diff --git a/CHANGELOG.md b/CHANGELOG.md index b28e0ccf43..73b9631d7f 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -4,24 +4,24 @@ All notable changes to this project are documented in this file by a CI job that runs on every NPM release. The file follows the [Keep a Changelog](https://keepachangelog.com/en/1.1.0/) format. -## [v2.0.6] (2025-08-04) +## [v2.0.6] (2025-08-04) ### Documentation -- Adding Contribution pages Spanish translation. ([#2431](https://github.com/WordPress/wordpress-playground/pull/2431)) +- Adding Contribution pages Spanish translation. ([#2431](https://github.com/WordPress/wordpress-playground/pull/2431)) ### PHP WebAssembly -- Fix file locking for PROXYFS nodes that wrap NODEFS. ([#2437](https://github.com/WordPress/wordpress-playground/pull/2437)) +- Fix file locking for PROXYFS nodes that wrap NODEFS. ([#2437](https://github.com/WordPress/wordpress-playground/pull/2437)) ### Bug Fixes -- Translations: Fix command typo in docs. ([#2449](https://github.com/WordPress/wordpress-playground/pull/2449)) +- Translations: Fix command typo in docs. ([#2449](https://github.com/WordPress/wordpress-playground/pull/2449)) ### Various -- Add Japanese translations to Blueprint Bundles and API Consistency. ([#2438](https://github.com/WordPress/wordpress-playground/pull/2438)) -- Translations: Clean up version from PR #2336. ([#2448](https://github.com/WordPress/wordpress-playground/pull/2448)) +- Add Japanese translations to Blueprint Bundles and API Consistency. ([#2438](https://github.com/WordPress/wordpress-playground/pull/2438)) +- Translations: Clean up version from PR #2336. ([#2448](https://github.com/WordPress/wordpress-playground/pull/2448)) ### Contributors @@ -29,16 +29,15 @@ The following contributors merged PRs in this release: @brandonpayton @fellyph @rollybueno @shimotmk @vipul0425 - -## [v2.0.5] (2025-07-28) +## [v2.0.5] (2025-07-28) ### Bug Fixes -- Fix fcntl() F_GETLK fatal due to undefined flock struct address. ([#2432](https://github.com/WordPress/wordpress-playground/pull/2432)) +- Fix fcntl() F_GETLK fatal due to undefined flock struct address. ([#2432](https://github.com/WordPress/wordpress-playground/pull/2432)) ### Various -- Add Japanese translations to contributing index and sidebar. ([#2434](https://github.com/WordPress/wordpress-playground/pull/2434)) +- Add Japanese translations to contributing index and sidebar. ([#2434](https://github.com/WordPress/wordpress-playground/pull/2434)) ### Contributors @@ -46,40 +45,38 @@ The following contributors merged PRs in this release: @brandonpayton @shimotmk - -## [v2.0.4] (2025-07-25) +## [v2.0.4] (2025-07-25) ### Public API - #### Blueprints -- Distribute @wp-playground/client without any package.json dependencies. ([#2426](https://github.com/WordPress/wordpress-playground/pull/2426)) +- Distribute @wp-playground/client without any package.json dependencies. ([#2426](https://github.com/WordPress/wordpress-playground/pull/2426)) ### Tools -- Fix ESLint 9 linting in VSCode. ([#2417](https://github.com/WordPress/wordpress-playground/pull/2417)) -- [ xdebug ] Add `--experimental-devtools` option in Playground CLI. ([#2411](https://github.com/WordPress/wordpress-playground/pull/2411)) +- Fix ESLint 9 linting in VSCode. ([#2417](https://github.com/WordPress/wordpress-playground/pull/2417)) +- [ xdebug ] Add `--experimental-devtools` option in Playground CLI. ([#2411](https://github.com/WordPress/wordpress-playground/pull/2411)) ### PHP WebAssembly -- [PHP] Dispatch request.error for all non-zero-exit request handler errors. ([#2429](https://github.com/WordPress/wordpress-playground/pull/2429)) +- [PHP] Dispatch request.error for all non-zero-exit request handler errors. ([#2429](https://github.com/WordPress/wordpress-playground/pull/2429)) ### Website -- Query Monitor plugin support. ([#2415](https://github.com/WordPress/wordpress-playground/pull/2415)) +- Query Monitor plugin support. ([#2415](https://github.com/WordPress/wordpress-playground/pull/2415)) ### Internal -- Skip flaky end-to-end tests in Firefox and Webkit. ([#2425](https://github.com/WordPress/wordpress-playground/pull/2425)) +- Skip flaky end-to-end tests in Firefox and Webkit. ([#2425](https://github.com/WordPress/wordpress-playground/pull/2425)) ### Bug Fixes -- [Xdebug Bridge] Correct error related to unresolved promises in bridge. ([#2422](https://github.com/WordPress/wordpress-playground/pull/2422)) +- [Xdebug Bridge] Correct error related to unresolved promises in bridge. ([#2422](https://github.com/WordPress/wordpress-playground/pull/2422)) ### Various -- Documentation add sidebar to blueprints bundles. ([#2397](https://github.com/WordPress/wordpress-playground/pull/2397)) +- Documentation add sidebar to blueprints bundles. ([#2397](https://github.com/WordPress/wordpress-playground/pull/2397)) ### Contributors @@ -87,16 +84,15 @@ The following contributors merged PRs in this release: @adamziel @brandonpayton @mho22 @shimotmk - -## [v2.0.3] (2025-07-24) +## [v2.0.3] (2025-07-24) ### Tools -- [ xdebug ] Add `--experimental-devtools` option in php-wasm CLI. ([#2408](https://github.com/WordPress/wordpress-playground/pull/2408)) +- [ xdebug ] Add `--experimental-devtools` option in php-wasm CLI. ([#2408](https://github.com/WordPress/wordpress-playground/pull/2408)) ### Bug Fixes -- Playground CLI Allow /wordpress subdirs to be mounted before WP install. ([#2382](https://github.com/WordPress/wordpress-playground/pull/2382)) +- Playground CLI Allow /wordpress subdirs to be mounted before WP install. ([#2382](https://github.com/WordPress/wordpress-playground/pull/2382)) ### Contributors @@ -104,23 +100,21 @@ The following contributors merged PRs in this release: @brandonpayton @mho22 - -## [v2.0.2] (2025-07-23) +## [v2.0.2] (2025-07-23) ### Tools - #### PHP WebAssembly -- [ xdebug ] Bridge DBGP session with CDP server. ([#2402](https://github.com/WordPress/wordpress-playground/pull/2402)) +- [ xdebug ] Bridge DBGP session with CDP server. ([#2402](https://github.com/WordPress/wordpress-playground/pull/2402)) ### Internal -- [Build] Preserve optionalDependencies in built package.json. ([#2410](https://github.com/WordPress/wordpress-playground/pull/2410)) +- [Build] Preserve optionalDependencies in built package.json. ([#2410](https://github.com/WordPress/wordpress-playground/pull/2410)) -### +### -- Comlink] Throw the original error in the error handler. ([#2407](https://github.com/WordPress/wordpress-playground/pull/2407)) +- Comlink] Throw the original error in the error handler. ([#2407](https://github.com/WordPress/wordpress-playground/pull/2407)) ### Contributors @@ -128,7 +122,6 @@ The following contributors merged PRs in this release: @adamziel - ## [v2.0.1] (2025-07-23) ### Blueprints diff --git a/packages/docs/site/docs/main/changelog.md b/packages/docs/site/docs/main/changelog.md index a560b5ebb0..9cc97b6d64 100644 --- a/packages/docs/site/docs/main/changelog.md +++ b/packages/docs/site/docs/main/changelog.md @@ -9,24 +9,24 @@ All notable changes to this project are documented in this file by a CI job that runs on every NPM release. The file follows the [Keep a Changelog](https://keepachangelog.com/en/1.1.0/) format. -## [v2.0.6] (2025-08-04) +## [v2.0.6] (2025-08-04) ### Documentation -- Adding Contribution pages Spanish translation. ([#2431](https://github.com/WordPress/wordpress-playground/pull/2431)) +- Adding Contribution pages Spanish translation. ([#2431](https://github.com/WordPress/wordpress-playground/pull/2431)) ### PHP WebAssembly -- Fix file locking for PROXYFS nodes that wrap NODEFS. ([#2437](https://github.com/WordPress/wordpress-playground/pull/2437)) +- Fix file locking for PROXYFS nodes that wrap NODEFS. ([#2437](https://github.com/WordPress/wordpress-playground/pull/2437)) ### Bug Fixes -- Translations: Fix command typo in docs. ([#2449](https://github.com/WordPress/wordpress-playground/pull/2449)) +- Translations: Fix command typo in docs. ([#2449](https://github.com/WordPress/wordpress-playground/pull/2449)) ### Various -- Add Japanese translations to Blueprint Bundles and API Consistency. ([#2438](https://github.com/WordPress/wordpress-playground/pull/2438)) -- Translations: Clean up version from PR #2336. ([#2448](https://github.com/WordPress/wordpress-playground/pull/2448)) +- Add Japanese translations to Blueprint Bundles and API Consistency. ([#2438](https://github.com/WordPress/wordpress-playground/pull/2438)) +- Translations: Clean up version from PR #2336. ([#2448](https://github.com/WordPress/wordpress-playground/pull/2448)) ### Contributors @@ -34,16 +34,15 @@ The following contributors merged PRs in this release: @brandonpayton @fellyph @rollybueno @shimotmk @vipul0425 - -## [v2.0.5] (2025-07-28) +## [v2.0.5] (2025-07-28) ### Bug Fixes -- Fix fcntl() F_GETLK fatal due to undefined flock struct address. ([#2432](https://github.com/WordPress/wordpress-playground/pull/2432)) +- Fix fcntl() F_GETLK fatal due to undefined flock struct address. ([#2432](https://github.com/WordPress/wordpress-playground/pull/2432)) ### Various -- Add Japanese translations to contributing index and sidebar. ([#2434](https://github.com/WordPress/wordpress-playground/pull/2434)) +- Add Japanese translations to contributing index and sidebar. ([#2434](https://github.com/WordPress/wordpress-playground/pull/2434)) ### Contributors @@ -51,40 +50,38 @@ The following contributors merged PRs in this release: @brandonpayton @shimotmk - -## [v2.0.4] (2025-07-25) +## [v2.0.4] (2025-07-25) ### Public API - #### Blueprints -- Distribute @wp-playground/client without any package.json dependencies. ([#2426](https://github.com/WordPress/wordpress-playground/pull/2426)) +- Distribute @wp-playground/client without any package.json dependencies. ([#2426](https://github.com/WordPress/wordpress-playground/pull/2426)) ### Tools -- Fix ESLint 9 linting in VSCode. ([#2417](https://github.com/WordPress/wordpress-playground/pull/2417)) -- [ xdebug ] Add `--experimental-devtools` option in Playground CLI. ([#2411](https://github.com/WordPress/wordpress-playground/pull/2411)) +- Fix ESLint 9 linting in VSCode. ([#2417](https://github.com/WordPress/wordpress-playground/pull/2417)) +- [ xdebug ] Add `--experimental-devtools` option in Playground CLI. ([#2411](https://github.com/WordPress/wordpress-playground/pull/2411)) ### PHP WebAssembly -- [PHP] Dispatch request.error for all non-zero-exit request handler errors. ([#2429](https://github.com/WordPress/wordpress-playground/pull/2429)) +- [PHP] Dispatch request.error for all non-zero-exit request handler errors. ([#2429](https://github.com/WordPress/wordpress-playground/pull/2429)) ### Website -- Query Monitor plugin support. ([#2415](https://github.com/WordPress/wordpress-playground/pull/2415)) +- Query Monitor plugin support. ([#2415](https://github.com/WordPress/wordpress-playground/pull/2415)) ### Internal -- Skip flaky end-to-end tests in Firefox and Webkit. ([#2425](https://github.com/WordPress/wordpress-playground/pull/2425)) +- Skip flaky end-to-end tests in Firefox and Webkit. ([#2425](https://github.com/WordPress/wordpress-playground/pull/2425)) ### Bug Fixes -- [Xdebug Bridge] Correct error related to unresolved promises in bridge. ([#2422](https://github.com/WordPress/wordpress-playground/pull/2422)) +- [Xdebug Bridge] Correct error related to unresolved promises in bridge. ([#2422](https://github.com/WordPress/wordpress-playground/pull/2422)) ### Various -- Documentation add sidebar to blueprints bundles. ([#2397](https://github.com/WordPress/wordpress-playground/pull/2397)) +- Documentation add sidebar to blueprints bundles. ([#2397](https://github.com/WordPress/wordpress-playground/pull/2397)) ### Contributors @@ -92,16 +89,15 @@ The following contributors merged PRs in this release: @adamziel @brandonpayton @mho22 @shimotmk - -## [v2.0.3] (2025-07-24) +## [v2.0.3] (2025-07-24) ### Tools -- [ xdebug ] Add `--experimental-devtools` option in php-wasm CLI. ([#2408](https://github.com/WordPress/wordpress-playground/pull/2408)) +- [ xdebug ] Add `--experimental-devtools` option in php-wasm CLI. ([#2408](https://github.com/WordPress/wordpress-playground/pull/2408)) ### Bug Fixes -- Playground CLI Allow /wordpress subdirs to be mounted before WP install. ([#2382](https://github.com/WordPress/wordpress-playground/pull/2382)) +- Playground CLI Allow /wordpress subdirs to be mounted before WP install. ([#2382](https://github.com/WordPress/wordpress-playground/pull/2382)) ### Contributors @@ -109,23 +105,21 @@ The following contributors merged PRs in this release: @brandonpayton @mho22 - -## [v2.0.2] (2025-07-23) +## [v2.0.2] (2025-07-23) ### Tools - #### PHP WebAssembly -- [ xdebug ] Bridge DBGP session with CDP server. ([#2402](https://github.com/WordPress/wordpress-playground/pull/2402)) +- [ xdebug ] Bridge DBGP session with CDP server. ([#2402](https://github.com/WordPress/wordpress-playground/pull/2402)) ### Internal -- [Build] Preserve optionalDependencies in built package.json. ([#2410](https://github.com/WordPress/wordpress-playground/pull/2410)) +- [Build] Preserve optionalDependencies in built package.json. ([#2410](https://github.com/WordPress/wordpress-playground/pull/2410)) -### +### -- Comlink] Throw the original error in the error handler. ([#2407](https://github.com/WordPress/wordpress-playground/pull/2407)) +- Comlink] Throw the original error in the error handler. ([#2407](https://github.com/WordPress/wordpress-playground/pull/2407)) ### Contributors @@ -133,7 +127,6 @@ The following contributors merged PRs in this release: @adamziel - ## [v2.0.1] (2025-07-23) ### Blueprints diff --git a/packages/php-wasm/node/asyncify/php_7_2.js b/packages/php-wasm/node/asyncify/php_7_2.js index dfe33bd041..50e191895c 100644 --- a/packages/php-wasm/node/asyncify/php_7_2.js +++ b/packages/php-wasm/node/asyncify/php_7_2.js @@ -1774,10 +1774,8 @@ export function init(RuntimeName, PHPLoader) { ); var ___call_sighandler = (fp, sig) => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - sig + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ sig ); ___call_sighandler.sig = 'vpi'; @@ -8802,11 +8800,8 @@ export function init(RuntimeName, PHPLoader) { dlSetError(`'Could not load dynamic lib: ${filename}\n${e}`); runtimeKeepalivePop(); callUserCallback(() => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, user_data ) ); @@ -8814,11 +8809,8 @@ export function init(RuntimeName, PHPLoader) { function successCallback() { runtimeKeepalivePop(); callUserCallback(() => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, user_data ) ); @@ -19476,11 +19468,8 @@ export function init(RuntimeName, PHPLoader) { var trace = getCallstack(); var parts = trace.split('\n'); for (var i = 0; i < parts.length; i++) { - var ret = (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0, + var ret = ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0, arg ); if (ret !== 0) return; @@ -20056,12 +20045,8 @@ export function init(RuntimeName, PHPLoader) { stringToUTF8(e.locale || '', keyEventData + 128, 32); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, keyEventData, userData ) @@ -20179,12 +20164,8 @@ export function init(RuntimeName, PHPLoader) { fillMouseEventData(JSEvents.mouseEvent, e, target); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.mouseEvent, userData ) @@ -20398,12 +20379,8 @@ export function init(RuntimeName, PHPLoader) { HEAPF64[(wheelEvent + 80) >> 3] = e['deltaZ']; HEAP32[(wheelEvent + 88) >> 2] = e['deltaMode']; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, wheelEvent, userData ) @@ -20484,12 +20461,8 @@ export function init(RuntimeName, PHPLoader) { HEAP32[(uiEvent + 28) >> 2] = pageXOffset | 0; // scroll offsets are float HEAP32[(uiEvent + 32) >> 2] = pageYOffset | 0; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, uiEvent, userData ) @@ -20563,12 +20536,8 @@ export function init(RuntimeName, PHPLoader) { stringToUTF8(id, focusEvent + 128, 128); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, focusEvent, userData ) @@ -20684,12 +20653,8 @@ export function init(RuntimeName, PHPLoader) { ); // TODO: Thread-safety with respect to emscripten_get_deviceorientation_status() if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.deviceOrientationEvent, userData ) @@ -20772,12 +20737,8 @@ export function init(RuntimeName, PHPLoader) { fillDeviceMotionEventData(JSEvents.deviceMotionEvent, e, target); // TODO: Thread-safety with respect to emscripten_get_devicemotion_status() if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.deviceMotionEvent, userData ) @@ -20887,12 +20848,8 @@ export function init(RuntimeName, PHPLoader) { fillOrientationChangeEventData(orientationChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, orientationChangeEvent, userData ) @@ -21025,12 +20982,8 @@ export function init(RuntimeName, PHPLoader) { fillFullscreenChangeEventData(fullscreenChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, fullscreenChangeEvent, userData ) @@ -21194,12 +21147,8 @@ export function init(RuntimeName, PHPLoader) { ); if (currentFullscreenStrategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, currentFullscreenStrategy.canvasResizedCallbackUserData ); @@ -21305,12 +21254,8 @@ export function init(RuntimeName, PHPLoader) { currentFullscreenStrategy = strategy; if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21412,12 +21357,8 @@ export function init(RuntimeName, PHPLoader) { !inCenteredWithoutScalingFullscreenMode && currentFullscreenStrategy.canvasResizedCallback ) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, currentFullscreenStrategy.canvasResizedCallbackUserData ); @@ -21516,12 +21457,8 @@ export function init(RuntimeName, PHPLoader) { softFullscreenResizeWebGLRenderTarget ); if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21534,12 +21471,8 @@ export function init(RuntimeName, PHPLoader) { // Inform the caller that the canvas size has changed. if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21607,12 +21540,8 @@ export function init(RuntimeName, PHPLoader) { fillPointerlockChangeEventData(pointerlockChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, pointerlockChangeEvent, userData ) @@ -21702,12 +21631,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var pointerlockErrorEventHandlerFunc = (e = event) => { if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ) @@ -21907,12 +21832,8 @@ export function init(RuntimeName, PHPLoader) { fillVisibilityChangeEventData(visibilityChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, visibilityChangeEvent, userData ) @@ -22032,12 +21953,8 @@ export function init(RuntimeName, PHPLoader) { HEAP32[(touchEvent + 8) >> 2] = numTouches; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, touchEvent, userData ) @@ -22175,12 +22092,8 @@ export function init(RuntimeName, PHPLoader) { fillGamepadEventData(gamepadEvent, e['gamepad']); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, gamepadEvent, userData ) @@ -22282,12 +22195,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var beforeUnloadEventHandlerFunc = (e = event) => { // Note: This is always called on the main browser thread, since it needs synchronously return a value! - var confirmationMessage = (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + var confirmationMessage = ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ); @@ -22358,12 +22267,8 @@ export function init(RuntimeName, PHPLoader) { fillBatteryEventData(batteryEvent, battery()); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, batteryEvent, userData ) @@ -22453,11 +22358,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_request_animation_frame = (cb, userData) => requestAnimationFrame((timeStamp) => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - timeStamp, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp, userData ) ); @@ -22469,11 +22371,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_request_animation_frame_loop = (cb, userData) => { function tick(timeStamp) { if ( - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - timeStamp, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp, userData ) ) { @@ -22698,10 +22597,8 @@ export function init(RuntimeName, PHPLoader) { return emSetImmediate(() => { runtimeKeepalivePop(); callUserCallback(() => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ); }); @@ -22718,10 +22615,8 @@ export function init(RuntimeName, PHPLoader) { function tick() { callUserCallback(() => { if ( - (( - a1 - ) => {}) /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ) { emSetImmediate(tick); @@ -22738,10 +22633,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_set_timeout = (cb, msecs, userData) => safeSetTimeout( () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ), msecs ); @@ -22757,11 +22650,8 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePop(); callUserCallback(() => { if ( - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - t, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ t, userData ) ) { @@ -22785,10 +22675,8 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePush(); return setInterval(() => { callUserCallback(() => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ); }, msecs); @@ -22803,10 +22691,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_async_call = (func, arg, millis) => { var wrapper = () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); if ( @@ -22839,7 +22725,7 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_set_main_loop = (func, fps, simulateInfiniteLoop) => { var iterFunc = - () => {} /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */; + () => {}; /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ setMainLoop(iterFunc, fps, simulateInfiniteLoop); }; _emscripten_set_main_loop.sig = 'vpii'; @@ -22851,10 +22737,8 @@ export function init(RuntimeName, PHPLoader) { simulateInfiniteLoop ) => { var iterFunc = () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); setMainLoop(iterFunc, fps, simulateInfiniteLoop, arg); }; @@ -22875,10 +22759,8 @@ export function init(RuntimeName, PHPLoader) { var __emscripten_push_main_loop_blocker = (func, arg, name) => { MainLoop.queue.push({ func: () => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, name: UTF8ToString(name), @@ -22891,10 +22773,8 @@ export function init(RuntimeName, PHPLoader) { var __emscripten_push_uncounted_main_loop_blocker = (func, arg, name) => { MainLoop.queue.push({ func: () => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, name: UTF8ToString(name), @@ -22928,12 +22808,8 @@ export function init(RuntimeName, PHPLoader) { var resultPtr = stackAlloc(POINTER_SIZE); HEAPU32[resultPtr >> 2] = 0; try { - var result = (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - resultPtr, + var result = ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ resultPtr, userData, value ); @@ -23869,19 +23745,15 @@ export function init(RuntimeName, PHPLoader) { () => { runtimeKeepalivePop(); if (onload) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - file + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file ); }, () => { runtimeKeepalivePop(); if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - file + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file ); }, true // don'tCreateFile - it's already there @@ -23915,21 +23787,16 @@ export function init(RuntimeName, PHPLoader) { () => { runtimeKeepalivePop(); if (onload) - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, cname ); }, () => { runtimeKeepalivePop(); if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, true // don'tCreateFile - it's already there @@ -24202,10 +24069,10 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePop(); callUserCallback(() => { var sp = stackSave(); - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - stringToUTF8OnStack(_file) + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stringToUTF8OnStack( + _file + ) ); stackRestore(sp); }); @@ -24249,12 +24116,8 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userdata, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata, buffer, byteArray.length ); @@ -24264,10 +24127,8 @@ export function init(RuntimeName, PHPLoader) { if (onerror) { runtimeKeepalivePop(); callUserCallback(() => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userdata + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata ); }); } @@ -24324,12 +24185,8 @@ export function init(RuntimeName, PHPLoader) { ); if (onload) { var sp = stackSave(); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, stringToUTF8OnStack(_file) ); @@ -24337,12 +24194,8 @@ export function init(RuntimeName, PHPLoader) { } } else { if (onerror) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status ); @@ -24355,12 +24208,8 @@ export function init(RuntimeName, PHPLoader) { http.onerror = (e) => { runtimeKeepalivePop(); if (onerror) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status ); @@ -24375,12 +24224,8 @@ export function init(RuntimeName, PHPLoader) { ) { var percentComplete = (e.loaded / e.total) * 100; if (onprogress) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, percentComplete ); @@ -24437,13 +24282,8 @@ export function init(RuntimeName, PHPLoader) { if (http.statusText) { statusText = stringToUTF8OnStack(http.statusText); } - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status, statusText @@ -24464,13 +24304,8 @@ export function init(RuntimeName, PHPLoader) { var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); if (onload) - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, buffer, byteArray.length @@ -24491,13 +24326,8 @@ export function init(RuntimeName, PHPLoader) { // PROGRESS http.onprogress = (e) => { if (onprogress) - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, e.loaded, e.lengthComputable || e.lengthComputable === undefined @@ -24617,24 +24447,16 @@ export function init(RuntimeName, PHPLoader) { if (event === 'error') { withStackSave(() => { var msg = stringToUTF8OnStack(data[2]); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - data[0], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data[0], data[1], msg, userData ); }); } else { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - data, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data, userData ); } @@ -25100,12 +24922,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var webGlEventHandlerFunc = (e = event) => { if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ) @@ -25324,21 +25142,15 @@ export function init(RuntimeName, PHPLoader) { ) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - lastX, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX, lastY ); } else if (GLUT.buttons != 0 && GLUT.motionFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - lastX, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX, lastY ); } @@ -25499,12 +25311,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.specialFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25514,12 +25322,8 @@ export function init(RuntimeName, PHPLoader) { if (key !== null && GLUT.keyboardFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25534,12 +25338,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.specialUpFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25549,12 +25349,8 @@ export function init(RuntimeName, PHPLoader) { if (key !== null && GLUT.keyboardUpFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25618,13 +25414,10 @@ export function init(RuntimeName, PHPLoader) { } catch (e) {} event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - event['button'], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[ + 'button' + ], 0 /*GLUT_DOWN*/, Browser.mouseX, Browser.mouseY @@ -25639,13 +25432,10 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.mouseFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - event['button'], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[ + 'button' + ], 1 /*GLUT_UP*/, Browser.mouseX, Browser.mouseY @@ -25674,13 +25464,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.mouseFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - button, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ button, 0 /*GLUT_DOWN*/, Browser.mouseX, Browser.mouseY @@ -25723,11 +25508,8 @@ export function init(RuntimeName, PHPLoader) { /* Can't call _glutReshapeWindow as that requests cancelling fullscreen. */ if (GLUT.reshapeFunc) { // out("GLUT.reshapeFunc (from FS): " + width + ", " + height); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -25770,11 +25552,8 @@ export function init(RuntimeName, PHPLoader) { Browser.resizeListeners.push((width, height) => { if (GLUT.reshapeFunc) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -25887,10 +25666,8 @@ export function init(RuntimeName, PHPLoader) { var _glutTimerFunc = (msec, func, value) => safeSetTimeout( () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - value + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ value ), msec ); @@ -26050,11 +25827,8 @@ export function init(RuntimeName, PHPLoader) { Browser.setCanvasSize(width, height, true); // N.B. GLUT.reshapeFunc is also registered as a canvas resize callback. // Just call it once here. if (GLUT.reshapeFunc) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -27116,21 +26890,15 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, buffer, byteArray.length ); @@ -27162,18 +26930,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (onstore) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); } @@ -27188,18 +26952,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (ondelete) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); }); @@ -27216,19 +26976,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (oncheck) - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, exists ); }); @@ -27244,18 +26999,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (onclear) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); }); @@ -27412,11 +27163,8 @@ export function init(RuntimeName, PHPLoader) { safeSetTimeout(() => { var stackBegin = Asyncify.currData + 12; var stackEnd = HEAPU32[Asyncify.currData >> 2]; - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - stackBegin, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stackBegin, stackEnd ); wakeUp(); @@ -27477,10 +27225,8 @@ export function init(RuntimeName, PHPLoader) { HEAPU32[(newFiber + 12) >> 2] = 0; var userData = HEAPU32[(newFiber + 16) >> 2]; - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ); } else { var asyncifyData = newFiber + 20; @@ -28492,11 +28238,8 @@ export function init(RuntimeName, PHPLoader) { if (!SDL.eventHandler) return; while (SDL.pollEvent(SDL.eventHandlerTemp)) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - SDL.eventHandlerContext, + ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL.eventHandlerContext, SDL.eventHandlerTemp ); } @@ -30129,12 +29872,9 @@ export function init(RuntimeName, PHPLoader) { return; // Ask SDL audio data from the user code. - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - SDL.audio.userdata, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL + .audio.userdata, SDL.audio.buffer, SDL.audio.bufferSize ); @@ -30592,10 +30332,8 @@ export function init(RuntimeName, PHPLoader) { info.audio = null; } if (SDL.channelFinished) { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - channel + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel ); } } @@ -30664,10 +30402,8 @@ export function init(RuntimeName, PHPLoader) { channelInfo.audio = null; } if (SDL.channelFinished) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - channel + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel ); }; if (channelInfo.audio) { @@ -31415,11 +31151,8 @@ export function init(RuntimeName, PHPLoader) { var _SDL_AddTimer = (interval, callback, param) => safeSetTimeout( () => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - interval, + ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ interval, param ), interval @@ -31802,12 +31535,8 @@ export function init(RuntimeName, PHPLoader) { socket.onopen = function (e) { var eventPtr = WS.getSocketEvent(socketId); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31829,12 +31558,8 @@ export function init(RuntimeName, PHPLoader) { socket.onerror = function (e) { var eventPtr = WS.getSocketEvent(socketId); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31859,12 +31584,8 @@ export function init(RuntimeName, PHPLoader) { (HEAP8[eventPtr + 4] = e.wasClean), (HEAP16[(eventPtr + 6) >> 1] = e.code), stringToUTF8(e.reason, eventPtr + 8, 512); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31898,12 +31619,8 @@ export function init(RuntimeName, PHPLoader) { (HEAPU32[(eventPtr + 4) >> 2] = buf), (HEAP32[(eventPtr + 8) >> 2] = len), (HEAP8[eventPtr + 12] = isText), - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); diff --git a/packages/php-wasm/node/asyncify/php_7_3.js b/packages/php-wasm/node/asyncify/php_7_3.js index 8e9ca2610e..d0947af78c 100644 --- a/packages/php-wasm/node/asyncify/php_7_3.js +++ b/packages/php-wasm/node/asyncify/php_7_3.js @@ -1774,10 +1774,8 @@ export function init(RuntimeName, PHPLoader) { ); var ___call_sighandler = (fp, sig) => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - sig + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ sig ); ___call_sighandler.sig = 'vpi'; @@ -8802,11 +8800,8 @@ export function init(RuntimeName, PHPLoader) { dlSetError(`'Could not load dynamic lib: ${filename}\n${e}`); runtimeKeepalivePop(); callUserCallback(() => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, user_data ) ); @@ -8814,11 +8809,8 @@ export function init(RuntimeName, PHPLoader) { function successCallback() { runtimeKeepalivePop(); callUserCallback(() => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, user_data ) ); @@ -19476,11 +19468,8 @@ export function init(RuntimeName, PHPLoader) { var trace = getCallstack(); var parts = trace.split('\n'); for (var i = 0; i < parts.length; i++) { - var ret = (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0, + var ret = ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0, arg ); if (ret !== 0) return; @@ -20056,12 +20045,8 @@ export function init(RuntimeName, PHPLoader) { stringToUTF8(e.locale || '', keyEventData + 128, 32); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, keyEventData, userData ) @@ -20179,12 +20164,8 @@ export function init(RuntimeName, PHPLoader) { fillMouseEventData(JSEvents.mouseEvent, e, target); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.mouseEvent, userData ) @@ -20398,12 +20379,8 @@ export function init(RuntimeName, PHPLoader) { HEAPF64[(wheelEvent + 80) >> 3] = e['deltaZ']; HEAP32[(wheelEvent + 88) >> 2] = e['deltaMode']; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, wheelEvent, userData ) @@ -20484,12 +20461,8 @@ export function init(RuntimeName, PHPLoader) { HEAP32[(uiEvent + 28) >> 2] = pageXOffset | 0; // scroll offsets are float HEAP32[(uiEvent + 32) >> 2] = pageYOffset | 0; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, uiEvent, userData ) @@ -20563,12 +20536,8 @@ export function init(RuntimeName, PHPLoader) { stringToUTF8(id, focusEvent + 128, 128); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, focusEvent, userData ) @@ -20684,12 +20653,8 @@ export function init(RuntimeName, PHPLoader) { ); // TODO: Thread-safety with respect to emscripten_get_deviceorientation_status() if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.deviceOrientationEvent, userData ) @@ -20772,12 +20737,8 @@ export function init(RuntimeName, PHPLoader) { fillDeviceMotionEventData(JSEvents.deviceMotionEvent, e, target); // TODO: Thread-safety with respect to emscripten_get_devicemotion_status() if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.deviceMotionEvent, userData ) @@ -20887,12 +20848,8 @@ export function init(RuntimeName, PHPLoader) { fillOrientationChangeEventData(orientationChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, orientationChangeEvent, userData ) @@ -21025,12 +20982,8 @@ export function init(RuntimeName, PHPLoader) { fillFullscreenChangeEventData(fullscreenChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, fullscreenChangeEvent, userData ) @@ -21194,12 +21147,8 @@ export function init(RuntimeName, PHPLoader) { ); if (currentFullscreenStrategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, currentFullscreenStrategy.canvasResizedCallbackUserData ); @@ -21305,12 +21254,8 @@ export function init(RuntimeName, PHPLoader) { currentFullscreenStrategy = strategy; if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21412,12 +21357,8 @@ export function init(RuntimeName, PHPLoader) { !inCenteredWithoutScalingFullscreenMode && currentFullscreenStrategy.canvasResizedCallback ) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, currentFullscreenStrategy.canvasResizedCallbackUserData ); @@ -21516,12 +21457,8 @@ export function init(RuntimeName, PHPLoader) { softFullscreenResizeWebGLRenderTarget ); if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21534,12 +21471,8 @@ export function init(RuntimeName, PHPLoader) { // Inform the caller that the canvas size has changed. if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21607,12 +21540,8 @@ export function init(RuntimeName, PHPLoader) { fillPointerlockChangeEventData(pointerlockChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, pointerlockChangeEvent, userData ) @@ -21702,12 +21631,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var pointerlockErrorEventHandlerFunc = (e = event) => { if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ) @@ -21907,12 +21832,8 @@ export function init(RuntimeName, PHPLoader) { fillVisibilityChangeEventData(visibilityChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, visibilityChangeEvent, userData ) @@ -22032,12 +21953,8 @@ export function init(RuntimeName, PHPLoader) { HEAP32[(touchEvent + 8) >> 2] = numTouches; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, touchEvent, userData ) @@ -22175,12 +22092,8 @@ export function init(RuntimeName, PHPLoader) { fillGamepadEventData(gamepadEvent, e['gamepad']); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, gamepadEvent, userData ) @@ -22282,12 +22195,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var beforeUnloadEventHandlerFunc = (e = event) => { // Note: This is always called on the main browser thread, since it needs synchronously return a value! - var confirmationMessage = (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + var confirmationMessage = ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ); @@ -22358,12 +22267,8 @@ export function init(RuntimeName, PHPLoader) { fillBatteryEventData(batteryEvent, battery()); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, batteryEvent, userData ) @@ -22453,11 +22358,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_request_animation_frame = (cb, userData) => requestAnimationFrame((timeStamp) => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - timeStamp, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp, userData ) ); @@ -22469,11 +22371,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_request_animation_frame_loop = (cb, userData) => { function tick(timeStamp) { if ( - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - timeStamp, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp, userData ) ) { @@ -22698,10 +22597,8 @@ export function init(RuntimeName, PHPLoader) { return emSetImmediate(() => { runtimeKeepalivePop(); callUserCallback(() => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ); }); @@ -22718,10 +22615,8 @@ export function init(RuntimeName, PHPLoader) { function tick() { callUserCallback(() => { if ( - (( - a1 - ) => {}) /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ) { emSetImmediate(tick); @@ -22738,10 +22633,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_set_timeout = (cb, msecs, userData) => safeSetTimeout( () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ), msecs ); @@ -22757,11 +22650,8 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePop(); callUserCallback(() => { if ( - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - t, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ t, userData ) ) { @@ -22785,10 +22675,8 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePush(); return setInterval(() => { callUserCallback(() => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ); }, msecs); @@ -22803,10 +22691,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_async_call = (func, arg, millis) => { var wrapper = () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); if ( @@ -22839,7 +22725,7 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_set_main_loop = (func, fps, simulateInfiniteLoop) => { var iterFunc = - () => {} /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */; + () => {}; /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ setMainLoop(iterFunc, fps, simulateInfiniteLoop); }; _emscripten_set_main_loop.sig = 'vpii'; @@ -22851,10 +22737,8 @@ export function init(RuntimeName, PHPLoader) { simulateInfiniteLoop ) => { var iterFunc = () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); setMainLoop(iterFunc, fps, simulateInfiniteLoop, arg); }; @@ -22875,10 +22759,8 @@ export function init(RuntimeName, PHPLoader) { var __emscripten_push_main_loop_blocker = (func, arg, name) => { MainLoop.queue.push({ func: () => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, name: UTF8ToString(name), @@ -22891,10 +22773,8 @@ export function init(RuntimeName, PHPLoader) { var __emscripten_push_uncounted_main_loop_blocker = (func, arg, name) => { MainLoop.queue.push({ func: () => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, name: UTF8ToString(name), @@ -22928,12 +22808,8 @@ export function init(RuntimeName, PHPLoader) { var resultPtr = stackAlloc(POINTER_SIZE); HEAPU32[resultPtr >> 2] = 0; try { - var result = (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - resultPtr, + var result = ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ resultPtr, userData, value ); @@ -23869,19 +23745,15 @@ export function init(RuntimeName, PHPLoader) { () => { runtimeKeepalivePop(); if (onload) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - file + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file ); }, () => { runtimeKeepalivePop(); if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - file + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file ); }, true // don'tCreateFile - it's already there @@ -23915,21 +23787,16 @@ export function init(RuntimeName, PHPLoader) { () => { runtimeKeepalivePop(); if (onload) - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, cname ); }, () => { runtimeKeepalivePop(); if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, true // don'tCreateFile - it's already there @@ -24202,10 +24069,10 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePop(); callUserCallback(() => { var sp = stackSave(); - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - stringToUTF8OnStack(_file) + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stringToUTF8OnStack( + _file + ) ); stackRestore(sp); }); @@ -24249,12 +24116,8 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userdata, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata, buffer, byteArray.length ); @@ -24264,10 +24127,8 @@ export function init(RuntimeName, PHPLoader) { if (onerror) { runtimeKeepalivePop(); callUserCallback(() => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userdata + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata ); }); } @@ -24324,12 +24185,8 @@ export function init(RuntimeName, PHPLoader) { ); if (onload) { var sp = stackSave(); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, stringToUTF8OnStack(_file) ); @@ -24337,12 +24194,8 @@ export function init(RuntimeName, PHPLoader) { } } else { if (onerror) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status ); @@ -24355,12 +24208,8 @@ export function init(RuntimeName, PHPLoader) { http.onerror = (e) => { runtimeKeepalivePop(); if (onerror) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status ); @@ -24375,12 +24224,8 @@ export function init(RuntimeName, PHPLoader) { ) { var percentComplete = (e.loaded / e.total) * 100; if (onprogress) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, percentComplete ); @@ -24437,13 +24282,8 @@ export function init(RuntimeName, PHPLoader) { if (http.statusText) { statusText = stringToUTF8OnStack(http.statusText); } - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status, statusText @@ -24464,13 +24304,8 @@ export function init(RuntimeName, PHPLoader) { var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); if (onload) - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, buffer, byteArray.length @@ -24491,13 +24326,8 @@ export function init(RuntimeName, PHPLoader) { // PROGRESS http.onprogress = (e) => { if (onprogress) - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, e.loaded, e.lengthComputable || e.lengthComputable === undefined @@ -24617,24 +24447,16 @@ export function init(RuntimeName, PHPLoader) { if (event === 'error') { withStackSave(() => { var msg = stringToUTF8OnStack(data[2]); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - data[0], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data[0], data[1], msg, userData ); }); } else { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - data, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data, userData ); } @@ -25100,12 +24922,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var webGlEventHandlerFunc = (e = event) => { if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ) @@ -25324,21 +25142,15 @@ export function init(RuntimeName, PHPLoader) { ) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - lastX, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX, lastY ); } else if (GLUT.buttons != 0 && GLUT.motionFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - lastX, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX, lastY ); } @@ -25499,12 +25311,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.specialFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25514,12 +25322,8 @@ export function init(RuntimeName, PHPLoader) { if (key !== null && GLUT.keyboardFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25534,12 +25338,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.specialUpFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25549,12 +25349,8 @@ export function init(RuntimeName, PHPLoader) { if (key !== null && GLUT.keyboardUpFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25618,13 +25414,10 @@ export function init(RuntimeName, PHPLoader) { } catch (e) {} event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - event['button'], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[ + 'button' + ], 0 /*GLUT_DOWN*/, Browser.mouseX, Browser.mouseY @@ -25639,13 +25432,10 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.mouseFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - event['button'], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[ + 'button' + ], 1 /*GLUT_UP*/, Browser.mouseX, Browser.mouseY @@ -25674,13 +25464,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.mouseFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - button, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ button, 0 /*GLUT_DOWN*/, Browser.mouseX, Browser.mouseY @@ -25723,11 +25508,8 @@ export function init(RuntimeName, PHPLoader) { /* Can't call _glutReshapeWindow as that requests cancelling fullscreen. */ if (GLUT.reshapeFunc) { // out("GLUT.reshapeFunc (from FS): " + width + ", " + height); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -25770,11 +25552,8 @@ export function init(RuntimeName, PHPLoader) { Browser.resizeListeners.push((width, height) => { if (GLUT.reshapeFunc) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -25887,10 +25666,8 @@ export function init(RuntimeName, PHPLoader) { var _glutTimerFunc = (msec, func, value) => safeSetTimeout( () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - value + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ value ), msec ); @@ -26050,11 +25827,8 @@ export function init(RuntimeName, PHPLoader) { Browser.setCanvasSize(width, height, true); // N.B. GLUT.reshapeFunc is also registered as a canvas resize callback. // Just call it once here. if (GLUT.reshapeFunc) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -27116,21 +26890,15 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, buffer, byteArray.length ); @@ -27162,18 +26930,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (onstore) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); } @@ -27188,18 +26952,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (ondelete) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); }); @@ -27216,19 +26976,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (oncheck) - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, exists ); }); @@ -27244,18 +26999,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (onclear) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); }); @@ -27412,11 +27163,8 @@ export function init(RuntimeName, PHPLoader) { safeSetTimeout(() => { var stackBegin = Asyncify.currData + 12; var stackEnd = HEAPU32[Asyncify.currData >> 2]; - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - stackBegin, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stackBegin, stackEnd ); wakeUp(); @@ -27477,10 +27225,8 @@ export function init(RuntimeName, PHPLoader) { HEAPU32[(newFiber + 12) >> 2] = 0; var userData = HEAPU32[(newFiber + 16) >> 2]; - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ); } else { var asyncifyData = newFiber + 20; @@ -28492,11 +28238,8 @@ export function init(RuntimeName, PHPLoader) { if (!SDL.eventHandler) return; while (SDL.pollEvent(SDL.eventHandlerTemp)) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - SDL.eventHandlerContext, + ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL.eventHandlerContext, SDL.eventHandlerTemp ); } @@ -30129,12 +29872,9 @@ export function init(RuntimeName, PHPLoader) { return; // Ask SDL audio data from the user code. - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - SDL.audio.userdata, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL + .audio.userdata, SDL.audio.buffer, SDL.audio.bufferSize ); @@ -30592,10 +30332,8 @@ export function init(RuntimeName, PHPLoader) { info.audio = null; } if (SDL.channelFinished) { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - channel + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel ); } } @@ -30664,10 +30402,8 @@ export function init(RuntimeName, PHPLoader) { channelInfo.audio = null; } if (SDL.channelFinished) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - channel + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel ); }; if (channelInfo.audio) { @@ -31415,11 +31151,8 @@ export function init(RuntimeName, PHPLoader) { var _SDL_AddTimer = (interval, callback, param) => safeSetTimeout( () => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - interval, + ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ interval, param ), interval @@ -31802,12 +31535,8 @@ export function init(RuntimeName, PHPLoader) { socket.onopen = function (e) { var eventPtr = WS.getSocketEvent(socketId); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31829,12 +31558,8 @@ export function init(RuntimeName, PHPLoader) { socket.onerror = function (e) { var eventPtr = WS.getSocketEvent(socketId); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31859,12 +31584,8 @@ export function init(RuntimeName, PHPLoader) { (HEAP8[eventPtr + 4] = e.wasClean), (HEAP16[(eventPtr + 6) >> 1] = e.code), stringToUTF8(e.reason, eventPtr + 8, 512); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31898,12 +31619,8 @@ export function init(RuntimeName, PHPLoader) { (HEAPU32[(eventPtr + 4) >> 2] = buf), (HEAP32[(eventPtr + 8) >> 2] = len), (HEAP8[eventPtr + 12] = isText), - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); diff --git a/packages/php-wasm/node/asyncify/php_7_4.js b/packages/php-wasm/node/asyncify/php_7_4.js index bf27e05f47..da44a38b1c 100644 --- a/packages/php-wasm/node/asyncify/php_7_4.js +++ b/packages/php-wasm/node/asyncify/php_7_4.js @@ -1774,10 +1774,8 @@ export function init(RuntimeName, PHPLoader) { ); var ___call_sighandler = (fp, sig) => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - sig + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ sig ); ___call_sighandler.sig = 'vpi'; @@ -8802,11 +8800,8 @@ export function init(RuntimeName, PHPLoader) { dlSetError(`'Could not load dynamic lib: ${filename}\n${e}`); runtimeKeepalivePop(); callUserCallback(() => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, user_data ) ); @@ -8814,11 +8809,8 @@ export function init(RuntimeName, PHPLoader) { function successCallback() { runtimeKeepalivePop(); callUserCallback(() => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, user_data ) ); @@ -19480,11 +19472,8 @@ export function init(RuntimeName, PHPLoader) { var trace = getCallstack(); var parts = trace.split('\n'); for (var i = 0; i < parts.length; i++) { - var ret = (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0, + var ret = ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0, arg ); if (ret !== 0) return; @@ -20060,12 +20049,8 @@ export function init(RuntimeName, PHPLoader) { stringToUTF8(e.locale || '', keyEventData + 128, 32); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, keyEventData, userData ) @@ -20183,12 +20168,8 @@ export function init(RuntimeName, PHPLoader) { fillMouseEventData(JSEvents.mouseEvent, e, target); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.mouseEvent, userData ) @@ -20402,12 +20383,8 @@ export function init(RuntimeName, PHPLoader) { HEAPF64[(wheelEvent + 80) >> 3] = e['deltaZ']; HEAP32[(wheelEvent + 88) >> 2] = e['deltaMode']; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, wheelEvent, userData ) @@ -20488,12 +20465,8 @@ export function init(RuntimeName, PHPLoader) { HEAP32[(uiEvent + 28) >> 2] = pageXOffset | 0; // scroll offsets are float HEAP32[(uiEvent + 32) >> 2] = pageYOffset | 0; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, uiEvent, userData ) @@ -20567,12 +20540,8 @@ export function init(RuntimeName, PHPLoader) { stringToUTF8(id, focusEvent + 128, 128); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, focusEvent, userData ) @@ -20688,12 +20657,8 @@ export function init(RuntimeName, PHPLoader) { ); // TODO: Thread-safety with respect to emscripten_get_deviceorientation_status() if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.deviceOrientationEvent, userData ) @@ -20776,12 +20741,8 @@ export function init(RuntimeName, PHPLoader) { fillDeviceMotionEventData(JSEvents.deviceMotionEvent, e, target); // TODO: Thread-safety with respect to emscripten_get_devicemotion_status() if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.deviceMotionEvent, userData ) @@ -20891,12 +20852,8 @@ export function init(RuntimeName, PHPLoader) { fillOrientationChangeEventData(orientationChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, orientationChangeEvent, userData ) @@ -21029,12 +20986,8 @@ export function init(RuntimeName, PHPLoader) { fillFullscreenChangeEventData(fullscreenChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, fullscreenChangeEvent, userData ) @@ -21198,12 +21151,8 @@ export function init(RuntimeName, PHPLoader) { ); if (currentFullscreenStrategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, currentFullscreenStrategy.canvasResizedCallbackUserData ); @@ -21309,12 +21258,8 @@ export function init(RuntimeName, PHPLoader) { currentFullscreenStrategy = strategy; if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21416,12 +21361,8 @@ export function init(RuntimeName, PHPLoader) { !inCenteredWithoutScalingFullscreenMode && currentFullscreenStrategy.canvasResizedCallback ) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, currentFullscreenStrategy.canvasResizedCallbackUserData ); @@ -21520,12 +21461,8 @@ export function init(RuntimeName, PHPLoader) { softFullscreenResizeWebGLRenderTarget ); if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21538,12 +21475,8 @@ export function init(RuntimeName, PHPLoader) { // Inform the caller that the canvas size has changed. if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21611,12 +21544,8 @@ export function init(RuntimeName, PHPLoader) { fillPointerlockChangeEventData(pointerlockChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, pointerlockChangeEvent, userData ) @@ -21706,12 +21635,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var pointerlockErrorEventHandlerFunc = (e = event) => { if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ) @@ -21911,12 +21836,8 @@ export function init(RuntimeName, PHPLoader) { fillVisibilityChangeEventData(visibilityChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, visibilityChangeEvent, userData ) @@ -22036,12 +21957,8 @@ export function init(RuntimeName, PHPLoader) { HEAP32[(touchEvent + 8) >> 2] = numTouches; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, touchEvent, userData ) @@ -22179,12 +22096,8 @@ export function init(RuntimeName, PHPLoader) { fillGamepadEventData(gamepadEvent, e['gamepad']); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, gamepadEvent, userData ) @@ -22286,12 +22199,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var beforeUnloadEventHandlerFunc = (e = event) => { // Note: This is always called on the main browser thread, since it needs synchronously return a value! - var confirmationMessage = (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + var confirmationMessage = ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ); @@ -22362,12 +22271,8 @@ export function init(RuntimeName, PHPLoader) { fillBatteryEventData(batteryEvent, battery()); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, batteryEvent, userData ) @@ -22457,11 +22362,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_request_animation_frame = (cb, userData) => requestAnimationFrame((timeStamp) => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - timeStamp, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp, userData ) ); @@ -22473,11 +22375,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_request_animation_frame_loop = (cb, userData) => { function tick(timeStamp) { if ( - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - timeStamp, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp, userData ) ) { @@ -22702,10 +22601,8 @@ export function init(RuntimeName, PHPLoader) { return emSetImmediate(() => { runtimeKeepalivePop(); callUserCallback(() => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ); }); @@ -22722,10 +22619,8 @@ export function init(RuntimeName, PHPLoader) { function tick() { callUserCallback(() => { if ( - (( - a1 - ) => {}) /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ) { emSetImmediate(tick); @@ -22742,10 +22637,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_set_timeout = (cb, msecs, userData) => safeSetTimeout( () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ), msecs ); @@ -22761,11 +22654,8 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePop(); callUserCallback(() => { if ( - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - t, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ t, userData ) ) { @@ -22789,10 +22679,8 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePush(); return setInterval(() => { callUserCallback(() => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ); }, msecs); @@ -22807,10 +22695,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_async_call = (func, arg, millis) => { var wrapper = () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); if ( @@ -22843,7 +22729,7 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_set_main_loop = (func, fps, simulateInfiniteLoop) => { var iterFunc = - () => {} /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */; + () => {}; /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ setMainLoop(iterFunc, fps, simulateInfiniteLoop); }; _emscripten_set_main_loop.sig = 'vpii'; @@ -22855,10 +22741,8 @@ export function init(RuntimeName, PHPLoader) { simulateInfiniteLoop ) => { var iterFunc = () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); setMainLoop(iterFunc, fps, simulateInfiniteLoop, arg); }; @@ -22879,10 +22763,8 @@ export function init(RuntimeName, PHPLoader) { var __emscripten_push_main_loop_blocker = (func, arg, name) => { MainLoop.queue.push({ func: () => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, name: UTF8ToString(name), @@ -22895,10 +22777,8 @@ export function init(RuntimeName, PHPLoader) { var __emscripten_push_uncounted_main_loop_blocker = (func, arg, name) => { MainLoop.queue.push({ func: () => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, name: UTF8ToString(name), @@ -22932,12 +22812,8 @@ export function init(RuntimeName, PHPLoader) { var resultPtr = stackAlloc(POINTER_SIZE); HEAPU32[resultPtr >> 2] = 0; try { - var result = (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - resultPtr, + var result = ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ resultPtr, userData, value ); @@ -23873,19 +23749,15 @@ export function init(RuntimeName, PHPLoader) { () => { runtimeKeepalivePop(); if (onload) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - file + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file ); }, () => { runtimeKeepalivePop(); if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - file + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file ); }, true // don'tCreateFile - it's already there @@ -23919,21 +23791,16 @@ export function init(RuntimeName, PHPLoader) { () => { runtimeKeepalivePop(); if (onload) - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, cname ); }, () => { runtimeKeepalivePop(); if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, true // don'tCreateFile - it's already there @@ -24206,10 +24073,10 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePop(); callUserCallback(() => { var sp = stackSave(); - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - stringToUTF8OnStack(_file) + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stringToUTF8OnStack( + _file + ) ); stackRestore(sp); }); @@ -24253,12 +24120,8 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userdata, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata, buffer, byteArray.length ); @@ -24268,10 +24131,8 @@ export function init(RuntimeName, PHPLoader) { if (onerror) { runtimeKeepalivePop(); callUserCallback(() => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userdata + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata ); }); } @@ -24328,12 +24189,8 @@ export function init(RuntimeName, PHPLoader) { ); if (onload) { var sp = stackSave(); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, stringToUTF8OnStack(_file) ); @@ -24341,12 +24198,8 @@ export function init(RuntimeName, PHPLoader) { } } else { if (onerror) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status ); @@ -24359,12 +24212,8 @@ export function init(RuntimeName, PHPLoader) { http.onerror = (e) => { runtimeKeepalivePop(); if (onerror) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status ); @@ -24379,12 +24228,8 @@ export function init(RuntimeName, PHPLoader) { ) { var percentComplete = (e.loaded / e.total) * 100; if (onprogress) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, percentComplete ); @@ -24441,13 +24286,8 @@ export function init(RuntimeName, PHPLoader) { if (http.statusText) { statusText = stringToUTF8OnStack(http.statusText); } - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status, statusText @@ -24468,13 +24308,8 @@ export function init(RuntimeName, PHPLoader) { var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); if (onload) - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, buffer, byteArray.length @@ -24495,13 +24330,8 @@ export function init(RuntimeName, PHPLoader) { // PROGRESS http.onprogress = (e) => { if (onprogress) - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, e.loaded, e.lengthComputable || e.lengthComputable === undefined @@ -24621,24 +24451,16 @@ export function init(RuntimeName, PHPLoader) { if (event === 'error') { withStackSave(() => { var msg = stringToUTF8OnStack(data[2]); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - data[0], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data[0], data[1], msg, userData ); }); } else { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - data, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data, userData ); } @@ -25104,12 +24926,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var webGlEventHandlerFunc = (e = event) => { if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ) @@ -25328,21 +25146,15 @@ export function init(RuntimeName, PHPLoader) { ) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - lastX, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX, lastY ); } else if (GLUT.buttons != 0 && GLUT.motionFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - lastX, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX, lastY ); } @@ -25503,12 +25315,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.specialFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25518,12 +25326,8 @@ export function init(RuntimeName, PHPLoader) { if (key !== null && GLUT.keyboardFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25538,12 +25342,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.specialUpFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25553,12 +25353,8 @@ export function init(RuntimeName, PHPLoader) { if (key !== null && GLUT.keyboardUpFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25622,13 +25418,10 @@ export function init(RuntimeName, PHPLoader) { } catch (e) {} event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - event['button'], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[ + 'button' + ], 0 /*GLUT_DOWN*/, Browser.mouseX, Browser.mouseY @@ -25643,13 +25436,10 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.mouseFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - event['button'], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[ + 'button' + ], 1 /*GLUT_UP*/, Browser.mouseX, Browser.mouseY @@ -25678,13 +25468,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.mouseFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - button, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ button, 0 /*GLUT_DOWN*/, Browser.mouseX, Browser.mouseY @@ -25727,11 +25512,8 @@ export function init(RuntimeName, PHPLoader) { /* Can't call _glutReshapeWindow as that requests cancelling fullscreen. */ if (GLUT.reshapeFunc) { // out("GLUT.reshapeFunc (from FS): " + width + ", " + height); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -25774,11 +25556,8 @@ export function init(RuntimeName, PHPLoader) { Browser.resizeListeners.push((width, height) => { if (GLUT.reshapeFunc) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -25891,10 +25670,8 @@ export function init(RuntimeName, PHPLoader) { var _glutTimerFunc = (msec, func, value) => safeSetTimeout( () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - value + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ value ), msec ); @@ -26054,11 +25831,8 @@ export function init(RuntimeName, PHPLoader) { Browser.setCanvasSize(width, height, true); // N.B. GLUT.reshapeFunc is also registered as a canvas resize callback. // Just call it once here. if (GLUT.reshapeFunc) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -27120,21 +26894,15 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, buffer, byteArray.length ); @@ -27166,18 +26934,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (onstore) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); } @@ -27192,18 +26956,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (ondelete) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); }); @@ -27220,19 +26980,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (oncheck) - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, exists ); }); @@ -27248,18 +27003,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (onclear) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); }); @@ -27416,11 +27167,8 @@ export function init(RuntimeName, PHPLoader) { safeSetTimeout(() => { var stackBegin = Asyncify.currData + 12; var stackEnd = HEAPU32[Asyncify.currData >> 2]; - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - stackBegin, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stackBegin, stackEnd ); wakeUp(); @@ -27481,10 +27229,8 @@ export function init(RuntimeName, PHPLoader) { HEAPU32[(newFiber + 12) >> 2] = 0; var userData = HEAPU32[(newFiber + 16) >> 2]; - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ); } else { var asyncifyData = newFiber + 20; @@ -28496,11 +28242,8 @@ export function init(RuntimeName, PHPLoader) { if (!SDL.eventHandler) return; while (SDL.pollEvent(SDL.eventHandlerTemp)) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - SDL.eventHandlerContext, + ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL.eventHandlerContext, SDL.eventHandlerTemp ); } @@ -30133,12 +29876,9 @@ export function init(RuntimeName, PHPLoader) { return; // Ask SDL audio data from the user code. - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - SDL.audio.userdata, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL + .audio.userdata, SDL.audio.buffer, SDL.audio.bufferSize ); @@ -30596,10 +30336,8 @@ export function init(RuntimeName, PHPLoader) { info.audio = null; } if (SDL.channelFinished) { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - channel + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel ); } } @@ -30668,10 +30406,8 @@ export function init(RuntimeName, PHPLoader) { channelInfo.audio = null; } if (SDL.channelFinished) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - channel + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel ); }; if (channelInfo.audio) { @@ -31419,11 +31155,8 @@ export function init(RuntimeName, PHPLoader) { var _SDL_AddTimer = (interval, callback, param) => safeSetTimeout( () => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - interval, + ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ interval, param ), interval @@ -31802,12 +31535,8 @@ export function init(RuntimeName, PHPLoader) { socket.onopen = function (e) { var eventPtr = WS.getSocketEvent(socketId); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31829,12 +31558,8 @@ export function init(RuntimeName, PHPLoader) { socket.onerror = function (e) { var eventPtr = WS.getSocketEvent(socketId); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31859,12 +31584,8 @@ export function init(RuntimeName, PHPLoader) { (HEAP8[eventPtr + 4] = e.wasClean), (HEAP16[(eventPtr + 6) >> 1] = e.code), stringToUTF8(e.reason, eventPtr + 8, 512); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31898,12 +31619,8 @@ export function init(RuntimeName, PHPLoader) { (HEAPU32[(eventPtr + 4) >> 2] = buf), (HEAP32[(eventPtr + 8) >> 2] = len), (HEAP8[eventPtr + 12] = isText), - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); diff --git a/packages/php-wasm/node/asyncify/php_8_0.js b/packages/php-wasm/node/asyncify/php_8_0.js index 8529ae4d7b..1975da4215 100644 --- a/packages/php-wasm/node/asyncify/php_8_0.js +++ b/packages/php-wasm/node/asyncify/php_8_0.js @@ -1774,10 +1774,8 @@ export function init(RuntimeName, PHPLoader) { ); var ___call_sighandler = (fp, sig) => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - sig + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ sig ); ___call_sighandler.sig = 'vpi'; @@ -8802,11 +8800,8 @@ export function init(RuntimeName, PHPLoader) { dlSetError(`'Could not load dynamic lib: ${filename}\n${e}`); runtimeKeepalivePop(); callUserCallback(() => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, user_data ) ); @@ -8814,11 +8809,8 @@ export function init(RuntimeName, PHPLoader) { function successCallback() { runtimeKeepalivePop(); callUserCallback(() => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, user_data ) ); @@ -19480,11 +19472,8 @@ export function init(RuntimeName, PHPLoader) { var trace = getCallstack(); var parts = trace.split('\n'); for (var i = 0; i < parts.length; i++) { - var ret = (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0, + var ret = ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0, arg ); if (ret !== 0) return; @@ -20060,12 +20049,8 @@ export function init(RuntimeName, PHPLoader) { stringToUTF8(e.locale || '', keyEventData + 128, 32); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, keyEventData, userData ) @@ -20183,12 +20168,8 @@ export function init(RuntimeName, PHPLoader) { fillMouseEventData(JSEvents.mouseEvent, e, target); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.mouseEvent, userData ) @@ -20402,12 +20383,8 @@ export function init(RuntimeName, PHPLoader) { HEAPF64[(wheelEvent + 80) >> 3] = e['deltaZ']; HEAP32[(wheelEvent + 88) >> 2] = e['deltaMode']; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, wheelEvent, userData ) @@ -20488,12 +20465,8 @@ export function init(RuntimeName, PHPLoader) { HEAP32[(uiEvent + 28) >> 2] = pageXOffset | 0; // scroll offsets are float HEAP32[(uiEvent + 32) >> 2] = pageYOffset | 0; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, uiEvent, userData ) @@ -20567,12 +20540,8 @@ export function init(RuntimeName, PHPLoader) { stringToUTF8(id, focusEvent + 128, 128); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, focusEvent, userData ) @@ -20688,12 +20657,8 @@ export function init(RuntimeName, PHPLoader) { ); // TODO: Thread-safety with respect to emscripten_get_deviceorientation_status() if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.deviceOrientationEvent, userData ) @@ -20776,12 +20741,8 @@ export function init(RuntimeName, PHPLoader) { fillDeviceMotionEventData(JSEvents.deviceMotionEvent, e, target); // TODO: Thread-safety with respect to emscripten_get_devicemotion_status() if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.deviceMotionEvent, userData ) @@ -20891,12 +20852,8 @@ export function init(RuntimeName, PHPLoader) { fillOrientationChangeEventData(orientationChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, orientationChangeEvent, userData ) @@ -21029,12 +20986,8 @@ export function init(RuntimeName, PHPLoader) { fillFullscreenChangeEventData(fullscreenChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, fullscreenChangeEvent, userData ) @@ -21198,12 +21151,8 @@ export function init(RuntimeName, PHPLoader) { ); if (currentFullscreenStrategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, currentFullscreenStrategy.canvasResizedCallbackUserData ); @@ -21309,12 +21258,8 @@ export function init(RuntimeName, PHPLoader) { currentFullscreenStrategy = strategy; if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21416,12 +21361,8 @@ export function init(RuntimeName, PHPLoader) { !inCenteredWithoutScalingFullscreenMode && currentFullscreenStrategy.canvasResizedCallback ) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, currentFullscreenStrategy.canvasResizedCallbackUserData ); @@ -21520,12 +21461,8 @@ export function init(RuntimeName, PHPLoader) { softFullscreenResizeWebGLRenderTarget ); if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21538,12 +21475,8 @@ export function init(RuntimeName, PHPLoader) { // Inform the caller that the canvas size has changed. if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21611,12 +21544,8 @@ export function init(RuntimeName, PHPLoader) { fillPointerlockChangeEventData(pointerlockChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, pointerlockChangeEvent, userData ) @@ -21706,12 +21635,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var pointerlockErrorEventHandlerFunc = (e = event) => { if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ) @@ -21911,12 +21836,8 @@ export function init(RuntimeName, PHPLoader) { fillVisibilityChangeEventData(visibilityChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, visibilityChangeEvent, userData ) @@ -22036,12 +21957,8 @@ export function init(RuntimeName, PHPLoader) { HEAP32[(touchEvent + 8) >> 2] = numTouches; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, touchEvent, userData ) @@ -22179,12 +22096,8 @@ export function init(RuntimeName, PHPLoader) { fillGamepadEventData(gamepadEvent, e['gamepad']); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, gamepadEvent, userData ) @@ -22286,12 +22199,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var beforeUnloadEventHandlerFunc = (e = event) => { // Note: This is always called on the main browser thread, since it needs synchronously return a value! - var confirmationMessage = (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + var confirmationMessage = ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ); @@ -22362,12 +22271,8 @@ export function init(RuntimeName, PHPLoader) { fillBatteryEventData(batteryEvent, battery()); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, batteryEvent, userData ) @@ -22457,11 +22362,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_request_animation_frame = (cb, userData) => requestAnimationFrame((timeStamp) => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - timeStamp, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp, userData ) ); @@ -22473,11 +22375,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_request_animation_frame_loop = (cb, userData) => { function tick(timeStamp) { if ( - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - timeStamp, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp, userData ) ) { @@ -22702,10 +22601,8 @@ export function init(RuntimeName, PHPLoader) { return emSetImmediate(() => { runtimeKeepalivePop(); callUserCallback(() => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ); }); @@ -22722,10 +22619,8 @@ export function init(RuntimeName, PHPLoader) { function tick() { callUserCallback(() => { if ( - (( - a1 - ) => {}) /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ) { emSetImmediate(tick); @@ -22742,10 +22637,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_set_timeout = (cb, msecs, userData) => safeSetTimeout( () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ), msecs ); @@ -22761,11 +22654,8 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePop(); callUserCallback(() => { if ( - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - t, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ t, userData ) ) { @@ -22789,10 +22679,8 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePush(); return setInterval(() => { callUserCallback(() => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ); }, msecs); @@ -22807,10 +22695,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_async_call = (func, arg, millis) => { var wrapper = () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); if ( @@ -22843,7 +22729,7 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_set_main_loop = (func, fps, simulateInfiniteLoop) => { var iterFunc = - () => {} /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */; + () => {}; /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ setMainLoop(iterFunc, fps, simulateInfiniteLoop); }; _emscripten_set_main_loop.sig = 'vpii'; @@ -22855,10 +22741,8 @@ export function init(RuntimeName, PHPLoader) { simulateInfiniteLoop ) => { var iterFunc = () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); setMainLoop(iterFunc, fps, simulateInfiniteLoop, arg); }; @@ -22879,10 +22763,8 @@ export function init(RuntimeName, PHPLoader) { var __emscripten_push_main_loop_blocker = (func, arg, name) => { MainLoop.queue.push({ func: () => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, name: UTF8ToString(name), @@ -22895,10 +22777,8 @@ export function init(RuntimeName, PHPLoader) { var __emscripten_push_uncounted_main_loop_blocker = (func, arg, name) => { MainLoop.queue.push({ func: () => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, name: UTF8ToString(name), @@ -22932,12 +22812,8 @@ export function init(RuntimeName, PHPLoader) { var resultPtr = stackAlloc(POINTER_SIZE); HEAPU32[resultPtr >> 2] = 0; try { - var result = (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - resultPtr, + var result = ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ resultPtr, userData, value ); @@ -23873,19 +23749,15 @@ export function init(RuntimeName, PHPLoader) { () => { runtimeKeepalivePop(); if (onload) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - file + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file ); }, () => { runtimeKeepalivePop(); if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - file + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file ); }, true // don'tCreateFile - it's already there @@ -23919,21 +23791,16 @@ export function init(RuntimeName, PHPLoader) { () => { runtimeKeepalivePop(); if (onload) - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, cname ); }, () => { runtimeKeepalivePop(); if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, true // don'tCreateFile - it's already there @@ -24206,10 +24073,10 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePop(); callUserCallback(() => { var sp = stackSave(); - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - stringToUTF8OnStack(_file) + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stringToUTF8OnStack( + _file + ) ); stackRestore(sp); }); @@ -24253,12 +24120,8 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userdata, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata, buffer, byteArray.length ); @@ -24268,10 +24131,8 @@ export function init(RuntimeName, PHPLoader) { if (onerror) { runtimeKeepalivePop(); callUserCallback(() => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userdata + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata ); }); } @@ -24328,12 +24189,8 @@ export function init(RuntimeName, PHPLoader) { ); if (onload) { var sp = stackSave(); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, stringToUTF8OnStack(_file) ); @@ -24341,12 +24198,8 @@ export function init(RuntimeName, PHPLoader) { } } else { if (onerror) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status ); @@ -24359,12 +24212,8 @@ export function init(RuntimeName, PHPLoader) { http.onerror = (e) => { runtimeKeepalivePop(); if (onerror) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status ); @@ -24379,12 +24228,8 @@ export function init(RuntimeName, PHPLoader) { ) { var percentComplete = (e.loaded / e.total) * 100; if (onprogress) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, percentComplete ); @@ -24441,13 +24286,8 @@ export function init(RuntimeName, PHPLoader) { if (http.statusText) { statusText = stringToUTF8OnStack(http.statusText); } - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status, statusText @@ -24468,13 +24308,8 @@ export function init(RuntimeName, PHPLoader) { var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); if (onload) - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, buffer, byteArray.length @@ -24495,13 +24330,8 @@ export function init(RuntimeName, PHPLoader) { // PROGRESS http.onprogress = (e) => { if (onprogress) - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, e.loaded, e.lengthComputable || e.lengthComputable === undefined @@ -24621,24 +24451,16 @@ export function init(RuntimeName, PHPLoader) { if (event === 'error') { withStackSave(() => { var msg = stringToUTF8OnStack(data[2]); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - data[0], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data[0], data[1], msg, userData ); }); } else { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - data, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data, userData ); } @@ -25104,12 +24926,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var webGlEventHandlerFunc = (e = event) => { if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ) @@ -25328,21 +25146,15 @@ export function init(RuntimeName, PHPLoader) { ) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - lastX, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX, lastY ); } else if (GLUT.buttons != 0 && GLUT.motionFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - lastX, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX, lastY ); } @@ -25503,12 +25315,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.specialFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25518,12 +25326,8 @@ export function init(RuntimeName, PHPLoader) { if (key !== null && GLUT.keyboardFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25538,12 +25342,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.specialUpFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25553,12 +25353,8 @@ export function init(RuntimeName, PHPLoader) { if (key !== null && GLUT.keyboardUpFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25622,13 +25418,10 @@ export function init(RuntimeName, PHPLoader) { } catch (e) {} event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - event['button'], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[ + 'button' + ], 0 /*GLUT_DOWN*/, Browser.mouseX, Browser.mouseY @@ -25643,13 +25436,10 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.mouseFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - event['button'], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[ + 'button' + ], 1 /*GLUT_UP*/, Browser.mouseX, Browser.mouseY @@ -25678,13 +25468,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.mouseFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - button, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ button, 0 /*GLUT_DOWN*/, Browser.mouseX, Browser.mouseY @@ -25727,11 +25512,8 @@ export function init(RuntimeName, PHPLoader) { /* Can't call _glutReshapeWindow as that requests cancelling fullscreen. */ if (GLUT.reshapeFunc) { // out("GLUT.reshapeFunc (from FS): " + width + ", " + height); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -25774,11 +25556,8 @@ export function init(RuntimeName, PHPLoader) { Browser.resizeListeners.push((width, height) => { if (GLUT.reshapeFunc) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -25891,10 +25670,8 @@ export function init(RuntimeName, PHPLoader) { var _glutTimerFunc = (msec, func, value) => safeSetTimeout( () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - value + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ value ), msec ); @@ -26054,11 +25831,8 @@ export function init(RuntimeName, PHPLoader) { Browser.setCanvasSize(width, height, true); // N.B. GLUT.reshapeFunc is also registered as a canvas resize callback. // Just call it once here. if (GLUT.reshapeFunc) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -27120,21 +26894,15 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, buffer, byteArray.length ); @@ -27166,18 +26934,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (onstore) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); } @@ -27192,18 +26956,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (ondelete) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); }); @@ -27220,19 +26980,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (oncheck) - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, exists ); }); @@ -27248,18 +27003,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (onclear) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); }); @@ -27416,11 +27167,8 @@ export function init(RuntimeName, PHPLoader) { safeSetTimeout(() => { var stackBegin = Asyncify.currData + 12; var stackEnd = HEAPU32[Asyncify.currData >> 2]; - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - stackBegin, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stackBegin, stackEnd ); wakeUp(); @@ -27481,10 +27229,8 @@ export function init(RuntimeName, PHPLoader) { HEAPU32[(newFiber + 12) >> 2] = 0; var userData = HEAPU32[(newFiber + 16) >> 2]; - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ); } else { var asyncifyData = newFiber + 20; @@ -28496,11 +28242,8 @@ export function init(RuntimeName, PHPLoader) { if (!SDL.eventHandler) return; while (SDL.pollEvent(SDL.eventHandlerTemp)) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - SDL.eventHandlerContext, + ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL.eventHandlerContext, SDL.eventHandlerTemp ); } @@ -30133,12 +29876,9 @@ export function init(RuntimeName, PHPLoader) { return; // Ask SDL audio data from the user code. - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - SDL.audio.userdata, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL + .audio.userdata, SDL.audio.buffer, SDL.audio.bufferSize ); @@ -30596,10 +30336,8 @@ export function init(RuntimeName, PHPLoader) { info.audio = null; } if (SDL.channelFinished) { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - channel + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel ); } } @@ -30668,10 +30406,8 @@ export function init(RuntimeName, PHPLoader) { channelInfo.audio = null; } if (SDL.channelFinished) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - channel + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel ); }; if (channelInfo.audio) { @@ -31419,11 +31155,8 @@ export function init(RuntimeName, PHPLoader) { var _SDL_AddTimer = (interval, callback, param) => safeSetTimeout( () => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - interval, + ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ interval, param ), interval @@ -31802,12 +31535,8 @@ export function init(RuntimeName, PHPLoader) { socket.onopen = function (e) { var eventPtr = WS.getSocketEvent(socketId); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31829,12 +31558,8 @@ export function init(RuntimeName, PHPLoader) { socket.onerror = function (e) { var eventPtr = WS.getSocketEvent(socketId); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31859,12 +31584,8 @@ export function init(RuntimeName, PHPLoader) { (HEAP8[eventPtr + 4] = e.wasClean), (HEAP16[(eventPtr + 6) >> 1] = e.code), stringToUTF8(e.reason, eventPtr + 8, 512); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31898,12 +31619,8 @@ export function init(RuntimeName, PHPLoader) { (HEAPU32[(eventPtr + 4) >> 2] = buf), (HEAP32[(eventPtr + 8) >> 2] = len), (HEAP8[eventPtr + 12] = isText), - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); diff --git a/packages/php-wasm/node/asyncify/php_8_1.js b/packages/php-wasm/node/asyncify/php_8_1.js index c1f949ebcd..2f069a9827 100644 --- a/packages/php-wasm/node/asyncify/php_8_1.js +++ b/packages/php-wasm/node/asyncify/php_8_1.js @@ -1774,10 +1774,8 @@ export function init(RuntimeName, PHPLoader) { ); var ___call_sighandler = (fp, sig) => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - sig + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ sig ); ___call_sighandler.sig = 'vpi'; @@ -8802,11 +8800,8 @@ export function init(RuntimeName, PHPLoader) { dlSetError(`'Could not load dynamic lib: ${filename}\n${e}`); runtimeKeepalivePop(); callUserCallback(() => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, user_data ) ); @@ -8814,11 +8809,8 @@ export function init(RuntimeName, PHPLoader) { function successCallback() { runtimeKeepalivePop(); callUserCallback(() => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, user_data ) ); @@ -19486,11 +19478,8 @@ export function init(RuntimeName, PHPLoader) { var trace = getCallstack(); var parts = trace.split('\n'); for (var i = 0; i < parts.length; i++) { - var ret = (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0, + var ret = ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0, arg ); if (ret !== 0) return; @@ -20066,12 +20055,8 @@ export function init(RuntimeName, PHPLoader) { stringToUTF8(e.locale || '', keyEventData + 128, 32); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, keyEventData, userData ) @@ -20189,12 +20174,8 @@ export function init(RuntimeName, PHPLoader) { fillMouseEventData(JSEvents.mouseEvent, e, target); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.mouseEvent, userData ) @@ -20408,12 +20389,8 @@ export function init(RuntimeName, PHPLoader) { HEAPF64[(wheelEvent + 80) >> 3] = e['deltaZ']; HEAP32[(wheelEvent + 88) >> 2] = e['deltaMode']; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, wheelEvent, userData ) @@ -20494,12 +20471,8 @@ export function init(RuntimeName, PHPLoader) { HEAP32[(uiEvent + 28) >> 2] = pageXOffset | 0; // scroll offsets are float HEAP32[(uiEvent + 32) >> 2] = pageYOffset | 0; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, uiEvent, userData ) @@ -20573,12 +20546,8 @@ export function init(RuntimeName, PHPLoader) { stringToUTF8(id, focusEvent + 128, 128); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, focusEvent, userData ) @@ -20694,12 +20663,8 @@ export function init(RuntimeName, PHPLoader) { ); // TODO: Thread-safety with respect to emscripten_get_deviceorientation_status() if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.deviceOrientationEvent, userData ) @@ -20782,12 +20747,8 @@ export function init(RuntimeName, PHPLoader) { fillDeviceMotionEventData(JSEvents.deviceMotionEvent, e, target); // TODO: Thread-safety with respect to emscripten_get_devicemotion_status() if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.deviceMotionEvent, userData ) @@ -20897,12 +20858,8 @@ export function init(RuntimeName, PHPLoader) { fillOrientationChangeEventData(orientationChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, orientationChangeEvent, userData ) @@ -21035,12 +20992,8 @@ export function init(RuntimeName, PHPLoader) { fillFullscreenChangeEventData(fullscreenChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, fullscreenChangeEvent, userData ) @@ -21204,12 +21157,8 @@ export function init(RuntimeName, PHPLoader) { ); if (currentFullscreenStrategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, currentFullscreenStrategy.canvasResizedCallbackUserData ); @@ -21315,12 +21264,8 @@ export function init(RuntimeName, PHPLoader) { currentFullscreenStrategy = strategy; if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21422,12 +21367,8 @@ export function init(RuntimeName, PHPLoader) { !inCenteredWithoutScalingFullscreenMode && currentFullscreenStrategy.canvasResizedCallback ) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, currentFullscreenStrategy.canvasResizedCallbackUserData ); @@ -21526,12 +21467,8 @@ export function init(RuntimeName, PHPLoader) { softFullscreenResizeWebGLRenderTarget ); if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21544,12 +21481,8 @@ export function init(RuntimeName, PHPLoader) { // Inform the caller that the canvas size has changed. if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21617,12 +21550,8 @@ export function init(RuntimeName, PHPLoader) { fillPointerlockChangeEventData(pointerlockChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, pointerlockChangeEvent, userData ) @@ -21712,12 +21641,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var pointerlockErrorEventHandlerFunc = (e = event) => { if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ) @@ -21917,12 +21842,8 @@ export function init(RuntimeName, PHPLoader) { fillVisibilityChangeEventData(visibilityChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, visibilityChangeEvent, userData ) @@ -22042,12 +21963,8 @@ export function init(RuntimeName, PHPLoader) { HEAP32[(touchEvent + 8) >> 2] = numTouches; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, touchEvent, userData ) @@ -22185,12 +22102,8 @@ export function init(RuntimeName, PHPLoader) { fillGamepadEventData(gamepadEvent, e['gamepad']); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, gamepadEvent, userData ) @@ -22292,12 +22205,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var beforeUnloadEventHandlerFunc = (e = event) => { // Note: This is always called on the main browser thread, since it needs synchronously return a value! - var confirmationMessage = (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + var confirmationMessage = ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ); @@ -22368,12 +22277,8 @@ export function init(RuntimeName, PHPLoader) { fillBatteryEventData(batteryEvent, battery()); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, batteryEvent, userData ) @@ -22463,11 +22368,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_request_animation_frame = (cb, userData) => requestAnimationFrame((timeStamp) => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - timeStamp, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp, userData ) ); @@ -22479,11 +22381,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_request_animation_frame_loop = (cb, userData) => { function tick(timeStamp) { if ( - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - timeStamp, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp, userData ) ) { @@ -22708,10 +22607,8 @@ export function init(RuntimeName, PHPLoader) { return emSetImmediate(() => { runtimeKeepalivePop(); callUserCallback(() => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ); }); @@ -22728,10 +22625,8 @@ export function init(RuntimeName, PHPLoader) { function tick() { callUserCallback(() => { if ( - (( - a1 - ) => {}) /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ) { emSetImmediate(tick); @@ -22748,10 +22643,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_set_timeout = (cb, msecs, userData) => safeSetTimeout( () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ), msecs ); @@ -22767,11 +22660,8 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePop(); callUserCallback(() => { if ( - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - t, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ t, userData ) ) { @@ -22795,10 +22685,8 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePush(); return setInterval(() => { callUserCallback(() => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ); }, msecs); @@ -22813,10 +22701,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_async_call = (func, arg, millis) => { var wrapper = () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); if ( @@ -22849,7 +22735,7 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_set_main_loop = (func, fps, simulateInfiniteLoop) => { var iterFunc = - () => {} /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */; + () => {}; /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ setMainLoop(iterFunc, fps, simulateInfiniteLoop); }; _emscripten_set_main_loop.sig = 'vpii'; @@ -22861,10 +22747,8 @@ export function init(RuntimeName, PHPLoader) { simulateInfiniteLoop ) => { var iterFunc = () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); setMainLoop(iterFunc, fps, simulateInfiniteLoop, arg); }; @@ -22885,10 +22769,8 @@ export function init(RuntimeName, PHPLoader) { var __emscripten_push_main_loop_blocker = (func, arg, name) => { MainLoop.queue.push({ func: () => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, name: UTF8ToString(name), @@ -22901,10 +22783,8 @@ export function init(RuntimeName, PHPLoader) { var __emscripten_push_uncounted_main_loop_blocker = (func, arg, name) => { MainLoop.queue.push({ func: () => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, name: UTF8ToString(name), @@ -22938,12 +22818,8 @@ export function init(RuntimeName, PHPLoader) { var resultPtr = stackAlloc(POINTER_SIZE); HEAPU32[resultPtr >> 2] = 0; try { - var result = (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - resultPtr, + var result = ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ resultPtr, userData, value ); @@ -23879,19 +23755,15 @@ export function init(RuntimeName, PHPLoader) { () => { runtimeKeepalivePop(); if (onload) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - file + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file ); }, () => { runtimeKeepalivePop(); if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - file + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file ); }, true // don'tCreateFile - it's already there @@ -23925,21 +23797,16 @@ export function init(RuntimeName, PHPLoader) { () => { runtimeKeepalivePop(); if (onload) - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, cname ); }, () => { runtimeKeepalivePop(); if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, true // don'tCreateFile - it's already there @@ -24212,10 +24079,10 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePop(); callUserCallback(() => { var sp = stackSave(); - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - stringToUTF8OnStack(_file) + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stringToUTF8OnStack( + _file + ) ); stackRestore(sp); }); @@ -24259,12 +24126,8 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userdata, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata, buffer, byteArray.length ); @@ -24274,10 +24137,8 @@ export function init(RuntimeName, PHPLoader) { if (onerror) { runtimeKeepalivePop(); callUserCallback(() => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userdata + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata ); }); } @@ -24334,12 +24195,8 @@ export function init(RuntimeName, PHPLoader) { ); if (onload) { var sp = stackSave(); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, stringToUTF8OnStack(_file) ); @@ -24347,12 +24204,8 @@ export function init(RuntimeName, PHPLoader) { } } else { if (onerror) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status ); @@ -24365,12 +24218,8 @@ export function init(RuntimeName, PHPLoader) { http.onerror = (e) => { runtimeKeepalivePop(); if (onerror) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status ); @@ -24385,12 +24234,8 @@ export function init(RuntimeName, PHPLoader) { ) { var percentComplete = (e.loaded / e.total) * 100; if (onprogress) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, percentComplete ); @@ -24447,13 +24292,8 @@ export function init(RuntimeName, PHPLoader) { if (http.statusText) { statusText = stringToUTF8OnStack(http.statusText); } - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status, statusText @@ -24474,13 +24314,8 @@ export function init(RuntimeName, PHPLoader) { var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); if (onload) - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, buffer, byteArray.length @@ -24501,13 +24336,8 @@ export function init(RuntimeName, PHPLoader) { // PROGRESS http.onprogress = (e) => { if (onprogress) - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, e.loaded, e.lengthComputable || e.lengthComputable === undefined @@ -24627,24 +24457,16 @@ export function init(RuntimeName, PHPLoader) { if (event === 'error') { withStackSave(() => { var msg = stringToUTF8OnStack(data[2]); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - data[0], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data[0], data[1], msg, userData ); }); } else { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - data, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data, userData ); } @@ -25110,12 +24932,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var webGlEventHandlerFunc = (e = event) => { if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ) @@ -25334,21 +25152,15 @@ export function init(RuntimeName, PHPLoader) { ) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - lastX, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX, lastY ); } else if (GLUT.buttons != 0 && GLUT.motionFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - lastX, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX, lastY ); } @@ -25509,12 +25321,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.specialFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25524,12 +25332,8 @@ export function init(RuntimeName, PHPLoader) { if (key !== null && GLUT.keyboardFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25544,12 +25348,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.specialUpFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25559,12 +25359,8 @@ export function init(RuntimeName, PHPLoader) { if (key !== null && GLUT.keyboardUpFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25628,13 +25424,10 @@ export function init(RuntimeName, PHPLoader) { } catch (e) {} event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - event['button'], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[ + 'button' + ], 0 /*GLUT_DOWN*/, Browser.mouseX, Browser.mouseY @@ -25649,13 +25442,10 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.mouseFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - event['button'], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[ + 'button' + ], 1 /*GLUT_UP*/, Browser.mouseX, Browser.mouseY @@ -25684,13 +25474,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.mouseFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - button, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ button, 0 /*GLUT_DOWN*/, Browser.mouseX, Browser.mouseY @@ -25733,11 +25518,8 @@ export function init(RuntimeName, PHPLoader) { /* Can't call _glutReshapeWindow as that requests cancelling fullscreen. */ if (GLUT.reshapeFunc) { // out("GLUT.reshapeFunc (from FS): " + width + ", " + height); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -25780,11 +25562,8 @@ export function init(RuntimeName, PHPLoader) { Browser.resizeListeners.push((width, height) => { if (GLUT.reshapeFunc) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -25897,10 +25676,8 @@ export function init(RuntimeName, PHPLoader) { var _glutTimerFunc = (msec, func, value) => safeSetTimeout( () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - value + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ value ), msec ); @@ -26060,11 +25837,8 @@ export function init(RuntimeName, PHPLoader) { Browser.setCanvasSize(width, height, true); // N.B. GLUT.reshapeFunc is also registered as a canvas resize callback. // Just call it once here. if (GLUT.reshapeFunc) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -27126,21 +26900,15 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, buffer, byteArray.length ); @@ -27172,18 +26940,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (onstore) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); } @@ -27198,18 +26962,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (ondelete) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); }); @@ -27226,19 +26986,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (oncheck) - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, exists ); }); @@ -27254,18 +27009,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (onclear) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); }); @@ -27422,11 +27173,8 @@ export function init(RuntimeName, PHPLoader) { safeSetTimeout(() => { var stackBegin = Asyncify.currData + 12; var stackEnd = HEAPU32[Asyncify.currData >> 2]; - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - stackBegin, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stackBegin, stackEnd ); wakeUp(); @@ -27487,10 +27235,8 @@ export function init(RuntimeName, PHPLoader) { HEAPU32[(newFiber + 12) >> 2] = 0; var userData = HEAPU32[(newFiber + 16) >> 2]; - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ); } else { var asyncifyData = newFiber + 20; @@ -28502,11 +28248,8 @@ export function init(RuntimeName, PHPLoader) { if (!SDL.eventHandler) return; while (SDL.pollEvent(SDL.eventHandlerTemp)) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - SDL.eventHandlerContext, + ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL.eventHandlerContext, SDL.eventHandlerTemp ); } @@ -30139,12 +29882,9 @@ export function init(RuntimeName, PHPLoader) { return; // Ask SDL audio data from the user code. - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - SDL.audio.userdata, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL + .audio.userdata, SDL.audio.buffer, SDL.audio.bufferSize ); @@ -30602,10 +30342,8 @@ export function init(RuntimeName, PHPLoader) { info.audio = null; } if (SDL.channelFinished) { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - channel + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel ); } } @@ -30674,10 +30412,8 @@ export function init(RuntimeName, PHPLoader) { channelInfo.audio = null; } if (SDL.channelFinished) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - channel + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel ); }; if (channelInfo.audio) { @@ -31425,11 +31161,8 @@ export function init(RuntimeName, PHPLoader) { var _SDL_AddTimer = (interval, callback, param) => safeSetTimeout( () => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - interval, + ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ interval, param ), interval @@ -31802,12 +31535,8 @@ export function init(RuntimeName, PHPLoader) { socket.onopen = function (e) { var eventPtr = WS.getSocketEvent(socketId); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31829,12 +31558,8 @@ export function init(RuntimeName, PHPLoader) { socket.onerror = function (e) { var eventPtr = WS.getSocketEvent(socketId); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31859,12 +31584,8 @@ export function init(RuntimeName, PHPLoader) { (HEAP8[eventPtr + 4] = e.wasClean), (HEAP16[(eventPtr + 6) >> 1] = e.code), stringToUTF8(e.reason, eventPtr + 8, 512); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31898,12 +31619,8 @@ export function init(RuntimeName, PHPLoader) { (HEAPU32[(eventPtr + 4) >> 2] = buf), (HEAP32[(eventPtr + 8) >> 2] = len), (HEAP8[eventPtr + 12] = isText), - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); diff --git a/packages/php-wasm/node/asyncify/php_8_2.js b/packages/php-wasm/node/asyncify/php_8_2.js index cf0430173b..01275c2c39 100644 --- a/packages/php-wasm/node/asyncify/php_8_2.js +++ b/packages/php-wasm/node/asyncify/php_8_2.js @@ -1774,10 +1774,8 @@ export function init(RuntimeName, PHPLoader) { ); var ___call_sighandler = (fp, sig) => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - sig + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ sig ); ___call_sighandler.sig = 'vpi'; @@ -8802,11 +8800,8 @@ export function init(RuntimeName, PHPLoader) { dlSetError(`'Could not load dynamic lib: ${filename}\n${e}`); runtimeKeepalivePop(); callUserCallback(() => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, user_data ) ); @@ -8814,11 +8809,8 @@ export function init(RuntimeName, PHPLoader) { function successCallback() { runtimeKeepalivePop(); callUserCallback(() => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, user_data ) ); @@ -19488,11 +19480,8 @@ export function init(RuntimeName, PHPLoader) { var trace = getCallstack(); var parts = trace.split('\n'); for (var i = 0; i < parts.length; i++) { - var ret = (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0, + var ret = ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0, arg ); if (ret !== 0) return; @@ -20068,12 +20057,8 @@ export function init(RuntimeName, PHPLoader) { stringToUTF8(e.locale || '', keyEventData + 128, 32); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, keyEventData, userData ) @@ -20191,12 +20176,8 @@ export function init(RuntimeName, PHPLoader) { fillMouseEventData(JSEvents.mouseEvent, e, target); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.mouseEvent, userData ) @@ -20410,12 +20391,8 @@ export function init(RuntimeName, PHPLoader) { HEAPF64[(wheelEvent + 80) >> 3] = e['deltaZ']; HEAP32[(wheelEvent + 88) >> 2] = e['deltaMode']; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, wheelEvent, userData ) @@ -20496,12 +20473,8 @@ export function init(RuntimeName, PHPLoader) { HEAP32[(uiEvent + 28) >> 2] = pageXOffset | 0; // scroll offsets are float HEAP32[(uiEvent + 32) >> 2] = pageYOffset | 0; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, uiEvent, userData ) @@ -20575,12 +20548,8 @@ export function init(RuntimeName, PHPLoader) { stringToUTF8(id, focusEvent + 128, 128); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, focusEvent, userData ) @@ -20696,12 +20665,8 @@ export function init(RuntimeName, PHPLoader) { ); // TODO: Thread-safety with respect to emscripten_get_deviceorientation_status() if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.deviceOrientationEvent, userData ) @@ -20784,12 +20749,8 @@ export function init(RuntimeName, PHPLoader) { fillDeviceMotionEventData(JSEvents.deviceMotionEvent, e, target); // TODO: Thread-safety with respect to emscripten_get_devicemotion_status() if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.deviceMotionEvent, userData ) @@ -20899,12 +20860,8 @@ export function init(RuntimeName, PHPLoader) { fillOrientationChangeEventData(orientationChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, orientationChangeEvent, userData ) @@ -21037,12 +20994,8 @@ export function init(RuntimeName, PHPLoader) { fillFullscreenChangeEventData(fullscreenChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, fullscreenChangeEvent, userData ) @@ -21206,12 +21159,8 @@ export function init(RuntimeName, PHPLoader) { ); if (currentFullscreenStrategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, currentFullscreenStrategy.canvasResizedCallbackUserData ); @@ -21317,12 +21266,8 @@ export function init(RuntimeName, PHPLoader) { currentFullscreenStrategy = strategy; if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21424,12 +21369,8 @@ export function init(RuntimeName, PHPLoader) { !inCenteredWithoutScalingFullscreenMode && currentFullscreenStrategy.canvasResizedCallback ) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, currentFullscreenStrategy.canvasResizedCallbackUserData ); @@ -21528,12 +21469,8 @@ export function init(RuntimeName, PHPLoader) { softFullscreenResizeWebGLRenderTarget ); if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21546,12 +21483,8 @@ export function init(RuntimeName, PHPLoader) { // Inform the caller that the canvas size has changed. if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21619,12 +21552,8 @@ export function init(RuntimeName, PHPLoader) { fillPointerlockChangeEventData(pointerlockChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, pointerlockChangeEvent, userData ) @@ -21714,12 +21643,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var pointerlockErrorEventHandlerFunc = (e = event) => { if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ) @@ -21919,12 +21844,8 @@ export function init(RuntimeName, PHPLoader) { fillVisibilityChangeEventData(visibilityChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, visibilityChangeEvent, userData ) @@ -22044,12 +21965,8 @@ export function init(RuntimeName, PHPLoader) { HEAP32[(touchEvent + 8) >> 2] = numTouches; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, touchEvent, userData ) @@ -22187,12 +22104,8 @@ export function init(RuntimeName, PHPLoader) { fillGamepadEventData(gamepadEvent, e['gamepad']); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, gamepadEvent, userData ) @@ -22294,12 +22207,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var beforeUnloadEventHandlerFunc = (e = event) => { // Note: This is always called on the main browser thread, since it needs synchronously return a value! - var confirmationMessage = (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + var confirmationMessage = ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ); @@ -22370,12 +22279,8 @@ export function init(RuntimeName, PHPLoader) { fillBatteryEventData(batteryEvent, battery()); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, batteryEvent, userData ) @@ -22465,11 +22370,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_request_animation_frame = (cb, userData) => requestAnimationFrame((timeStamp) => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - timeStamp, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp, userData ) ); @@ -22481,11 +22383,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_request_animation_frame_loop = (cb, userData) => { function tick(timeStamp) { if ( - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - timeStamp, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp, userData ) ) { @@ -22710,10 +22609,8 @@ export function init(RuntimeName, PHPLoader) { return emSetImmediate(() => { runtimeKeepalivePop(); callUserCallback(() => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ); }); @@ -22730,10 +22627,8 @@ export function init(RuntimeName, PHPLoader) { function tick() { callUserCallback(() => { if ( - (( - a1 - ) => {}) /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ) { emSetImmediate(tick); @@ -22750,10 +22645,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_set_timeout = (cb, msecs, userData) => safeSetTimeout( () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ), msecs ); @@ -22769,11 +22662,8 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePop(); callUserCallback(() => { if ( - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - t, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ t, userData ) ) { @@ -22797,10 +22687,8 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePush(); return setInterval(() => { callUserCallback(() => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ); }, msecs); @@ -22815,10 +22703,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_async_call = (func, arg, millis) => { var wrapper = () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); if ( @@ -22851,7 +22737,7 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_set_main_loop = (func, fps, simulateInfiniteLoop) => { var iterFunc = - () => {} /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */; + () => {}; /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ setMainLoop(iterFunc, fps, simulateInfiniteLoop); }; _emscripten_set_main_loop.sig = 'vpii'; @@ -22863,10 +22749,8 @@ export function init(RuntimeName, PHPLoader) { simulateInfiniteLoop ) => { var iterFunc = () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); setMainLoop(iterFunc, fps, simulateInfiniteLoop, arg); }; @@ -22887,10 +22771,8 @@ export function init(RuntimeName, PHPLoader) { var __emscripten_push_main_loop_blocker = (func, arg, name) => { MainLoop.queue.push({ func: () => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, name: UTF8ToString(name), @@ -22903,10 +22785,8 @@ export function init(RuntimeName, PHPLoader) { var __emscripten_push_uncounted_main_loop_blocker = (func, arg, name) => { MainLoop.queue.push({ func: () => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, name: UTF8ToString(name), @@ -22940,12 +22820,8 @@ export function init(RuntimeName, PHPLoader) { var resultPtr = stackAlloc(POINTER_SIZE); HEAPU32[resultPtr >> 2] = 0; try { - var result = (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - resultPtr, + var result = ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ resultPtr, userData, value ); @@ -23881,19 +23757,15 @@ export function init(RuntimeName, PHPLoader) { () => { runtimeKeepalivePop(); if (onload) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - file + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file ); }, () => { runtimeKeepalivePop(); if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - file + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file ); }, true // don'tCreateFile - it's already there @@ -23927,21 +23799,16 @@ export function init(RuntimeName, PHPLoader) { () => { runtimeKeepalivePop(); if (onload) - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, cname ); }, () => { runtimeKeepalivePop(); if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, true // don'tCreateFile - it's already there @@ -24214,10 +24081,10 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePop(); callUserCallback(() => { var sp = stackSave(); - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - stringToUTF8OnStack(_file) + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stringToUTF8OnStack( + _file + ) ); stackRestore(sp); }); @@ -24261,12 +24128,8 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userdata, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata, buffer, byteArray.length ); @@ -24276,10 +24139,8 @@ export function init(RuntimeName, PHPLoader) { if (onerror) { runtimeKeepalivePop(); callUserCallback(() => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userdata + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata ); }); } @@ -24336,12 +24197,8 @@ export function init(RuntimeName, PHPLoader) { ); if (onload) { var sp = stackSave(); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, stringToUTF8OnStack(_file) ); @@ -24349,12 +24206,8 @@ export function init(RuntimeName, PHPLoader) { } } else { if (onerror) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status ); @@ -24367,12 +24220,8 @@ export function init(RuntimeName, PHPLoader) { http.onerror = (e) => { runtimeKeepalivePop(); if (onerror) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status ); @@ -24387,12 +24236,8 @@ export function init(RuntimeName, PHPLoader) { ) { var percentComplete = (e.loaded / e.total) * 100; if (onprogress) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, percentComplete ); @@ -24449,13 +24294,8 @@ export function init(RuntimeName, PHPLoader) { if (http.statusText) { statusText = stringToUTF8OnStack(http.statusText); } - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status, statusText @@ -24476,13 +24316,8 @@ export function init(RuntimeName, PHPLoader) { var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); if (onload) - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, buffer, byteArray.length @@ -24503,13 +24338,8 @@ export function init(RuntimeName, PHPLoader) { // PROGRESS http.onprogress = (e) => { if (onprogress) - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, e.loaded, e.lengthComputable || e.lengthComputable === undefined @@ -24629,24 +24459,16 @@ export function init(RuntimeName, PHPLoader) { if (event === 'error') { withStackSave(() => { var msg = stringToUTF8OnStack(data[2]); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - data[0], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data[0], data[1], msg, userData ); }); } else { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - data, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data, userData ); } @@ -25112,12 +24934,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var webGlEventHandlerFunc = (e = event) => { if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ) @@ -25336,21 +25154,15 @@ export function init(RuntimeName, PHPLoader) { ) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - lastX, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX, lastY ); } else if (GLUT.buttons != 0 && GLUT.motionFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - lastX, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX, lastY ); } @@ -25511,12 +25323,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.specialFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25526,12 +25334,8 @@ export function init(RuntimeName, PHPLoader) { if (key !== null && GLUT.keyboardFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25546,12 +25350,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.specialUpFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25561,12 +25361,8 @@ export function init(RuntimeName, PHPLoader) { if (key !== null && GLUT.keyboardUpFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25630,13 +25426,10 @@ export function init(RuntimeName, PHPLoader) { } catch (e) {} event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - event['button'], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[ + 'button' + ], 0 /*GLUT_DOWN*/, Browser.mouseX, Browser.mouseY @@ -25651,13 +25444,10 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.mouseFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - event['button'], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[ + 'button' + ], 1 /*GLUT_UP*/, Browser.mouseX, Browser.mouseY @@ -25686,13 +25476,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.mouseFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - button, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ button, 0 /*GLUT_DOWN*/, Browser.mouseX, Browser.mouseY @@ -25735,11 +25520,8 @@ export function init(RuntimeName, PHPLoader) { /* Can't call _glutReshapeWindow as that requests cancelling fullscreen. */ if (GLUT.reshapeFunc) { // out("GLUT.reshapeFunc (from FS): " + width + ", " + height); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -25782,11 +25564,8 @@ export function init(RuntimeName, PHPLoader) { Browser.resizeListeners.push((width, height) => { if (GLUT.reshapeFunc) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -25899,10 +25678,8 @@ export function init(RuntimeName, PHPLoader) { var _glutTimerFunc = (msec, func, value) => safeSetTimeout( () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - value + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ value ), msec ); @@ -26062,11 +25839,8 @@ export function init(RuntimeName, PHPLoader) { Browser.setCanvasSize(width, height, true); // N.B. GLUT.reshapeFunc is also registered as a canvas resize callback. // Just call it once here. if (GLUT.reshapeFunc) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -27128,21 +26902,15 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, buffer, byteArray.length ); @@ -27174,18 +26942,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (onstore) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); } @@ -27200,18 +26964,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (ondelete) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); }); @@ -27228,19 +26988,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (oncheck) - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, exists ); }); @@ -27256,18 +27011,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (onclear) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); }); @@ -27424,11 +27175,8 @@ export function init(RuntimeName, PHPLoader) { safeSetTimeout(() => { var stackBegin = Asyncify.currData + 12; var stackEnd = HEAPU32[Asyncify.currData >> 2]; - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - stackBegin, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stackBegin, stackEnd ); wakeUp(); @@ -27489,10 +27237,8 @@ export function init(RuntimeName, PHPLoader) { HEAPU32[(newFiber + 12) >> 2] = 0; var userData = HEAPU32[(newFiber + 16) >> 2]; - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ); } else { var asyncifyData = newFiber + 20; @@ -28504,11 +28250,8 @@ export function init(RuntimeName, PHPLoader) { if (!SDL.eventHandler) return; while (SDL.pollEvent(SDL.eventHandlerTemp)) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - SDL.eventHandlerContext, + ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL.eventHandlerContext, SDL.eventHandlerTemp ); } @@ -30141,12 +29884,9 @@ export function init(RuntimeName, PHPLoader) { return; // Ask SDL audio data from the user code. - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - SDL.audio.userdata, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL + .audio.userdata, SDL.audio.buffer, SDL.audio.bufferSize ); @@ -30604,10 +30344,8 @@ export function init(RuntimeName, PHPLoader) { info.audio = null; } if (SDL.channelFinished) { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - channel + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel ); } } @@ -30676,10 +30414,8 @@ export function init(RuntimeName, PHPLoader) { channelInfo.audio = null; } if (SDL.channelFinished) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - channel + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel ); }; if (channelInfo.audio) { @@ -31427,11 +31163,8 @@ export function init(RuntimeName, PHPLoader) { var _SDL_AddTimer = (interval, callback, param) => safeSetTimeout( () => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - interval, + ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ interval, param ), interval @@ -31802,12 +31535,8 @@ export function init(RuntimeName, PHPLoader) { socket.onopen = function (e) { var eventPtr = WS.getSocketEvent(socketId); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31829,12 +31558,8 @@ export function init(RuntimeName, PHPLoader) { socket.onerror = function (e) { var eventPtr = WS.getSocketEvent(socketId); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31859,12 +31584,8 @@ export function init(RuntimeName, PHPLoader) { (HEAP8[eventPtr + 4] = e.wasClean), (HEAP16[(eventPtr + 6) >> 1] = e.code), stringToUTF8(e.reason, eventPtr + 8, 512); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31898,12 +31619,8 @@ export function init(RuntimeName, PHPLoader) { (HEAPU32[(eventPtr + 4) >> 2] = buf), (HEAP32[(eventPtr + 8) >> 2] = len), (HEAP8[eventPtr + 12] = isText), - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); diff --git a/packages/php-wasm/node/asyncify/php_8_3.js b/packages/php-wasm/node/asyncify/php_8_3.js index cbca1f87a5..e0661a20a3 100644 --- a/packages/php-wasm/node/asyncify/php_8_3.js +++ b/packages/php-wasm/node/asyncify/php_8_3.js @@ -1774,10 +1774,8 @@ export function init(RuntimeName, PHPLoader) { ); var ___call_sighandler = (fp, sig) => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - sig + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ sig ); ___call_sighandler.sig = 'vpi'; @@ -8802,11 +8800,8 @@ export function init(RuntimeName, PHPLoader) { dlSetError(`'Could not load dynamic lib: ${filename}\n${e}`); runtimeKeepalivePop(); callUserCallback(() => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, user_data ) ); @@ -8814,11 +8809,8 @@ export function init(RuntimeName, PHPLoader) { function successCallback() { runtimeKeepalivePop(); callUserCallback(() => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, user_data ) ); @@ -19488,11 +19480,8 @@ export function init(RuntimeName, PHPLoader) { var trace = getCallstack(); var parts = trace.split('\n'); for (var i = 0; i < parts.length; i++) { - var ret = (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0, + var ret = ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0, arg ); if (ret !== 0) return; @@ -20068,12 +20057,8 @@ export function init(RuntimeName, PHPLoader) { stringToUTF8(e.locale || '', keyEventData + 128, 32); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, keyEventData, userData ) @@ -20191,12 +20176,8 @@ export function init(RuntimeName, PHPLoader) { fillMouseEventData(JSEvents.mouseEvent, e, target); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.mouseEvent, userData ) @@ -20410,12 +20391,8 @@ export function init(RuntimeName, PHPLoader) { HEAPF64[(wheelEvent + 80) >> 3] = e['deltaZ']; HEAP32[(wheelEvent + 88) >> 2] = e['deltaMode']; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, wheelEvent, userData ) @@ -20496,12 +20473,8 @@ export function init(RuntimeName, PHPLoader) { HEAP32[(uiEvent + 28) >> 2] = pageXOffset | 0; // scroll offsets are float HEAP32[(uiEvent + 32) >> 2] = pageYOffset | 0; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, uiEvent, userData ) @@ -20575,12 +20548,8 @@ export function init(RuntimeName, PHPLoader) { stringToUTF8(id, focusEvent + 128, 128); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, focusEvent, userData ) @@ -20696,12 +20665,8 @@ export function init(RuntimeName, PHPLoader) { ); // TODO: Thread-safety with respect to emscripten_get_deviceorientation_status() if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.deviceOrientationEvent, userData ) @@ -20784,12 +20749,8 @@ export function init(RuntimeName, PHPLoader) { fillDeviceMotionEventData(JSEvents.deviceMotionEvent, e, target); // TODO: Thread-safety with respect to emscripten_get_devicemotion_status() if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.deviceMotionEvent, userData ) @@ -20899,12 +20860,8 @@ export function init(RuntimeName, PHPLoader) { fillOrientationChangeEventData(orientationChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, orientationChangeEvent, userData ) @@ -21037,12 +20994,8 @@ export function init(RuntimeName, PHPLoader) { fillFullscreenChangeEventData(fullscreenChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, fullscreenChangeEvent, userData ) @@ -21206,12 +21159,8 @@ export function init(RuntimeName, PHPLoader) { ); if (currentFullscreenStrategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, currentFullscreenStrategy.canvasResizedCallbackUserData ); @@ -21317,12 +21266,8 @@ export function init(RuntimeName, PHPLoader) { currentFullscreenStrategy = strategy; if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21424,12 +21369,8 @@ export function init(RuntimeName, PHPLoader) { !inCenteredWithoutScalingFullscreenMode && currentFullscreenStrategy.canvasResizedCallback ) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, currentFullscreenStrategy.canvasResizedCallbackUserData ); @@ -21528,12 +21469,8 @@ export function init(RuntimeName, PHPLoader) { softFullscreenResizeWebGLRenderTarget ); if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21546,12 +21483,8 @@ export function init(RuntimeName, PHPLoader) { // Inform the caller that the canvas size has changed. if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21619,12 +21552,8 @@ export function init(RuntimeName, PHPLoader) { fillPointerlockChangeEventData(pointerlockChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, pointerlockChangeEvent, userData ) @@ -21714,12 +21643,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var pointerlockErrorEventHandlerFunc = (e = event) => { if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ) @@ -21919,12 +21844,8 @@ export function init(RuntimeName, PHPLoader) { fillVisibilityChangeEventData(visibilityChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, visibilityChangeEvent, userData ) @@ -22044,12 +21965,8 @@ export function init(RuntimeName, PHPLoader) { HEAP32[(touchEvent + 8) >> 2] = numTouches; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, touchEvent, userData ) @@ -22187,12 +22104,8 @@ export function init(RuntimeName, PHPLoader) { fillGamepadEventData(gamepadEvent, e['gamepad']); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, gamepadEvent, userData ) @@ -22294,12 +22207,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var beforeUnloadEventHandlerFunc = (e = event) => { // Note: This is always called on the main browser thread, since it needs synchronously return a value! - var confirmationMessage = (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + var confirmationMessage = ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ); @@ -22370,12 +22279,8 @@ export function init(RuntimeName, PHPLoader) { fillBatteryEventData(batteryEvent, battery()); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, batteryEvent, userData ) @@ -22465,11 +22370,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_request_animation_frame = (cb, userData) => requestAnimationFrame((timeStamp) => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - timeStamp, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp, userData ) ); @@ -22481,11 +22383,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_request_animation_frame_loop = (cb, userData) => { function tick(timeStamp) { if ( - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - timeStamp, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp, userData ) ) { @@ -22710,10 +22609,8 @@ export function init(RuntimeName, PHPLoader) { return emSetImmediate(() => { runtimeKeepalivePop(); callUserCallback(() => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ); }); @@ -22730,10 +22627,8 @@ export function init(RuntimeName, PHPLoader) { function tick() { callUserCallback(() => { if ( - (( - a1 - ) => {}) /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ) { emSetImmediate(tick); @@ -22750,10 +22645,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_set_timeout = (cb, msecs, userData) => safeSetTimeout( () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ), msecs ); @@ -22769,11 +22662,8 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePop(); callUserCallback(() => { if ( - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - t, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ t, userData ) ) { @@ -22797,10 +22687,8 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePush(); return setInterval(() => { callUserCallback(() => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ); }, msecs); @@ -22815,10 +22703,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_async_call = (func, arg, millis) => { var wrapper = () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); if ( @@ -22851,7 +22737,7 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_set_main_loop = (func, fps, simulateInfiniteLoop) => { var iterFunc = - () => {} /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */; + () => {}; /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ setMainLoop(iterFunc, fps, simulateInfiniteLoop); }; _emscripten_set_main_loop.sig = 'vpii'; @@ -22863,10 +22749,8 @@ export function init(RuntimeName, PHPLoader) { simulateInfiniteLoop ) => { var iterFunc = () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); setMainLoop(iterFunc, fps, simulateInfiniteLoop, arg); }; @@ -22887,10 +22771,8 @@ export function init(RuntimeName, PHPLoader) { var __emscripten_push_main_loop_blocker = (func, arg, name) => { MainLoop.queue.push({ func: () => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, name: UTF8ToString(name), @@ -22903,10 +22785,8 @@ export function init(RuntimeName, PHPLoader) { var __emscripten_push_uncounted_main_loop_blocker = (func, arg, name) => { MainLoop.queue.push({ func: () => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, name: UTF8ToString(name), @@ -22940,12 +22820,8 @@ export function init(RuntimeName, PHPLoader) { var resultPtr = stackAlloc(POINTER_SIZE); HEAPU32[resultPtr >> 2] = 0; try { - var result = (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - resultPtr, + var result = ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ resultPtr, userData, value ); @@ -23881,19 +23757,15 @@ export function init(RuntimeName, PHPLoader) { () => { runtimeKeepalivePop(); if (onload) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - file + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file ); }, () => { runtimeKeepalivePop(); if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - file + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file ); }, true // don'tCreateFile - it's already there @@ -23927,21 +23799,16 @@ export function init(RuntimeName, PHPLoader) { () => { runtimeKeepalivePop(); if (onload) - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, cname ); }, () => { runtimeKeepalivePop(); if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, true // don'tCreateFile - it's already there @@ -24214,10 +24081,10 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePop(); callUserCallback(() => { var sp = stackSave(); - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - stringToUTF8OnStack(_file) + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stringToUTF8OnStack( + _file + ) ); stackRestore(sp); }); @@ -24261,12 +24128,8 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userdata, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata, buffer, byteArray.length ); @@ -24276,10 +24139,8 @@ export function init(RuntimeName, PHPLoader) { if (onerror) { runtimeKeepalivePop(); callUserCallback(() => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userdata + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata ); }); } @@ -24336,12 +24197,8 @@ export function init(RuntimeName, PHPLoader) { ); if (onload) { var sp = stackSave(); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, stringToUTF8OnStack(_file) ); @@ -24349,12 +24206,8 @@ export function init(RuntimeName, PHPLoader) { } } else { if (onerror) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status ); @@ -24367,12 +24220,8 @@ export function init(RuntimeName, PHPLoader) { http.onerror = (e) => { runtimeKeepalivePop(); if (onerror) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status ); @@ -24387,12 +24236,8 @@ export function init(RuntimeName, PHPLoader) { ) { var percentComplete = (e.loaded / e.total) * 100; if (onprogress) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, percentComplete ); @@ -24449,13 +24294,8 @@ export function init(RuntimeName, PHPLoader) { if (http.statusText) { statusText = stringToUTF8OnStack(http.statusText); } - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status, statusText @@ -24476,13 +24316,8 @@ export function init(RuntimeName, PHPLoader) { var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); if (onload) - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, buffer, byteArray.length @@ -24503,13 +24338,8 @@ export function init(RuntimeName, PHPLoader) { // PROGRESS http.onprogress = (e) => { if (onprogress) - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, e.loaded, e.lengthComputable || e.lengthComputable === undefined @@ -24629,24 +24459,16 @@ export function init(RuntimeName, PHPLoader) { if (event === 'error') { withStackSave(() => { var msg = stringToUTF8OnStack(data[2]); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - data[0], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data[0], data[1], msg, userData ); }); } else { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - data, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data, userData ); } @@ -25112,12 +24934,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var webGlEventHandlerFunc = (e = event) => { if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ) @@ -25336,21 +25154,15 @@ export function init(RuntimeName, PHPLoader) { ) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - lastX, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX, lastY ); } else if (GLUT.buttons != 0 && GLUT.motionFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - lastX, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX, lastY ); } @@ -25511,12 +25323,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.specialFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25526,12 +25334,8 @@ export function init(RuntimeName, PHPLoader) { if (key !== null && GLUT.keyboardFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25546,12 +25350,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.specialUpFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25561,12 +25361,8 @@ export function init(RuntimeName, PHPLoader) { if (key !== null && GLUT.keyboardUpFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25630,13 +25426,10 @@ export function init(RuntimeName, PHPLoader) { } catch (e) {} event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - event['button'], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[ + 'button' + ], 0 /*GLUT_DOWN*/, Browser.mouseX, Browser.mouseY @@ -25651,13 +25444,10 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.mouseFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - event['button'], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[ + 'button' + ], 1 /*GLUT_UP*/, Browser.mouseX, Browser.mouseY @@ -25686,13 +25476,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.mouseFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - button, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ button, 0 /*GLUT_DOWN*/, Browser.mouseX, Browser.mouseY @@ -25735,11 +25520,8 @@ export function init(RuntimeName, PHPLoader) { /* Can't call _glutReshapeWindow as that requests cancelling fullscreen. */ if (GLUT.reshapeFunc) { // out("GLUT.reshapeFunc (from FS): " + width + ", " + height); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -25782,11 +25564,8 @@ export function init(RuntimeName, PHPLoader) { Browser.resizeListeners.push((width, height) => { if (GLUT.reshapeFunc) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -25899,10 +25678,8 @@ export function init(RuntimeName, PHPLoader) { var _glutTimerFunc = (msec, func, value) => safeSetTimeout( () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - value + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ value ), msec ); @@ -26062,11 +25839,8 @@ export function init(RuntimeName, PHPLoader) { Browser.setCanvasSize(width, height, true); // N.B. GLUT.reshapeFunc is also registered as a canvas resize callback. // Just call it once here. if (GLUT.reshapeFunc) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -27128,21 +26902,15 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, buffer, byteArray.length ); @@ -27174,18 +26942,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (onstore) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); } @@ -27200,18 +26964,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (ondelete) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); }); @@ -27228,19 +26988,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (oncheck) - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, exists ); }); @@ -27256,18 +27011,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (onclear) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); }); @@ -27424,11 +27175,8 @@ export function init(RuntimeName, PHPLoader) { safeSetTimeout(() => { var stackBegin = Asyncify.currData + 12; var stackEnd = HEAPU32[Asyncify.currData >> 2]; - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - stackBegin, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stackBegin, stackEnd ); wakeUp(); @@ -27489,10 +27237,8 @@ export function init(RuntimeName, PHPLoader) { HEAPU32[(newFiber + 12) >> 2] = 0; var userData = HEAPU32[(newFiber + 16) >> 2]; - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ); } else { var asyncifyData = newFiber + 20; @@ -28504,11 +28250,8 @@ export function init(RuntimeName, PHPLoader) { if (!SDL.eventHandler) return; while (SDL.pollEvent(SDL.eventHandlerTemp)) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - SDL.eventHandlerContext, + ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL.eventHandlerContext, SDL.eventHandlerTemp ); } @@ -30141,12 +29884,9 @@ export function init(RuntimeName, PHPLoader) { return; // Ask SDL audio data from the user code. - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - SDL.audio.userdata, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL + .audio.userdata, SDL.audio.buffer, SDL.audio.bufferSize ); @@ -30604,10 +30344,8 @@ export function init(RuntimeName, PHPLoader) { info.audio = null; } if (SDL.channelFinished) { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - channel + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel ); } } @@ -30676,10 +30414,8 @@ export function init(RuntimeName, PHPLoader) { channelInfo.audio = null; } if (SDL.channelFinished) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - channel + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel ); }; if (channelInfo.audio) { @@ -31427,11 +31163,8 @@ export function init(RuntimeName, PHPLoader) { var _SDL_AddTimer = (interval, callback, param) => safeSetTimeout( () => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - interval, + ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ interval, param ), interval @@ -31802,12 +31535,8 @@ export function init(RuntimeName, PHPLoader) { socket.onopen = function (e) { var eventPtr = WS.getSocketEvent(socketId); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31829,12 +31558,8 @@ export function init(RuntimeName, PHPLoader) { socket.onerror = function (e) { var eventPtr = WS.getSocketEvent(socketId); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31859,12 +31584,8 @@ export function init(RuntimeName, PHPLoader) { (HEAP8[eventPtr + 4] = e.wasClean), (HEAP16[(eventPtr + 6) >> 1] = e.code), stringToUTF8(e.reason, eventPtr + 8, 512); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31898,12 +31619,8 @@ export function init(RuntimeName, PHPLoader) { (HEAPU32[(eventPtr + 4) >> 2] = buf), (HEAP32[(eventPtr + 8) >> 2] = len), (HEAP8[eventPtr + 12] = isText), - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); diff --git a/packages/php-wasm/node/asyncify/php_8_4.js b/packages/php-wasm/node/asyncify/php_8_4.js index 83b36fecec..efe1fccc18 100644 --- a/packages/php-wasm/node/asyncify/php_8_4.js +++ b/packages/php-wasm/node/asyncify/php_8_4.js @@ -1774,10 +1774,8 @@ export function init(RuntimeName, PHPLoader) { ); var ___call_sighandler = (fp, sig) => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - sig + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ sig ); ___call_sighandler.sig = 'vpi'; @@ -8802,11 +8800,8 @@ export function init(RuntimeName, PHPLoader) { dlSetError(`'Could not load dynamic lib: ${filename}\n${e}`); runtimeKeepalivePop(); callUserCallback(() => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, user_data ) ); @@ -8814,11 +8809,8 @@ export function init(RuntimeName, PHPLoader) { function successCallback() { runtimeKeepalivePop(); callUserCallback(() => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, user_data ) ); @@ -19488,11 +19480,8 @@ export function init(RuntimeName, PHPLoader) { var trace = getCallstack(); var parts = trace.split('\n'); for (var i = 0; i < parts.length; i++) { - var ret = (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0, + var ret = ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0, arg ); if (ret !== 0) return; @@ -20068,12 +20057,8 @@ export function init(RuntimeName, PHPLoader) { stringToUTF8(e.locale || '', keyEventData + 128, 32); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, keyEventData, userData ) @@ -20191,12 +20176,8 @@ export function init(RuntimeName, PHPLoader) { fillMouseEventData(JSEvents.mouseEvent, e, target); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.mouseEvent, userData ) @@ -20410,12 +20391,8 @@ export function init(RuntimeName, PHPLoader) { HEAPF64[(wheelEvent + 80) >> 3] = e['deltaZ']; HEAP32[(wheelEvent + 88) >> 2] = e['deltaMode']; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, wheelEvent, userData ) @@ -20496,12 +20473,8 @@ export function init(RuntimeName, PHPLoader) { HEAP32[(uiEvent + 28) >> 2] = pageXOffset | 0; // scroll offsets are float HEAP32[(uiEvent + 32) >> 2] = pageYOffset | 0; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, uiEvent, userData ) @@ -20575,12 +20548,8 @@ export function init(RuntimeName, PHPLoader) { stringToUTF8(id, focusEvent + 128, 128); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, focusEvent, userData ) @@ -20696,12 +20665,8 @@ export function init(RuntimeName, PHPLoader) { ); // TODO: Thread-safety with respect to emscripten_get_deviceorientation_status() if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.deviceOrientationEvent, userData ) @@ -20784,12 +20749,8 @@ export function init(RuntimeName, PHPLoader) { fillDeviceMotionEventData(JSEvents.deviceMotionEvent, e, target); // TODO: Thread-safety with respect to emscripten_get_devicemotion_status() if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, JSEvents.deviceMotionEvent, userData ) @@ -20899,12 +20860,8 @@ export function init(RuntimeName, PHPLoader) { fillOrientationChangeEventData(orientationChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, orientationChangeEvent, userData ) @@ -21037,12 +20994,8 @@ export function init(RuntimeName, PHPLoader) { fillFullscreenChangeEventData(fullscreenChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, fullscreenChangeEvent, userData ) @@ -21206,12 +21159,8 @@ export function init(RuntimeName, PHPLoader) { ); if (currentFullscreenStrategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, currentFullscreenStrategy.canvasResizedCallbackUserData ); @@ -21317,12 +21266,8 @@ export function init(RuntimeName, PHPLoader) { currentFullscreenStrategy = strategy; if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21424,12 +21369,8 @@ export function init(RuntimeName, PHPLoader) { !inCenteredWithoutScalingFullscreenMode && currentFullscreenStrategy.canvasResizedCallback ) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, currentFullscreenStrategy.canvasResizedCallbackUserData ); @@ -21528,12 +21469,8 @@ export function init(RuntimeName, PHPLoader) { softFullscreenResizeWebGLRenderTarget ); if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21546,12 +21483,8 @@ export function init(RuntimeName, PHPLoader) { // Inform the caller that the canvas size has changed. if (strategy.canvasResizedCallback) { - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 37, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37, 0, strategy.canvasResizedCallbackUserData ); @@ -21619,12 +21552,8 @@ export function init(RuntimeName, PHPLoader) { fillPointerlockChangeEventData(pointerlockChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, pointerlockChangeEvent, userData ) @@ -21714,12 +21643,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var pointerlockErrorEventHandlerFunc = (e = event) => { if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ) @@ -21919,12 +21844,8 @@ export function init(RuntimeName, PHPLoader) { fillVisibilityChangeEventData(visibilityChangeEvent); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, visibilityChangeEvent, userData ) @@ -22044,12 +21965,8 @@ export function init(RuntimeName, PHPLoader) { HEAP32[(touchEvent + 8) >> 2] = numTouches; if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, touchEvent, userData ) @@ -22187,12 +22104,8 @@ export function init(RuntimeName, PHPLoader) { fillGamepadEventData(gamepadEvent, e['gamepad']); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, gamepadEvent, userData ) @@ -22294,12 +22207,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var beforeUnloadEventHandlerFunc = (e = event) => { // Note: This is always called on the main browser thread, since it needs synchronously return a value! - var confirmationMessage = (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + var confirmationMessage = ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ); @@ -22370,12 +22279,8 @@ export function init(RuntimeName, PHPLoader) { fillBatteryEventData(batteryEvent, battery()); if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, batteryEvent, userData ) @@ -22465,11 +22370,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_request_animation_frame = (cb, userData) => requestAnimationFrame((timeStamp) => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - timeStamp, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp, userData ) ); @@ -22481,11 +22383,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_request_animation_frame_loop = (cb, userData) => { function tick(timeStamp) { if ( - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - timeStamp, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp, userData ) ) { @@ -22710,10 +22609,8 @@ export function init(RuntimeName, PHPLoader) { return emSetImmediate(() => { runtimeKeepalivePop(); callUserCallback(() => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ); }); @@ -22730,10 +22627,8 @@ export function init(RuntimeName, PHPLoader) { function tick() { callUserCallback(() => { if ( - (( - a1 - ) => {}) /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ) { emSetImmediate(tick); @@ -22750,10 +22645,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_set_timeout = (cb, msecs, userData) => safeSetTimeout( () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ), msecs ); @@ -22769,11 +22662,8 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePop(); callUserCallback(() => { if ( - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - t, + ((a1, a2) => {})( + /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ t, userData ) ) { @@ -22797,10 +22687,8 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePush(); return setInterval(() => { callUserCallback(() => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ) ); }, msecs); @@ -22815,10 +22703,8 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_async_call = (func, arg, millis) => { var wrapper = () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); if ( @@ -22851,7 +22737,7 @@ export function init(RuntimeName, PHPLoader) { var _emscripten_set_main_loop = (func, fps, simulateInfiniteLoop) => { var iterFunc = - () => {} /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */; + () => {}; /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ setMainLoop(iterFunc, fps, simulateInfiniteLoop); }; _emscripten_set_main_loop.sig = 'vpii'; @@ -22863,10 +22749,8 @@ export function init(RuntimeName, PHPLoader) { simulateInfiniteLoop ) => { var iterFunc = () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); setMainLoop(iterFunc, fps, simulateInfiniteLoop, arg); }; @@ -22887,10 +22771,8 @@ export function init(RuntimeName, PHPLoader) { var __emscripten_push_main_loop_blocker = (func, arg, name) => { MainLoop.queue.push({ func: () => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, name: UTF8ToString(name), @@ -22903,10 +22785,8 @@ export function init(RuntimeName, PHPLoader) { var __emscripten_push_uncounted_main_loop_blocker = (func, arg, name) => { MainLoop.queue.push({ func: () => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, name: UTF8ToString(name), @@ -22940,12 +22820,8 @@ export function init(RuntimeName, PHPLoader) { var resultPtr = stackAlloc(POINTER_SIZE); HEAPU32[resultPtr >> 2] = 0; try { - var result = (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - resultPtr, + var result = ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ resultPtr, userData, value ); @@ -23881,19 +23757,15 @@ export function init(RuntimeName, PHPLoader) { () => { runtimeKeepalivePop(); if (onload) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - file + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file ); }, () => { runtimeKeepalivePop(); if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - file + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file ); }, true // don'tCreateFile - it's already there @@ -23927,21 +23799,16 @@ export function init(RuntimeName, PHPLoader) { () => { runtimeKeepalivePop(); if (onload) - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, cname ); }, () => { runtimeKeepalivePop(); if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }, true // don'tCreateFile - it's already there @@ -24214,10 +24081,10 @@ export function init(RuntimeName, PHPLoader) { runtimeKeepalivePop(); callUserCallback(() => { var sp = stackSave(); - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - stringToUTF8OnStack(_file) + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stringToUTF8OnStack( + _file + ) ); stackRestore(sp); }); @@ -24261,12 +24128,8 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userdata, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata, buffer, byteArray.length ); @@ -24276,10 +24139,8 @@ export function init(RuntimeName, PHPLoader) { if (onerror) { runtimeKeepalivePop(); callUserCallback(() => { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userdata + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata ); }); } @@ -24336,12 +24197,8 @@ export function init(RuntimeName, PHPLoader) { ); if (onload) { var sp = stackSave(); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, stringToUTF8OnStack(_file) ); @@ -24349,12 +24206,8 @@ export function init(RuntimeName, PHPLoader) { } } else { if (onerror) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status ); @@ -24367,12 +24220,8 @@ export function init(RuntimeName, PHPLoader) { http.onerror = (e) => { runtimeKeepalivePop(); if (onerror) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status ); @@ -24387,12 +24236,8 @@ export function init(RuntimeName, PHPLoader) { ) { var percentComplete = (e.loaded / e.total) * 100; if (onprogress) - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, percentComplete ); @@ -24449,13 +24294,8 @@ export function init(RuntimeName, PHPLoader) { if (http.statusText) { statusText = stringToUTF8OnStack(http.statusText); } - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, http.status, statusText @@ -24476,13 +24316,8 @@ export function init(RuntimeName, PHPLoader) { var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); if (onload) - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, buffer, byteArray.length @@ -24503,13 +24338,8 @@ export function init(RuntimeName, PHPLoader) { // PROGRESS http.onprogress = (e) => { if (onprogress) - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - handle, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle, userdata, e.loaded, e.lengthComputable || e.lengthComputable === undefined @@ -24629,24 +24459,16 @@ export function init(RuntimeName, PHPLoader) { if (event === 'error') { withStackSave(() => { var msg = stringToUTF8OnStack(data[2]); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - data[0], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data[0], data[1], msg, userData ); }); } else { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - data, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data, userData ); } @@ -25112,12 +24934,8 @@ export function init(RuntimeName, PHPLoader) { ) => { var webGlEventHandlerFunc = (e = event) => { if ( - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - eventTypeId, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId, 0, userData ) @@ -25336,21 +25154,15 @@ export function init(RuntimeName, PHPLoader) { ) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - lastX, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX, lastY ); } else if (GLUT.buttons != 0 && GLUT.motionFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - lastX, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX, lastY ); } @@ -25511,12 +25323,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.specialFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25526,12 +25334,8 @@ export function init(RuntimeName, PHPLoader) { if (key !== null && GLUT.keyboardFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25546,12 +25350,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.specialUpFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25561,12 +25361,8 @@ export function init(RuntimeName, PHPLoader) { if (key !== null && GLUT.keyboardUpFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - key, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key, Browser.mouseX, Browser.mouseY ); @@ -25630,13 +25426,10 @@ export function init(RuntimeName, PHPLoader) { } catch (e) {} event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - event['button'], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[ + 'button' + ], 0 /*GLUT_DOWN*/, Browser.mouseX, Browser.mouseY @@ -25651,13 +25444,10 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.mouseFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - event['button'], + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[ + 'button' + ], 1 /*GLUT_UP*/, Browser.mouseX, Browser.mouseY @@ -25686,13 +25476,8 @@ export function init(RuntimeName, PHPLoader) { if (GLUT.mouseFunc) { event.preventDefault(); GLUT.saveModifiers(event); - (( - a1, - a2, - a3, - a4 - ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - button, + ((a1, a2, a3, a4) => {})( + /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ button, 0 /*GLUT_DOWN*/, Browser.mouseX, Browser.mouseY @@ -25735,11 +25520,8 @@ export function init(RuntimeName, PHPLoader) { /* Can't call _glutReshapeWindow as that requests cancelling fullscreen. */ if (GLUT.reshapeFunc) { // out("GLUT.reshapeFunc (from FS): " + width + ", " + height); - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -25782,11 +25564,8 @@ export function init(RuntimeName, PHPLoader) { Browser.resizeListeners.push((width, height) => { if (GLUT.reshapeFunc) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -25899,10 +25678,8 @@ export function init(RuntimeName, PHPLoader) { var _glutTimerFunc = (msec, func, value) => safeSetTimeout( () => - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - value + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ value ), msec ); @@ -26062,11 +25839,8 @@ export function init(RuntimeName, PHPLoader) { Browser.setCanvasSize(width, height, true); // N.B. GLUT.reshapeFunc is also registered as a canvas resize callback. // Just call it once here. if (GLUT.reshapeFunc) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - width, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width, height ); } @@ -27128,21 +26902,15 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } var buffer = _malloc(byteArray.length); HEAPU8.set(byteArray, buffer); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, buffer, byteArray.length ); @@ -27174,18 +26942,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (onstore) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); } @@ -27200,18 +26964,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (ondelete) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); }); @@ -27228,19 +26988,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (oncheck) - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg, exists ); }); @@ -27256,18 +27011,14 @@ export function init(RuntimeName, PHPLoader) { callUserCallback(() => { if (error) { if (onerror) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); return; } if (onclear) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - arg + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg ); }); }); @@ -27424,11 +27175,8 @@ export function init(RuntimeName, PHPLoader) { safeSetTimeout(() => { var stackBegin = Asyncify.currData + 12; var stackEnd = HEAPU32[Asyncify.currData >> 2]; - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - stackBegin, + ((a1, a2) => {})( + /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stackBegin, stackEnd ); wakeUp(); @@ -27489,10 +27237,8 @@ export function init(RuntimeName, PHPLoader) { HEAPU32[(newFiber + 12) >> 2] = 0; var userData = HEAPU32[(newFiber + 16) >> 2]; - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - userData + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData ); } else { var asyncifyData = newFiber + 20; @@ -28504,11 +28250,8 @@ export function init(RuntimeName, PHPLoader) { if (!SDL.eventHandler) return; while (SDL.pollEvent(SDL.eventHandlerTemp)) { - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - SDL.eventHandlerContext, + ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL.eventHandlerContext, SDL.eventHandlerTemp ); } @@ -30141,12 +29884,9 @@ export function init(RuntimeName, PHPLoader) { return; // Ask SDL audio data from the user code. - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - SDL.audio.userdata, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL + .audio.userdata, SDL.audio.buffer, SDL.audio.bufferSize ); @@ -30604,10 +30344,8 @@ export function init(RuntimeName, PHPLoader) { info.audio = null; } if (SDL.channelFinished) { - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - channel + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel ); } } @@ -30676,10 +30414,8 @@ export function init(RuntimeName, PHPLoader) { channelInfo.audio = null; } if (SDL.channelFinished) - (( - a1 - ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - channel + ((a1) => {})( + /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel ); }; if (channelInfo.audio) { @@ -31427,11 +31163,8 @@ export function init(RuntimeName, PHPLoader) { var _SDL_AddTimer = (interval, callback, param) => safeSetTimeout( () => - (( - a1, - a2 - ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - interval, + ((a1, a2) => {})( + /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ interval, param ), interval @@ -31802,12 +31535,8 @@ export function init(RuntimeName, PHPLoader) { socket.onopen = function (e) { var eventPtr = WS.getSocketEvent(socketId); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31829,12 +31558,8 @@ export function init(RuntimeName, PHPLoader) { socket.onerror = function (e) { var eventPtr = WS.getSocketEvent(socketId); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31859,12 +31584,8 @@ export function init(RuntimeName, PHPLoader) { (HEAP8[eventPtr + 4] = e.wasClean), (HEAP16[(eventPtr + 6) >> 1] = e.code), stringToUTF8(e.reason, eventPtr + 8, 512); - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); @@ -31898,12 +31619,8 @@ export function init(RuntimeName, PHPLoader) { (HEAPU32[(eventPtr + 4) >> 2] = buf), (HEAP32[(eventPtr + 8) >> 2] = len), (HEAP8[eventPtr + 12] = isText), - (( - a1, - a2, - a3 - ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */( - 0 /*TODO*/, + ((a1, a2, a3) => {})( + /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/, eventPtr, userData ); diff --git a/packages/php-wasm/xdebug-bridge/project.json b/packages/php-wasm/xdebug-bridge/project.json index 12d126e850..535063450e 100644 --- a/packages/php-wasm/xdebug-bridge/project.json +++ b/packages/php-wasm/xdebug-bridge/project.json @@ -67,8 +67,7 @@ "{workspaceRoot}/coverage/packages/php-wasm/xdebug-bridge" ], "options": { - "reportsDirectory": "../../../coverage/packages/php-wasm/xdebug-bridge", - "testFiles": ["mock-test.spec.ts"] + "reportsDirectory": "../../../coverage/packages/php-wasm/xdebug-bridge" } }, "typecheck": { diff --git a/packages/php-wasm/xdebug-bridge/src/lib/cdp-server.ts b/packages/php-wasm/xdebug-bridge/src/lib/cdp-server.ts index 2cf0130146..d0fb17c4cb 100644 --- a/packages/php-wasm/xdebug-bridge/src/lib/cdp-server.ts +++ b/packages/php-wasm/xdebug-bridge/src/lib/cdp-server.ts @@ -47,4 +47,8 @@ export class CDPServer extends EventEmitter { console.log('\x1b[1;32m[CDP][send]\x1b[0m', json); this.ws.send(json); } + + close() { + this.wss.close(); + } } diff --git a/packages/php-wasm/xdebug-bridge/src/lib/dbgp-session.ts b/packages/php-wasm/xdebug-bridge/src/lib/dbgp-session.ts index fb2a4e2a89..add8d412ad 100644 --- a/packages/php-wasm/xdebug-bridge/src/lib/dbgp-session.ts +++ b/packages/php-wasm/xdebug-bridge/src/lib/dbgp-session.ts @@ -80,4 +80,8 @@ export class DbgpSession extends EventEmitter { // Commands must end with null terminator this.socket.write(command + '\x00'); } + + close() { + this.server.close(); + } } diff --git a/packages/php-wasm/xdebug-bridge/src/lib/xdebug-cdp-bridge.ts b/packages/php-wasm/xdebug-bridge/src/lib/xdebug-cdp-bridge.ts index 10b192bd22..75dae703fd 100644 --- a/packages/php-wasm/xdebug-bridge/src/lib/xdebug-cdp-bridge.ts +++ b/packages/php-wasm/xdebug-bridge/src/lib/xdebug-cdp-bridge.ts @@ -22,6 +22,10 @@ interface ObjectHandle { contextId?: number; depth: number; fullname?: string; + // Add pagination support + currentPage?: number; + totalPages?: number; + aggregatedProps?: any[]; } export interface XdebugCDPBridgeConfig { @@ -136,6 +140,11 @@ export class XdebugCDPBridge { }); } + stop() { + this.dbgp.close(); + this.cdp.close(); + } + private sendInitialScripts() { // Send scriptParsed for the main file if not already sent if (this.initFileUri && !this.scriptIdByUrl.has(this.initFileUri)) { @@ -387,20 +396,36 @@ export class XdebugCDPBridge { if (handle.type === 'context') { const contextId = handle.contextId ?? 0; const depth = handle.depth; - // Get variables in the context - const cmd = `context_get -d ${depth} -c ${contextId}`; + // Get variables in the context with pagination support (32 items per page) + const cmd = `context_get -d ${depth} -c ${contextId} -p 0 -m 32`; const txn = this.sendDbgpCommand(cmd); + // Initialize pagination state + const updatedHandle = { + ...handle, + currentPage: 0, + aggregatedProps: [], + }; + this.objectHandles.set(objectId, updatedHandle); this.pendingCommands.set(txn, { cdpId: id, cdpMethod: method, + params: { objectId: objectId }, }); sendResponse = false; } else if (handle.type === 'property') { const depth = handle.depth; const fullname = handle.fullname!; const fmtName = this.formatPropertyFullName(fullname); - const cmd = `property_get -d ${depth} -n ${fmtName}`; + // Get property with pagination support (32 items per page) + const cmd = `property_get -d ${depth} -n ${fmtName} -p 0 -m 32`; const txn = this.sendDbgpCommand(cmd); + // Initialize pagination state + const updatedHandle = { + ...handle, + currentPage: 0, + aggregatedProps: [], + }; + this.objectHandles.set(objectId, updatedHandle); this.pendingCommands.set(txn, { cdpId: id, cdpMethod: method, @@ -686,13 +711,26 @@ export class XdebugCDPBridge { case 'context_get': case 'property_get': { if (pending && pending.cdpId !== undefined) { - // Handle variables or object properties retrieval - const props: any = []; - const responseProps = response.property; + // Handle variables or object properties retrieval with pagination + const objectId = + pending.params?.objectId || + pending.params?.parentObjectId; + const handle = objectId + ? this.objectHandles.get(objectId) + : null; + + // @TODO: This is hacky. It enables browsing arrays. Without it, + // the debugger shows $_SERVER as an array with a single property called + // $_SERVER. + const responseProps = + response.property?.property ?? response.property; + + const currentProps: any[] = []; if (responseProps) { const propertiesArray = Array.isArray(responseProps) ? responseProps : [responseProps]; + for (const prop of propertiesArray) { const name = prop.$.name || prop.$.fullname || ''; @@ -722,7 +760,7 @@ export class XdebugCDPBridge { const className = prop.$.classname || (type === 'array' ? 'Array' : 'Object'); - const objectId = String( + const childObjectId = String( this.nextObjectId++ ); // Store handle @@ -745,19 +783,20 @@ export class XdebugCDPBridge { )?.depth || 0 : 0; // Use same depth/context as parent - this.objectHandles.set(objectId, { + this.objectHandles.set(childObjectId, { type: 'property', depth: depth, contextId: contextId, fullname: prop.$.fullname || name, }); - props.push({ + + currentProps.push({ name: prop.$.key || name, value: { type: 'object', className: className, description: className, - objectId: objectId, + objectId: childObjectId, }, writable: false, configurable: false, @@ -802,7 +841,7 @@ export class XdebugCDPBridge { }; if (subtype) valueObj.subtype = subtype; valueObj.value = value; - props.push({ + currentProps.push({ name: prop.$.key || name, value: valueObj, writable: false, @@ -812,9 +851,71 @@ export class XdebugCDPBridge { } } } - const result = { result: props }; - this.cdp.sendMessage({ id: pending.cdpId, result }); - this.pendingCommands.delete(transId); + + // Handle pagination + if (handle) { + // Add current page props to aggregated results + const aggregatedProps = ( + handle.aggregatedProps || [] + ).concat(currentProps); + + // Check if there are more pages - if we got exactly 32 items (page size), there might be more + const pageSize = 32; + const hasMorePages = + currentProps.length === pageSize; + + if (hasMorePages) { + // More pages available, fetch next page + const nextPage = (handle.currentPage || 0) + 1; + const updatedHandle = { + ...handle, + currentPage: nextPage, + aggregatedProps: aggregatedProps, + }; + this.objectHandles.set( + objectId!, + updatedHandle + ); + + // Send command for next page + let nextCmd: string; + if (command === 'context_get') { + const contextId = handle.contextId ?? 0; + const depth = handle.depth; + nextCmd = `context_get -d ${depth} -c ${contextId} -p ${nextPage} -m ${pageSize}`; + } else { + // property_get + const depth = handle.depth; + const fullname = handle.fullname!; + const fmtName = + this.formatPropertyFullName(fullname); + nextCmd = `property_get -d ${depth} -n ${fmtName} -p ${nextPage} -m ${pageSize}`; + } + + const txn = this.sendDbgpCommand(nextCmd); + this.pendingCommands.set(txn, { + cdpId: pending.cdpId, + cdpMethod: pending.cdpMethod, + params: pending.params, + }); + // Don't send response yet, wait for more pages + this.pendingCommands.delete(transId); + return; + } else { + // No more pages or last page, send final response + const result = { result: aggregatedProps }; + this.cdp.sendMessage({ + id: pending.cdpId, + result, + }); + this.pendingCommands.delete(transId); + } + } else { + // No handle, send current props + const result = { result: currentProps }; + this.cdp.sendMessage({ id: pending.cdpId, result }); + this.pendingCommands.delete(transId); + } } break; } diff --git a/packages/php-wasm/xdebug-bridge/src/tests/cdp-server.spec.ts b/packages/php-wasm/xdebug-bridge/src/tests/cdp-server.spec.ts new file mode 100644 index 0000000000..418da4931e --- /dev/null +++ b/packages/php-wasm/xdebug-bridge/src/tests/cdp-server.spec.ts @@ -0,0 +1,106 @@ +import './mocker'; +import { vi } from 'vitest'; +import { WebSocket } from 'ws'; +import { CDPServer } from '../lib/cdp-server'; + +describe('CDPServer', () => { + let server: any; + let socket: any; + + beforeEach(() => { + // @ts-ignore + socket = new WebSocket(); + server = new CDPServer(9999); + }); + + afterEach(() => { + server.removeAllListeners(); + vi.clearAllMocks(); + }); + + it('emits clientConnected on new connection', () => { + const onClientConnected = vi.fn(); + + server.on('clientConnected', onClientConnected); + server.wss.emit('connection', socket); + + expect(onClientConnected).toHaveBeenCalled(); + }); + + it('only allows one client at a time', () => { + // @ts-ignore + const client = new WebSocket(); + const spy = vi.spyOn(client, 'close'); + + server.wss.emit('connection', socket); + server.wss.emit('connection', client); + + expect(spy).toHaveBeenCalledTimes(1); + }); + + it('emits message when a valid JSON message is received', () => { + const msg = { id: 1, method: 'Debugger.enable' }; + const onMessage = vi.fn(); + + server.on('message', onMessage); + server.wss.emit('connection', socket); + socket.emit('message', JSON.stringify(msg)); + + expect(onMessage).toHaveBeenCalledWith(msg); + }); + + it('ignores invalid JSON messages', () => { + const onMessage = vi.fn(); + + server.on('message', onMessage); + server.wss.emit('connection', socket); + socket.emit('message', '{ invalid json }'); + + expect(onMessage).not.toHaveBeenCalled(); + }); + + it('emits clientDisconnected when client closes', () => { + const onDisconnect = vi.fn(); + + server.on('clientDisconnected', onDisconnect); + server.wss.emit('connection', socket); + socket.emit('close'); + + expect(onDisconnect).toHaveBeenCalled(); + }); + + it('emits error on websocket error', () => { + const error = new Error('Test error'); + const onError = vi.fn(); + + server.on('error', onError); + server.wss.emit('connection', socket); + socket.emit('error', error); + + expect(onError).toHaveBeenCalledWith(error); + }); + + it('sends a message if client is connected and open', () => { + const msg = { id: 1, result: 'ok' }; + + server.wss.emit('connection', socket); + server.sendMessage(msg); + + expect(socket.send).toHaveBeenCalledWith(JSON.stringify(msg)); + }); + + it('does not send message if no client connected', () => { + server.sendMessage({ hello: 'world' }); + + expect(socket.send).not.toHaveBeenCalled(); + }); + + it('does not send message if client is not OPEN', () => { + socket.readyState = 0; + + server.wss.emit('connection', socket); + server.sendMessage({ id: 1 }); + + expect(socket.send).not.toHaveBeenCalled(); + }); +}); diff --git a/packages/php-wasm/xdebug-bridge/src/tests/dbgp-session.spec.ts b/packages/php-wasm/xdebug-bridge/src/tests/dbgp-session.spec.ts new file mode 100644 index 0000000000..58d58a6d7b --- /dev/null +++ b/packages/php-wasm/xdebug-bridge/src/tests/dbgp-session.spec.ts @@ -0,0 +1,113 @@ +import './mocker'; +import net from 'net'; +import { vi } from 'vitest'; +import { DbgpSession } from '../lib/dbgp-session'; + +describe('DbgpSession', () => { + let server: any; + let socket: any; + + beforeEach(() => { + socket = new net.Socket(); + server = new net.Server(); + + vi.spyOn(net, 'createServer').mockImplementation(() => server); + }); + + afterEach(() => { + vi.clearAllMocks(); + }); + + it('listens on specified port', () => { + new DbgpSession(1234); + + expect(net.createServer).toHaveBeenCalled(); + expect(server.listen).toHaveBeenCalledWith(1234); + }); + + it('emits connected on first connection', () => { + const session = new DbgpSession(); + + const onConnected = vi.fn(); + session.on('connected', onConnected); + server.onConnectionHandler(socket); + + expect(socket.setEncoding).toHaveBeenCalledWith('utf8'); + expect(onConnected).toHaveBeenCalled(); + }); + + it('rejects second connection', () => { + new DbgpSession(); + server.onConnectionHandler(socket); + + const secondSocket = new net.Socket(); + secondSocket.destroy = vi.fn(); + + server.onConnectionHandler(secondSocket); + expect(secondSocket.destroy).toHaveBeenCalled(); + }); + + it('emits message when receiving valid length-prefixed XML data', () => { + const session = new DbgpSession(); + server.onConnectionHandler(socket); + + const onMessage = vi.fn(); + session.on('message', onMessage); + + socket.emit('data', '25\x00test\x00'); + + expect(onMessage).toHaveBeenCalledWith('test'); + }); + + it('handles partial and multiple messages correctly', () => { + const session = new DbgpSession(); + server.onConnectionHandler(socket); + + const onMessage = vi.fn(); + session.on('message', onMessage); + + socket.emit('data', '24\x00foo\x00'); + + expect(onMessage).toHaveBeenCalledWith('foo'); + + socket.emit( + 'data', + '24\x00bar\x0024\x00baz\x00' + ); + + expect(onMessage).toHaveBeenCalledWith('bar'); + expect(onMessage).toHaveBeenCalledWith('baz'); + }); + + it('sends command with null terminator', () => { + const session = new DbgpSession(); + server.onConnectionHandler(socket); + + session.sendCommand('run -i 1'); + expect(socket.write).toHaveBeenCalledWith('run -i 1\x00'); + }); + + it('emits close and reset socket on close', () => { + const session = new DbgpSession(); + server.onConnectionHandler(socket); + + const onClose = vi.fn(); + session.on('close', onClose); + + socket.emit('close'); + expect(onClose).toHaveBeenCalled(); + }); + + it('emits error events', () => { + const session = new DbgpSession(); + server.onConnectionHandler(socket); + + const onError = vi.fn(); + session.on('error', onError); + + const err = new Error('Test'); + socket.emit('error', err); + expect(onError).toHaveBeenCalledWith(err); + }); +}); diff --git a/packages/php-wasm/xdebug-bridge/src/tests/fixtures/array.php b/packages/php-wasm/xdebug-bridge/src/tests/fixtures/array.php new file mode 100644 index 0000000000..322e87d3a0 --- /dev/null +++ b/packages/php-wasm/xdebug-bridge/src/tests/fixtures/array.php @@ -0,0 +1,16 @@ + "bar", + "baz" => [ + "qux" => "quux", + "corge" => [ + "grault" => "garply", + "waldo" => "fred" + ] + ] +]; + +$test = 42; + +echo "Stop!\n"; diff --git a/packages/php-wasm/xdebug-bridge/src/tests/fixtures/test.php b/packages/php-wasm/xdebug-bridge/src/tests/fixtures/test.php new file mode 100644 index 0000000000..0bb2aa8f0c --- /dev/null +++ b/packages/php-wasm/xdebug-bridge/src/tests/fixtures/test.php @@ -0,0 +1,11 @@ + { + const { EventEmitter } = await import('events'); + + class WebSocket extends EventEmitter { + readyState = 1; + OPEN = 1; + send = vi.fn(); + close = vi.fn(); + } + class WebSocketServer extends EventEmitter { + constructor() { + super(); + } + } + return { + WebSocketServer, + WebSocket, + }; +}); + +vi.mock('net', async () => { + const { EventEmitter } = await import('events'); + + class Socket extends EventEmitter { + setEncoding = vi.fn(); + write = vi.fn(); + destroy = vi.fn(); + } + + class Server extends EventEmitter { + // eslint-disable-next-line @typescript-eslint/no-unsafe-function-type + onConnectionHandler: Function | undefined; + + listen = vi.fn(); + // eslint-disable-next-line @typescript-eslint/no-unsafe-function-type + override on = vi.fn((event: string, handler: Function) => { + if (event === 'connection') this.onConnectionHandler = handler; + + return this; + }); + } + + return { + default: { + createServer: vi.fn(() => new Server()), + Socket, + Server, + }, + }; +}); + +vi.mock(import('fs'), async (original) => { + const fs = await original(); + return { + ...fs, + readdirSync: vi.fn().mockReturnValue(['foo.js', 'bar.md', 'baz.php']), + lstatSync: vi.fn().mockReturnValue({ isDirectory: () => false }), + readFileSync: vi.fn().mockReturnValue(' { + const path = await original(); + return { + ...path, + join: vi.fn((...args: string[]) => args.join('/')), + }; +}); diff --git a/packages/php-wasm/xdebug-bridge/src/tests/run-cli.spec.ts b/packages/php-wasm/xdebug-bridge/src/tests/run-cli.spec.ts new file mode 100644 index 0000000000..f354a2fb44 --- /dev/null +++ b/packages/php-wasm/xdebug-bridge/src/tests/run-cli.spec.ts @@ -0,0 +1,70 @@ +import './mocker'; +import { vi } from 'vitest'; +import { main } from '../lib/run-cli'; +import { startBridge } from '../lib/start-bridge'; +import type { XdebugCDPBridge } from '../lib/xdebug-cdp-bridge'; + +describe('CLI', () => { + const argv = process.argv; + + beforeEach(async () => { + process.argv = [...argv.slice(0, 2)]; + + vi.spyOn( + await import('../lib/start-bridge'), + 'startBridge' + ).mockResolvedValue({ start: vi.fn() } as unknown as XdebugCDPBridge); + }); + + afterEach(() => { + process.argv = argv; + + vi.clearAllMocks(); + }); + + it('calls startBridge with default arguments', async () => { + await main(); + + expect(startBridge).toHaveBeenCalledWith({ + cdpPort: 9229, + cdpHost: 'localhost', + dbgpPort: 9003, + phpRoot: './', + }); + + const bridge = await (startBridge as any).mock.results[0].value; + expect(bridge.start).toHaveBeenCalled(); + }); + + it('passes custom arguments correctly', async () => { + process.argv.push( + '--port', + '9000', + '--host', + '127.0.0.1', + '--php-root', + '/var/www' + ); + + await main(); + + expect(startBridge).toHaveBeenCalledWith({ + cdpPort: 9229, + cdpHost: '127.0.0.1', + dbgpPort: 9000, + phpRoot: '/var/www', + }); + }); + + it('does not start bridge when help argument is passed', async () => { + process.argv.push('--help'); + + try { + await main(); + } catch (e: any) { + expect(e.message).toBe('process.exit unexpectedly called with "0"'); + } + + expect(startBridge).not.toHaveBeenCalled(); + }); +}); diff --git a/packages/php-wasm/xdebug-bridge/src/tests/start-bridge.spec.ts b/packages/php-wasm/xdebug-bridge/src/tests/start-bridge.spec.ts new file mode 100644 index 0000000000..761b952bcc --- /dev/null +++ b/packages/php-wasm/xdebug-bridge/src/tests/start-bridge.spec.ts @@ -0,0 +1,101 @@ +import './mocker'; +import { vi } from 'vitest'; +import type { PHP } from '@php-wasm/universal'; +import { EventEmitter } from 'events'; +import { startBridge } from '../lib/start-bridge'; +import { CDPServer } from '../lib/cdp-server'; +import { DbgpSession } from '../lib/dbgp-session'; +import { XdebugCDPBridge } from '../lib/xdebug-cdp-bridge'; + +describe('Bridge', () => { + beforeEach(async () => { + vi.spyOn(global, 'setTimeout').mockImplementation( + (cb) => global.setImmediate(() => cb()) as unknown as NodeJS.Timeout + ); + vi.spyOn(EventEmitter.prototype, 'on').mockImplementation(function ( + this: EventEmitter, + event, + cb + ) { + if (event === 'clientConnected') { + setTimeout(cb, 0); + } + return this; + }); + + vi.spyOn( + await import('../lib/cdp-server'), + 'CDPServer' + ).mockReturnThis(); + vi.spyOn( + await import('../lib/dbgp-session'), + 'DbgpSession' + ).mockReturnThis(); + vi.spyOn( + await import('../lib/xdebug-cdp-bridge'), + 'XdebugCDPBridge' + ).mockReturnThis(); + }); + + afterEach(() => { + vi.clearAllMocks(); + }); + + it('starts the bridge with default config', async () => { + const bridge = await startBridge({}); + + expect(CDPServer).toHaveBeenCalledWith(9229); + expect(DbgpSession).toHaveBeenCalledWith(9003); + expect(XdebugCDPBridge).toHaveBeenCalled(); + expect(bridge).toBeInstanceOf(XdebugCDPBridge); + }); + + it('respects custom ports and hosts', async () => { + await startBridge({ + cdpPort: 9999, + dbgpPort: 8888, + }); + + expect(CDPServer).toHaveBeenCalledWith(9999); + expect(DbgpSession).toHaveBeenCalledWith(8888); + }); + + it('finds PHP files', async () => { + await startBridge({ phpRoot: '/foo/bar' }); + + const args = (XdebugCDPBridge as any).mock.calls[0][2]; + expect(args.knownScriptUrls).toContain('file:///foo/bar/baz.php'); + + expect(typeof args.getPHPFile).toBe('function'); + const content = await args.getPHPFile('file:///foo/bar/baz.php'); + expect(content).toBe(' { + const php = { + readFileAsText: vi + .fn() + .mockResolvedValue(' { + const getPHPFile = vi + .fn() + .mockResolvedValue(' { + let php: PHP; + let dbgpSession: DbgpSession; + let cdpServer: CDPServer; + let bridge: XdebugCDPBridge; + + beforeEach(async () => { + php = new PHP( + await loadNodeRuntime(RecommendedPHPVersion, { withXdebug: true }) + ); + + dbgpSession = new DbgpSession(); + cdpServer = new CDPServer(); + bridge = new XdebugCDPBridge(dbgpSession, cdpServer, { + knownScriptUrls: fs.readdirSync(`${import.meta.dirname}/fixtures`), + getPHPFile: (file) => php.readFileAsText(file), + }); + + vi.spyOn(dbgpSession, 'sendCommand'); + vi.spyOn(dbgpSession, 'on'); + vi.spyOn(cdpServer, 'sendMessage'); + vi.spyOn(cdpServer, 'on'); + }); + + afterEach(() => { + vi.clearAllMocks(); + + bridge.stop(); + + php.exit(); + }); + + it('initializes with correct script IDs', () => { + expect(bridge['scriptIdByUrl'].get('array.php')).toBe('1'); + expect(bridge['scriptIdByUrl'].get('test.php')).toBe('2'); + }); + + it('registers event handlers in start function', () => { + bridge.start(); + + expect(dbgpSession.on).toHaveBeenCalledWith( + 'connected', + expect.any(Function) + ); + expect(dbgpSession.on).toHaveBeenCalledWith( + 'message', + expect.any(Function) + ); + expect(dbgpSession.on).toHaveBeenCalledWith( + 'close', + expect.any(Function) + ); + + expect(cdpServer.on).toHaveBeenCalledWith( + 'clientConnected', + expect.any(Function) + ); + expect(cdpServer.on).toHaveBeenCalledWith( + 'message', + expect.any(Function) + ); + expect(cdpServer.on).toHaveBeenCalledWith( + 'clientDisconnected', + expect.any(Function) + ); + }); + + it('sends command with correct transaction ID', () => { + const txn = bridge['sendDbgpCommand']('run'); + expect(txn).toBe('1'); + expect(dbgpSession.sendCommand).toHaveBeenCalledWith('run -i 1'); + }); + + it('formats property fullname with escaping', () => { + const formatted = bridge['formatPropertyFullName']( + `$_SERVER["HTTP_HOST"]` + ); + expect(formatted).toBe('"$_SERVER[\\"HTTP_HOST\\"]"'); + }); + + it('handles Debugger.resume and send run command', () => { + bridge['xdebugConnected'] = true; + + bridge['handleCdpMessage']({ + id: 101, + method: 'Debugger.resume', + params: {}, + }); + + expect(dbgpSession.sendCommand).toHaveBeenCalledWith( + expect.stringContaining('run') + ); + expect(cdpServer.sendMessage).toHaveBeenCalledWith({ + id: 101, + result: {}, + }); + }); + + it('handles Debugger.setBreakpointByUrl when xdebug is not connected', () => { + bridge['xdebugConnected'] = false; + + bridge['handleCdpMessage']({ + id: 202, + method: 'Debugger.setBreakpointByUrl', + params: { + url: 'file:///test.php', + lineNumber: 4, + }, + }); + + expect(cdpServer.sendMessage).toHaveBeenCalledWith({ + id: 202, + result: { + breakpointId: '1', + locations: [ + { + scriptId: '3', + lineNumber: 4, + columnNumber: 0, + }, + ], + }, + }); + }); + + it('handles Debugger.removeBreakpoint and update internal state', () => { + bridge['breakpoints'].set('1', { + cdpId: '1', + xdebugId: null, + file: 'file:///test.php', + line: 5, + }); + + bridge['handleCdpMessage']({ + id: 303, + method: 'Debugger.removeBreakpoint', + params: { breakpointId: '1' }, + }); + + expect(bridge['breakpoints'].has('1')).toBe(false); + expect(cdpServer.sendMessage).toHaveBeenCalledWith({ + id: 303, + result: {}, + }); + }); + + it('connects to Xdebug and pauses at a breakpoint', async () => { + bridge.start(); + + const script = fs.readFileSync( + `${import.meta.dirname}/fixtures/test.php` + ); + + await php.runStream({ code: script.toString() }); + + await new Promise((resolve) => { + const original = cdpServer.sendMessage.bind(cdpServer); + vi.spyOn(cdpServer, 'sendMessage').mockImplementation((msg) => { + if (msg.method === 'Debugger.paused') resolve(msg); + return original(msg); + }); + }); + + expect(cdpServer.sendMessage).toHaveBeenCalledWith( + expect.objectContaining({ method: 'Debugger.paused' }) + ); + }); + + it('connects to Xdebug, pause at a breakpoint, steps over and returns correct stack', async () => { + bridge.start(); + + const script = fs.readFileSync( + `${import.meta.dirname}/fixtures/array.php` + ); + + await php.runStream({ code: script.toString() }); + + // 5 transactions were already sent before the first pause. + let steps = 5; + const transactions: Record = + {}; + + await new Promise((resolve) => { + const originalSendMessage = cdpServer.sendMessage.bind(cdpServer); + vi.spyOn(cdpServer, 'sendMessage').mockImplementation((message) => { + if (message.method === 'Debugger.paused') { + if (steps < 8) { + dbgpSession.sendCommand(`step_over -i ${steps}`); + } else if (steps == 8) { + dbgpSession.sendCommand( + `property_get -d 0 -n $nested_array -p 0 -m 32 -i ${steps}` + ); + } + steps++; + } + return originalSendMessage(message); + }); + + const originalOnData = (dbgpSession as any).onData.bind( + dbgpSession + ); + vi.spyOn(dbgpSession as any, 'onData').mockImplementation( + (data) => { + if ((data as string).includes('command="property_get')) { + if (steps == 9) { + dbgpSession.sendCommand( + `property_get -d 0 -n $nested_array["baz"] -p 0 -m 32 -i ${steps}` + ); + } else if (steps == 10) { + dbgpSession.sendCommand( + `property_get -d 0 -n $nested_array["baz"]["corge"] -p 0 -m 32 -i ${steps}` + ); + } else { + resolve(); + } + steps++; + + const id = (data as string).match( + /transaction_id="([^"]+)"/ + )![1]; + const matches = [ + ...(data as string).matchAll( + /]+)>/g + ), + ]; + + const children = matches.slice(1).map((m) => { + const attrs = m[1]; + const nameMatch = attrs.match(/name="([^"]+)"/); + const typeMatch = attrs.match(/type="([^"]+)"/); + return { + name: nameMatch ? nameMatch[1] : '', + type: typeMatch ? typeMatch[1] : '', + }; + }); + + transactions[id] = children; + } + + return originalOnData(data); + } + ); + }); + + expect(transactions[8]).toEqual([ + { name: 'foo', type: 'string' }, + { name: 'baz', type: 'array' }, + ]); + expect(transactions[9]).toEqual([ + { name: 'qux', type: 'string' }, + { name: 'corge', type: 'array' }, + ]); + expect(transactions[10]).toEqual([ + { name: 'grault', type: 'string' }, + { name: 'waldo', type: 'string' }, + ]); + }); +}); diff --git a/packages/php-wasm/xdebug-bridge/tests/mock-test.spec.ts b/packages/php-wasm/xdebug-bridge/tests/mock-test.spec.ts deleted file mode 100644 index f40ba17587..0000000000 --- a/packages/php-wasm/xdebug-bridge/tests/mock-test.spec.ts +++ /dev/null @@ -1,7 +0,0 @@ -import { test, expect } from 'vitest'; - -test('mock test to prevent vitest from failing', () => { - // This is a placeholder test to ensure vitest doesn't fail due to no tests - // TODO: Add actual tests for the xdebug-bridge functionality - expect(true).toBe(true); -}); diff --git a/packages/php-wasm/xdebug-bridge/tsconfig.json b/packages/php-wasm/xdebug-bridge/tsconfig.json index e4e0c46e69..a6f5201524 100644 --- a/packages/php-wasm/xdebug-bridge/tsconfig.json +++ b/packages/php-wasm/xdebug-bridge/tsconfig.json @@ -4,9 +4,11 @@ "forceConsistentCasingInFileNames": true, "strict": true, "noImplicitOverride": true, + "allowSyntheticDefaultImports": true, "noPropertyAccessFromIndexSignature": true, "noImplicitReturns": true, - "noFallthroughCasesInSwitch": true + "noFallthroughCasesInSwitch": true, + "types": ["vitest"] }, "files": [], "include": [], diff --git a/packages/php-wasm/xdebug-bridge/vite.config.ts b/packages/php-wasm/xdebug-bridge/vite.config.ts index 921542c587..48f44ddf89 100644 --- a/packages/php-wasm/xdebug-bridge/vite.config.ts +++ b/packages/php-wasm/xdebug-bridge/vite.config.ts @@ -1,6 +1,7 @@ /// import { join } from 'path'; -import { defineConfig } from 'vite'; +import { defineConfig, type Plugin } from 'vite'; +import path from 'path'; import dts from 'vite-plugin-dts'; // eslint-disable-next-line @nx/enforce-module-boundaries @@ -19,6 +20,37 @@ export default defineConfig({ viteTsConfigPaths({ root: '../../../', }), + { + name: 'import-url', + enforce: 'pre', + + resolveId(id: string, importer: string): any { + if (id.startsWith('import-url:')) { + return id; + } + + if (!path.isAbsolute(id) && id.endsWith('?url')) { + const filepath = path.resolve(path.dirname(importer), id); + return `import-url:${filepath}`; + } + + return null; + }, + + load(id: string): any { + if (id.startsWith('import-url:')) { + const encodedPath = id.slice('import-url:'.length); + const filePath = encodedPath.replace('?url', ''); + + return { + code: `export default ${JSON.stringify(filePath)};`, + map: null, + }; + } + + return null; + }, + } as Plugin, ], build: { diff --git a/packages/playground/wordpress-builds/src/sqlite-database-integration/get-sqlite-driver-module-details.ts b/packages/playground/wordpress-builds/src/sqlite-database-integration/get-sqlite-driver-module-details.ts index e4e0ed4e51..63cb0be6e3 100644 --- a/packages/playground/wordpress-builds/src/sqlite-database-integration/get-sqlite-driver-module-details.ts +++ b/packages/playground/wordpress-builds/src/sqlite-database-integration/get-sqlite-driver-module-details.ts @@ -19,7 +19,6 @@ export function getSqliteDriverModuleDetails( url: string; } { switch (version) { - case 'develop': /** @ts-ignore */ return {