreenStrategy.canvasResizedCallback ) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, currentFullscreenStrategy.canvasResizedCallbackUserData ); @@ -21516,12 +21457,8 @@ export function init(RuntimeName, PHPLoader) { softFullscreenResizeWebGLRenderTarget ); if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21534,12 +21471,8 @@ export function init(RuntimeName, PHPLoader) { // Inform the caller that the canvas size has changed. if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21607,12 +21540,8 @@ export function init(RuntimeName, PHPLoader) { fillPointerlockChangeEventData(pointerlockChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, pointerlockChangeEvent, userData ) @@ -21702,12 +21631,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var pointerlockErrorEventHandlerFunc = (e = event) => { if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ) @@ -21907,12 +21832,8 @@ export function init(RuntimeName, PHPLoader) { fillVisibilityChangeEventData(visibilityChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, visibilityChangeEvent, userData ) @@ -22032,12 +21953,8 @@ export function init(RuntimeName, PHPLoader) { HEAP32[(touchEvent + 8) >> 2] = numTouches; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, touchEvent, userData ) @@ -22175,12 +22092,8 @@ export function init(RuntimeName, PHPLoader) { fillGamepadEventData(gamepadEvent, e['gamepad']); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, gamepadEvent, userData ) @@ -22282,12 +22195,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var beforeUnloadEventHandlerFunc = (e = event) => { // Note: This is always called on the main browser thread, since it needs synchronously return a value! - var confirmationMessage = (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + var confirmationMessage = ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ); @@ -22358,12 +22267,8 @@ export function init(RuntimeName, PHPLoader) { fillBatteryEventData(batteryEvent, battery()); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, batteryEvent, userData ) @@ -22453,11 +22358,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_request_animation_frame = (cb, userData) => requestAnimationFrame((timeStamp) => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - timeStamp, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp, userData ) ); @@ -22469,11 +22371,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_request_animation_frame_loop = (cb, userData) => { function tick(timeStamp) { if ( - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - timeStamp, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp, userData ) ) { @@ -22698,10 +22597,8 @@ export function init(RuntimeName, PHPLoader) { return emSetImmediate(() => { runtimeKeepalivePop(); callUserCallback(() => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ); }); @@ -22718,10 +22615,8 @@ export function init(RuntimeName, PHPLoader) { function tick() { callUserCallback(() => { if ( - (( - a1 - ) => {}) /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ) { emSetImmediate(tick); @@ -22738,10 +22633,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_set_timeout = (cb, msecs, userData) => safeSetTimeout( () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ), msecs ); @@ -22757,11 +22650,8 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePop(); callUserCallback(() => { if ( - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - t, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ t, userData ) ) { @@ -22785,10 +22675,8 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePush(); return setInterval(() => { callUserCallback(() => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ); }, msecs); @@ -22803,10 +22691,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_async_call = (func, arg, millis) => { var wrapper = () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); if ( @@ -22839,7 +22725,7 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_set_main_loop = (func, fps, simulateInfiniteLoop) => { var iterFunc = - () => {} /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */; + () => {}; /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ setMainLoop(iterFunc, fps, simulateInfiniteLoop); }; _emscripten_set_main_loop.sig = 'vpii'; @@ -22851,10 +22737,8 @@ export function init(RuntimeName, PHPLoader) { simulateInfiniteLoop ) => { var iterFunc = () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); setMainLoop(iterFunc, fps, simulateInfiniteLoop, arg); }; @@ -22875,10 +22759,8 @@ export function init(RuntimeName, PHPLoader) { var __emscripten_push_main_loop_blocker = (func, arg, name) => { MainLoop.queue.push({ func: () => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, name: UTF8ToString(name), @@ -22891,10 +22773,8 @@ export function init(RuntimeName, PHPLoader) { var __emscripten_push_uncounted_main_loop_blocker = (func, arg, name) => { MainLoop.queue.push({ func: () => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, name: UTF8ToString(name), @@ -22928,12 +22808,8 @@ export function init(RuntimeName, PHPLoader) { var resultPtr = stackAlloc(POINTER_SIZE); HEAPU32[resultPtr >> 2] = 0; try { - var result = (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - resultPtr, + var result = ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ resultPtr, userData, value ); @@ -23869,19 +23745,15 @@ export function init(RuntimeName, PHPLoader) { () => { runtimeKeepalivePop(); if (onload) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - file + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file ); }, () => { runtimeKeepalivePop(); if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - file + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file ); }, true // don'tCreateFile - it's already there @@ -23915,21 +23787,16 @@ export function init(RuntimeName, PHPLoader) { () => { runtimeKeepalivePop(); if (onload) - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, cname ); }, () => { runtimeKeepalivePop(); if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, true // don'tCreateFile - it's already there @@ -24202,10 +24069,10 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePop(); callUserCallback(() => { var sp = stackSave(); - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - stringToUTF8OnStack(_file) + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stringToUTF8OnStack( + _file + ) ); stackRestore(sp); }); @@ -24249,12 +24116,8 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userdata, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata, buffer, byteArray.length ); @@ -24264,10 +24127,8 @@ export function init(RuntimeName, PHPLoader) { if (onerror) { runtimeKeepalivePop(); callUserCallback(() => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userdata + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata ); }); } @@ -24324,12 +24185,8 @@ export function init(RuntimeName, PHPLoader) { ); if (onload) { var sp = stackSave(); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, stringToUTF8OnStack(_file) ); @@ -24337,12 +24194,8 @@ export function init(RuntimeName, PHPLoader) { } } else { if (onerror) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status ); @@ -24355,12 +24208,8 @@ export function init(RuntimeName, PHPLoader) { http.onerror = (e) => { runtimeKeepalivePop(); if (onerror) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status ); @@ -24375,12 +24224,8 @@ export function init(RuntimeName, PHPLoader) { ) { var percentComplete = (e.loaded / e.total) * 100; if (onprogress) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, percentComplete ); @@ -24437,13 +24282,8 @@ export function init(RuntimeName, PHPLoader) { if (http.statusText) { statusText = stringToUTF8OnStack(http.statusText); } - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status, statusText @@ -24464,13 +24304,8 @@ export function init(RuntimeName, PHPLoader) { var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); if (onload) - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, buffer, byteArray.length @@ -24491,13 +24326,8 @@ export function init(RuntimeName, PHPLoader) { // PROGRESS http.onprogress = (e) => { if (onprogress) - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, e.loaded, e.lengthComputable || e.lengthComputable === undefined @@ -24617,24 +24447,16 @@ export function init(RuntimeName, PHPLoader) { if (event === 'error') { withStackSave(() => { var msg = stringToUTF8OnStack(data[2]); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - data[0], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data[0], data[1], msg, userData ); }); } else { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - data, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data, userData ); } @@ -25100,12 +24922,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var webGlEventHandlerFunc = (e = event) => { if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ) @@ -25324,21 +25142,15 @@ export function init(RuntimeName, PHPLoader) { ) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - lastX, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX, lastY ); } else if (GLUT.buttons != 0 && GLUT.motionFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - lastX, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX, lastY ); } @@ -25499,12 +25311,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.specialFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25514,12 +25322,8 @@ export function init(RuntimeName, PHPLoader) { if (key !== null && GLUT.keyboardFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25534,12 +25338,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.specialUpFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25549,12 +25349,8 @@ export function init(RuntimeName, PHPLoader) { if (key !== null && GLUT.keyboardUpFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25618,13 +25414,10 @@ export function init(RuntimeName, PHPLoader) { } catch (e) {} event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - event['button'], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[ + 'button' + ], 0 /*GLUT_DOWN*/, Browser.mouseX, Browser.mouseY @@ -25639,13 +25432,10 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.mouseFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - event['button'], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[ + 'button' + ], 1 /*GLUT_UP*/, Browser.mouseX, Browser.mouseY @@ -25674,13 +25464,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.mouseFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - button, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ button, 0 /*GLUT_DOWN*/, Browser.mouseX, Browser.mouseY @@ -25723,11 +25508,8 @@ export function init(RuntimeName, PHPLoader) { /* Can't call _glutReshapeWindow as that requests cancelling fullscreen. */ if (GLUT.reshapeFunc) { // out("GLUT.reshapeFunc (from FS): " + width + ", " + height); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -25770,11 +25552,8 @@ export function init(RuntimeName, PHPLoader) { Browser.resizeListeners.push((width, height) => { if (GLUT.reshapeFunc) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -25887,10 +25666,8 @@ export function init(RuntimeName, PHPLoader) { var _glutTimerFunc = (msec, func, value) => safeSetTimeout( () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - value + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ value ), msec ); @@ -26050,11 +25827,8 @@ export function init(RuntimeName, PHPLoader) { Browser.setCanvasSize(width, height, true); // N.B. GLUT.reshapeFunc is also registered as a canvas resize callback. // Just call it once here. if (GLUT.reshapeFunc) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -27116,21 +26890,15 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, buffer, byteArray.length ); @@ -27162,18 +26930,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (onstore) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); } @@ -27188,18 +26952,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (ondelete) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); }); @@ -27216,19 +26976,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (oncheck) - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, exists ); }); @@ -27244,18 +26999,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (onclear) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); }); @@ -27412,11 +27163,8 @@ export function init(RuntimeName, PHPLoader) { safeSetTimeout(() => { var stackBegin = Asyncify.currData + 12; var stackEnd = HEAPU32[Asyncify.currData >> 2]; - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - stackBegin, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stackBegin, stackEnd ); wakeUp(); @@ -27477,10 +27225,8 @@ export function init(RuntimeName, PHPLoader) { HEAPU32[(newFiber + 12) >> 2] = 0; var userData = HEAPU32[(newFiber + 16) >> 2]; - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ); } else { var asyncifyData = newFiber + 20; @@ -28492,11 +28238,8 @@ export function init(RuntimeName, PHPLoader) { if (!SDL.eventHandler) return; while (SDL.pollEvent(SDL.eventHandlerTemp)) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - SDL.eventHandlerContext, + ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL.eventHandlerContext, SDL.eventHandlerTemp ); } @@ -30129,12 +29872,9 @@ export function init(RuntimeName, PHPLoader) { return; // Ask SDL audio data from the user code. - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - SDL.audio.userdata, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL + .audio.userdata, SDL.audio.buffer, SDL.audio.bufferSize ); @@ -30592,10 +30332,8 @@ export function init(RuntimeName, PHPLoader) { info.audio = null; } if (SDL.channelFinished) { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - channel + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel ); } } @@ -30664,10 +30402,8 @@ export function init(RuntimeName, PHPLoader) { channelInfo.audio = null; } if (SDL.channelFinished) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - channel + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel ); }; if (channelInfo.audio) { @@ -31415,11 +31151,8 @@ export function init(RuntimeName, PHPLoader) { var _SDL_AddTimer = (interval, callback, param) => safeSetTimeout( () => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - interval, + ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ interval, param ), interval @@ -31792,12 +31525,8 @@ export function init(RuntimeName, PHPLoader) { socket.onopen = function (e) { var eventPtr = WS.getSocketEvent(socketId); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31819,12 +31548,8 @@ export function init(RuntimeName, PHPLoader) { socket.onerror = function (e) { var eventPtr = WS.getSocketEvent(socketId); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31849,12 +31574,8 @@ export function init(RuntimeName, PHPLoader) { (HEAP8[eventPtr + 4] = e.wasClean), (HEAP16[(eventPtr + 6) >> 1] = e.code), stringToUTF8(e.reason, eventPtr + 8, 512); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31888,12 +31609,8 @@ export function init(RuntimeName, PHPLoader) { (HEAPU32[(eventPtr + 4) >> 2] = buf), (HEAP32[(eventPtr + 8) >> 2] = len), (HEAP8[eventPtr + 12] = isText), - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); diff --git a/packages/php-wasm/node/asyncify/php_8_2.js b/packages/php-wasm/node/asyncify/php_8_2.js index 98ad7e6da5..8ce9398019 100644 --- a/packages/php-wasm/node/asyncify/php_8_2.js +++ b/packages/php-wasm/node/asyncify/php_8_2.js @@ -1773,10 +1773,8 @@ export function init(RuntimeName, PHPLoader) { ); var ___call_sighandler = (fp, sig) => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - sig + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ sig ); ___call_sighandler.sig = 'vpi'; @@ -8792,11 +8790,8 @@ export function init(RuntimeName, PHPLoader) { dlSetError(`'Could not load dynamic lib: ${filename}\n${e}`); runtimeKeepalivePop(); callUserCallback(() => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, user_data ) ); @@ -8804,11 +8799,8 @@ export function init(RuntimeName, PHPLoader) { function successCallback() { runtimeKeepalivePop(); callUserCallback(() => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, user_data ) ); @@ -19478,11 +19470,8 @@ export function init(RuntimeName, PHPLoader) { var trace = getCallstack(); var parts = trace.split('\n'); for (var i = 0; i < parts.length; i++) { - var ret = (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0, + var ret = ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0, arg ); if (ret !== 0) return; @@ -20058,12 +20047,8 @@ export function init(RuntimeName, PHPLoader) { stringToUTF8(e.locale || '', keyEventData + 128, 32); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, keyEventData, userData ) @@ -20181,12 +20166,8 @@ export function init(RuntimeName, PHPLoader) { fillMouseEventData(JSEvents.mouseEvent, e, target); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.mouseEvent, userData ) @@ -20400,12 +20381,8 @@ export function init(RuntimeName, PHPLoader) { HEAPF64[(wheelEvent + 80) >> 3] = e['deltaZ']; HEAP32[(wheelEvent + 88) >> 2] = e['deltaMode']; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, wheelEvent, userData ) @@ -20486,12 +20463,8 @@ export function init(RuntimeName, PHPLoader) { HEAP32[(uiEvent + 28) >> 2] = pageXOffset | 0; // scroll offsets are float HEAP32[(uiEvent + 32) >> 2] = pageYOffset | 0; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, uiEvent, userData ) @@ -20565,12 +20538,8 @@ export function init(RuntimeName, PHPLoader) { stringToUTF8(id, focusEvent + 128, 128); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, focusEvent, userData ) @@ -20686,12 +20655,8 @@ export function init(RuntimeName, PHPLoader) { ); // TODO: Thread-safety with respect to emscripten_get_deviceorientation_status() if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.deviceOrientationEvent, userData ) @@ -20774,12 +20739,8 @@ export function init(RuntimeName, PHPLoader) { fillDeviceMotionEventData(JSEvents.deviceMotionEvent, e, target); // TODO: Thread-safety with respect to emscripten_get_devicemotion_status() if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.deviceMotionEvent, userData ) @@ -20889,12 +20850,8 @@ export function init(RuntimeName, PHPLoader) { fillOrientationChangeEventData(orientationChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, orientationChangeEvent, userData ) @@ -21027,12 +20984,8 @@ export function init(RuntimeName, PHPLoader) { fillFullscreenChangeEventData(fullscreenChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, fullscreenChangeEvent, userData ) @@ -21196,12 +21149,8 @@ export function init(RuntimeName, PHPLoader) { ); if (currentFullscreenStrategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, currentFullscreenStrategy.canvasResizedCallbackUserData ); @@ -21307,12 +21256,8 @@ export function init(RuntimeName, PHPLoader) { currentFullscreenStrategy = strategy; if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21414,12 +21359,8 @@ export function init(RuntimeName, PHPLoader) { !inCenteredWithoutScalingFullscreenMode && currentFullscreenStrategy.canvasResizedCallback ) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, currentFullscreenStrategy.canvasResizedCallbackUserData ); @@ -21518,12 +21459,8 @@ export function init(RuntimeName, PHPLoader) { softFullscreenResizeWebGLRenderTarget ); if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21536,12 +21473,8 @@ export function init(RuntimeName, PHPLoader) { // Inform the caller that the canvas size has changed. if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21609,12 +21542,8 @@ export function init(RuntimeName, PHPLoader) { fillPointerlockChangeEventData(pointerlockChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, pointerlockChangeEvent, userData ) @@ -21704,12 +21633,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var pointerlockErrorEventHandlerFunc = (e = event) => { if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ) @@ -21909,12 +21834,8 @@ export function init(RuntimeName, PHPLoader) { fillVisibilityChangeEventData(visibilityChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, visibilityChangeEvent, userData ) @@ -22034,12 +21955,8 @@ export function init(RuntimeName, PHPLoader) { HEAP32[(touchEvent + 8) >> 2] = numTouches; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, touchEvent, userData ) @@ -22177,12 +22094,8 @@ export function init(RuntimeName, PHPLoader) { fillGamepadEventData(gamepadEvent, e['gamepad']); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, gamepadEvent, userData ) @@ -22284,12 +22197,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var beforeUnloadEventHandlerFunc = (e = event) => { // Note: This is always called on the main browser thread, since it needs synchronously return a value! - var confirmationMessage = (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + var confirmationMessage = ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ); @@ -22360,12 +22269,8 @@ export function init(RuntimeName, PHPLoader) { fillBatteryEventData(batteryEvent, battery()); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, batteryEvent, userData ) @@ -22455,11 +22360,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_request_animation_frame = (cb, userData) => requestAnimationFrame((timeStamp) => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - timeStamp, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp, userData ) ); @@ -22471,11 +22373,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_request_animation_frame_loop = (cb, userData) => { function tick(timeStamp) { if ( - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - timeStamp, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp, userData ) ) { @@ -22700,10 +22599,8 @@ export function init(RuntimeName, PHPLoader) { return emSetImmediate(() => { runtimeKeepalivePop(); callUserCallback(() => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ); }); @@ -22720,10 +22617,8 @@ export function init(RuntimeName, PHPLoader) { function tick() { callUserCallback(() => { if ( - (( - a1 - ) => {}) /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ) { emSetImmediate(tick); @@ -22740,10 +22635,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_set_timeout = (cb, msecs, userData) => safeSetTimeout( () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ), msecs ); @@ -22759,11 +22652,8 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePop(); callUserCallback(() => { if ( - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - t, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ t, userData ) ) { @@ -22787,10 +22677,8 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePush(); return setInterval(() => { callUserCallback(() => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ); }, msecs); @@ -22805,10 +22693,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_async_call = (func, arg, millis) => { var wrapper = () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); if ( @@ -22841,7 +22727,7 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_set_main_loop = (func, fps, simulateInfiniteLoop) => { var iterFunc = - () => {} /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */; + () => {}; /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ setMainLoop(iterFunc, fps, simulateInfiniteLoop); }; _emscripten_set_main_loop.sig = 'vpii'; @@ -22853,10 +22739,8 @@ export function init(RuntimeName, PHPLoader) { simulateInfiniteLoop ) => { var iterFunc = () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); setMainLoop(iterFunc, fps, simulateInfiniteLoop, arg); }; @@ -22877,10 +22761,8 @@ export function init(RuntimeName, PHPLoader) { var __emscripten_push_main_loop_blocker = (func, arg, name) => { MainLoop.queue.push({ func: () => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, name: UTF8ToString(name), @@ -22893,10 +22775,8 @@ export function init(RuntimeName, PHPLoader) { var __emscripten_push_uncounted_main_loop_blocker = (func, arg, name) => { MainLoop.queue.push({ func: () => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, name: UTF8ToString(name), @@ -22930,12 +22810,8 @@ export function init(RuntimeName, PHPLoader) { var resultPtr = stackAlloc(POINTER_SIZE); HEAPU32[resultPtr >> 2] = 0; try { - var result = (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - resultPtr, + var result = ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ resultPtr, userData, value ); @@ -23871,19 +23747,15 @@ export function init(RuntimeName, PHPLoader) { () => { runtimeKeepalivePop(); if (onload) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - file + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file ); }, () => { runtimeKeepalivePop(); if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - file + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file ); }, true // don'tCreateFile - it's already there @@ -23917,21 +23789,16 @@ export function init(RuntimeName, PHPLoader) { () => { runtimeKeepalivePop(); if (onload) - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, cname ); }, () => { runtimeKeepalivePop(); if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, true // don'tCreateFile - it's already there @@ -24204,10 +24071,10 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePop(); callUserCallback(() => { var sp = stackSave(); - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - stringToUTF8OnStack(_file) + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stringToUTF8OnStack( + _file + ) ); stackRestore(sp); }); @@ -24251,12 +24118,8 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userdata, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata, buffer, byteArray.length ); @@ -24266,10 +24129,8 @@ export function init(RuntimeName, PHPLoader) { if (onerror) { runtimeKeepalivePop(); callUserCallback(() => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userdata + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata ); }); } @@ -24326,12 +24187,8 @@ export function init(RuntimeName, PHPLoader) { ); if (onload) { var sp = stackSave(); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, stringToUTF8OnStack(_file) ); @@ -24339,12 +24196,8 @@ export function init(RuntimeName, PHPLoader) { } } else { if (onerror) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status ); @@ -24357,12 +24210,8 @@ export function init(RuntimeName, PHPLoader) { http.onerror = (e) => { runtimeKeepalivePop(); if (onerror) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status ); @@ -24377,12 +24226,8 @@ export function init(RuntimeName, PHPLoader) { ) { var percentComplete = (e.loaded / e.total) * 100; if (onprogress) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, percentComplete ); @@ -24439,13 +24284,8 @@ export function init(RuntimeName, PHPLoader) { if (http.statusText) { statusText = stringToUTF8OnStack(http.statusText); } - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status, statusText @@ -24466,13 +24306,8 @@ export function init(RuntimeName, PHPLoader) { var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); if (onload) - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, buffer, byteArray.length @@ -24493,13 +24328,8 @@ export function init(RuntimeName, PHPLoader) { // PROGRESS http.onprogress = (e) => { if (onprogress) - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, e.loaded, e.lengthComputable || e.lengthComputable === undefined @@ -24619,24 +24449,16 @@ export function init(RuntimeName, PHPLoader) { if (event === 'error') { withStackSave(() => { var msg = stringToUTF8OnStack(data[2]); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - data[0], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data[0], data[1], msg, userData ); }); } else { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - data, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data, userData ); } @@ -25102,12 +24924,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var webGlEventHandlerFunc = (e = event) => { if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ) @@ -25326,21 +25144,15 @@ export function init(RuntimeName, PHPLoader) { ) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - lastX, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX, lastY ); } else if (GLUT.buttons != 0 && GLUT.motionFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - lastX, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX, lastY ); } @@ -25501,12 +25313,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.specialFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25516,12 +25324,8 @@ export function init(RuntimeName, PHPLoader) { if (key !== null && GLUT.keyboardFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25536,12 +25340,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.specialUpFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25551,12 +25351,8 @@ export function init(RuntimeName, PHPLoader) { if (key !== null && GLUT.keyboardUpFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25620,13 +25416,10 @@ export function init(RuntimeName, PHPLoader) { } catch (e) {} event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - event['button'], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[ + 'button' + ], 0 /*GLUT_DOWN*/, Browser.mouseX, Browser.mouseY @@ -25641,13 +25434,10 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.mouseFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - event['button'], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[ + 'button' + ], 1 /*GLUT_UP*/, Browser.mouseX, Browser.mouseY @@ -25676,13 +25466,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.mouseFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - button, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ button, 0 /*GLUT_DOWN*/, Browser.mouseX, Browser.mouseY @@ -25725,11 +25510,8 @@ export function init(RuntimeName, PHPLoader) { /* Can't call _glutReshapeWindow as that requests cancelling fullscreen. */ if (GLUT.reshapeFunc) { // out("GLUT.reshapeFunc (from FS): " + width + ", " + height); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -25772,11 +25554,8 @@ export function init(RuntimeName, PHPLoader) { Browser.resizeListeners.push((width, height) => { if (GLUT.reshapeFunc) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -25889,10 +25668,8 @@ export function init(RuntimeName, PHPLoader) { var _glutTimerFunc = (msec, func, value) => safeSetTimeout( () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - value + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ value ), msec ); @@ -26052,11 +25829,8 @@ export function init(RuntimeName, PHPLoader) { Browser.setCanvasSize(width, height, true); // N.B. GLUT.reshapeFunc is also registered as a canvas resize callback. // Just call it once here. if (GLUT.reshapeFunc) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -27118,21 +26892,15 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, buffer, byteArray.length ); @@ -27164,18 +26932,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (onstore) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); } @@ -27190,18 +26954,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (ondelete) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); }); @@ -27218,19 +26978,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (oncheck) - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, exists ); }); @@ -27246,18 +27001,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (onclear) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); }); @@ -27414,11 +27165,8 @@ export function init(RuntimeName, PHPLoader) { safeSetTimeout(() => { var stackBegin = Asyncify.currData + 12; var stackEnd = HEAPU32[Asyncify.currData >> 2]; - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - stackBegin, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stackBegin, stackEnd ); wakeUp(); @@ -27479,10 +27227,8 @@ export function init(RuntimeName, PHPLoader) { HEAPU32[(newFiber + 12) >> 2] = 0; var userData = HEAPU32[(newFiber + 16) >> 2]; - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ); } else { var asyncifyData = newFiber + 20; @@ -28494,11 +28240,8 @@ export function init(RuntimeName, PHPLoader) { if (!SDL.eventHandler) return; while (SDL.pollEvent(SDL.eventHandlerTemp)) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - SDL.eventHandlerContext, + ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL.eventHandlerContext, SDL.eventHandlerTemp ); } @@ -30131,12 +29874,9 @@ export function init(RuntimeName, PHPLoader) { return; // Ask SDL audio data from the user code. - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - SDL.audio.userdata, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL + .audio.userdata, SDL.audio.buffer, SDL.audio.bufferSize ); @@ -30594,10 +30334,8 @@ export function init(RuntimeName, PHPLoader) { info.audio = null; } if (SDL.channelFinished) { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - channel + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel ); } } @@ -30666,10 +30404,8 @@ export function init(RuntimeName, PHPLoader) { channelInfo.audio = null; } if (SDL.channelFinished) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - channel + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel ); }; if (channelInfo.audio) { @@ -31417,11 +31153,8 @@ export function init(RuntimeName, PHPLoader) { var _SDL_AddTimer = (interval, callback, param) => safeSetTimeout( () => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - interval, + ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ interval, param ), interval @@ -31792,12 +31525,8 @@ export function init(RuntimeName, PHPLoader) { socket.onopen = function (e) { var eventPtr = WS.getSocketEvent(socketId); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31819,12 +31548,8 @@ export function init(RuntimeName, PHPLoader) { socket.onerror = function (e) { var eventPtr = WS.getSocketEvent(socketId); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31849,12 +31574,8 @@ export function init(RuntimeName, PHPLoader) { (HEAP8[eventPtr + 4] = e.wasClean), (HEAP16[(eventPtr + 6) >> 1] = e.code), stringToUTF8(e.reason, eventPtr + 8, 512); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31888,12 +31609,8 @@ export function init(RuntimeName, PHPLoader) { (HEAPU32[(eventPtr + 4) >> 2] = buf), (HEAP32[(eventPtr + 8) >> 2] = len), (HEAP8[eventPtr + 12] = isText), - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); diff --git a/packages/php-wasm/node/asyncify/php_8_3.js b/packages/php-wasm/node/asyncify/php_8_3.js index 0b14290db7..65e7b621f1 100644 --- a/packages/php-wasm/node/asyncify/php_8_3.js +++ b/packages/php-wasm/node/asyncify/php_8_3.js @@ -1773,10 +1773,8 @@ export function init(RuntimeName, PHPLoader) { ); var ___call_sighandler = (fp, sig) => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - sig + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ sig ); ___call_sighandler.sig = 'vpi'; @@ -8792,11 +8790,8 @@ export function init(RuntimeName, PHPLoader) { dlSetError(`'Could not load dynamic lib: ${filename}\n${e}`); runtimeKeepalivePop(); callUserCallback(() => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, user_data ) ); @@ -8804,11 +8799,8 @@ export function init(RuntimeName, PHPLoader) { function successCallback() { runtimeKeepalivePop(); callUserCallback(() => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, user_data ) ); @@ -19478,11 +19470,8 @@ export function init(RuntimeName, PHPLoader) { var trace = getCallstack(); var parts = trace.split('\n'); for (var i = 0; i < parts.length; i++) { - var ret = (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0, + var ret = ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0, arg ); if (ret !== 0) return; @@ -20058,12 +20047,8 @@ export function init(RuntimeName, PHPLoader) { stringToUTF8(e.locale || '', keyEventData + 128, 32); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, keyEventData, userData ) @@ -20181,12 +20166,8 @@ export function init(RuntimeName, PHPLoader) { fillMouseEventData(JSEvents.mouseEvent, e, target); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.mouseEvent, userData ) @@ -20400,12 +20381,8 @@ export function init(RuntimeName, PHPLoader) { HEAPF64[(wheelEvent + 80) >> 3] = e['deltaZ']; HEAP32[(wheelEvent + 88) >> 2] = e['deltaMode']; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, wheelEvent, userData ) @@ -20486,12 +20463,8 @@ export function init(RuntimeName, PHPLoader) { HEAP32[(uiEvent + 28) >> 2] = pageXOffset | 0; // scroll offsets are float HEAP32[(uiEvent + 32) >> 2] = pageYOffset | 0; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, uiEvent, userData ) @@ -20565,12 +20538,8 @@ export function init(RuntimeName, PHPLoader) { stringToUTF8(id, focusEvent + 128, 128); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, focusEvent, userData ) @@ -20686,12 +20655,8 @@ export function init(RuntimeName, PHPLoader) { ); // TODO: Thread-safety with respect to emscripten_get_deviceorientation_status() if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.deviceOrientationEvent, userData ) @@ -20774,12 +20739,8 @@ export function init(RuntimeName, PHPLoader) { fillDeviceMotionEventData(JSEvents.deviceMotionEvent, e, target); // TODO: Thread-safety with respect to emscripten_get_devicemotion_status() if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.deviceMotionEvent, userData ) @@ -20889,12 +20850,8 @@ export function init(RuntimeName, PHPLoader) { fillOrientationChangeEventData(orientationChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, orientationChangeEvent, userData ) @@ -21027,12 +20984,8 @@ export function init(RuntimeName, PHPLoader) { fillFullscreenChangeEventData(fullscreenChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, fullscreenChangeEvent, userData ) @@ -21196,12 +21149,8 @@ export function init(RuntimeName, PHPLoader) { ); if (currentFullscreenStrategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, currentFullscreenStrategy.canvasResizedCallbackUserData ); @@ -21307,12 +21256,8 @@ export function init(RuntimeName, PHPLoader) { currentFullscreenStrategy = strategy; if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21414,12 +21359,8 @@ export function init(RuntimeName, PHPLoader) { !inCenteredWithoutScalingFullscreenMode && currentFullscreenStrategy.canvasResizedCallback ) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, currentFullscreenStrategy.canvasResizedCallbackUserData ); @@ -21518,12 +21459,8 @@ export function init(RuntimeName, PHPLoader) { softFullscreenResizeWebGLRenderTarget ); if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21536,12 +21473,8 @@ export function init(RuntimeName, PHPLoader) { // Inform the caller that the canvas size has changed. if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21609,12 +21542,8 @@ export function init(RuntimeName, PHPLoader) { fillPointerlockChangeEventData(pointerlockChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, pointerlockChangeEvent, userData ) @@ -21704,12 +21633,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var pointerlockErrorEventHandlerFunc = (e = event) => { if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ) @@ -21909,12 +21834,8 @@ export function init(RuntimeName, PHPLoader) { fillVisibilityChangeEventData(visibilityChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, visibilityChangeEvent, userData ) @@ -22034,12 +21955,8 @@ export function init(RuntimeName, PHPLoader) { HEAP32[(touchEvent + 8) >> 2] = numTouches; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, touchEvent, userData ) @@ -22177,12 +22094,8 @@ export function init(RuntimeName, PHPLoader) { fillGamepadEventData(gamepadEvent, e['gamepad']); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, gamepadEvent, userData ) @@ -22284,12 +22197,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var beforeUnloadEventHandlerFunc = (e = event) => { // Note: This is always called on the main browser thread, since it needs synchronously return a value! - var confirmationMessage = (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + var confirmationMessage = ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ); @@ -22360,12 +22269,8 @@ export function init(RuntimeName, PHPLoader) { fillBatteryEventData(batteryEvent, battery()); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, batteryEvent, userData ) @@ -22455,11 +22360,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_request_animation_frame = (cb, userData) => requestAnimationFrame((timeStamp) => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - timeStamp, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp, userData ) ); @@ -22471,11 +22373,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_request_animation_frame_loop = (cb, userData) => { function tick(timeStamp) { if ( - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - timeStamp, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp, userData ) ) { @@ -22700,10 +22599,8 @@ export function init(RuntimeName, PHPLoader) { return emSetImmediate(() => { runtimeKeepalivePop(); callUserCallback(() => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ); }); @@ -22720,10 +22617,8 @@ export function init(RuntimeName, PHPLoader) { function tick() { callUserCallback(() => { if ( - (( - a1 - ) => {}) /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ) { emSetImmediate(tick); @@ -22740,10 +22635,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_set_timeout = (cb, msecs, userData) => safeSetTimeout( () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ), msecs ); @@ -22759,11 +22652,8 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePop(); callUserCallback(() => { if ( - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - t, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ t, userData ) ) { @@ -22787,10 +22677,8 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePush(); return setInterval(() => { callUserCallback(() => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ); }, msecs); @@ -22805,10 +22693,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_async_call = (func, arg, millis) => { var wrapper = () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); if ( @@ -22841,7 +22727,7 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_set_main_loop = (func, fps, simulateInfiniteLoop) => { var iterFunc = - () => {} /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */; + () => {}; /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ setMainLoop(iterFunc, fps, simulateInfiniteLoop); }; _emscripten_set_main_loop.sig = 'vpii'; @@ -22853,10 +22739,8 @@ export function init(RuntimeName, PHPLoader) { simulateInfiniteLoop ) => { var iterFunc = () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); setMainLoop(iterFunc, fps, simulateInfiniteLoop, arg); }; @@ -22877,10 +22761,8 @@ export function init(RuntimeName, PHPLoader) { var __emscripten_push_main_loop_blocker = (func, arg, name) => { MainLoop.queue.push({ func: () => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, name: UTF8ToString(name), @@ -22893,10 +22775,8 @@ export function init(RuntimeName, PHPLoader) { var __emscripten_push_uncounted_main_loop_blocker = (func, arg, name) => { MainLoop.queue.push({ func: () => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, name: UTF8ToString(name), @@ -22930,12 +22810,8 @@ export function init(RuntimeName, PHPLoader) { var resultPtr = stackAlloc(POINTER_SIZE); HEAPU32[resultPtr >> 2] = 0; try { - var result = (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - resultPtr, + var result = ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ resultPtr, userData, value ); @@ -23871,19 +23747,15 @@ export function init(RuntimeName, PHPLoader) { () => { runtimeKeepalivePop(); if (onload) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - file + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file ); }, () => { runtimeKeepalivePop(); if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - file + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file ); }, true // don'tCreateFile - it's already there @@ -23917,21 +23789,16 @@ export function init(RuntimeName, PHPLoader) { () => { runtimeKeepalivePop(); if (onload) - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, cname ); }, () => { runtimeKeepalivePop(); if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, true // don'tCreateFile - it's already there @@ -24204,10 +24071,10 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePop(); callUserCallback(() => { var sp = stackSave(); - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - stringToUTF8OnStack(_file) + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stringToUTF8OnStack( + _file + ) ); stackRestore(sp); }); @@ -24251,12 +24118,8 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userdata, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata, buffer, byteArray.length ); @@ -24266,10 +24129,8 @@ export function init(RuntimeName, PHPLoader) { if (onerror) { runtimeKeepalivePop(); callUserCallback(() => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userdata + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata ); }); } @@ -24326,12 +24187,8 @@ export function init(RuntimeName, PHPLoader) { ); if (onload) { var sp = stackSave(); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, stringToUTF8OnStack(_file) ); @@ -24339,12 +24196,8 @@ export function init(RuntimeName, PHPLoader) { } } else { if (onerror) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status ); @@ -24357,12 +24210,8 @@ export function init(RuntimeName, PHPLoader) { http.onerror = (e) => { runtimeKeepalivePop(); if (onerror) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status ); @@ -24377,12 +24226,8 @@ export function init(RuntimeName, PHPLoader) { ) { var percentComplete = (e.loaded / e.total) * 100; if (onprogress) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, percentComplete ); @@ -24439,13 +24284,8 @@ export function init(RuntimeName, PHPLoader) { if (http.statusText) { statusText = stringToUTF8OnStack(http.statusText); } - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status, statusText @@ -24466,13 +24306,8 @@ export function init(RuntimeName, PHPLoader) { var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); if (onload) - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, buffer, byteArray.length @@ -24493,13 +24328,8 @@ export function init(RuntimeName, PHPLoader) { // PROGRESS http.onprogress = (e) => { if (onprogress) - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, e.loaded, e.lengthComputable || e.lengthComputable === undefined @@ -24619,24 +24449,16 @@ export function init(RuntimeName, PHPLoader) { if (event === 'error') { withStackSave(() => { var msg = stringToUTF8OnStack(data[2]); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - data[0], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data[0], data[1], msg, userData ); }); } else { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - data, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data, userData ); } @@ -25102,12 +24924,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var webGlEventHandlerFunc = (e = event) => { if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ) @@ -25326,21 +25144,15 @@ export function init(RuntimeName, PHPLoader) { ) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - lastX, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX, lastY ); } else if (GLUT.buttons != 0 && GLUT.motionFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - lastX, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX, lastY ); } @@ -25501,12 +25313,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.specialFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25516,12 +25324,8 @@ export function init(RuntimeName, PHPLoader) { if (key !== null && GLUT.keyboardFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25536,12 +25340,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.specialUpFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25551,12 +25351,8 @@ export function init(RuntimeName, PHPLoader) { if (key !== null && GLUT.keyboardUpFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25620,13 +25416,10 @@ export function init(RuntimeName, PHPLoader) { } catch (e) {} event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - event['button'], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[ + 'button' + ], 0 /*GLUT_DOWN*/, Browser.mouseX, Browser.mouseY @@ -25641,13 +25434,10 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.mouseFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - event['button'], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[ + 'button' + ], 1 /*GLUT_UP*/, Browser.mouseX, Browser.mouseY @@ -25676,13 +25466,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.mouseFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - button, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ button, 0 /*GLUT_DOWN*/, Browser.mouseX, Browser.mouseY @@ -25725,11 +25510,8 @@ export function init(RuntimeName, PHPLoader) { /* Can't call _glutReshapeWindow as that requests cancelling fullscreen. */ if (GLUT.reshapeFunc) { // out("GLUT.reshapeFunc (from FS): " + width + ", " + height); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -25772,11 +25554,8 @@ export function init(RuntimeName, PHPLoader) { Browser.resizeListeners.push((width, height) => { if (GLUT.reshapeFunc) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -25889,10 +25668,8 @@ export function init(RuntimeName, PHPLoader) { var _glutTimerFunc = (msec, func, value) => safeSetTimeout( () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - value + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ value ), msec ); @@ -26052,11 +25829,8 @@ export function init(RuntimeName, PHPLoader) { Browser.setCanvasSize(width, height, true); // N.B. GLUT.reshapeFunc is also registered as a canvas resize callback. // Just call it once here. if (GLUT.reshapeFunc) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -27118,21 +26892,15 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, buffer, byteArray.length ); @@ -27164,18 +26932,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (onstore) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); } @@ -27190,18 +26954,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (ondelete) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); }); @@ -27218,19 +26978,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (oncheck) - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, exists ); }); @@ -27246,18 +27001,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (onclear) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); }); @@ -27414,11 +27165,8 @@ export function init(RuntimeName, PHPLoader) { safeSetTimeout(() => { var stackBegin = Asyncify.currData + 12; var stackEnd = HEAPU32[Asyncify.currData >> 2]; - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - stackBegin, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stackBegin, stackEnd ); wakeUp(); @@ -27479,10 +27227,8 @@ export function init(RuntimeName, PHPLoader) { HEAPU32[(newFiber + 12) >> 2] = 0; var userData = HEAPU32[(newFiber + 16) >> 2]; - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ); } else { var asyncifyData = newFiber + 20; @@ -28494,11 +28240,8 @@ export function init(RuntimeName, PHPLoader) { if (!SDL.eventHandler) return; while (SDL.pollEvent(SDL.eventHandlerTemp)) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - SDL.eventHandlerContext, + ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL.eventHandlerContext, SDL.eventHandlerTemp ); } @@ -30131,12 +29874,9 @@ export function init(RuntimeName, PHPLoader) { return; // Ask SDL audio data from the user code. - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - SDL.audio.userdata, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL + .audio.userdata, SDL.audio.buffer, SDL.audio.bufferSize ); @@ -30594,10 +30334,8 @@ export function init(RuntimeName, PHPLoader) { info.audio = null; } if (SDL.channelFinished) { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - channel + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel ); } } @@ -30666,10 +30404,8 @@ export function init(RuntimeName, PHPLoader) { channelInfo.audio = null; } if (SDL.channelFinished) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - channel + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel ); }; if (channelInfo.audio) { @@ -31417,11 +31153,8 @@ export function init(RuntimeName, PHPLoader) { var _SDL_AddTimer = (interval, callback, param) => safeSetTimeout( () => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - interval, + ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ interval, param ), interval @@ -31792,12 +31525,8 @@ export function init(RuntimeName, PHPLoader) { socket.onopen = function (e) { var eventPtr = WS.getSocketEvent(socketId); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31819,12 +31548,8 @@ export function init(RuntimeName, PHPLoader) { socket.onerror = function (e) { var eventPtr = WS.getSocketEvent(socketId); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31849,12 +31574,8 @@ export function init(RuntimeName, PHPLoader) { (HEAP8[eventPtr + 4] = e.wasClean), (HEAP16[(eventPtr + 6) >> 1] = e.code), stringToUTF8(e.reason, eventPtr + 8, 512); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31888,12 +31609,8 @@ export function init(RuntimeName, PHPLoader) { (HEAPU32[(eventPtr + 4) >> 2] = buf), (HEAP32[(eventPtr + 8) >> 2] = len), (HEAP8[eventPtr + 12] = isText), - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); diff --git a/packages/php-wasm/node/asyncify/php_8_4.js b/packages/php-wasm/node/asyncify/php_8_4.js index fe623142e2..0c2d7038e0 100644 --- a/packages/php-wasm/node/asyncify/php_8_4.js +++ b/packages/php-wasm/node/asyncify/php_8_4.js @@ -1773,10 +1773,8 @@ export function init(RuntimeName, PHPLoader) { ); var ___call_sighandler = (fp, sig) => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - sig + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ sig ); ___call_sighandler.sig = 'vpi'; @@ -8792,11 +8790,8 @@ export function init(RuntimeName, PHPLoader) { dlSetError(`'Could not load dynamic lib: ${filename}\n${e}`); runtimeKeepalivePop(); callUserCallback(() => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, user_data ) ); @@ -8804,11 +8799,8 @@ export function init(RuntimeName, PHPLoader) { function successCallback() { runtimeKeepalivePop(); callUserCallback(() => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, user_data ) ); @@ -19478,11 +19470,8 @@ export function init(RuntimeName, PHPLoader) { var trace = getCallstack(); var parts = trace.split('\n'); for (var i = 0; i < parts.length; i++) { - var ret = (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0, + var ret = ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0, arg ); if (ret !== 0) return; @@ -20058,12 +20047,8 @@ export function init(RuntimeName, PHPLoader) { stringToUTF8(e.locale || '', keyEventData + 128, 32); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, keyEventData, userData ) @@ -20181,12 +20166,8 @@ export function init(RuntimeName, PHPLoader) { fillMouseEventData(JSEvents.mouseEvent, e, target); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.mouseEvent, userData ) @@ -20400,12 +20381,8 @@ export function init(RuntimeName, PHPLoader) { HEAPF64[(wheelEvent + 80) >> 3] = e['deltaZ']; HEAP32[(wheelEvent + 88) >> 2] = e['deltaMode']; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, wheelEvent, userData ) @@ -20486,12 +20463,8 @@ export function init(RuntimeName, PHPLoader) { HEAP32[(uiEvent + 28) >> 2] = pageXOffset | 0; // scroll offsets are float HEAP32[(uiEvent + 32) >> 2] = pageYOffset | 0; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, uiEvent, userData ) @@ -20565,12 +20538,8 @@ export function init(RuntimeName, PHPLoader) { stringToUTF8(id, focusEvent + 128, 128); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, focusEvent, userData ) @@ -20686,12 +20655,8 @@ export function init(RuntimeName, PHPLoader) { ); // TODO: Thread-safety with respect to emscripten_get_deviceorientation_status() if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.deviceOrientationEvent, userData ) @@ -20774,12 +20739,8 @@ export function init(RuntimeName, PHPLoader) { fillDeviceMotionEventData(JSEvents.deviceMotionEvent, e, target); // TODO: Thread-safety with respect to emscripten_get_devicemotion_status() if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.deviceMotionEvent, userData ) @@ -20889,12 +20850,8 @@ export function init(RuntimeName, PHPLoader) { fillOrientationChangeEventData(orientationChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, orientationChangeEvent, userData ) @@ -21027,12 +20984,8 @@ export function init(RuntimeName, PHPLoader) { fillFullscreenChangeEventData(fullscreenChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, fullscreenChangeEvent, userData ) @@ -21196,12 +21149,8 @@ export function init(RuntimeName, PHPLoader) { ); if (currentFullscreenStrategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, currentFullscreenStrategy.canvasResizedCallbackUserData ); @@ -21307,12 +21256,8 @@ export function init(RuntimeName, PHPLoader) { currentFullscreenStrategy = strategy; if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21414,12 +21359,8 @@ export function init(RuntimeName, PHPLoader) { !inCenteredWithoutScalingFullscreenMode && currentFullscreenStrategy.canvasResizedCallback ) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, currentFullscreenStrategy.canvasResizedCallbackUserData ); @@ -21518,12 +21459,8 @@ export function init(RuntimeName, PHPLoader) { softFullscreenResizeWebGLRenderTarget ); if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21536,12 +21473,8 @@ export function init(RuntimeName, PHPLoader) { // Inform the caller that the canvas size has changed. if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21609,12 +21542,8 @@ export function init(RuntimeName, PHPLoader) { fillPointerlockChangeEventData(pointerlockChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, pointerlockChangeEvent, userData ) @@ -21704,12 +21633,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var pointerlockErrorEventHandlerFunc = (e = event) => { if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ) @@ -21909,12 +21834,8 @@ export function init(RuntimeName, PHPLoader) { fillVisibilityChangeEventData(visibilityChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, visibilityChangeEvent, userData ) @@ -22034,12 +21955,8 @@ export function init(RuntimeName, PHPLoader) { HEAP32[(touchEvent + 8) >> 2] = numTouches; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, touchEvent, userData ) @@ -22177,12 +22094,8 @@ export function init(RuntimeName, PHPLoader) { fillGamepadEventData(gamepadEvent, e['gamepad']); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, gamepadEvent, userData ) @@ -22284,12 +22197,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var beforeUnloadEventHandlerFunc = (e = event) => { // Note: This is always called on the main browser thread, since it needs synchronously return a value! - var confirmationMessage = (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + var confirmationMessage = ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ); @@ -22360,12 +22269,8 @@ export function init(RuntimeName, PHPLoader) { fillBatteryEventData(batteryEvent, battery()); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, batteryEvent, userData ) @@ -22455,11 +22360,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_request_animation_frame = (cb, userData) => requestAnimationFrame((timeStamp) => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - timeStamp, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp, userData ) ); @@ -22471,11 +22373,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_request_animation_frame_loop = (cb, userData) => { function tick(timeStamp) { if ( - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - timeStamp, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp, userData ) ) { @@ -22700,10 +22599,8 @@ export function init(RuntimeName, PHPLoader) { return emSetImmediate(() => { runtimeKeepalivePop(); callUserCallback(() => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ); }); @@ -22720,10 +22617,8 @@ export function init(RuntimeName, PHPLoader) { function tick() { callUserCallback(() => { if ( - (( - a1 - ) => {}) /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ) { emSetImmediate(tick); @@ -22740,10 +22635,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_set_timeout = (cb, msecs, userData) => safeSetTimeout( () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ), msecs ); @@ -22759,11 +22652,8 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePop(); callUserCallback(() => { if ( - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - t, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ t, userData ) ) { @@ -22787,10 +22677,8 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePush(); return setInterval(() => { callUserCallback(() => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ); }, msecs); @@ -22805,10 +22693,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_async_call = (func, arg, millis) => { var wrapper = () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); if ( @@ -22841,7 +22727,7 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_set_main_loop = (func, fps, simulateInfiniteLoop) => { var iterFunc = - () => {} /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */; + () => {}; /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ setMainLoop(iterFunc, fps, simulateInfiniteLoop); }; _emscripten_set_main_loop.sig = 'vpii'; @@ -22853,10 +22739,8 @@ export function init(RuntimeName, PHPLoader) { simulateInfiniteLoop ) => { var iterFunc = () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); setMainLoop(iterFunc, fps, simulateInfiniteLoop, arg); }; @@ -22877,10 +22761,8 @@ export function init(RuntimeName, PHPLoader) { var __emscripten_push_main_loop_blocker = (func, arg, name) => { MainLoop.queue.push({ func: () => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, name: UTF8ToString(name), @@ -22893,10 +22775,8 @@ export function init(RuntimeName, PHPLoader) { var __emscripten_push_uncounted_main_loop_blocker = (func, arg, name) => { MainLoop.queue.push({ func: () => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, name: UTF8ToString(name), @@ -22930,12 +22810,8 @@ export function init(RuntimeName, PHPLoader) { var resultPtr = stackAlloc(POINTER_SIZE); HEAPU32[resultPtr >> 2] = 0; try { - var result = (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - resultPtr, + var result = ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ resultPtr, userData, value ); @@ -23871,19 +23747,15 @@ export function init(RuntimeName, PHPLoader) { () => { runtimeKeepalivePop(); if (onload) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - file + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file ); }, () => { runtimeKeepalivePop(); if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - file + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file ); }, true // don'tCreateFile - it's already there @@ -23917,21 +23789,16 @@ export function init(RuntimeName, PHPLoader) { () => { runtimeKeepalivePop(); if (onload) - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, cname ); }, () => { runtimeKeepalivePop(); if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, true // don'tCreateFile - it's already there @@ -24204,10 +24071,10 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePop(); callUserCallback(() => { var sp = stackSave(); - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - stringToUTF8OnStack(_file) + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stringToUTF8OnStack( + _file + ) ); stackRestore(sp); }); @@ -24251,12 +24118,8 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userdata, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata, buffer, byteArray.length ); @@ -24266,10 +24129,8 @@ export function init(RuntimeName, PHPLoader) { if (onerror) { runtimeKeepalivePop(); callUserCallback(() => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userdata + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata ); }); } @@ -24326,12 +24187,8 @@ export function init(RuntimeName, PHPLoader) { ); if (onload) { var sp = stackSave(); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, stringToUTF8OnStack(_file) ); @@ -24339,12 +24196,8 @@ export function init(RuntimeName, PHPLoader) { } } else { if (onerror) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status ); @@ -24357,12 +24210,8 @@ export function init(RuntimeName, PHPLoader) { http.onerror = (e) => { runtimeKeepalivePop(); if (onerror) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status ); @@ -24377,12 +24226,8 @@ export function init(RuntimeName, PHPLoader) { ) { var percentComplete = (e.loaded / e.total) * 100; if (onprogress) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, percentComplete ); @@ -24439,13 +24284,8 @@ export function init(RuntimeName, PHPLoader) { if (http.statusText) { statusText = stringToUTF8OnStack(http.statusText); } - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status, statusText @@ -24466,13 +24306,8 @@ export function init(RuntimeName, PHPLoader) { var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); if (onload) - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, buffer, byteArray.length @@ -24493,13 +24328,8 @@ export function init(RuntimeName, PHPLoader) { // PROGRESS http.onprogress = (e) => { if (onprogress) - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, e.loaded, e.lengthComputable || e.lengthComputable === undefined @@ -24619,24 +24449,16 @@ export function init(RuntimeName, PHPLoader) { if (event === 'error') { withStackSave(() => { var msg = stringToUTF8OnStack(data[2]); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - data[0], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data[0], data[1], msg, userData ); }); } else { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - data, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data, userData ); } @@ -25102,12 +24924,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var webGlEventHandlerFunc = (e = event) => { if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ) @@ -25326,21 +25144,15 @@ export function init(RuntimeName, PHPLoader) { ) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - lastX, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX, lastY ); } else if (GLUT.buttons != 0 && GLUT.motionFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - lastX, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX, lastY ); } @@ -25501,12 +25313,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.specialFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25516,12 +25324,8 @@ export function init(RuntimeName, PHPLoader) { if (key !== null && GLUT.keyboardFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25536,12 +25340,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.specialUpFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25551,12 +25351,8 @@ export function init(RuntimeName, PHPLoader) { if (key !== null && GLUT.keyboardUpFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25620,13 +25416,10 @@ export function init(RuntimeName, PHPLoader) { } catch (e) {} event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - event['button'], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[ + 'button' + ], 0 /*GLUT_DOWN*/, Browser.mouseX, Browser.mouseY @@ -25641,13 +25434,10 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.mouseFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - event['button'], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[ + 'button' + ], 1 /*GLUT_UP*/, Browser.mouseX, Browser.mouseY @@ -25676,13 +25466,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.mouseFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - button, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ button, 0 /*GLUT_DOWN*/, Browser.mouseX, Browser.mouseY @@ -25725,11 +25510,8 @@ export function init(RuntimeName, PHPLoader) { /* Can't call _glutReshapeWindow as that requests cancelling fullscreen. */ if (GLUT.reshapeFunc) { // out("GLUT.reshapeFunc (from FS): " + width + ", " + height); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -25772,11 +25554,8 @@ export function init(RuntimeName, PHPLoader) { Browser.resizeListeners.push((width, height) => { if (GLUT.reshapeFunc) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -25889,10 +25668,8 @@ export function init(RuntimeName, PHPLoader) { var _glutTimerFunc = (msec, func, value) => safeSetTimeout( () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - value + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ value ), msec ); @@ -26052,11 +25829,8 @@ export function init(RuntimeName, PHPLoader) { Browser.setCanvasSize(width, height, true); // N.B. GLUT.reshapeFunc is also registered as a canvas resize callback. // Just call it once here. if (GLUT.reshapeFunc) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -27118,21 +26892,15 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, buffer, byteArray.length ); @@ -27164,18 +26932,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (onstore) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); } @@ -27190,18 +26954,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (ondelete) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); }); @@ -27218,19 +26978,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (oncheck) - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, exists ); }); @@ -27246,18 +27001,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (onclear) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); }); @@ -27414,11 +27165,8 @@ export function init(RuntimeName, PHPLoader) { safeSetTimeout(() => { var stackBegin = Asyncify.currData + 12; var stackEnd = HEAPU32[Asyncify.currData >> 2]; - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - stackBegin, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stackBegin, stackEnd ); wakeUp(); @@ -27479,10 +27227,8 @@ export function init(RuntimeName, PHPLoader) { HEAPU32[(newFiber + 12) >> 2] = 0; var userData = HEAPU32[(newFiber + 16) >> 2]; - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ); } else { var asyncifyData = newFiber + 20; @@ -28494,11 +28240,8 @@ export function init(RuntimeName, PHPLoader) { if (!SDL.eventHandler) return; while (SDL.pollEvent(SDL.eventHandlerTemp)) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - SDL.eventHandlerContext, + ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL.eventHandlerContext, SDL.eventHandlerTemp ); } @@ -30131,12 +29874,9 @@ export function init(RuntimeName, PHPLoader) { return; // Ask SDL audio data from the user code. - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - SDL.audio.userdata, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL + .audio.userdata, SDL.audio.buffer, SDL.audio.bufferSize ); @@ -30594,10 +30334,8 @@ export function init(RuntimeName, PHPLoader) { info.audio = null; } if (SDL.channelFinished) { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - channel + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel ); } } @@ -30666,10 +30404,8 @@ export function init(RuntimeName, PHPLoader) { channelInfo.audio = null; } if (SDL.channelFinished) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - channel + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel ); }; if (channelInfo.audio) { @@ -31417,11 +31153,8 @@ export function init(RuntimeName, PHPLoader) { var _SDL_AddTimer = (interval, callback, param) => safeSetTimeout( () => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - interval, + ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ interval, param ), interval @@ -31792,12 +31525,8 @@ export function init(RuntimeName, PHPLoader) { socket.onopen = function (e) { var eventPtr = WS.getSocketEvent(socketId); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31819,12 +31548,8 @@ export function init(RuntimeName, PHPLoader) { socket.onerror = function (e) { var eventPtr = WS.getSocketEvent(socketId); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31849,12 +31574,8 @@ export function init(RuntimeName, PHPLoader) { (HEAP8[eventPtr + 4] = e.wasClean), (HEAP16[(eventPtr + 6) >> 1] = e.code), stringToUTF8(e.reason, eventPtr + 8, 512); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31888,12 +31609,8 @@ export function init(RuntimeName, PHPLoader) { (HEAPU32[(eventPtr + 4) >> 2] = buf), (HEAP32[(eventPtr + 8) >> 2] = len), (HEAP8[eventPtr + 12] = isText), - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); diff --git a/packages/php-wasm/node/src/lib/load-runtime.ts b/packages/php-wasm/node/src/lib/load-runtime.ts index 961987b748..8bf31fa76b 100644 --- a/packages/php-wasm/node/src/lib/load-runtime.ts +++ b/packages/php-wasm/node/src/lib/load-runtime.ts @@ -90,12 +90,46 @@ export async function loadNodeRuntime( * in the Emscripten's filesystem and mount the OS directory * to the Emscripten filesystem. * - * The directory is mounted to the `/internals/symlinks` directory to avoid + * The directory is mounted to the `/internal/symlinks` directory to avoid * conflicts with existing VFS directories. * We can set a arbitrary mount path because readlink is the source of truth * for the path and Emscripten will accept it as if it was the real link path. */ if (options?.followSymlinks === true) { + const fsStat = phpRuntime.FS.stat; + phpRuntime.FS.stat = (path: string, dontFollow: boolean) => { + if (dontFollow === true && path.includes('woocommerce')) { + const obj: any = {}; + if ('captureStackTrace' in Error) { + Error.captureStackTrace(obj); + } + const stack = obj.stack.split('\n'); + const lastStackLine = stack[stack.length - 1]; + const functionName = lastStackLine.trim().split(' ')[1]; + + /** + * One of these functions is called with dontFollow set to true + * and causes plugin activation to fail with a "Plugin file does not exist" error. + * + * Potentially related to https://core.trac.wordpress.org/ticket/16953 + */ + if ( + [ + 'php.wasm.php_stat', + 'php.wasm.__fstatat', + 'php.wasm.tsrm_realpath_r', + ].includes(functionName) + ) { + console.log( + `[DEBUG] dontFollow override for function ${functionName} for path ${path}`, + obj.stack + ); + dontFollow = false; + } + } + return fsStat(path, dontFollow); + }; + phpRuntime.FS.filesystems.NODEFS.node_ops.readlink = ( node: any ) => { @@ -106,7 +140,7 @@ export async function loadNodeRuntime( ) ); const symlinkPath = joinPaths( - `/internals/symlinks`, + `/internal/symlinks`, absoluteSourcePath ); if ( @@ -129,6 +163,12 @@ export async function loadNodeRuntime( { root: absoluteSourcePath }, symlinkPath ); + console.log( + '\n[DEBUG] readlink mounted symlinked path', + absoluteSourcePath, + '->', + symlinkPath + ); } return symlinkPath; }; diff --git a/packages/php-wasm/node/src/lib/node-fs-mount.ts b/packages/php-wasm/node/src/lib/node-fs-mount.ts index b562edd3ec..b3f376896a 100644 --- a/packages/php-wasm/node/src/lib/node-fs-mount.ts +++ b/packages/php-wasm/node/src/lib/node-fs-mount.ts @@ -49,6 +49,21 @@ export function createNodeFsMountHandler(localPath: string): MountHandler { throw e; } FS.mount(FS.filesystems['NODEFS'], { root: localPath }, vfsMountPoint); + console.log( + '[DEBUG] createNodeFsMountHandler mounted local path', + localPath, + 'to', + vfsMountPoint + ); + + php.run({ + code: ` { + console.log( + '[DEBUG] createNodeFsMountHandler mounted plugin path exists', + result.json + ); + }); return () => { FS!.unmount(vfsMountPoint); if (removeVfsNode) { diff --git a/packages/playground/cli/src/run-cli.ts b/packages/playground/cli/src/run-cli.ts index efd5d7aeb4..a632a2e53a 100644 --- a/packages/playground/cli/src/run-cli.ts +++ b/packages/playground/cli/src/run-cli.ts @@ -683,6 +683,17 @@ export async function runCLI(args: RunCLIArgs): Promise { wordPressReady = true; logger.log(`Booted!`); + playground + .run({ + code: ` { + console.log( + '\n[DEBUG] runCLI mounted plugin path exists', + result.json + ); + }); + if (compiledBlueprint) { logger.log(`Running the Blueprint...`); await runBlueprintSteps(compiledBlueprint, playground); diff --git a/packages/playground/cli/src/test/mount-examples/plugin/plugin b/packages/playground/cli/src/test/mount-examples/plugin/plugin new file mode 120000 index 0000000000..276b2c81a0 --- /dev/null +++ b/packages/playground/cli/src/test/mount-examples/plugin/plugin @@ -0,0 +1 @@ +/Users/bero/Projects/wordpress-playground/packages/playground/cli/src/test/mount-examples/plugin \ No newline at end of file diff --git a/packages/playground/wordpress-builds/src/sqlite-database-integration/get-sqlite-driver-module-details.ts b/packages/playground/wordpress-builds/src/sqlite-database-integration/get-sqlite-driver-module-details.ts index 380ed44d72..77ec7636f6 100644 --- a/packages/playground/wordpress-builds/src/sqlite-database-integration/get-sqlite-driver-module-details.ts +++ b/packages/playground/wordpress-builds/src/sqlite-database-integration/get-sqlite-driver-module-details.ts @@ -19,7 +19,6 @@ export function getSqliteDriverModuleDetails( url: string; } { switch (version) { - case 'develop': /** @ts-ignore */ return { diff --git a/packages/playground/wordpress-builds/src/sqlite-database-integration/sqlite-database-integration-versions.json b/packages/playground/wordpress-builds/src/sqlite-database-integration/sqlite-database-integration-versions.json index 5ad5ea82d3..ae1c3ffcc9 100644 --- a/packages/playground/wordpress-builds/src/sqlite-database-integration/sqlite-database-integration-versions.json +++ b/packages/playground/wordpress-builds/src/sqlite-database-integration/sqlite-database-integration-versions.json @@ -1,4 +1,4 @@ { - "develop": "develop", - "v2.1.16": "v2.1.16" -} \ No newline at end of file + "develop": "develop", + "v2.1.16": "v2.1.16" +} diff --git a/packages/playground/wordpress/src/boot.ts b/packages/playground/wordpress/src/boot.ts index 800245136c..caf0773258 100644 --- a/packages/playground/wordpress/src/boot.ts +++ b/packages/playground/wordpress/src/boot.ts @@ -233,6 +233,7 @@ export async function bootRequestHandler(options: BootRequestHandlerOptions) { '/tmp', requestHandler.documentRoot, '/internal/shared', + '/internal/symlinks', ]); } diff --git a/plugin-symlink b/plugin-symlink new file mode 120000 index 0000000000..cd62fd0d90 --- /dev/null +++ b/plugin-symlink @@ -0,0 +1 @@ +packages/playground/cli/src/test/mount-examples/plugin \ No newline at end of file diff --git a/run-cli.sh b/run-cli.sh new file mode 100644 index 0000000000..f7cc032592 --- /dev/null +++ b/run-cli.sh @@ -0,0 +1,21 @@ +#!/bin/bash + +current_dir=$(pwd) +plugin_dir=$current_dir/packages/playground/cli/src/test/mount-examples/plugin +symlink_dir=$current_dir/plugin-symlink + +# symlink plugin +ln -s $plugin_dir $symlink_dir + +# run cli +node \ + --experimental-wasm-jspi \ + --experimental-strip-types \ + --experimental-transform-types \ + --import ./packages/meta/src/node-es-module-loader/register.mts \ + ./packages/playground/cli/src/cli.ts \ + server \ + --port=9400 \ + --follow-symlinks \ + --blueprint=$current_dir/blueprint.json \ + --mount=$symlink_dir:/wordpress/wp-content/plugins/plugin \ No newline at end of file