diff --git a/CHANGELOG.md b/CHANGELOG.md
index b28e0ccf43..73b9631d7f 100644
--- a/CHANGELOG.md
+++ b/CHANGELOG.md
@@ -4,24 +4,24 @@ All notable changes to this project are documented in this file by a CI job
that runs on every NPM release. The file follows the [Keep a Changelog](https://keepachangelog.com/en/1.1.0/)
format.
-## [v2.0.6] (2025-08-04)
+## [v2.0.6] (2025-08-04)
### Documentation
-- Adding Contribution pages Spanish translation. ([#2431](https://github.com/WordPress/wordpress-playground/pull/2431))
+- Adding Contribution pages Spanish translation. ([#2431](https://github.com/WordPress/wordpress-playground/pull/2431))
### PHP WebAssembly
-- Fix file locking for PROXYFS nodes that wrap NODEFS. ([#2437](https://github.com/WordPress/wordpress-playground/pull/2437))
+- Fix file locking for PROXYFS nodes that wrap NODEFS. ([#2437](https://github.com/WordPress/wordpress-playground/pull/2437))
### Bug Fixes
-- Translations: Fix command typo in docs. ([#2449](https://github.com/WordPress/wordpress-playground/pull/2449))
+- Translations: Fix command typo in docs. ([#2449](https://github.com/WordPress/wordpress-playground/pull/2449))
### Various
-- Add Japanese translations to Blueprint Bundles and API Consistency. ([#2438](https://github.com/WordPress/wordpress-playground/pull/2438))
-- Translations: Clean up version from PR #2336. ([#2448](https://github.com/WordPress/wordpress-playground/pull/2448))
+- Add Japanese translations to Blueprint Bundles and API Consistency. ([#2438](https://github.com/WordPress/wordpress-playground/pull/2438))
+- Translations: Clean up version from PR #2336. ([#2448](https://github.com/WordPress/wordpress-playground/pull/2448))
### Contributors
@@ -29,16 +29,15 @@ The following contributors merged PRs in this release:
@brandonpayton @fellyph @rollybueno @shimotmk @vipul0425
-
-## [v2.0.5] (2025-07-28)
+## [v2.0.5] (2025-07-28)
### Bug Fixes
-- Fix fcntl() F_GETLK fatal due to undefined flock struct address. ([#2432](https://github.com/WordPress/wordpress-playground/pull/2432))
+- Fix fcntl() F_GETLK fatal due to undefined flock struct address. ([#2432](https://github.com/WordPress/wordpress-playground/pull/2432))
### Various
-- Add Japanese translations to contributing index and sidebar. ([#2434](https://github.com/WordPress/wordpress-playground/pull/2434))
+- Add Japanese translations to contributing index and sidebar. ([#2434](https://github.com/WordPress/wordpress-playground/pull/2434))
### Contributors
@@ -46,40 +45,38 @@ The following contributors merged PRs in this release:
@brandonpayton @shimotmk
-
-## [v2.0.4] (2025-07-25)
+## [v2.0.4] (2025-07-25)
### Public API
-
#### Blueprints
-- Distribute @wp-playground/client without any package.json dependencies. ([#2426](https://github.com/WordPress/wordpress-playground/pull/2426))
+- Distribute @wp-playground/client without any package.json dependencies. ([#2426](https://github.com/WordPress/wordpress-playground/pull/2426))
### Tools
-- Fix ESLint 9 linting in VSCode. ([#2417](https://github.com/WordPress/wordpress-playground/pull/2417))
-- [ xdebug ] Add `--experimental-devtools` option in Playground CLI. ([#2411](https://github.com/WordPress/wordpress-playground/pull/2411))
+- Fix ESLint 9 linting in VSCode. ([#2417](https://github.com/WordPress/wordpress-playground/pull/2417))
+- [ xdebug ] Add `--experimental-devtools` option in Playground CLI. ([#2411](https://github.com/WordPress/wordpress-playground/pull/2411))
### PHP WebAssembly
-- [PHP] Dispatch request.error for all non-zero-exit request handler errors. ([#2429](https://github.com/WordPress/wordpress-playground/pull/2429))
+- [PHP] Dispatch request.error for all non-zero-exit request handler errors. ([#2429](https://github.com/WordPress/wordpress-playground/pull/2429))
### Website
-- Query Monitor plugin support. ([#2415](https://github.com/WordPress/wordpress-playground/pull/2415))
+- Query Monitor plugin support. ([#2415](https://github.com/WordPress/wordpress-playground/pull/2415))
### Internal
-- Skip flaky end-to-end tests in Firefox and Webkit. ([#2425](https://github.com/WordPress/wordpress-playground/pull/2425))
+- Skip flaky end-to-end tests in Firefox and Webkit. ([#2425](https://github.com/WordPress/wordpress-playground/pull/2425))
### Bug Fixes
-- [Xdebug Bridge] Correct error related to unresolved promises in bridge. ([#2422](https://github.com/WordPress/wordpress-playground/pull/2422))
+- [Xdebug Bridge] Correct error related to unresolved promises in bridge. ([#2422](https://github.com/WordPress/wordpress-playground/pull/2422))
### Various
-- Documentation add sidebar to blueprints bundles. ([#2397](https://github.com/WordPress/wordpress-playground/pull/2397))
+- Documentation add sidebar to blueprints bundles. ([#2397](https://github.com/WordPress/wordpress-playground/pull/2397))
### Contributors
@@ -87,16 +84,15 @@ The following contributors merged PRs in this release:
@adamziel @brandonpayton @mho22 @shimotmk
-
-## [v2.0.3] (2025-07-24)
+## [v2.0.3] (2025-07-24)
### Tools
-- [ xdebug ] Add `--experimental-devtools` option in php-wasm CLI. ([#2408](https://github.com/WordPress/wordpress-playground/pull/2408))
+- [ xdebug ] Add `--experimental-devtools` option in php-wasm CLI. ([#2408](https://github.com/WordPress/wordpress-playground/pull/2408))
### Bug Fixes
-- Playground CLI Allow /wordpress subdirs to be mounted before WP install. ([#2382](https://github.com/WordPress/wordpress-playground/pull/2382))
+- Playground CLI Allow /wordpress subdirs to be mounted before WP install. ([#2382](https://github.com/WordPress/wordpress-playground/pull/2382))
### Contributors
@@ -104,23 +100,21 @@ The following contributors merged PRs in this release:
@brandonpayton @mho22
-
-## [v2.0.2] (2025-07-23)
+## [v2.0.2] (2025-07-23)
### Tools
-
#### PHP WebAssembly
-- [ xdebug ] Bridge DBGP session with CDP server. ([#2402](https://github.com/WordPress/wordpress-playground/pull/2402))
+- [ xdebug ] Bridge DBGP session with CDP server. ([#2402](https://github.com/WordPress/wordpress-playground/pull/2402))
### Internal
-- [Build] Preserve optionalDependencies in built package.json. ([#2410](https://github.com/WordPress/wordpress-playground/pull/2410))
+- [Build] Preserve optionalDependencies in built package.json. ([#2410](https://github.com/WordPress/wordpress-playground/pull/2410))
-###
+###
-- Comlink] Throw the original error in the error handler. ([#2407](https://github.com/WordPress/wordpress-playground/pull/2407))
+- Comlink] Throw the original error in the error handler. ([#2407](https://github.com/WordPress/wordpress-playground/pull/2407))
### Contributors
@@ -128,7 +122,6 @@ The following contributors merged PRs in this release:
@adamziel
-
## [v2.0.1] (2025-07-23)
### Blueprints
diff --git a/packages/docs/site/docs/main/changelog.md b/packages/docs/site/docs/main/changelog.md
index a560b5ebb0..9cc97b6d64 100644
--- a/packages/docs/site/docs/main/changelog.md
+++ b/packages/docs/site/docs/main/changelog.md
@@ -9,24 +9,24 @@ All notable changes to this project are documented in this file by a CI job
that runs on every NPM release. The file follows the [Keep a Changelog](https://keepachangelog.com/en/1.1.0/)
format.
-## [v2.0.6] (2025-08-04)
+## [v2.0.6] (2025-08-04)
### Documentation
-- Adding Contribution pages Spanish translation. ([#2431](https://github.com/WordPress/wordpress-playground/pull/2431))
+- Adding Contribution pages Spanish translation. ([#2431](https://github.com/WordPress/wordpress-playground/pull/2431))
### PHP WebAssembly
-- Fix file locking for PROXYFS nodes that wrap NODEFS. ([#2437](https://github.com/WordPress/wordpress-playground/pull/2437))
+- Fix file locking for PROXYFS nodes that wrap NODEFS. ([#2437](https://github.com/WordPress/wordpress-playground/pull/2437))
### Bug Fixes
-- Translations: Fix command typo in docs. ([#2449](https://github.com/WordPress/wordpress-playground/pull/2449))
+- Translations: Fix command typo in docs. ([#2449](https://github.com/WordPress/wordpress-playground/pull/2449))
### Various
-- Add Japanese translations to Blueprint Bundles and API Consistency. ([#2438](https://github.com/WordPress/wordpress-playground/pull/2438))
-- Translations: Clean up version from PR #2336. ([#2448](https://github.com/WordPress/wordpress-playground/pull/2448))
+- Add Japanese translations to Blueprint Bundles and API Consistency. ([#2438](https://github.com/WordPress/wordpress-playground/pull/2438))
+- Translations: Clean up version from PR #2336. ([#2448](https://github.com/WordPress/wordpress-playground/pull/2448))
### Contributors
@@ -34,16 +34,15 @@ The following contributors merged PRs in this release:
@brandonpayton @fellyph @rollybueno @shimotmk @vipul0425
-
-## [v2.0.5] (2025-07-28)
+## [v2.0.5] (2025-07-28)
### Bug Fixes
-- Fix fcntl() F_GETLK fatal due to undefined flock struct address. ([#2432](https://github.com/WordPress/wordpress-playground/pull/2432))
+- Fix fcntl() F_GETLK fatal due to undefined flock struct address. ([#2432](https://github.com/WordPress/wordpress-playground/pull/2432))
### Various
-- Add Japanese translations to contributing index and sidebar. ([#2434](https://github.com/WordPress/wordpress-playground/pull/2434))
+- Add Japanese translations to contributing index and sidebar. ([#2434](https://github.com/WordPress/wordpress-playground/pull/2434))
### Contributors
@@ -51,40 +50,38 @@ The following contributors merged PRs in this release:
@brandonpayton @shimotmk
-
-## [v2.0.4] (2025-07-25)
+## [v2.0.4] (2025-07-25)
### Public API
-
#### Blueprints
-- Distribute @wp-playground/client without any package.json dependencies. ([#2426](https://github.com/WordPress/wordpress-playground/pull/2426))
+- Distribute @wp-playground/client without any package.json dependencies. ([#2426](https://github.com/WordPress/wordpress-playground/pull/2426))
### Tools
-- Fix ESLint 9 linting in VSCode. ([#2417](https://github.com/WordPress/wordpress-playground/pull/2417))
-- [ xdebug ] Add `--experimental-devtools` option in Playground CLI. ([#2411](https://github.com/WordPress/wordpress-playground/pull/2411))
+- Fix ESLint 9 linting in VSCode. ([#2417](https://github.com/WordPress/wordpress-playground/pull/2417))
+- [ xdebug ] Add `--experimental-devtools` option in Playground CLI. ([#2411](https://github.com/WordPress/wordpress-playground/pull/2411))
### PHP WebAssembly
-- [PHP] Dispatch request.error for all non-zero-exit request handler errors. ([#2429](https://github.com/WordPress/wordpress-playground/pull/2429))
+- [PHP] Dispatch request.error for all non-zero-exit request handler errors. ([#2429](https://github.com/WordPress/wordpress-playground/pull/2429))
### Website
-- Query Monitor plugin support. ([#2415](https://github.com/WordPress/wordpress-playground/pull/2415))
+- Query Monitor plugin support. ([#2415](https://github.com/WordPress/wordpress-playground/pull/2415))
### Internal
-- Skip flaky end-to-end tests in Firefox and Webkit. ([#2425](https://github.com/WordPress/wordpress-playground/pull/2425))
+- Skip flaky end-to-end tests in Firefox and Webkit. ([#2425](https://github.com/WordPress/wordpress-playground/pull/2425))
### Bug Fixes
-- [Xdebug Bridge] Correct error related to unresolved promises in bridge. ([#2422](https://github.com/WordPress/wordpress-playground/pull/2422))
+- [Xdebug Bridge] Correct error related to unresolved promises in bridge. ([#2422](https://github.com/WordPress/wordpress-playground/pull/2422))
### Various
-- Documentation add sidebar to blueprints bundles. ([#2397](https://github.com/WordPress/wordpress-playground/pull/2397))
+- Documentation add sidebar to blueprints bundles. ([#2397](https://github.com/WordPress/wordpress-playground/pull/2397))
### Contributors
@@ -92,16 +89,15 @@ The following contributors merged PRs in this release:
@adamziel @brandonpayton @mho22 @shimotmk
-
-## [v2.0.3] (2025-07-24)
+## [v2.0.3] (2025-07-24)
### Tools
-- [ xdebug ] Add `--experimental-devtools` option in php-wasm CLI. ([#2408](https://github.com/WordPress/wordpress-playground/pull/2408))
+- [ xdebug ] Add `--experimental-devtools` option in php-wasm CLI. ([#2408](https://github.com/WordPress/wordpress-playground/pull/2408))
### Bug Fixes
-- Playground CLI Allow /wordpress subdirs to be mounted before WP install. ([#2382](https://github.com/WordPress/wordpress-playground/pull/2382))
+- Playground CLI Allow /wordpress subdirs to be mounted before WP install. ([#2382](https://github.com/WordPress/wordpress-playground/pull/2382))
### Contributors
@@ -109,23 +105,21 @@ The following contributors merged PRs in this release:
@brandonpayton @mho22
-
-## [v2.0.2] (2025-07-23)
+## [v2.0.2] (2025-07-23)
### Tools
-
#### PHP WebAssembly
-- [ xdebug ] Bridge DBGP session with CDP server. ([#2402](https://github.com/WordPress/wordpress-playground/pull/2402))
+- [ xdebug ] Bridge DBGP session with CDP server. ([#2402](https://github.com/WordPress/wordpress-playground/pull/2402))
### Internal
-- [Build] Preserve optionalDependencies in built package.json. ([#2410](https://github.com/WordPress/wordpress-playground/pull/2410))
+- [Build] Preserve optionalDependencies in built package.json. ([#2410](https://github.com/WordPress/wordpress-playground/pull/2410))
-###
+###
-- Comlink] Throw the original error in the error handler. ([#2407](https://github.com/WordPress/wordpress-playground/pull/2407))
+- Comlink] Throw the original error in the error handler. ([#2407](https://github.com/WordPress/wordpress-playground/pull/2407))
### Contributors
@@ -133,7 +127,6 @@ The following contributors merged PRs in this release:
@adamziel
-
## [v2.0.1] (2025-07-23)
### Blueprints
diff --git a/packages/php-wasm/node/asyncify/php_7_2.js b/packages/php-wasm/node/asyncify/php_7_2.js
index dfe33bd041..50e191895c 100644
--- a/packages/php-wasm/node/asyncify/php_7_2.js
+++ b/packages/php-wasm/node/asyncify/php_7_2.js
@@ -1774,10 +1774,8 @@ export function init(RuntimeName, PHPLoader) {
);
var ___call_sighandler = (fp, sig) =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- sig
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ sig
);
___call_sighandler.sig = 'vpi';
@@ -8802,11 +8800,8 @@ export function init(RuntimeName, PHPLoader) {
dlSetError(`'Could not load dynamic lib: ${filename}\n${e}`);
runtimeKeepalivePop();
callUserCallback(() =>
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
user_data
)
);
@@ -8814,11 +8809,8 @@ export function init(RuntimeName, PHPLoader) {
function successCallback() {
runtimeKeepalivePop();
callUserCallback(() =>
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
user_data
)
);
@@ -19476,11 +19468,8 @@ export function init(RuntimeName, PHPLoader) {
var trace = getCallstack();
var parts = trace.split('\n');
for (var i = 0; i < parts.length; i++) {
- var ret = ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 0,
+ var ret = ((a1, a2) => {})(
+ /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0,
arg
);
if (ret !== 0) return;
@@ -20056,12 +20045,8 @@ export function init(RuntimeName, PHPLoader) {
stringToUTF8(e.locale || '', keyEventData + 128, 32);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
keyEventData,
userData
)
@@ -20179,12 +20164,8 @@ export function init(RuntimeName, PHPLoader) {
fillMouseEventData(JSEvents.mouseEvent, e, target);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
JSEvents.mouseEvent,
userData
)
@@ -20398,12 +20379,8 @@ export function init(RuntimeName, PHPLoader) {
HEAPF64[(wheelEvent + 80) >> 3] = e['deltaZ'];
HEAP32[(wheelEvent + 88) >> 2] = e['deltaMode'];
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
wheelEvent,
userData
)
@@ -20484,12 +20461,8 @@ export function init(RuntimeName, PHPLoader) {
HEAP32[(uiEvent + 28) >> 2] = pageXOffset | 0; // scroll offsets are float
HEAP32[(uiEvent + 32) >> 2] = pageYOffset | 0;
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
uiEvent,
userData
)
@@ -20563,12 +20536,8 @@ export function init(RuntimeName, PHPLoader) {
stringToUTF8(id, focusEvent + 128, 128);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
focusEvent,
userData
)
@@ -20684,12 +20653,8 @@ export function init(RuntimeName, PHPLoader) {
); // TODO: Thread-safety with respect to emscripten_get_deviceorientation_status()
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
JSEvents.deviceOrientationEvent,
userData
)
@@ -20772,12 +20737,8 @@ export function init(RuntimeName, PHPLoader) {
fillDeviceMotionEventData(JSEvents.deviceMotionEvent, e, target); // TODO: Thread-safety with respect to emscripten_get_devicemotion_status()
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
JSEvents.deviceMotionEvent,
userData
)
@@ -20887,12 +20848,8 @@ export function init(RuntimeName, PHPLoader) {
fillOrientationChangeEventData(orientationChangeEvent);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
orientationChangeEvent,
userData
)
@@ -21025,12 +20982,8 @@ export function init(RuntimeName, PHPLoader) {
fillFullscreenChangeEventData(fullscreenChangeEvent);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
fullscreenChangeEvent,
userData
)
@@ -21194,12 +21147,8 @@ export function init(RuntimeName, PHPLoader) {
);
if (currentFullscreenStrategy.canvasResizedCallback) {
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 37,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
0,
currentFullscreenStrategy.canvasResizedCallbackUserData
);
@@ -21305,12 +21254,8 @@ export function init(RuntimeName, PHPLoader) {
currentFullscreenStrategy = strategy;
if (strategy.canvasResizedCallback) {
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 37,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
0,
strategy.canvasResizedCallbackUserData
);
@@ -21412,12 +21357,8 @@ export function init(RuntimeName, PHPLoader) {
!inCenteredWithoutScalingFullscreenMode &&
currentFullscreenStrategy.canvasResizedCallback
) {
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 37,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
0,
currentFullscreenStrategy.canvasResizedCallbackUserData
);
@@ -21516,12 +21457,8 @@ export function init(RuntimeName, PHPLoader) {
softFullscreenResizeWebGLRenderTarget
);
if (strategy.canvasResizedCallback) {
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 37,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
0,
strategy.canvasResizedCallbackUserData
);
@@ -21534,12 +21471,8 @@ export function init(RuntimeName, PHPLoader) {
// Inform the caller that the canvas size has changed.
if (strategy.canvasResizedCallback) {
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 37,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
0,
strategy.canvasResizedCallbackUserData
);
@@ -21607,12 +21540,8 @@ export function init(RuntimeName, PHPLoader) {
fillPointerlockChangeEventData(pointerlockChangeEvent);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
pointerlockChangeEvent,
userData
)
@@ -21702,12 +21631,8 @@ export function init(RuntimeName, PHPLoader) {
) => {
var pointerlockErrorEventHandlerFunc = (e = event) => {
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
0,
userData
)
@@ -21907,12 +21832,8 @@ export function init(RuntimeName, PHPLoader) {
fillVisibilityChangeEventData(visibilityChangeEvent);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
visibilityChangeEvent,
userData
)
@@ -22032,12 +21953,8 @@ export function init(RuntimeName, PHPLoader) {
HEAP32[(touchEvent + 8) >> 2] = numTouches;
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
touchEvent,
userData
)
@@ -22175,12 +22092,8 @@ export function init(RuntimeName, PHPLoader) {
fillGamepadEventData(gamepadEvent, e['gamepad']);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
gamepadEvent,
userData
)
@@ -22282,12 +22195,8 @@ export function init(RuntimeName, PHPLoader) {
) => {
var beforeUnloadEventHandlerFunc = (e = event) => {
// Note: This is always called on the main browser thread, since it needs synchronously return a value!
- var confirmationMessage = ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ var confirmationMessage = ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
0,
userData
);
@@ -22358,12 +22267,8 @@ export function init(RuntimeName, PHPLoader) {
fillBatteryEventData(batteryEvent, battery());
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
batteryEvent,
userData
)
@@ -22453,11 +22358,8 @@ export function init(RuntimeName, PHPLoader) {
var _emscripten_request_animation_frame = (cb, userData) =>
requestAnimationFrame((timeStamp) =>
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- timeStamp,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp,
userData
)
);
@@ -22469,11 +22371,8 @@ export function init(RuntimeName, PHPLoader) {
var _emscripten_request_animation_frame_loop = (cb, userData) => {
function tick(timeStamp) {
if (
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- timeStamp,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp,
userData
)
) {
@@ -22698,10 +22597,8 @@ export function init(RuntimeName, PHPLoader) {
return emSetImmediate(() => {
runtimeKeepalivePop();
callUserCallback(() =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userData
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
)
);
});
@@ -22718,10 +22615,8 @@ export function init(RuntimeName, PHPLoader) {
function tick() {
callUserCallback(() => {
if (
- ((
- a1
- ) => {}) /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userData
+ ((a1) => {})(
+ /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
)
) {
emSetImmediate(tick);
@@ -22738,10 +22633,8 @@ export function init(RuntimeName, PHPLoader) {
var _emscripten_set_timeout = (cb, msecs, userData) =>
safeSetTimeout(
() =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userData
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
),
msecs
);
@@ -22757,11 +22650,8 @@ export function init(RuntimeName, PHPLoader) {
runtimeKeepalivePop();
callUserCallback(() => {
if (
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- t,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ t,
userData
)
) {
@@ -22785,10 +22675,8 @@ export function init(RuntimeName, PHPLoader) {
runtimeKeepalivePush();
return setInterval(() => {
callUserCallback(() =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userData
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
)
);
}, msecs);
@@ -22803,10 +22691,8 @@ export function init(RuntimeName, PHPLoader) {
var _emscripten_async_call = (func, arg, millis) => {
var wrapper = () =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
if (
@@ -22839,7 +22725,7 @@ export function init(RuntimeName, PHPLoader) {
var _emscripten_set_main_loop = (func, fps, simulateInfiniteLoop) => {
var iterFunc =
- () => {} /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */;
+ () => {}; /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */
setMainLoop(iterFunc, fps, simulateInfiniteLoop);
};
_emscripten_set_main_loop.sig = 'vpii';
@@ -22851,10 +22737,8 @@ export function init(RuntimeName, PHPLoader) {
simulateInfiniteLoop
) => {
var iterFunc = () =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
setMainLoop(iterFunc, fps, simulateInfiniteLoop, arg);
};
@@ -22875,10 +22759,8 @@ export function init(RuntimeName, PHPLoader) {
var __emscripten_push_main_loop_blocker = (func, arg, name) => {
MainLoop.queue.push({
func: () => {
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
},
name: UTF8ToString(name),
@@ -22891,10 +22773,8 @@ export function init(RuntimeName, PHPLoader) {
var __emscripten_push_uncounted_main_loop_blocker = (func, arg, name) => {
MainLoop.queue.push({
func: () => {
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
},
name: UTF8ToString(name),
@@ -22928,12 +22808,8 @@ export function init(RuntimeName, PHPLoader) {
var resultPtr = stackAlloc(POINTER_SIZE);
HEAPU32[resultPtr >> 2] = 0;
try {
- var result = ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- resultPtr,
+ var result = ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ resultPtr,
userData,
value
);
@@ -23869,19 +23745,15 @@ export function init(RuntimeName, PHPLoader) {
() => {
runtimeKeepalivePop();
if (onload)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- file
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file
);
},
() => {
runtimeKeepalivePop();
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- file
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file
);
},
true // don'tCreateFile - it's already there
@@ -23915,21 +23787,16 @@ export function init(RuntimeName, PHPLoader) {
() => {
runtimeKeepalivePop();
if (onload)
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
cname
);
},
() => {
runtimeKeepalivePop();
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
},
true // don'tCreateFile - it's already there
@@ -24202,10 +24069,10 @@ export function init(RuntimeName, PHPLoader) {
runtimeKeepalivePop();
callUserCallback(() => {
var sp = stackSave();
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- stringToUTF8OnStack(_file)
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stringToUTF8OnStack(
+ _file
+ )
);
stackRestore(sp);
});
@@ -24249,12 +24116,8 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
var buffer = _malloc(byteArray.length);
HEAPU8.set(byteArray, buffer);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userdata,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata,
buffer,
byteArray.length
);
@@ -24264,10 +24127,8 @@ export function init(RuntimeName, PHPLoader) {
if (onerror) {
runtimeKeepalivePop();
callUserCallback(() => {
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userdata
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata
);
});
}
@@ -24324,12 +24185,8 @@ export function init(RuntimeName, PHPLoader) {
);
if (onload) {
var sp = stackSave();
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
stringToUTF8OnStack(_file)
);
@@ -24337,12 +24194,8 @@ export function init(RuntimeName, PHPLoader) {
}
} else {
if (onerror)
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
http.status
);
@@ -24355,12 +24208,8 @@ export function init(RuntimeName, PHPLoader) {
http.onerror = (e) => {
runtimeKeepalivePop();
if (onerror)
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
http.status
);
@@ -24375,12 +24224,8 @@ export function init(RuntimeName, PHPLoader) {
) {
var percentComplete = (e.loaded / e.total) * 100;
if (onprogress)
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
percentComplete
);
@@ -24437,13 +24282,8 @@ export function init(RuntimeName, PHPLoader) {
if (http.statusText) {
statusText = stringToUTF8OnStack(http.statusText);
}
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
http.status,
statusText
@@ -24464,13 +24304,8 @@ export function init(RuntimeName, PHPLoader) {
var buffer = _malloc(byteArray.length);
HEAPU8.set(byteArray, buffer);
if (onload)
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
buffer,
byteArray.length
@@ -24491,13 +24326,8 @@ export function init(RuntimeName, PHPLoader) {
// PROGRESS
http.onprogress = (e) => {
if (onprogress)
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
e.loaded,
e.lengthComputable || e.lengthComputable === undefined
@@ -24617,24 +24447,16 @@ export function init(RuntimeName, PHPLoader) {
if (event === 'error') {
withStackSave(() => {
var msg = stringToUTF8OnStack(data[2]);
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- data[0],
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data[0],
data[1],
msg,
userData
);
});
} else {
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- data,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data,
userData
);
}
@@ -25100,12 +24922,8 @@ export function init(RuntimeName, PHPLoader) {
) => {
var webGlEventHandlerFunc = (e = event) => {
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
0,
userData
)
@@ -25324,21 +25142,15 @@ export function init(RuntimeName, PHPLoader) {
) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- lastX,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX,
lastY
);
} else if (GLUT.buttons != 0 && GLUT.motionFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- lastX,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX,
lastY
);
}
@@ -25499,12 +25311,8 @@ export function init(RuntimeName, PHPLoader) {
if (GLUT.specialFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- key,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
Browser.mouseX,
Browser.mouseY
);
@@ -25514,12 +25322,8 @@ export function init(RuntimeName, PHPLoader) {
if (key !== null && GLUT.keyboardFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- key,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
Browser.mouseX,
Browser.mouseY
);
@@ -25534,12 +25338,8 @@ export function init(RuntimeName, PHPLoader) {
if (GLUT.specialUpFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- key,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
Browser.mouseX,
Browser.mouseY
);
@@ -25549,12 +25349,8 @@ export function init(RuntimeName, PHPLoader) {
if (key !== null && GLUT.keyboardUpFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- key,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
Browser.mouseX,
Browser.mouseY
);
@@ -25618,13 +25414,10 @@ export function init(RuntimeName, PHPLoader) {
} catch (e) {}
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- event['button'],
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[
+ 'button'
+ ],
0 /*GLUT_DOWN*/,
Browser.mouseX,
Browser.mouseY
@@ -25639,13 +25432,10 @@ export function init(RuntimeName, PHPLoader) {
if (GLUT.mouseFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- event['button'],
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[
+ 'button'
+ ],
1 /*GLUT_UP*/,
Browser.mouseX,
Browser.mouseY
@@ -25674,13 +25464,8 @@ export function init(RuntimeName, PHPLoader) {
if (GLUT.mouseFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- button,
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ button,
0 /*GLUT_DOWN*/,
Browser.mouseX,
Browser.mouseY
@@ -25723,11 +25508,8 @@ export function init(RuntimeName, PHPLoader) {
/* Can't call _glutReshapeWindow as that requests cancelling fullscreen. */
if (GLUT.reshapeFunc) {
// out("GLUT.reshapeFunc (from FS): " + width + ", " + height);
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- width,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
height
);
}
@@ -25770,11 +25552,8 @@ export function init(RuntimeName, PHPLoader) {
Browser.resizeListeners.push((width, height) => {
if (GLUT.reshapeFunc) {
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- width,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
height
);
}
@@ -25887,10 +25666,8 @@ export function init(RuntimeName, PHPLoader) {
var _glutTimerFunc = (msec, func, value) =>
safeSetTimeout(
() =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- value
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ value
),
msec
);
@@ -26050,11 +25827,8 @@ export function init(RuntimeName, PHPLoader) {
Browser.setCanvasSize(width, height, true); // N.B. GLUT.reshapeFunc is also registered as a canvas resize callback.
// Just call it once here.
if (GLUT.reshapeFunc) {
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- width,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
height
);
}
@@ -27116,21 +26890,15 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
if (error) {
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
return;
}
var buffer = _malloc(byteArray.length);
HEAPU8.set(byteArray, buffer);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
buffer,
byteArray.length
);
@@ -27162,18 +26930,14 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
if (error) {
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
return;
}
if (onstore)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
});
}
@@ -27188,18 +26952,14 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
if (error) {
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
return;
}
if (ondelete)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
});
});
@@ -27216,19 +26976,14 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
if (error) {
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
return;
}
if (oncheck)
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
exists
);
});
@@ -27244,18 +26999,14 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
if (error) {
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
return;
}
if (onclear)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
});
});
@@ -27412,11 +27163,8 @@ export function init(RuntimeName, PHPLoader) {
safeSetTimeout(() => {
var stackBegin = Asyncify.currData + 12;
var stackEnd = HEAPU32[Asyncify.currData >> 2];
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- stackBegin,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stackBegin,
stackEnd
);
wakeUp();
@@ -27477,10 +27225,8 @@ export function init(RuntimeName, PHPLoader) {
HEAPU32[(newFiber + 12) >> 2] = 0;
var userData = HEAPU32[(newFiber + 16) >> 2];
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userData
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
);
} else {
var asyncifyData = newFiber + 20;
@@ -28492,11 +28238,8 @@ export function init(RuntimeName, PHPLoader) {
if (!SDL.eventHandler) return;
while (SDL.pollEvent(SDL.eventHandlerTemp)) {
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- SDL.eventHandlerContext,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL.eventHandlerContext,
SDL.eventHandlerTemp
);
}
@@ -30129,12 +29872,9 @@ export function init(RuntimeName, PHPLoader) {
return;
// Ask SDL audio data from the user code.
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- SDL.audio.userdata,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL
+ .audio.userdata,
SDL.audio.buffer,
SDL.audio.bufferSize
);
@@ -30592,10 +30332,8 @@ export function init(RuntimeName, PHPLoader) {
info.audio = null;
}
if (SDL.channelFinished) {
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- channel
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel
);
}
}
@@ -30664,10 +30402,8 @@ export function init(RuntimeName, PHPLoader) {
channelInfo.audio = null;
}
if (SDL.channelFinished)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- channel
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel
);
};
if (channelInfo.audio) {
@@ -31415,11 +31151,8 @@ export function init(RuntimeName, PHPLoader) {
var _SDL_AddTimer = (interval, callback, param) =>
safeSetTimeout(
() =>
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- interval,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ interval,
param
),
interval
@@ -31802,12 +31535,8 @@ export function init(RuntimeName, PHPLoader) {
socket.onopen = function (e) {
var eventPtr = WS.getSocketEvent(socketId);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 0 /*TODO*/,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
eventPtr,
userData
);
@@ -31829,12 +31558,8 @@ export function init(RuntimeName, PHPLoader) {
socket.onerror = function (e) {
var eventPtr = WS.getSocketEvent(socketId);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 0 /*TODO*/,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
eventPtr,
userData
);
@@ -31859,12 +31584,8 @@ export function init(RuntimeName, PHPLoader) {
(HEAP8[eventPtr + 4] = e.wasClean),
(HEAP16[(eventPtr + 6) >> 1] = e.code),
stringToUTF8(e.reason, eventPtr + 8, 512);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 0 /*TODO*/,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
eventPtr,
userData
);
@@ -31898,12 +31619,8 @@ export function init(RuntimeName, PHPLoader) {
(HEAPU32[(eventPtr + 4) >> 2] = buf),
(HEAP32[(eventPtr + 8) >> 2] = len),
(HEAP8[eventPtr + 12] = isText),
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 0 /*TODO*/,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
eventPtr,
userData
);
diff --git a/packages/php-wasm/node/asyncify/php_7_3.js b/packages/php-wasm/node/asyncify/php_7_3.js
index 8e9ca2610e..d0947af78c 100644
--- a/packages/php-wasm/node/asyncify/php_7_3.js
+++ b/packages/php-wasm/node/asyncify/php_7_3.js
@@ -1774,10 +1774,8 @@ export function init(RuntimeName, PHPLoader) {
);
var ___call_sighandler = (fp, sig) =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- sig
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ sig
);
___call_sighandler.sig = 'vpi';
@@ -8802,11 +8800,8 @@ export function init(RuntimeName, PHPLoader) {
dlSetError(`'Could not load dynamic lib: ${filename}\n${e}`);
runtimeKeepalivePop();
callUserCallback(() =>
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
user_data
)
);
@@ -8814,11 +8809,8 @@ export function init(RuntimeName, PHPLoader) {
function successCallback() {
runtimeKeepalivePop();
callUserCallback(() =>
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
user_data
)
);
@@ -19476,11 +19468,8 @@ export function init(RuntimeName, PHPLoader) {
var trace = getCallstack();
var parts = trace.split('\n');
for (var i = 0; i < parts.length; i++) {
- var ret = ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 0,
+ var ret = ((a1, a2) => {})(
+ /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0,
arg
);
if (ret !== 0) return;
@@ -20056,12 +20045,8 @@ export function init(RuntimeName, PHPLoader) {
stringToUTF8(e.locale || '', keyEventData + 128, 32);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
keyEventData,
userData
)
@@ -20179,12 +20164,8 @@ export function init(RuntimeName, PHPLoader) {
fillMouseEventData(JSEvents.mouseEvent, e, target);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
JSEvents.mouseEvent,
userData
)
@@ -20398,12 +20379,8 @@ export function init(RuntimeName, PHPLoader) {
HEAPF64[(wheelEvent + 80) >> 3] = e['deltaZ'];
HEAP32[(wheelEvent + 88) >> 2] = e['deltaMode'];
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
wheelEvent,
userData
)
@@ -20484,12 +20461,8 @@ export function init(RuntimeName, PHPLoader) {
HEAP32[(uiEvent + 28) >> 2] = pageXOffset | 0; // scroll offsets are float
HEAP32[(uiEvent + 32) >> 2] = pageYOffset | 0;
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
uiEvent,
userData
)
@@ -20563,12 +20536,8 @@ export function init(RuntimeName, PHPLoader) {
stringToUTF8(id, focusEvent + 128, 128);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
focusEvent,
userData
)
@@ -20684,12 +20653,8 @@ export function init(RuntimeName, PHPLoader) {
); // TODO: Thread-safety with respect to emscripten_get_deviceorientation_status()
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
JSEvents.deviceOrientationEvent,
userData
)
@@ -20772,12 +20737,8 @@ export function init(RuntimeName, PHPLoader) {
fillDeviceMotionEventData(JSEvents.deviceMotionEvent, e, target); // TODO: Thread-safety with respect to emscripten_get_devicemotion_status()
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
JSEvents.deviceMotionEvent,
userData
)
@@ -20887,12 +20848,8 @@ export function init(RuntimeName, PHPLoader) {
fillOrientationChangeEventData(orientationChangeEvent);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
orientationChangeEvent,
userData
)
@@ -21025,12 +20982,8 @@ export function init(RuntimeName, PHPLoader) {
fillFullscreenChangeEventData(fullscreenChangeEvent);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
fullscreenChangeEvent,
userData
)
@@ -21194,12 +21147,8 @@ export function init(RuntimeName, PHPLoader) {
);
if (currentFullscreenStrategy.canvasResizedCallback) {
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 37,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
0,
currentFullscreenStrategy.canvasResizedCallbackUserData
);
@@ -21305,12 +21254,8 @@ export function init(RuntimeName, PHPLoader) {
currentFullscreenStrategy = strategy;
if (strategy.canvasResizedCallback) {
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 37,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
0,
strategy.canvasResizedCallbackUserData
);
@@ -21412,12 +21357,8 @@ export function init(RuntimeName, PHPLoader) {
!inCenteredWithoutScalingFullscreenMode &&
currentFullscreenStrategy.canvasResizedCallback
) {
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 37,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
0,
currentFullscreenStrategy.canvasResizedCallbackUserData
);
@@ -21516,12 +21457,8 @@ export function init(RuntimeName, PHPLoader) {
softFullscreenResizeWebGLRenderTarget
);
if (strategy.canvasResizedCallback) {
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 37,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
0,
strategy.canvasResizedCallbackUserData
);
@@ -21534,12 +21471,8 @@ export function init(RuntimeName, PHPLoader) {
// Inform the caller that the canvas size has changed.
if (strategy.canvasResizedCallback) {
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 37,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
0,
strategy.canvasResizedCallbackUserData
);
@@ -21607,12 +21540,8 @@ export function init(RuntimeName, PHPLoader) {
fillPointerlockChangeEventData(pointerlockChangeEvent);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
pointerlockChangeEvent,
userData
)
@@ -21702,12 +21631,8 @@ export function init(RuntimeName, PHPLoader) {
) => {
var pointerlockErrorEventHandlerFunc = (e = event) => {
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
0,
userData
)
@@ -21907,12 +21832,8 @@ export function init(RuntimeName, PHPLoader) {
fillVisibilityChangeEventData(visibilityChangeEvent);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
visibilityChangeEvent,
userData
)
@@ -22032,12 +21953,8 @@ export function init(RuntimeName, PHPLoader) {
HEAP32[(touchEvent + 8) >> 2] = numTouches;
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
touchEvent,
userData
)
@@ -22175,12 +22092,8 @@ export function init(RuntimeName, PHPLoader) {
fillGamepadEventData(gamepadEvent, e['gamepad']);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
gamepadEvent,
userData
)
@@ -22282,12 +22195,8 @@ export function init(RuntimeName, PHPLoader) {
) => {
var beforeUnloadEventHandlerFunc = (e = event) => {
// Note: This is always called on the main browser thread, since it needs synchronously return a value!
- var confirmationMessage = ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ var confirmationMessage = ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
0,
userData
);
@@ -22358,12 +22267,8 @@ export function init(RuntimeName, PHPLoader) {
fillBatteryEventData(batteryEvent, battery());
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
batteryEvent,
userData
)
@@ -22453,11 +22358,8 @@ export function init(RuntimeName, PHPLoader) {
var _emscripten_request_animation_frame = (cb, userData) =>
requestAnimationFrame((timeStamp) =>
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- timeStamp,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp,
userData
)
);
@@ -22469,11 +22371,8 @@ export function init(RuntimeName, PHPLoader) {
var _emscripten_request_animation_frame_loop = (cb, userData) => {
function tick(timeStamp) {
if (
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- timeStamp,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp,
userData
)
) {
@@ -22698,10 +22597,8 @@ export function init(RuntimeName, PHPLoader) {
return emSetImmediate(() => {
runtimeKeepalivePop();
callUserCallback(() =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userData
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
)
);
});
@@ -22718,10 +22615,8 @@ export function init(RuntimeName, PHPLoader) {
function tick() {
callUserCallback(() => {
if (
- ((
- a1
- ) => {}) /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userData
+ ((a1) => {})(
+ /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
)
) {
emSetImmediate(tick);
@@ -22738,10 +22633,8 @@ export function init(RuntimeName, PHPLoader) {
var _emscripten_set_timeout = (cb, msecs, userData) =>
safeSetTimeout(
() =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userData
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
),
msecs
);
@@ -22757,11 +22650,8 @@ export function init(RuntimeName, PHPLoader) {
runtimeKeepalivePop();
callUserCallback(() => {
if (
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- t,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ t,
userData
)
) {
@@ -22785,10 +22675,8 @@ export function init(RuntimeName, PHPLoader) {
runtimeKeepalivePush();
return setInterval(() => {
callUserCallback(() =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userData
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
)
);
}, msecs);
@@ -22803,10 +22691,8 @@ export function init(RuntimeName, PHPLoader) {
var _emscripten_async_call = (func, arg, millis) => {
var wrapper = () =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
if (
@@ -22839,7 +22725,7 @@ export function init(RuntimeName, PHPLoader) {
var _emscripten_set_main_loop = (func, fps, simulateInfiniteLoop) => {
var iterFunc =
- () => {} /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */;
+ () => {}; /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */
setMainLoop(iterFunc, fps, simulateInfiniteLoop);
};
_emscripten_set_main_loop.sig = 'vpii';
@@ -22851,10 +22737,8 @@ export function init(RuntimeName, PHPLoader) {
simulateInfiniteLoop
) => {
var iterFunc = () =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
setMainLoop(iterFunc, fps, simulateInfiniteLoop, arg);
};
@@ -22875,10 +22759,8 @@ export function init(RuntimeName, PHPLoader) {
var __emscripten_push_main_loop_blocker = (func, arg, name) => {
MainLoop.queue.push({
func: () => {
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
},
name: UTF8ToString(name),
@@ -22891,10 +22773,8 @@ export function init(RuntimeName, PHPLoader) {
var __emscripten_push_uncounted_main_loop_blocker = (func, arg, name) => {
MainLoop.queue.push({
func: () => {
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
},
name: UTF8ToString(name),
@@ -22928,12 +22808,8 @@ export function init(RuntimeName, PHPLoader) {
var resultPtr = stackAlloc(POINTER_SIZE);
HEAPU32[resultPtr >> 2] = 0;
try {
- var result = ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- resultPtr,
+ var result = ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ resultPtr,
userData,
value
);
@@ -23869,19 +23745,15 @@ export function init(RuntimeName, PHPLoader) {
() => {
runtimeKeepalivePop();
if (onload)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- file
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file
);
},
() => {
runtimeKeepalivePop();
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- file
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file
);
},
true // don'tCreateFile - it's already there
@@ -23915,21 +23787,16 @@ export function init(RuntimeName, PHPLoader) {
() => {
runtimeKeepalivePop();
if (onload)
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
cname
);
},
() => {
runtimeKeepalivePop();
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
},
true // don'tCreateFile - it's already there
@@ -24202,10 +24069,10 @@ export function init(RuntimeName, PHPLoader) {
runtimeKeepalivePop();
callUserCallback(() => {
var sp = stackSave();
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- stringToUTF8OnStack(_file)
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stringToUTF8OnStack(
+ _file
+ )
);
stackRestore(sp);
});
@@ -24249,12 +24116,8 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
var buffer = _malloc(byteArray.length);
HEAPU8.set(byteArray, buffer);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userdata,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata,
buffer,
byteArray.length
);
@@ -24264,10 +24127,8 @@ export function init(RuntimeName, PHPLoader) {
if (onerror) {
runtimeKeepalivePop();
callUserCallback(() => {
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userdata
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata
);
});
}
@@ -24324,12 +24185,8 @@ export function init(RuntimeName, PHPLoader) {
);
if (onload) {
var sp = stackSave();
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
stringToUTF8OnStack(_file)
);
@@ -24337,12 +24194,8 @@ export function init(RuntimeName, PHPLoader) {
}
} else {
if (onerror)
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
http.status
);
@@ -24355,12 +24208,8 @@ export function init(RuntimeName, PHPLoader) {
http.onerror = (e) => {
runtimeKeepalivePop();
if (onerror)
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
http.status
);
@@ -24375,12 +24224,8 @@ export function init(RuntimeName, PHPLoader) {
) {
var percentComplete = (e.loaded / e.total) * 100;
if (onprogress)
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
percentComplete
);
@@ -24437,13 +24282,8 @@ export function init(RuntimeName, PHPLoader) {
if (http.statusText) {
statusText = stringToUTF8OnStack(http.statusText);
}
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
http.status,
statusText
@@ -24464,13 +24304,8 @@ export function init(RuntimeName, PHPLoader) {
var buffer = _malloc(byteArray.length);
HEAPU8.set(byteArray, buffer);
if (onload)
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
buffer,
byteArray.length
@@ -24491,13 +24326,8 @@ export function init(RuntimeName, PHPLoader) {
// PROGRESS
http.onprogress = (e) => {
if (onprogress)
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
e.loaded,
e.lengthComputable || e.lengthComputable === undefined
@@ -24617,24 +24447,16 @@ export function init(RuntimeName, PHPLoader) {
if (event === 'error') {
withStackSave(() => {
var msg = stringToUTF8OnStack(data[2]);
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- data[0],
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data[0],
data[1],
msg,
userData
);
});
} else {
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- data,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data,
userData
);
}
@@ -25100,12 +24922,8 @@ export function init(RuntimeName, PHPLoader) {
) => {
var webGlEventHandlerFunc = (e = event) => {
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
0,
userData
)
@@ -25324,21 +25142,15 @@ export function init(RuntimeName, PHPLoader) {
) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- lastX,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX,
lastY
);
} else if (GLUT.buttons != 0 && GLUT.motionFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- lastX,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX,
lastY
);
}
@@ -25499,12 +25311,8 @@ export function init(RuntimeName, PHPLoader) {
if (GLUT.specialFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- key,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
Browser.mouseX,
Browser.mouseY
);
@@ -25514,12 +25322,8 @@ export function init(RuntimeName, PHPLoader) {
if (key !== null && GLUT.keyboardFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- key,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
Browser.mouseX,
Browser.mouseY
);
@@ -25534,12 +25338,8 @@ export function init(RuntimeName, PHPLoader) {
if (GLUT.specialUpFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- key,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
Browser.mouseX,
Browser.mouseY
);
@@ -25549,12 +25349,8 @@ export function init(RuntimeName, PHPLoader) {
if (key !== null && GLUT.keyboardUpFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- key,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
Browser.mouseX,
Browser.mouseY
);
@@ -25618,13 +25414,10 @@ export function init(RuntimeName, PHPLoader) {
} catch (e) {}
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- event['button'],
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[
+ 'button'
+ ],
0 /*GLUT_DOWN*/,
Browser.mouseX,
Browser.mouseY
@@ -25639,13 +25432,10 @@ export function init(RuntimeName, PHPLoader) {
if (GLUT.mouseFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- event['button'],
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[
+ 'button'
+ ],
1 /*GLUT_UP*/,
Browser.mouseX,
Browser.mouseY
@@ -25674,13 +25464,8 @@ export function init(RuntimeName, PHPLoader) {
if (GLUT.mouseFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- button,
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ button,
0 /*GLUT_DOWN*/,
Browser.mouseX,
Browser.mouseY
@@ -25723,11 +25508,8 @@ export function init(RuntimeName, PHPLoader) {
/* Can't call _glutReshapeWindow as that requests cancelling fullscreen. */
if (GLUT.reshapeFunc) {
// out("GLUT.reshapeFunc (from FS): " + width + ", " + height);
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- width,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
height
);
}
@@ -25770,11 +25552,8 @@ export function init(RuntimeName, PHPLoader) {
Browser.resizeListeners.push((width, height) => {
if (GLUT.reshapeFunc) {
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- width,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
height
);
}
@@ -25887,10 +25666,8 @@ export function init(RuntimeName, PHPLoader) {
var _glutTimerFunc = (msec, func, value) =>
safeSetTimeout(
() =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- value
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ value
),
msec
);
@@ -26050,11 +25827,8 @@ export function init(RuntimeName, PHPLoader) {
Browser.setCanvasSize(width, height, true); // N.B. GLUT.reshapeFunc is also registered as a canvas resize callback.
// Just call it once here.
if (GLUT.reshapeFunc) {
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- width,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
height
);
}
@@ -27116,21 +26890,15 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
if (error) {
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
return;
}
var buffer = _malloc(byteArray.length);
HEAPU8.set(byteArray, buffer);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
buffer,
byteArray.length
);
@@ -27162,18 +26930,14 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
if (error) {
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
return;
}
if (onstore)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
});
}
@@ -27188,18 +26952,14 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
if (error) {
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
return;
}
if (ondelete)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
});
});
@@ -27216,19 +26976,14 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
if (error) {
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
return;
}
if (oncheck)
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
exists
);
});
@@ -27244,18 +26999,14 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
if (error) {
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
return;
}
if (onclear)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
});
});
@@ -27412,11 +27163,8 @@ export function init(RuntimeName, PHPLoader) {
safeSetTimeout(() => {
var stackBegin = Asyncify.currData + 12;
var stackEnd = HEAPU32[Asyncify.currData >> 2];
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- stackBegin,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stackBegin,
stackEnd
);
wakeUp();
@@ -27477,10 +27225,8 @@ export function init(RuntimeName, PHPLoader) {
HEAPU32[(newFiber + 12) >> 2] = 0;
var userData = HEAPU32[(newFiber + 16) >> 2];
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userData
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
);
} else {
var asyncifyData = newFiber + 20;
@@ -28492,11 +28238,8 @@ export function init(RuntimeName, PHPLoader) {
if (!SDL.eventHandler) return;
while (SDL.pollEvent(SDL.eventHandlerTemp)) {
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- SDL.eventHandlerContext,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL.eventHandlerContext,
SDL.eventHandlerTemp
);
}
@@ -30129,12 +29872,9 @@ export function init(RuntimeName, PHPLoader) {
return;
// Ask SDL audio data from the user code.
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- SDL.audio.userdata,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL
+ .audio.userdata,
SDL.audio.buffer,
SDL.audio.bufferSize
);
@@ -30592,10 +30332,8 @@ export function init(RuntimeName, PHPLoader) {
info.audio = null;
}
if (SDL.channelFinished) {
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- channel
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel
);
}
}
@@ -30664,10 +30402,8 @@ export function init(RuntimeName, PHPLoader) {
channelInfo.audio = null;
}
if (SDL.channelFinished)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- channel
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel
);
};
if (channelInfo.audio) {
@@ -31415,11 +31151,8 @@ export function init(RuntimeName, PHPLoader) {
var _SDL_AddTimer = (interval, callback, param) =>
safeSetTimeout(
() =>
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- interval,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ interval,
param
),
interval
@@ -31802,12 +31535,8 @@ export function init(RuntimeName, PHPLoader) {
socket.onopen = function (e) {
var eventPtr = WS.getSocketEvent(socketId);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 0 /*TODO*/,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
eventPtr,
userData
);
@@ -31829,12 +31558,8 @@ export function init(RuntimeName, PHPLoader) {
socket.onerror = function (e) {
var eventPtr = WS.getSocketEvent(socketId);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 0 /*TODO*/,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
eventPtr,
userData
);
@@ -31859,12 +31584,8 @@ export function init(RuntimeName, PHPLoader) {
(HEAP8[eventPtr + 4] = e.wasClean),
(HEAP16[(eventPtr + 6) >> 1] = e.code),
stringToUTF8(e.reason, eventPtr + 8, 512);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 0 /*TODO*/,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
eventPtr,
userData
);
@@ -31898,12 +31619,8 @@ export function init(RuntimeName, PHPLoader) {
(HEAPU32[(eventPtr + 4) >> 2] = buf),
(HEAP32[(eventPtr + 8) >> 2] = len),
(HEAP8[eventPtr + 12] = isText),
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 0 /*TODO*/,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
eventPtr,
userData
);
diff --git a/packages/php-wasm/node/asyncify/php_7_4.js b/packages/php-wasm/node/asyncify/php_7_4.js
index bf27e05f47..da44a38b1c 100644
--- a/packages/php-wasm/node/asyncify/php_7_4.js
+++ b/packages/php-wasm/node/asyncify/php_7_4.js
@@ -1774,10 +1774,8 @@ export function init(RuntimeName, PHPLoader) {
);
var ___call_sighandler = (fp, sig) =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- sig
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ sig
);
___call_sighandler.sig = 'vpi';
@@ -8802,11 +8800,8 @@ export function init(RuntimeName, PHPLoader) {
dlSetError(`'Could not load dynamic lib: ${filename}\n${e}`);
runtimeKeepalivePop();
callUserCallback(() =>
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
user_data
)
);
@@ -8814,11 +8809,8 @@ export function init(RuntimeName, PHPLoader) {
function successCallback() {
runtimeKeepalivePop();
callUserCallback(() =>
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
user_data
)
);
@@ -19480,11 +19472,8 @@ export function init(RuntimeName, PHPLoader) {
var trace = getCallstack();
var parts = trace.split('\n');
for (var i = 0; i < parts.length; i++) {
- var ret = ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 0,
+ var ret = ((a1, a2) => {})(
+ /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0,
arg
);
if (ret !== 0) return;
@@ -20060,12 +20049,8 @@ export function init(RuntimeName, PHPLoader) {
stringToUTF8(e.locale || '', keyEventData + 128, 32);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
keyEventData,
userData
)
@@ -20183,12 +20168,8 @@ export function init(RuntimeName, PHPLoader) {
fillMouseEventData(JSEvents.mouseEvent, e, target);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
JSEvents.mouseEvent,
userData
)
@@ -20402,12 +20383,8 @@ export function init(RuntimeName, PHPLoader) {
HEAPF64[(wheelEvent + 80) >> 3] = e['deltaZ'];
HEAP32[(wheelEvent + 88) >> 2] = e['deltaMode'];
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
wheelEvent,
userData
)
@@ -20488,12 +20465,8 @@ export function init(RuntimeName, PHPLoader) {
HEAP32[(uiEvent + 28) >> 2] = pageXOffset | 0; // scroll offsets are float
HEAP32[(uiEvent + 32) >> 2] = pageYOffset | 0;
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
uiEvent,
userData
)
@@ -20567,12 +20540,8 @@ export function init(RuntimeName, PHPLoader) {
stringToUTF8(id, focusEvent + 128, 128);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
focusEvent,
userData
)
@@ -20688,12 +20657,8 @@ export function init(RuntimeName, PHPLoader) {
); // TODO: Thread-safety with respect to emscripten_get_deviceorientation_status()
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
JSEvents.deviceOrientationEvent,
userData
)
@@ -20776,12 +20741,8 @@ export function init(RuntimeName, PHPLoader) {
fillDeviceMotionEventData(JSEvents.deviceMotionEvent, e, target); // TODO: Thread-safety with respect to emscripten_get_devicemotion_status()
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
JSEvents.deviceMotionEvent,
userData
)
@@ -20891,12 +20852,8 @@ export function init(RuntimeName, PHPLoader) {
fillOrientationChangeEventData(orientationChangeEvent);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
orientationChangeEvent,
userData
)
@@ -21029,12 +20986,8 @@ export function init(RuntimeName, PHPLoader) {
fillFullscreenChangeEventData(fullscreenChangeEvent);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
fullscreenChangeEvent,
userData
)
@@ -21198,12 +21151,8 @@ export function init(RuntimeName, PHPLoader) {
);
if (currentFullscreenStrategy.canvasResizedCallback) {
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 37,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
0,
currentFullscreenStrategy.canvasResizedCallbackUserData
);
@@ -21309,12 +21258,8 @@ export function init(RuntimeName, PHPLoader) {
currentFullscreenStrategy = strategy;
if (strategy.canvasResizedCallback) {
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 37,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
0,
strategy.canvasResizedCallbackUserData
);
@@ -21416,12 +21361,8 @@ export function init(RuntimeName, PHPLoader) {
!inCenteredWithoutScalingFullscreenMode &&
currentFullscreenStrategy.canvasResizedCallback
) {
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 37,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
0,
currentFullscreenStrategy.canvasResizedCallbackUserData
);
@@ -21520,12 +21461,8 @@ export function init(RuntimeName, PHPLoader) {
softFullscreenResizeWebGLRenderTarget
);
if (strategy.canvasResizedCallback) {
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 37,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
0,
strategy.canvasResizedCallbackUserData
);
@@ -21538,12 +21475,8 @@ export function init(RuntimeName, PHPLoader) {
// Inform the caller that the canvas size has changed.
if (strategy.canvasResizedCallback) {
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 37,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
0,
strategy.canvasResizedCallbackUserData
);
@@ -21611,12 +21544,8 @@ export function init(RuntimeName, PHPLoader) {
fillPointerlockChangeEventData(pointerlockChangeEvent);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
pointerlockChangeEvent,
userData
)
@@ -21706,12 +21635,8 @@ export function init(RuntimeName, PHPLoader) {
) => {
var pointerlockErrorEventHandlerFunc = (e = event) => {
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
0,
userData
)
@@ -21911,12 +21836,8 @@ export function init(RuntimeName, PHPLoader) {
fillVisibilityChangeEventData(visibilityChangeEvent);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
visibilityChangeEvent,
userData
)
@@ -22036,12 +21957,8 @@ export function init(RuntimeName, PHPLoader) {
HEAP32[(touchEvent + 8) >> 2] = numTouches;
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
touchEvent,
userData
)
@@ -22179,12 +22096,8 @@ export function init(RuntimeName, PHPLoader) {
fillGamepadEventData(gamepadEvent, e['gamepad']);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
gamepadEvent,
userData
)
@@ -22286,12 +22199,8 @@ export function init(RuntimeName, PHPLoader) {
) => {
var beforeUnloadEventHandlerFunc = (e = event) => {
// Note: This is always called on the main browser thread, since it needs synchronously return a value!
- var confirmationMessage = ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ var confirmationMessage = ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
0,
userData
);
@@ -22362,12 +22271,8 @@ export function init(RuntimeName, PHPLoader) {
fillBatteryEventData(batteryEvent, battery());
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
batteryEvent,
userData
)
@@ -22457,11 +22362,8 @@ export function init(RuntimeName, PHPLoader) {
var _emscripten_request_animation_frame = (cb, userData) =>
requestAnimationFrame((timeStamp) =>
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- timeStamp,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp,
userData
)
);
@@ -22473,11 +22375,8 @@ export function init(RuntimeName, PHPLoader) {
var _emscripten_request_animation_frame_loop = (cb, userData) => {
function tick(timeStamp) {
if (
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- timeStamp,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp,
userData
)
) {
@@ -22702,10 +22601,8 @@ export function init(RuntimeName, PHPLoader) {
return emSetImmediate(() => {
runtimeKeepalivePop();
callUserCallback(() =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userData
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
)
);
});
@@ -22722,10 +22619,8 @@ export function init(RuntimeName, PHPLoader) {
function tick() {
callUserCallback(() => {
if (
- ((
- a1
- ) => {}) /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userData
+ ((a1) => {})(
+ /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
)
) {
emSetImmediate(tick);
@@ -22742,10 +22637,8 @@ export function init(RuntimeName, PHPLoader) {
var _emscripten_set_timeout = (cb, msecs, userData) =>
safeSetTimeout(
() =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userData
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
),
msecs
);
@@ -22761,11 +22654,8 @@ export function init(RuntimeName, PHPLoader) {
runtimeKeepalivePop();
callUserCallback(() => {
if (
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- t,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ t,
userData
)
) {
@@ -22789,10 +22679,8 @@ export function init(RuntimeName, PHPLoader) {
runtimeKeepalivePush();
return setInterval(() => {
callUserCallback(() =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userData
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
)
);
}, msecs);
@@ -22807,10 +22695,8 @@ export function init(RuntimeName, PHPLoader) {
var _emscripten_async_call = (func, arg, millis) => {
var wrapper = () =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
if (
@@ -22843,7 +22729,7 @@ export function init(RuntimeName, PHPLoader) {
var _emscripten_set_main_loop = (func, fps, simulateInfiniteLoop) => {
var iterFunc =
- () => {} /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */;
+ () => {}; /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */
setMainLoop(iterFunc, fps, simulateInfiniteLoop);
};
_emscripten_set_main_loop.sig = 'vpii';
@@ -22855,10 +22741,8 @@ export function init(RuntimeName, PHPLoader) {
simulateInfiniteLoop
) => {
var iterFunc = () =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
setMainLoop(iterFunc, fps, simulateInfiniteLoop, arg);
};
@@ -22879,10 +22763,8 @@ export function init(RuntimeName, PHPLoader) {
var __emscripten_push_main_loop_blocker = (func, arg, name) => {
MainLoop.queue.push({
func: () => {
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
},
name: UTF8ToString(name),
@@ -22895,10 +22777,8 @@ export function init(RuntimeName, PHPLoader) {
var __emscripten_push_uncounted_main_loop_blocker = (func, arg, name) => {
MainLoop.queue.push({
func: () => {
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
},
name: UTF8ToString(name),
@@ -22932,12 +22812,8 @@ export function init(RuntimeName, PHPLoader) {
var resultPtr = stackAlloc(POINTER_SIZE);
HEAPU32[resultPtr >> 2] = 0;
try {
- var result = ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- resultPtr,
+ var result = ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ resultPtr,
userData,
value
);
@@ -23873,19 +23749,15 @@ export function init(RuntimeName, PHPLoader) {
() => {
runtimeKeepalivePop();
if (onload)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- file
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file
);
},
() => {
runtimeKeepalivePop();
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- file
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file
);
},
true // don'tCreateFile - it's already there
@@ -23919,21 +23791,16 @@ export function init(RuntimeName, PHPLoader) {
() => {
runtimeKeepalivePop();
if (onload)
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
cname
);
},
() => {
runtimeKeepalivePop();
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
},
true // don'tCreateFile - it's already there
@@ -24206,10 +24073,10 @@ export function init(RuntimeName, PHPLoader) {
runtimeKeepalivePop();
callUserCallback(() => {
var sp = stackSave();
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- stringToUTF8OnStack(_file)
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stringToUTF8OnStack(
+ _file
+ )
);
stackRestore(sp);
});
@@ -24253,12 +24120,8 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
var buffer = _malloc(byteArray.length);
HEAPU8.set(byteArray, buffer);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userdata,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata,
buffer,
byteArray.length
);
@@ -24268,10 +24131,8 @@ export function init(RuntimeName, PHPLoader) {
if (onerror) {
runtimeKeepalivePop();
callUserCallback(() => {
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userdata
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata
);
});
}
@@ -24328,12 +24189,8 @@ export function init(RuntimeName, PHPLoader) {
);
if (onload) {
var sp = stackSave();
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
stringToUTF8OnStack(_file)
);
@@ -24341,12 +24198,8 @@ export function init(RuntimeName, PHPLoader) {
}
} else {
if (onerror)
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
http.status
);
@@ -24359,12 +24212,8 @@ export function init(RuntimeName, PHPLoader) {
http.onerror = (e) => {
runtimeKeepalivePop();
if (onerror)
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
http.status
);
@@ -24379,12 +24228,8 @@ export function init(RuntimeName, PHPLoader) {
) {
var percentComplete = (e.loaded / e.total) * 100;
if (onprogress)
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
percentComplete
);
@@ -24441,13 +24286,8 @@ export function init(RuntimeName, PHPLoader) {
if (http.statusText) {
statusText = stringToUTF8OnStack(http.statusText);
}
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
http.status,
statusText
@@ -24468,13 +24308,8 @@ export function init(RuntimeName, PHPLoader) {
var buffer = _malloc(byteArray.length);
HEAPU8.set(byteArray, buffer);
if (onload)
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
buffer,
byteArray.length
@@ -24495,13 +24330,8 @@ export function init(RuntimeName, PHPLoader) {
// PROGRESS
http.onprogress = (e) => {
if (onprogress)
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
e.loaded,
e.lengthComputable || e.lengthComputable === undefined
@@ -24621,24 +24451,16 @@ export function init(RuntimeName, PHPLoader) {
if (event === 'error') {
withStackSave(() => {
var msg = stringToUTF8OnStack(data[2]);
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- data[0],
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data[0],
data[1],
msg,
userData
);
});
} else {
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- data,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data,
userData
);
}
@@ -25104,12 +24926,8 @@ export function init(RuntimeName, PHPLoader) {
) => {
var webGlEventHandlerFunc = (e = event) => {
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
0,
userData
)
@@ -25328,21 +25146,15 @@ export function init(RuntimeName, PHPLoader) {
) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- lastX,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX,
lastY
);
} else if (GLUT.buttons != 0 && GLUT.motionFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- lastX,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX,
lastY
);
}
@@ -25503,12 +25315,8 @@ export function init(RuntimeName, PHPLoader) {
if (GLUT.specialFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- key,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
Browser.mouseX,
Browser.mouseY
);
@@ -25518,12 +25326,8 @@ export function init(RuntimeName, PHPLoader) {
if (key !== null && GLUT.keyboardFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- key,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
Browser.mouseX,
Browser.mouseY
);
@@ -25538,12 +25342,8 @@ export function init(RuntimeName, PHPLoader) {
if (GLUT.specialUpFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- key,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
Browser.mouseX,
Browser.mouseY
);
@@ -25553,12 +25353,8 @@ export function init(RuntimeName, PHPLoader) {
if (key !== null && GLUT.keyboardUpFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- key,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
Browser.mouseX,
Browser.mouseY
);
@@ -25622,13 +25418,10 @@ export function init(RuntimeName, PHPLoader) {
} catch (e) {}
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- event['button'],
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[
+ 'button'
+ ],
0 /*GLUT_DOWN*/,
Browser.mouseX,
Browser.mouseY
@@ -25643,13 +25436,10 @@ export function init(RuntimeName, PHPLoader) {
if (GLUT.mouseFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- event['button'],
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[
+ 'button'
+ ],
1 /*GLUT_UP*/,
Browser.mouseX,
Browser.mouseY
@@ -25678,13 +25468,8 @@ export function init(RuntimeName, PHPLoader) {
if (GLUT.mouseFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- button,
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ button,
0 /*GLUT_DOWN*/,
Browser.mouseX,
Browser.mouseY
@@ -25727,11 +25512,8 @@ export function init(RuntimeName, PHPLoader) {
/* Can't call _glutReshapeWindow as that requests cancelling fullscreen. */
if (GLUT.reshapeFunc) {
// out("GLUT.reshapeFunc (from FS): " + width + ", " + height);
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- width,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
height
);
}
@@ -25774,11 +25556,8 @@ export function init(RuntimeName, PHPLoader) {
Browser.resizeListeners.push((width, height) => {
if (GLUT.reshapeFunc) {
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- width,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
height
);
}
@@ -25891,10 +25670,8 @@ export function init(RuntimeName, PHPLoader) {
var _glutTimerFunc = (msec, func, value) =>
safeSetTimeout(
() =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- value
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ value
),
msec
);
@@ -26054,11 +25831,8 @@ export function init(RuntimeName, PHPLoader) {
Browser.setCanvasSize(width, height, true); // N.B. GLUT.reshapeFunc is also registered as a canvas resize callback.
// Just call it once here.
if (GLUT.reshapeFunc) {
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- width,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
height
);
}
@@ -27120,21 +26894,15 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
if (error) {
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
return;
}
var buffer = _malloc(byteArray.length);
HEAPU8.set(byteArray, buffer);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
buffer,
byteArray.length
);
@@ -27166,18 +26934,14 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
if (error) {
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
return;
}
if (onstore)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
});
}
@@ -27192,18 +26956,14 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
if (error) {
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
return;
}
if (ondelete)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
});
});
@@ -27220,19 +26980,14 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
if (error) {
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
return;
}
if (oncheck)
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
exists
);
});
@@ -27248,18 +27003,14 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
if (error) {
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
return;
}
if (onclear)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
});
});
@@ -27416,11 +27167,8 @@ export function init(RuntimeName, PHPLoader) {
safeSetTimeout(() => {
var stackBegin = Asyncify.currData + 12;
var stackEnd = HEAPU32[Asyncify.currData >> 2];
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- stackBegin,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stackBegin,
stackEnd
);
wakeUp();
@@ -27481,10 +27229,8 @@ export function init(RuntimeName, PHPLoader) {
HEAPU32[(newFiber + 12) >> 2] = 0;
var userData = HEAPU32[(newFiber + 16) >> 2];
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userData
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
);
} else {
var asyncifyData = newFiber + 20;
@@ -28496,11 +28242,8 @@ export function init(RuntimeName, PHPLoader) {
if (!SDL.eventHandler) return;
while (SDL.pollEvent(SDL.eventHandlerTemp)) {
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- SDL.eventHandlerContext,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL.eventHandlerContext,
SDL.eventHandlerTemp
);
}
@@ -30133,12 +29876,9 @@ export function init(RuntimeName, PHPLoader) {
return;
// Ask SDL audio data from the user code.
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- SDL.audio.userdata,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL
+ .audio.userdata,
SDL.audio.buffer,
SDL.audio.bufferSize
);
@@ -30596,10 +30336,8 @@ export function init(RuntimeName, PHPLoader) {
info.audio = null;
}
if (SDL.channelFinished) {
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- channel
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel
);
}
}
@@ -30668,10 +30406,8 @@ export function init(RuntimeName, PHPLoader) {
channelInfo.audio = null;
}
if (SDL.channelFinished)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- channel
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel
);
};
if (channelInfo.audio) {
@@ -31419,11 +31155,8 @@ export function init(RuntimeName, PHPLoader) {
var _SDL_AddTimer = (interval, callback, param) =>
safeSetTimeout(
() =>
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- interval,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ interval,
param
),
interval
@@ -31802,12 +31535,8 @@ export function init(RuntimeName, PHPLoader) {
socket.onopen = function (e) {
var eventPtr = WS.getSocketEvent(socketId);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 0 /*TODO*/,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
eventPtr,
userData
);
@@ -31829,12 +31558,8 @@ export function init(RuntimeName, PHPLoader) {
socket.onerror = function (e) {
var eventPtr = WS.getSocketEvent(socketId);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 0 /*TODO*/,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
eventPtr,
userData
);
@@ -31859,12 +31584,8 @@ export function init(RuntimeName, PHPLoader) {
(HEAP8[eventPtr + 4] = e.wasClean),
(HEAP16[(eventPtr + 6) >> 1] = e.code),
stringToUTF8(e.reason, eventPtr + 8, 512);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 0 /*TODO*/,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
eventPtr,
userData
);
@@ -31898,12 +31619,8 @@ export function init(RuntimeName, PHPLoader) {
(HEAPU32[(eventPtr + 4) >> 2] = buf),
(HEAP32[(eventPtr + 8) >> 2] = len),
(HEAP8[eventPtr + 12] = isText),
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 0 /*TODO*/,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
eventPtr,
userData
);
diff --git a/packages/php-wasm/node/asyncify/php_8_0.js b/packages/php-wasm/node/asyncify/php_8_0.js
index 8529ae4d7b..1975da4215 100644
--- a/packages/php-wasm/node/asyncify/php_8_0.js
+++ b/packages/php-wasm/node/asyncify/php_8_0.js
@@ -1774,10 +1774,8 @@ export function init(RuntimeName, PHPLoader) {
);
var ___call_sighandler = (fp, sig) =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- sig
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ sig
);
___call_sighandler.sig = 'vpi';
@@ -8802,11 +8800,8 @@ export function init(RuntimeName, PHPLoader) {
dlSetError(`'Could not load dynamic lib: ${filename}\n${e}`);
runtimeKeepalivePop();
callUserCallback(() =>
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
user_data
)
);
@@ -8814,11 +8809,8 @@ export function init(RuntimeName, PHPLoader) {
function successCallback() {
runtimeKeepalivePop();
callUserCallback(() =>
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
user_data
)
);
@@ -19480,11 +19472,8 @@ export function init(RuntimeName, PHPLoader) {
var trace = getCallstack();
var parts = trace.split('\n');
for (var i = 0; i < parts.length; i++) {
- var ret = ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 0,
+ var ret = ((a1, a2) => {})(
+ /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0,
arg
);
if (ret !== 0) return;
@@ -20060,12 +20049,8 @@ export function init(RuntimeName, PHPLoader) {
stringToUTF8(e.locale || '', keyEventData + 128, 32);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
keyEventData,
userData
)
@@ -20183,12 +20168,8 @@ export function init(RuntimeName, PHPLoader) {
fillMouseEventData(JSEvents.mouseEvent, e, target);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
JSEvents.mouseEvent,
userData
)
@@ -20402,12 +20383,8 @@ export function init(RuntimeName, PHPLoader) {
HEAPF64[(wheelEvent + 80) >> 3] = e['deltaZ'];
HEAP32[(wheelEvent + 88) >> 2] = e['deltaMode'];
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
wheelEvent,
userData
)
@@ -20488,12 +20465,8 @@ export function init(RuntimeName, PHPLoader) {
HEAP32[(uiEvent + 28) >> 2] = pageXOffset | 0; // scroll offsets are float
HEAP32[(uiEvent + 32) >> 2] = pageYOffset | 0;
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
uiEvent,
userData
)
@@ -20567,12 +20540,8 @@ export function init(RuntimeName, PHPLoader) {
stringToUTF8(id, focusEvent + 128, 128);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
focusEvent,
userData
)
@@ -20688,12 +20657,8 @@ export function init(RuntimeName, PHPLoader) {
); // TODO: Thread-safety with respect to emscripten_get_deviceorientation_status()
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
JSEvents.deviceOrientationEvent,
userData
)
@@ -20776,12 +20741,8 @@ export function init(RuntimeName, PHPLoader) {
fillDeviceMotionEventData(JSEvents.deviceMotionEvent, e, target); // TODO: Thread-safety with respect to emscripten_get_devicemotion_status()
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
JSEvents.deviceMotionEvent,
userData
)
@@ -20891,12 +20852,8 @@ export function init(RuntimeName, PHPLoader) {
fillOrientationChangeEventData(orientationChangeEvent);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
orientationChangeEvent,
userData
)
@@ -21029,12 +20986,8 @@ export function init(RuntimeName, PHPLoader) {
fillFullscreenChangeEventData(fullscreenChangeEvent);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
fullscreenChangeEvent,
userData
)
@@ -21198,12 +21151,8 @@ export function init(RuntimeName, PHPLoader) {
);
if (currentFullscreenStrategy.canvasResizedCallback) {
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 37,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
0,
currentFullscreenStrategy.canvasResizedCallbackUserData
);
@@ -21309,12 +21258,8 @@ export function init(RuntimeName, PHPLoader) {
currentFullscreenStrategy = strategy;
if (strategy.canvasResizedCallback) {
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 37,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
0,
strategy.canvasResizedCallbackUserData
);
@@ -21416,12 +21361,8 @@ export function init(RuntimeName, PHPLoader) {
!inCenteredWithoutScalingFullscreenMode &&
currentFullscreenStrategy.canvasResizedCallback
) {
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 37,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
0,
currentFullscreenStrategy.canvasResizedCallbackUserData
);
@@ -21520,12 +21461,8 @@ export function init(RuntimeName, PHPLoader) {
softFullscreenResizeWebGLRenderTarget
);
if (strategy.canvasResizedCallback) {
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 37,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
0,
strategy.canvasResizedCallbackUserData
);
@@ -21538,12 +21475,8 @@ export function init(RuntimeName, PHPLoader) {
// Inform the caller that the canvas size has changed.
if (strategy.canvasResizedCallback) {
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 37,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
0,
strategy.canvasResizedCallbackUserData
);
@@ -21611,12 +21544,8 @@ export function init(RuntimeName, PHPLoader) {
fillPointerlockChangeEventData(pointerlockChangeEvent);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
pointerlockChangeEvent,
userData
)
@@ -21706,12 +21635,8 @@ export function init(RuntimeName, PHPLoader) {
) => {
var pointerlockErrorEventHandlerFunc = (e = event) => {
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
0,
userData
)
@@ -21911,12 +21836,8 @@ export function init(RuntimeName, PHPLoader) {
fillVisibilityChangeEventData(visibilityChangeEvent);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
visibilityChangeEvent,
userData
)
@@ -22036,12 +21957,8 @@ export function init(RuntimeName, PHPLoader) {
HEAP32[(touchEvent + 8) >> 2] = numTouches;
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
touchEvent,
userData
)
@@ -22179,12 +22096,8 @@ export function init(RuntimeName, PHPLoader) {
fillGamepadEventData(gamepadEvent, e['gamepad']);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
gamepadEvent,
userData
)
@@ -22286,12 +22199,8 @@ export function init(RuntimeName, PHPLoader) {
) => {
var beforeUnloadEventHandlerFunc = (e = event) => {
// Note: This is always called on the main browser thread, since it needs synchronously return a value!
- var confirmationMessage = ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ var confirmationMessage = ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
0,
userData
);
@@ -22362,12 +22271,8 @@ export function init(RuntimeName, PHPLoader) {
fillBatteryEventData(batteryEvent, battery());
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
batteryEvent,
userData
)
@@ -22457,11 +22362,8 @@ export function init(RuntimeName, PHPLoader) {
var _emscripten_request_animation_frame = (cb, userData) =>
requestAnimationFrame((timeStamp) =>
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- timeStamp,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp,
userData
)
);
@@ -22473,11 +22375,8 @@ export function init(RuntimeName, PHPLoader) {
var _emscripten_request_animation_frame_loop = (cb, userData) => {
function tick(timeStamp) {
if (
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- timeStamp,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp,
userData
)
) {
@@ -22702,10 +22601,8 @@ export function init(RuntimeName, PHPLoader) {
return emSetImmediate(() => {
runtimeKeepalivePop();
callUserCallback(() =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userData
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
)
);
});
@@ -22722,10 +22619,8 @@ export function init(RuntimeName, PHPLoader) {
function tick() {
callUserCallback(() => {
if (
- ((
- a1
- ) => {}) /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userData
+ ((a1) => {})(
+ /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
)
) {
emSetImmediate(tick);
@@ -22742,10 +22637,8 @@ export function init(RuntimeName, PHPLoader) {
var _emscripten_set_timeout = (cb, msecs, userData) =>
safeSetTimeout(
() =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userData
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
),
msecs
);
@@ -22761,11 +22654,8 @@ export function init(RuntimeName, PHPLoader) {
runtimeKeepalivePop();
callUserCallback(() => {
if (
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- t,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ t,
userData
)
) {
@@ -22789,10 +22679,8 @@ export function init(RuntimeName, PHPLoader) {
runtimeKeepalivePush();
return setInterval(() => {
callUserCallback(() =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userData
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
)
);
}, msecs);
@@ -22807,10 +22695,8 @@ export function init(RuntimeName, PHPLoader) {
var _emscripten_async_call = (func, arg, millis) => {
var wrapper = () =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
if (
@@ -22843,7 +22729,7 @@ export function init(RuntimeName, PHPLoader) {
var _emscripten_set_main_loop = (func, fps, simulateInfiniteLoop) => {
var iterFunc =
- () => {} /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */;
+ () => {}; /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */
setMainLoop(iterFunc, fps, simulateInfiniteLoop);
};
_emscripten_set_main_loop.sig = 'vpii';
@@ -22855,10 +22741,8 @@ export function init(RuntimeName, PHPLoader) {
simulateInfiniteLoop
) => {
var iterFunc = () =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
setMainLoop(iterFunc, fps, simulateInfiniteLoop, arg);
};
@@ -22879,10 +22763,8 @@ export function init(RuntimeName, PHPLoader) {
var __emscripten_push_main_loop_blocker = (func, arg, name) => {
MainLoop.queue.push({
func: () => {
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
},
name: UTF8ToString(name),
@@ -22895,10 +22777,8 @@ export function init(RuntimeName, PHPLoader) {
var __emscripten_push_uncounted_main_loop_blocker = (func, arg, name) => {
MainLoop.queue.push({
func: () => {
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
},
name: UTF8ToString(name),
@@ -22932,12 +22812,8 @@ export function init(RuntimeName, PHPLoader) {
var resultPtr = stackAlloc(POINTER_SIZE);
HEAPU32[resultPtr >> 2] = 0;
try {
- var result = ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- resultPtr,
+ var result = ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ resultPtr,
userData,
value
);
@@ -23873,19 +23749,15 @@ export function init(RuntimeName, PHPLoader) {
() => {
runtimeKeepalivePop();
if (onload)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- file
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file
);
},
() => {
runtimeKeepalivePop();
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- file
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file
);
},
true // don'tCreateFile - it's already there
@@ -23919,21 +23791,16 @@ export function init(RuntimeName, PHPLoader) {
() => {
runtimeKeepalivePop();
if (onload)
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
cname
);
},
() => {
runtimeKeepalivePop();
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
},
true // don'tCreateFile - it's already there
@@ -24206,10 +24073,10 @@ export function init(RuntimeName, PHPLoader) {
runtimeKeepalivePop();
callUserCallback(() => {
var sp = stackSave();
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- stringToUTF8OnStack(_file)
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stringToUTF8OnStack(
+ _file
+ )
);
stackRestore(sp);
});
@@ -24253,12 +24120,8 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
var buffer = _malloc(byteArray.length);
HEAPU8.set(byteArray, buffer);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userdata,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata,
buffer,
byteArray.length
);
@@ -24268,10 +24131,8 @@ export function init(RuntimeName, PHPLoader) {
if (onerror) {
runtimeKeepalivePop();
callUserCallback(() => {
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userdata
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata
);
});
}
@@ -24328,12 +24189,8 @@ export function init(RuntimeName, PHPLoader) {
);
if (onload) {
var sp = stackSave();
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
stringToUTF8OnStack(_file)
);
@@ -24341,12 +24198,8 @@ export function init(RuntimeName, PHPLoader) {
}
} else {
if (onerror)
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
http.status
);
@@ -24359,12 +24212,8 @@ export function init(RuntimeName, PHPLoader) {
http.onerror = (e) => {
runtimeKeepalivePop();
if (onerror)
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
http.status
);
@@ -24379,12 +24228,8 @@ export function init(RuntimeName, PHPLoader) {
) {
var percentComplete = (e.loaded / e.total) * 100;
if (onprogress)
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
percentComplete
);
@@ -24441,13 +24286,8 @@ export function init(RuntimeName, PHPLoader) {
if (http.statusText) {
statusText = stringToUTF8OnStack(http.statusText);
}
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
http.status,
statusText
@@ -24468,13 +24308,8 @@ export function init(RuntimeName, PHPLoader) {
var buffer = _malloc(byteArray.length);
HEAPU8.set(byteArray, buffer);
if (onload)
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
buffer,
byteArray.length
@@ -24495,13 +24330,8 @@ export function init(RuntimeName, PHPLoader) {
// PROGRESS
http.onprogress = (e) => {
if (onprogress)
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
e.loaded,
e.lengthComputable || e.lengthComputable === undefined
@@ -24621,24 +24451,16 @@ export function init(RuntimeName, PHPLoader) {
if (event === 'error') {
withStackSave(() => {
var msg = stringToUTF8OnStack(data[2]);
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- data[0],
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data[0],
data[1],
msg,
userData
);
});
} else {
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- data,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data,
userData
);
}
@@ -25104,12 +24926,8 @@ export function init(RuntimeName, PHPLoader) {
) => {
var webGlEventHandlerFunc = (e = event) => {
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
0,
userData
)
@@ -25328,21 +25146,15 @@ export function init(RuntimeName, PHPLoader) {
) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- lastX,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX,
lastY
);
} else if (GLUT.buttons != 0 && GLUT.motionFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- lastX,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX,
lastY
);
}
@@ -25503,12 +25315,8 @@ export function init(RuntimeName, PHPLoader) {
if (GLUT.specialFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- key,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
Browser.mouseX,
Browser.mouseY
);
@@ -25518,12 +25326,8 @@ export function init(RuntimeName, PHPLoader) {
if (key !== null && GLUT.keyboardFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- key,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
Browser.mouseX,
Browser.mouseY
);
@@ -25538,12 +25342,8 @@ export function init(RuntimeName, PHPLoader) {
if (GLUT.specialUpFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- key,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
Browser.mouseX,
Browser.mouseY
);
@@ -25553,12 +25353,8 @@ export function init(RuntimeName, PHPLoader) {
if (key !== null && GLUT.keyboardUpFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- key,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
Browser.mouseX,
Browser.mouseY
);
@@ -25622,13 +25418,10 @@ export function init(RuntimeName, PHPLoader) {
} catch (e) {}
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- event['button'],
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[
+ 'button'
+ ],
0 /*GLUT_DOWN*/,
Browser.mouseX,
Browser.mouseY
@@ -25643,13 +25436,10 @@ export function init(RuntimeName, PHPLoader) {
if (GLUT.mouseFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- event['button'],
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[
+ 'button'
+ ],
1 /*GLUT_UP*/,
Browser.mouseX,
Browser.mouseY
@@ -25678,13 +25468,8 @@ export function init(RuntimeName, PHPLoader) {
if (GLUT.mouseFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- button,
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ button,
0 /*GLUT_DOWN*/,
Browser.mouseX,
Browser.mouseY
@@ -25727,11 +25512,8 @@ export function init(RuntimeName, PHPLoader) {
/* Can't call _glutReshapeWindow as that requests cancelling fullscreen. */
if (GLUT.reshapeFunc) {
// out("GLUT.reshapeFunc (from FS): " + width + ", " + height);
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- width,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
height
);
}
@@ -25774,11 +25556,8 @@ export function init(RuntimeName, PHPLoader) {
Browser.resizeListeners.push((width, height) => {
if (GLUT.reshapeFunc) {
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- width,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
height
);
}
@@ -25891,10 +25670,8 @@ export function init(RuntimeName, PHPLoader) {
var _glutTimerFunc = (msec, func, value) =>
safeSetTimeout(
() =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- value
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ value
),
msec
);
@@ -26054,11 +25831,8 @@ export function init(RuntimeName, PHPLoader) {
Browser.setCanvasSize(width, height, true); // N.B. GLUT.reshapeFunc is also registered as a canvas resize callback.
// Just call it once here.
if (GLUT.reshapeFunc) {
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- width,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
height
);
}
@@ -27120,21 +26894,15 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
if (error) {
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
return;
}
var buffer = _malloc(byteArray.length);
HEAPU8.set(byteArray, buffer);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
buffer,
byteArray.length
);
@@ -27166,18 +26934,14 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
if (error) {
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
return;
}
if (onstore)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
});
}
@@ -27192,18 +26956,14 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
if (error) {
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
return;
}
if (ondelete)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
});
});
@@ -27220,19 +26980,14 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
if (error) {
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
return;
}
if (oncheck)
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
exists
);
});
@@ -27248,18 +27003,14 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
if (error) {
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
return;
}
if (onclear)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
});
});
@@ -27416,11 +27167,8 @@ export function init(RuntimeName, PHPLoader) {
safeSetTimeout(() => {
var stackBegin = Asyncify.currData + 12;
var stackEnd = HEAPU32[Asyncify.currData >> 2];
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- stackBegin,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stackBegin,
stackEnd
);
wakeUp();
@@ -27481,10 +27229,8 @@ export function init(RuntimeName, PHPLoader) {
HEAPU32[(newFiber + 12) >> 2] = 0;
var userData = HEAPU32[(newFiber + 16) >> 2];
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userData
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
);
} else {
var asyncifyData = newFiber + 20;
@@ -28496,11 +28242,8 @@ export function init(RuntimeName, PHPLoader) {
if (!SDL.eventHandler) return;
while (SDL.pollEvent(SDL.eventHandlerTemp)) {
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- SDL.eventHandlerContext,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL.eventHandlerContext,
SDL.eventHandlerTemp
);
}
@@ -30133,12 +29876,9 @@ export function init(RuntimeName, PHPLoader) {
return;
// Ask SDL audio data from the user code.
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- SDL.audio.userdata,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL
+ .audio.userdata,
SDL.audio.buffer,
SDL.audio.bufferSize
);
@@ -30596,10 +30336,8 @@ export function init(RuntimeName, PHPLoader) {
info.audio = null;
}
if (SDL.channelFinished) {
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- channel
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel
);
}
}
@@ -30668,10 +30406,8 @@ export function init(RuntimeName, PHPLoader) {
channelInfo.audio = null;
}
if (SDL.channelFinished)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- channel
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel
);
};
if (channelInfo.audio) {
@@ -31419,11 +31155,8 @@ export function init(RuntimeName, PHPLoader) {
var _SDL_AddTimer = (interval, callback, param) =>
safeSetTimeout(
() =>
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- interval,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ interval,
param
),
interval
@@ -31802,12 +31535,8 @@ export function init(RuntimeName, PHPLoader) {
socket.onopen = function (e) {
var eventPtr = WS.getSocketEvent(socketId);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 0 /*TODO*/,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
eventPtr,
userData
);
@@ -31829,12 +31558,8 @@ export function init(RuntimeName, PHPLoader) {
socket.onerror = function (e) {
var eventPtr = WS.getSocketEvent(socketId);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 0 /*TODO*/,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
eventPtr,
userData
);
@@ -31859,12 +31584,8 @@ export function init(RuntimeName, PHPLoader) {
(HEAP8[eventPtr + 4] = e.wasClean),
(HEAP16[(eventPtr + 6) >> 1] = e.code),
stringToUTF8(e.reason, eventPtr + 8, 512);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 0 /*TODO*/,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
eventPtr,
userData
);
@@ -31898,12 +31619,8 @@ export function init(RuntimeName, PHPLoader) {
(HEAPU32[(eventPtr + 4) >> 2] = buf),
(HEAP32[(eventPtr + 8) >> 2] = len),
(HEAP8[eventPtr + 12] = isText),
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 0 /*TODO*/,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
eventPtr,
userData
);
diff --git a/packages/php-wasm/node/asyncify/php_8_1.js b/packages/php-wasm/node/asyncify/php_8_1.js
index c1f949ebcd..2f069a9827 100644
--- a/packages/php-wasm/node/asyncify/php_8_1.js
+++ b/packages/php-wasm/node/asyncify/php_8_1.js
@@ -1774,10 +1774,8 @@ export function init(RuntimeName, PHPLoader) {
);
var ___call_sighandler = (fp, sig) =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- sig
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ sig
);
___call_sighandler.sig = 'vpi';
@@ -8802,11 +8800,8 @@ export function init(RuntimeName, PHPLoader) {
dlSetError(`'Could not load dynamic lib: ${filename}\n${e}`);
runtimeKeepalivePop();
callUserCallback(() =>
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
user_data
)
);
@@ -8814,11 +8809,8 @@ export function init(RuntimeName, PHPLoader) {
function successCallback() {
runtimeKeepalivePop();
callUserCallback(() =>
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
user_data
)
);
@@ -19486,11 +19478,8 @@ export function init(RuntimeName, PHPLoader) {
var trace = getCallstack();
var parts = trace.split('\n');
for (var i = 0; i < parts.length; i++) {
- var ret = ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 0,
+ var ret = ((a1, a2) => {})(
+ /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0,
arg
);
if (ret !== 0) return;
@@ -20066,12 +20055,8 @@ export function init(RuntimeName, PHPLoader) {
stringToUTF8(e.locale || '', keyEventData + 128, 32);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
keyEventData,
userData
)
@@ -20189,12 +20174,8 @@ export function init(RuntimeName, PHPLoader) {
fillMouseEventData(JSEvents.mouseEvent, e, target);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
JSEvents.mouseEvent,
userData
)
@@ -20408,12 +20389,8 @@ export function init(RuntimeName, PHPLoader) {
HEAPF64[(wheelEvent + 80) >> 3] = e['deltaZ'];
HEAP32[(wheelEvent + 88) >> 2] = e['deltaMode'];
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
wheelEvent,
userData
)
@@ -20494,12 +20471,8 @@ export function init(RuntimeName, PHPLoader) {
HEAP32[(uiEvent + 28) >> 2] = pageXOffset | 0; // scroll offsets are float
HEAP32[(uiEvent + 32) >> 2] = pageYOffset | 0;
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
uiEvent,
userData
)
@@ -20573,12 +20546,8 @@ export function init(RuntimeName, PHPLoader) {
stringToUTF8(id, focusEvent + 128, 128);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
focusEvent,
userData
)
@@ -20694,12 +20663,8 @@ export function init(RuntimeName, PHPLoader) {
); // TODO: Thread-safety with respect to emscripten_get_deviceorientation_status()
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
JSEvents.deviceOrientationEvent,
userData
)
@@ -20782,12 +20747,8 @@ export function init(RuntimeName, PHPLoader) {
fillDeviceMotionEventData(JSEvents.deviceMotionEvent, e, target); // TODO: Thread-safety with respect to emscripten_get_devicemotion_status()
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
JSEvents.deviceMotionEvent,
userData
)
@@ -20897,12 +20858,8 @@ export function init(RuntimeName, PHPLoader) {
fillOrientationChangeEventData(orientationChangeEvent);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
orientationChangeEvent,
userData
)
@@ -21035,12 +20992,8 @@ export function init(RuntimeName, PHPLoader) {
fillFullscreenChangeEventData(fullscreenChangeEvent);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
fullscreenChangeEvent,
userData
)
@@ -21204,12 +21157,8 @@ export function init(RuntimeName, PHPLoader) {
);
if (currentFullscreenStrategy.canvasResizedCallback) {
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 37,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
0,
currentFullscreenStrategy.canvasResizedCallbackUserData
);
@@ -21315,12 +21264,8 @@ export function init(RuntimeName, PHPLoader) {
currentFullscreenStrategy = strategy;
if (strategy.canvasResizedCallback) {
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 37,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
0,
strategy.canvasResizedCallbackUserData
);
@@ -21422,12 +21367,8 @@ export function init(RuntimeName, PHPLoader) {
!inCenteredWithoutScalingFullscreenMode &&
currentFullscreenStrategy.canvasResizedCallback
) {
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 37,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
0,
currentFullscreenStrategy.canvasResizedCallbackUserData
);
@@ -21526,12 +21467,8 @@ export function init(RuntimeName, PHPLoader) {
softFullscreenResizeWebGLRenderTarget
);
if (strategy.canvasResizedCallback) {
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 37,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
0,
strategy.canvasResizedCallbackUserData
);
@@ -21544,12 +21481,8 @@ export function init(RuntimeName, PHPLoader) {
// Inform the caller that the canvas size has changed.
if (strategy.canvasResizedCallback) {
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 37,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
0,
strategy.canvasResizedCallbackUserData
);
@@ -21617,12 +21550,8 @@ export function init(RuntimeName, PHPLoader) {
fillPointerlockChangeEventData(pointerlockChangeEvent);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
pointerlockChangeEvent,
userData
)
@@ -21712,12 +21641,8 @@ export function init(RuntimeName, PHPLoader) {
) => {
var pointerlockErrorEventHandlerFunc = (e = event) => {
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
0,
userData
)
@@ -21917,12 +21842,8 @@ export function init(RuntimeName, PHPLoader) {
fillVisibilityChangeEventData(visibilityChangeEvent);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
visibilityChangeEvent,
userData
)
@@ -22042,12 +21963,8 @@ export function init(RuntimeName, PHPLoader) {
HEAP32[(touchEvent + 8) >> 2] = numTouches;
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
touchEvent,
userData
)
@@ -22185,12 +22102,8 @@ export function init(RuntimeName, PHPLoader) {
fillGamepadEventData(gamepadEvent, e['gamepad']);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
gamepadEvent,
userData
)
@@ -22292,12 +22205,8 @@ export function init(RuntimeName, PHPLoader) {
) => {
var beforeUnloadEventHandlerFunc = (e = event) => {
// Note: This is always called on the main browser thread, since it needs synchronously return a value!
- var confirmationMessage = ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ var confirmationMessage = ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
0,
userData
);
@@ -22368,12 +22277,8 @@ export function init(RuntimeName, PHPLoader) {
fillBatteryEventData(batteryEvent, battery());
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
batteryEvent,
userData
)
@@ -22463,11 +22368,8 @@ export function init(RuntimeName, PHPLoader) {
var _emscripten_request_animation_frame = (cb, userData) =>
requestAnimationFrame((timeStamp) =>
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- timeStamp,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp,
userData
)
);
@@ -22479,11 +22381,8 @@ export function init(RuntimeName, PHPLoader) {
var _emscripten_request_animation_frame_loop = (cb, userData) => {
function tick(timeStamp) {
if (
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- timeStamp,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp,
userData
)
) {
@@ -22708,10 +22607,8 @@ export function init(RuntimeName, PHPLoader) {
return emSetImmediate(() => {
runtimeKeepalivePop();
callUserCallback(() =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userData
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
)
);
});
@@ -22728,10 +22625,8 @@ export function init(RuntimeName, PHPLoader) {
function tick() {
callUserCallback(() => {
if (
- ((
- a1
- ) => {}) /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userData
+ ((a1) => {})(
+ /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
)
) {
emSetImmediate(tick);
@@ -22748,10 +22643,8 @@ export function init(RuntimeName, PHPLoader) {
var _emscripten_set_timeout = (cb, msecs, userData) =>
safeSetTimeout(
() =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userData
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
),
msecs
);
@@ -22767,11 +22660,8 @@ export function init(RuntimeName, PHPLoader) {
runtimeKeepalivePop();
callUserCallback(() => {
if (
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- t,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ t,
userData
)
) {
@@ -22795,10 +22685,8 @@ export function init(RuntimeName, PHPLoader) {
runtimeKeepalivePush();
return setInterval(() => {
callUserCallback(() =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userData
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
)
);
}, msecs);
@@ -22813,10 +22701,8 @@ export function init(RuntimeName, PHPLoader) {
var _emscripten_async_call = (func, arg, millis) => {
var wrapper = () =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
if (
@@ -22849,7 +22735,7 @@ export function init(RuntimeName, PHPLoader) {
var _emscripten_set_main_loop = (func, fps, simulateInfiniteLoop) => {
var iterFunc =
- () => {} /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */;
+ () => {}; /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */
setMainLoop(iterFunc, fps, simulateInfiniteLoop);
};
_emscripten_set_main_loop.sig = 'vpii';
@@ -22861,10 +22747,8 @@ export function init(RuntimeName, PHPLoader) {
simulateInfiniteLoop
) => {
var iterFunc = () =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
setMainLoop(iterFunc, fps, simulateInfiniteLoop, arg);
};
@@ -22885,10 +22769,8 @@ export function init(RuntimeName, PHPLoader) {
var __emscripten_push_main_loop_blocker = (func, arg, name) => {
MainLoop.queue.push({
func: () => {
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
},
name: UTF8ToString(name),
@@ -22901,10 +22783,8 @@ export function init(RuntimeName, PHPLoader) {
var __emscripten_push_uncounted_main_loop_blocker = (func, arg, name) => {
MainLoop.queue.push({
func: () => {
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
},
name: UTF8ToString(name),
@@ -22938,12 +22818,8 @@ export function init(RuntimeName, PHPLoader) {
var resultPtr = stackAlloc(POINTER_SIZE);
HEAPU32[resultPtr >> 2] = 0;
try {
- var result = ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- resultPtr,
+ var result = ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ resultPtr,
userData,
value
);
@@ -23879,19 +23755,15 @@ export function init(RuntimeName, PHPLoader) {
() => {
runtimeKeepalivePop();
if (onload)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- file
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file
);
},
() => {
runtimeKeepalivePop();
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- file
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file
);
},
true // don'tCreateFile - it's already there
@@ -23925,21 +23797,16 @@ export function init(RuntimeName, PHPLoader) {
() => {
runtimeKeepalivePop();
if (onload)
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
cname
);
},
() => {
runtimeKeepalivePop();
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
},
true // don'tCreateFile - it's already there
@@ -24212,10 +24079,10 @@ export function init(RuntimeName, PHPLoader) {
runtimeKeepalivePop();
callUserCallback(() => {
var sp = stackSave();
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- stringToUTF8OnStack(_file)
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stringToUTF8OnStack(
+ _file
+ )
);
stackRestore(sp);
});
@@ -24259,12 +24126,8 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
var buffer = _malloc(byteArray.length);
HEAPU8.set(byteArray, buffer);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userdata,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata,
buffer,
byteArray.length
);
@@ -24274,10 +24137,8 @@ export function init(RuntimeName, PHPLoader) {
if (onerror) {
runtimeKeepalivePop();
callUserCallback(() => {
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userdata
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata
);
});
}
@@ -24334,12 +24195,8 @@ export function init(RuntimeName, PHPLoader) {
);
if (onload) {
var sp = stackSave();
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
stringToUTF8OnStack(_file)
);
@@ -24347,12 +24204,8 @@ export function init(RuntimeName, PHPLoader) {
}
} else {
if (onerror)
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
http.status
);
@@ -24365,12 +24218,8 @@ export function init(RuntimeName, PHPLoader) {
http.onerror = (e) => {
runtimeKeepalivePop();
if (onerror)
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
http.status
);
@@ -24385,12 +24234,8 @@ export function init(RuntimeName, PHPLoader) {
) {
var percentComplete = (e.loaded / e.total) * 100;
if (onprogress)
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
percentComplete
);
@@ -24447,13 +24292,8 @@ export function init(RuntimeName, PHPLoader) {
if (http.statusText) {
statusText = stringToUTF8OnStack(http.statusText);
}
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
http.status,
statusText
@@ -24474,13 +24314,8 @@ export function init(RuntimeName, PHPLoader) {
var buffer = _malloc(byteArray.length);
HEAPU8.set(byteArray, buffer);
if (onload)
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
buffer,
byteArray.length
@@ -24501,13 +24336,8 @@ export function init(RuntimeName, PHPLoader) {
// PROGRESS
http.onprogress = (e) => {
if (onprogress)
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
e.loaded,
e.lengthComputable || e.lengthComputable === undefined
@@ -24627,24 +24457,16 @@ export function init(RuntimeName, PHPLoader) {
if (event === 'error') {
withStackSave(() => {
var msg = stringToUTF8OnStack(data[2]);
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- data[0],
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data[0],
data[1],
msg,
userData
);
});
} else {
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- data,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data,
userData
);
}
@@ -25110,12 +24932,8 @@ export function init(RuntimeName, PHPLoader) {
) => {
var webGlEventHandlerFunc = (e = event) => {
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
0,
userData
)
@@ -25334,21 +25152,15 @@ export function init(RuntimeName, PHPLoader) {
) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- lastX,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX,
lastY
);
} else if (GLUT.buttons != 0 && GLUT.motionFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- lastX,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX,
lastY
);
}
@@ -25509,12 +25321,8 @@ export function init(RuntimeName, PHPLoader) {
if (GLUT.specialFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- key,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
Browser.mouseX,
Browser.mouseY
);
@@ -25524,12 +25332,8 @@ export function init(RuntimeName, PHPLoader) {
if (key !== null && GLUT.keyboardFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- key,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
Browser.mouseX,
Browser.mouseY
);
@@ -25544,12 +25348,8 @@ export function init(RuntimeName, PHPLoader) {
if (GLUT.specialUpFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- key,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
Browser.mouseX,
Browser.mouseY
);
@@ -25559,12 +25359,8 @@ export function init(RuntimeName, PHPLoader) {
if (key !== null && GLUT.keyboardUpFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- key,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
Browser.mouseX,
Browser.mouseY
);
@@ -25628,13 +25424,10 @@ export function init(RuntimeName, PHPLoader) {
} catch (e) {}
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- event['button'],
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[
+ 'button'
+ ],
0 /*GLUT_DOWN*/,
Browser.mouseX,
Browser.mouseY
@@ -25649,13 +25442,10 @@ export function init(RuntimeName, PHPLoader) {
if (GLUT.mouseFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- event['button'],
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[
+ 'button'
+ ],
1 /*GLUT_UP*/,
Browser.mouseX,
Browser.mouseY
@@ -25684,13 +25474,8 @@ export function init(RuntimeName, PHPLoader) {
if (GLUT.mouseFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- button,
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ button,
0 /*GLUT_DOWN*/,
Browser.mouseX,
Browser.mouseY
@@ -25733,11 +25518,8 @@ export function init(RuntimeName, PHPLoader) {
/* Can't call _glutReshapeWindow as that requests cancelling fullscreen. */
if (GLUT.reshapeFunc) {
// out("GLUT.reshapeFunc (from FS): " + width + ", " + height);
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- width,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
height
);
}
@@ -25780,11 +25562,8 @@ export function init(RuntimeName, PHPLoader) {
Browser.resizeListeners.push((width, height) => {
if (GLUT.reshapeFunc) {
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- width,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
height
);
}
@@ -25897,10 +25676,8 @@ export function init(RuntimeName, PHPLoader) {
var _glutTimerFunc = (msec, func, value) =>
safeSetTimeout(
() =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- value
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ value
),
msec
);
@@ -26060,11 +25837,8 @@ export function init(RuntimeName, PHPLoader) {
Browser.setCanvasSize(width, height, true); // N.B. GLUT.reshapeFunc is also registered as a canvas resize callback.
// Just call it once here.
if (GLUT.reshapeFunc) {
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- width,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
height
);
}
@@ -27126,21 +26900,15 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
if (error) {
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
return;
}
var buffer = _malloc(byteArray.length);
HEAPU8.set(byteArray, buffer);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
buffer,
byteArray.length
);
@@ -27172,18 +26940,14 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
if (error) {
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
return;
}
if (onstore)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
});
}
@@ -27198,18 +26962,14 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
if (error) {
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
return;
}
if (ondelete)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
});
});
@@ -27226,19 +26986,14 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
if (error) {
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
return;
}
if (oncheck)
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
exists
);
});
@@ -27254,18 +27009,14 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
if (error) {
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
return;
}
if (onclear)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
});
});
@@ -27422,11 +27173,8 @@ export function init(RuntimeName, PHPLoader) {
safeSetTimeout(() => {
var stackBegin = Asyncify.currData + 12;
var stackEnd = HEAPU32[Asyncify.currData >> 2];
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- stackBegin,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stackBegin,
stackEnd
);
wakeUp();
@@ -27487,10 +27235,8 @@ export function init(RuntimeName, PHPLoader) {
HEAPU32[(newFiber + 12) >> 2] = 0;
var userData = HEAPU32[(newFiber + 16) >> 2];
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userData
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
);
} else {
var asyncifyData = newFiber + 20;
@@ -28502,11 +28248,8 @@ export function init(RuntimeName, PHPLoader) {
if (!SDL.eventHandler) return;
while (SDL.pollEvent(SDL.eventHandlerTemp)) {
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- SDL.eventHandlerContext,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL.eventHandlerContext,
SDL.eventHandlerTemp
);
}
@@ -30139,12 +29882,9 @@ export function init(RuntimeName, PHPLoader) {
return;
// Ask SDL audio data from the user code.
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- SDL.audio.userdata,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL
+ .audio.userdata,
SDL.audio.buffer,
SDL.audio.bufferSize
);
@@ -30602,10 +30342,8 @@ export function init(RuntimeName, PHPLoader) {
info.audio = null;
}
if (SDL.channelFinished) {
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- channel
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel
);
}
}
@@ -30674,10 +30412,8 @@ export function init(RuntimeName, PHPLoader) {
channelInfo.audio = null;
}
if (SDL.channelFinished)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- channel
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel
);
};
if (channelInfo.audio) {
@@ -31425,11 +31161,8 @@ export function init(RuntimeName, PHPLoader) {
var _SDL_AddTimer = (interval, callback, param) =>
safeSetTimeout(
() =>
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- interval,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ interval,
param
),
interval
@@ -31802,12 +31535,8 @@ export function init(RuntimeName, PHPLoader) {
socket.onopen = function (e) {
var eventPtr = WS.getSocketEvent(socketId);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 0 /*TODO*/,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
eventPtr,
userData
);
@@ -31829,12 +31558,8 @@ export function init(RuntimeName, PHPLoader) {
socket.onerror = function (e) {
var eventPtr = WS.getSocketEvent(socketId);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 0 /*TODO*/,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
eventPtr,
userData
);
@@ -31859,12 +31584,8 @@ export function init(RuntimeName, PHPLoader) {
(HEAP8[eventPtr + 4] = e.wasClean),
(HEAP16[(eventPtr + 6) >> 1] = e.code),
stringToUTF8(e.reason, eventPtr + 8, 512);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 0 /*TODO*/,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
eventPtr,
userData
);
@@ -31898,12 +31619,8 @@ export function init(RuntimeName, PHPLoader) {
(HEAPU32[(eventPtr + 4) >> 2] = buf),
(HEAP32[(eventPtr + 8) >> 2] = len),
(HEAP8[eventPtr + 12] = isText),
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 0 /*TODO*/,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
eventPtr,
userData
);
diff --git a/packages/php-wasm/node/asyncify/php_8_2.js b/packages/php-wasm/node/asyncify/php_8_2.js
index cf0430173b..01275c2c39 100644
--- a/packages/php-wasm/node/asyncify/php_8_2.js
+++ b/packages/php-wasm/node/asyncify/php_8_2.js
@@ -1774,10 +1774,8 @@ export function init(RuntimeName, PHPLoader) {
);
var ___call_sighandler = (fp, sig) =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- sig
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ sig
);
___call_sighandler.sig = 'vpi';
@@ -8802,11 +8800,8 @@ export function init(RuntimeName, PHPLoader) {
dlSetError(`'Could not load dynamic lib: ${filename}\n${e}`);
runtimeKeepalivePop();
callUserCallback(() =>
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
user_data
)
);
@@ -8814,11 +8809,8 @@ export function init(RuntimeName, PHPLoader) {
function successCallback() {
runtimeKeepalivePop();
callUserCallback(() =>
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
user_data
)
);
@@ -19488,11 +19480,8 @@ export function init(RuntimeName, PHPLoader) {
var trace = getCallstack();
var parts = trace.split('\n');
for (var i = 0; i < parts.length; i++) {
- var ret = ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 0,
+ var ret = ((a1, a2) => {})(
+ /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0,
arg
);
if (ret !== 0) return;
@@ -20068,12 +20057,8 @@ export function init(RuntimeName, PHPLoader) {
stringToUTF8(e.locale || '', keyEventData + 128, 32);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
keyEventData,
userData
)
@@ -20191,12 +20176,8 @@ export function init(RuntimeName, PHPLoader) {
fillMouseEventData(JSEvents.mouseEvent, e, target);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
JSEvents.mouseEvent,
userData
)
@@ -20410,12 +20391,8 @@ export function init(RuntimeName, PHPLoader) {
HEAPF64[(wheelEvent + 80) >> 3] = e['deltaZ'];
HEAP32[(wheelEvent + 88) >> 2] = e['deltaMode'];
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
wheelEvent,
userData
)
@@ -20496,12 +20473,8 @@ export function init(RuntimeName, PHPLoader) {
HEAP32[(uiEvent + 28) >> 2] = pageXOffset | 0; // scroll offsets are float
HEAP32[(uiEvent + 32) >> 2] = pageYOffset | 0;
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
uiEvent,
userData
)
@@ -20575,12 +20548,8 @@ export function init(RuntimeName, PHPLoader) {
stringToUTF8(id, focusEvent + 128, 128);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
focusEvent,
userData
)
@@ -20696,12 +20665,8 @@ export function init(RuntimeName, PHPLoader) {
); // TODO: Thread-safety with respect to emscripten_get_deviceorientation_status()
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
JSEvents.deviceOrientationEvent,
userData
)
@@ -20784,12 +20749,8 @@ export function init(RuntimeName, PHPLoader) {
fillDeviceMotionEventData(JSEvents.deviceMotionEvent, e, target); // TODO: Thread-safety with respect to emscripten_get_devicemotion_status()
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
JSEvents.deviceMotionEvent,
userData
)
@@ -20899,12 +20860,8 @@ export function init(RuntimeName, PHPLoader) {
fillOrientationChangeEventData(orientationChangeEvent);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
orientationChangeEvent,
userData
)
@@ -21037,12 +20994,8 @@ export function init(RuntimeName, PHPLoader) {
fillFullscreenChangeEventData(fullscreenChangeEvent);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
fullscreenChangeEvent,
userData
)
@@ -21206,12 +21159,8 @@ export function init(RuntimeName, PHPLoader) {
);
if (currentFullscreenStrategy.canvasResizedCallback) {
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 37,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
0,
currentFullscreenStrategy.canvasResizedCallbackUserData
);
@@ -21317,12 +21266,8 @@ export function init(RuntimeName, PHPLoader) {
currentFullscreenStrategy = strategy;
if (strategy.canvasResizedCallback) {
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 37,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
0,
strategy.canvasResizedCallbackUserData
);
@@ -21424,12 +21369,8 @@ export function init(RuntimeName, PHPLoader) {
!inCenteredWithoutScalingFullscreenMode &&
currentFullscreenStrategy.canvasResizedCallback
) {
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 37,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
0,
currentFullscreenStrategy.canvasResizedCallbackUserData
);
@@ -21528,12 +21469,8 @@ export function init(RuntimeName, PHPLoader) {
softFullscreenResizeWebGLRenderTarget
);
if (strategy.canvasResizedCallback) {
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 37,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
0,
strategy.canvasResizedCallbackUserData
);
@@ -21546,12 +21483,8 @@ export function init(RuntimeName, PHPLoader) {
// Inform the caller that the canvas size has changed.
if (strategy.canvasResizedCallback) {
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 37,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
0,
strategy.canvasResizedCallbackUserData
);
@@ -21619,12 +21552,8 @@ export function init(RuntimeName, PHPLoader) {
fillPointerlockChangeEventData(pointerlockChangeEvent);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
pointerlockChangeEvent,
userData
)
@@ -21714,12 +21643,8 @@ export function init(RuntimeName, PHPLoader) {
) => {
var pointerlockErrorEventHandlerFunc = (e = event) => {
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
0,
userData
)
@@ -21919,12 +21844,8 @@ export function init(RuntimeName, PHPLoader) {
fillVisibilityChangeEventData(visibilityChangeEvent);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
visibilityChangeEvent,
userData
)
@@ -22044,12 +21965,8 @@ export function init(RuntimeName, PHPLoader) {
HEAP32[(touchEvent + 8) >> 2] = numTouches;
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
touchEvent,
userData
)
@@ -22187,12 +22104,8 @@ export function init(RuntimeName, PHPLoader) {
fillGamepadEventData(gamepadEvent, e['gamepad']);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
gamepadEvent,
userData
)
@@ -22294,12 +22207,8 @@ export function init(RuntimeName, PHPLoader) {
) => {
var beforeUnloadEventHandlerFunc = (e = event) => {
// Note: This is always called on the main browser thread, since it needs synchronously return a value!
- var confirmationMessage = ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ var confirmationMessage = ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
0,
userData
);
@@ -22370,12 +22279,8 @@ export function init(RuntimeName, PHPLoader) {
fillBatteryEventData(batteryEvent, battery());
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
batteryEvent,
userData
)
@@ -22465,11 +22370,8 @@ export function init(RuntimeName, PHPLoader) {
var _emscripten_request_animation_frame = (cb, userData) =>
requestAnimationFrame((timeStamp) =>
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- timeStamp,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp,
userData
)
);
@@ -22481,11 +22383,8 @@ export function init(RuntimeName, PHPLoader) {
var _emscripten_request_animation_frame_loop = (cb, userData) => {
function tick(timeStamp) {
if (
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- timeStamp,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp,
userData
)
) {
@@ -22710,10 +22609,8 @@ export function init(RuntimeName, PHPLoader) {
return emSetImmediate(() => {
runtimeKeepalivePop();
callUserCallback(() =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userData
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
)
);
});
@@ -22730,10 +22627,8 @@ export function init(RuntimeName, PHPLoader) {
function tick() {
callUserCallback(() => {
if (
- ((
- a1
- ) => {}) /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userData
+ ((a1) => {})(
+ /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
)
) {
emSetImmediate(tick);
@@ -22750,10 +22645,8 @@ export function init(RuntimeName, PHPLoader) {
var _emscripten_set_timeout = (cb, msecs, userData) =>
safeSetTimeout(
() =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userData
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
),
msecs
);
@@ -22769,11 +22662,8 @@ export function init(RuntimeName, PHPLoader) {
runtimeKeepalivePop();
callUserCallback(() => {
if (
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- t,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ t,
userData
)
) {
@@ -22797,10 +22687,8 @@ export function init(RuntimeName, PHPLoader) {
runtimeKeepalivePush();
return setInterval(() => {
callUserCallback(() =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userData
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
)
);
}, msecs);
@@ -22815,10 +22703,8 @@ export function init(RuntimeName, PHPLoader) {
var _emscripten_async_call = (func, arg, millis) => {
var wrapper = () =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
if (
@@ -22851,7 +22737,7 @@ export function init(RuntimeName, PHPLoader) {
var _emscripten_set_main_loop = (func, fps, simulateInfiniteLoop) => {
var iterFunc =
- () => {} /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */;
+ () => {}; /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */
setMainLoop(iterFunc, fps, simulateInfiniteLoop);
};
_emscripten_set_main_loop.sig = 'vpii';
@@ -22863,10 +22749,8 @@ export function init(RuntimeName, PHPLoader) {
simulateInfiniteLoop
) => {
var iterFunc = () =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
setMainLoop(iterFunc, fps, simulateInfiniteLoop, arg);
};
@@ -22887,10 +22771,8 @@ export function init(RuntimeName, PHPLoader) {
var __emscripten_push_main_loop_blocker = (func, arg, name) => {
MainLoop.queue.push({
func: () => {
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
},
name: UTF8ToString(name),
@@ -22903,10 +22785,8 @@ export function init(RuntimeName, PHPLoader) {
var __emscripten_push_uncounted_main_loop_blocker = (func, arg, name) => {
MainLoop.queue.push({
func: () => {
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
},
name: UTF8ToString(name),
@@ -22940,12 +22820,8 @@ export function init(RuntimeName, PHPLoader) {
var resultPtr = stackAlloc(POINTER_SIZE);
HEAPU32[resultPtr >> 2] = 0;
try {
- var result = ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- resultPtr,
+ var result = ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ resultPtr,
userData,
value
);
@@ -23881,19 +23757,15 @@ export function init(RuntimeName, PHPLoader) {
() => {
runtimeKeepalivePop();
if (onload)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- file
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file
);
},
() => {
runtimeKeepalivePop();
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- file
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file
);
},
true // don'tCreateFile - it's already there
@@ -23927,21 +23799,16 @@ export function init(RuntimeName, PHPLoader) {
() => {
runtimeKeepalivePop();
if (onload)
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
cname
);
},
() => {
runtimeKeepalivePop();
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
},
true // don'tCreateFile - it's already there
@@ -24214,10 +24081,10 @@ export function init(RuntimeName, PHPLoader) {
runtimeKeepalivePop();
callUserCallback(() => {
var sp = stackSave();
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- stringToUTF8OnStack(_file)
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stringToUTF8OnStack(
+ _file
+ )
);
stackRestore(sp);
});
@@ -24261,12 +24128,8 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
var buffer = _malloc(byteArray.length);
HEAPU8.set(byteArray, buffer);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userdata,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata,
buffer,
byteArray.length
);
@@ -24276,10 +24139,8 @@ export function init(RuntimeName, PHPLoader) {
if (onerror) {
runtimeKeepalivePop();
callUserCallback(() => {
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userdata
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata
);
});
}
@@ -24336,12 +24197,8 @@ export function init(RuntimeName, PHPLoader) {
);
if (onload) {
var sp = stackSave();
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
stringToUTF8OnStack(_file)
);
@@ -24349,12 +24206,8 @@ export function init(RuntimeName, PHPLoader) {
}
} else {
if (onerror)
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
http.status
);
@@ -24367,12 +24220,8 @@ export function init(RuntimeName, PHPLoader) {
http.onerror = (e) => {
runtimeKeepalivePop();
if (onerror)
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
http.status
);
@@ -24387,12 +24236,8 @@ export function init(RuntimeName, PHPLoader) {
) {
var percentComplete = (e.loaded / e.total) * 100;
if (onprogress)
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
percentComplete
);
@@ -24449,13 +24294,8 @@ export function init(RuntimeName, PHPLoader) {
if (http.statusText) {
statusText = stringToUTF8OnStack(http.statusText);
}
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
http.status,
statusText
@@ -24476,13 +24316,8 @@ export function init(RuntimeName, PHPLoader) {
var buffer = _malloc(byteArray.length);
HEAPU8.set(byteArray, buffer);
if (onload)
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
buffer,
byteArray.length
@@ -24503,13 +24338,8 @@ export function init(RuntimeName, PHPLoader) {
// PROGRESS
http.onprogress = (e) => {
if (onprogress)
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
e.loaded,
e.lengthComputable || e.lengthComputable === undefined
@@ -24629,24 +24459,16 @@ export function init(RuntimeName, PHPLoader) {
if (event === 'error') {
withStackSave(() => {
var msg = stringToUTF8OnStack(data[2]);
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- data[0],
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data[0],
data[1],
msg,
userData
);
});
} else {
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- data,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data,
userData
);
}
@@ -25112,12 +24934,8 @@ export function init(RuntimeName, PHPLoader) {
) => {
var webGlEventHandlerFunc = (e = event) => {
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
0,
userData
)
@@ -25336,21 +25154,15 @@ export function init(RuntimeName, PHPLoader) {
) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- lastX,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX,
lastY
);
} else if (GLUT.buttons != 0 && GLUT.motionFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- lastX,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX,
lastY
);
}
@@ -25511,12 +25323,8 @@ export function init(RuntimeName, PHPLoader) {
if (GLUT.specialFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- key,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
Browser.mouseX,
Browser.mouseY
);
@@ -25526,12 +25334,8 @@ export function init(RuntimeName, PHPLoader) {
if (key !== null && GLUT.keyboardFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- key,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
Browser.mouseX,
Browser.mouseY
);
@@ -25546,12 +25350,8 @@ export function init(RuntimeName, PHPLoader) {
if (GLUT.specialUpFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- key,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
Browser.mouseX,
Browser.mouseY
);
@@ -25561,12 +25361,8 @@ export function init(RuntimeName, PHPLoader) {
if (key !== null && GLUT.keyboardUpFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- key,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
Browser.mouseX,
Browser.mouseY
);
@@ -25630,13 +25426,10 @@ export function init(RuntimeName, PHPLoader) {
} catch (e) {}
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- event['button'],
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[
+ 'button'
+ ],
0 /*GLUT_DOWN*/,
Browser.mouseX,
Browser.mouseY
@@ -25651,13 +25444,10 @@ export function init(RuntimeName, PHPLoader) {
if (GLUT.mouseFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- event['button'],
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[
+ 'button'
+ ],
1 /*GLUT_UP*/,
Browser.mouseX,
Browser.mouseY
@@ -25686,13 +25476,8 @@ export function init(RuntimeName, PHPLoader) {
if (GLUT.mouseFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- button,
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ button,
0 /*GLUT_DOWN*/,
Browser.mouseX,
Browser.mouseY
@@ -25735,11 +25520,8 @@ export function init(RuntimeName, PHPLoader) {
/* Can't call _glutReshapeWindow as that requests cancelling fullscreen. */
if (GLUT.reshapeFunc) {
// out("GLUT.reshapeFunc (from FS): " + width + ", " + height);
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- width,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
height
);
}
@@ -25782,11 +25564,8 @@ export function init(RuntimeName, PHPLoader) {
Browser.resizeListeners.push((width, height) => {
if (GLUT.reshapeFunc) {
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- width,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
height
);
}
@@ -25899,10 +25678,8 @@ export function init(RuntimeName, PHPLoader) {
var _glutTimerFunc = (msec, func, value) =>
safeSetTimeout(
() =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- value
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ value
),
msec
);
@@ -26062,11 +25839,8 @@ export function init(RuntimeName, PHPLoader) {
Browser.setCanvasSize(width, height, true); // N.B. GLUT.reshapeFunc is also registered as a canvas resize callback.
// Just call it once here.
if (GLUT.reshapeFunc) {
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- width,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
height
);
}
@@ -27128,21 +26902,15 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
if (error) {
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
return;
}
var buffer = _malloc(byteArray.length);
HEAPU8.set(byteArray, buffer);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
buffer,
byteArray.length
);
@@ -27174,18 +26942,14 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
if (error) {
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
return;
}
if (onstore)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
});
}
@@ -27200,18 +26964,14 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
if (error) {
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
return;
}
if (ondelete)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
});
});
@@ -27228,19 +26988,14 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
if (error) {
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
return;
}
if (oncheck)
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
exists
);
});
@@ -27256,18 +27011,14 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
if (error) {
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
return;
}
if (onclear)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
});
});
@@ -27424,11 +27175,8 @@ export function init(RuntimeName, PHPLoader) {
safeSetTimeout(() => {
var stackBegin = Asyncify.currData + 12;
var stackEnd = HEAPU32[Asyncify.currData >> 2];
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- stackBegin,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stackBegin,
stackEnd
);
wakeUp();
@@ -27489,10 +27237,8 @@ export function init(RuntimeName, PHPLoader) {
HEAPU32[(newFiber + 12) >> 2] = 0;
var userData = HEAPU32[(newFiber + 16) >> 2];
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userData
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
);
} else {
var asyncifyData = newFiber + 20;
@@ -28504,11 +28250,8 @@ export function init(RuntimeName, PHPLoader) {
if (!SDL.eventHandler) return;
while (SDL.pollEvent(SDL.eventHandlerTemp)) {
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- SDL.eventHandlerContext,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL.eventHandlerContext,
SDL.eventHandlerTemp
);
}
@@ -30141,12 +29884,9 @@ export function init(RuntimeName, PHPLoader) {
return;
// Ask SDL audio data from the user code.
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- SDL.audio.userdata,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL
+ .audio.userdata,
SDL.audio.buffer,
SDL.audio.bufferSize
);
@@ -30604,10 +30344,8 @@ export function init(RuntimeName, PHPLoader) {
info.audio = null;
}
if (SDL.channelFinished) {
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- channel
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel
);
}
}
@@ -30676,10 +30414,8 @@ export function init(RuntimeName, PHPLoader) {
channelInfo.audio = null;
}
if (SDL.channelFinished)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- channel
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel
);
};
if (channelInfo.audio) {
@@ -31427,11 +31163,8 @@ export function init(RuntimeName, PHPLoader) {
var _SDL_AddTimer = (interval, callback, param) =>
safeSetTimeout(
() =>
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- interval,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ interval,
param
),
interval
@@ -31802,12 +31535,8 @@ export function init(RuntimeName, PHPLoader) {
socket.onopen = function (e) {
var eventPtr = WS.getSocketEvent(socketId);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 0 /*TODO*/,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
eventPtr,
userData
);
@@ -31829,12 +31558,8 @@ export function init(RuntimeName, PHPLoader) {
socket.onerror = function (e) {
var eventPtr = WS.getSocketEvent(socketId);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 0 /*TODO*/,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
eventPtr,
userData
);
@@ -31859,12 +31584,8 @@ export function init(RuntimeName, PHPLoader) {
(HEAP8[eventPtr + 4] = e.wasClean),
(HEAP16[(eventPtr + 6) >> 1] = e.code),
stringToUTF8(e.reason, eventPtr + 8, 512);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 0 /*TODO*/,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
eventPtr,
userData
);
@@ -31898,12 +31619,8 @@ export function init(RuntimeName, PHPLoader) {
(HEAPU32[(eventPtr + 4) >> 2] = buf),
(HEAP32[(eventPtr + 8) >> 2] = len),
(HEAP8[eventPtr + 12] = isText),
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 0 /*TODO*/,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
eventPtr,
userData
);
diff --git a/packages/php-wasm/node/asyncify/php_8_3.js b/packages/php-wasm/node/asyncify/php_8_3.js
index cbca1f87a5..e0661a20a3 100644
--- a/packages/php-wasm/node/asyncify/php_8_3.js
+++ b/packages/php-wasm/node/asyncify/php_8_3.js
@@ -1774,10 +1774,8 @@ export function init(RuntimeName, PHPLoader) {
);
var ___call_sighandler = (fp, sig) =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- sig
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ sig
);
___call_sighandler.sig = 'vpi';
@@ -8802,11 +8800,8 @@ export function init(RuntimeName, PHPLoader) {
dlSetError(`'Could not load dynamic lib: ${filename}\n${e}`);
runtimeKeepalivePop();
callUserCallback(() =>
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
user_data
)
);
@@ -8814,11 +8809,8 @@ export function init(RuntimeName, PHPLoader) {
function successCallback() {
runtimeKeepalivePop();
callUserCallback(() =>
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
user_data
)
);
@@ -19488,11 +19480,8 @@ export function init(RuntimeName, PHPLoader) {
var trace = getCallstack();
var parts = trace.split('\n');
for (var i = 0; i < parts.length; i++) {
- var ret = ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 0,
+ var ret = ((a1, a2) => {})(
+ /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0,
arg
);
if (ret !== 0) return;
@@ -20068,12 +20057,8 @@ export function init(RuntimeName, PHPLoader) {
stringToUTF8(e.locale || '', keyEventData + 128, 32);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
keyEventData,
userData
)
@@ -20191,12 +20176,8 @@ export function init(RuntimeName, PHPLoader) {
fillMouseEventData(JSEvents.mouseEvent, e, target);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
JSEvents.mouseEvent,
userData
)
@@ -20410,12 +20391,8 @@ export function init(RuntimeName, PHPLoader) {
HEAPF64[(wheelEvent + 80) >> 3] = e['deltaZ'];
HEAP32[(wheelEvent + 88) >> 2] = e['deltaMode'];
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
wheelEvent,
userData
)
@@ -20496,12 +20473,8 @@ export function init(RuntimeName, PHPLoader) {
HEAP32[(uiEvent + 28) >> 2] = pageXOffset | 0; // scroll offsets are float
HEAP32[(uiEvent + 32) >> 2] = pageYOffset | 0;
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
uiEvent,
userData
)
@@ -20575,12 +20548,8 @@ export function init(RuntimeName, PHPLoader) {
stringToUTF8(id, focusEvent + 128, 128);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
focusEvent,
userData
)
@@ -20696,12 +20665,8 @@ export function init(RuntimeName, PHPLoader) {
); // TODO: Thread-safety with respect to emscripten_get_deviceorientation_status()
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
JSEvents.deviceOrientationEvent,
userData
)
@@ -20784,12 +20749,8 @@ export function init(RuntimeName, PHPLoader) {
fillDeviceMotionEventData(JSEvents.deviceMotionEvent, e, target); // TODO: Thread-safety with respect to emscripten_get_devicemotion_status()
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
JSEvents.deviceMotionEvent,
userData
)
@@ -20899,12 +20860,8 @@ export function init(RuntimeName, PHPLoader) {
fillOrientationChangeEventData(orientationChangeEvent);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
orientationChangeEvent,
userData
)
@@ -21037,12 +20994,8 @@ export function init(RuntimeName, PHPLoader) {
fillFullscreenChangeEventData(fullscreenChangeEvent);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
fullscreenChangeEvent,
userData
)
@@ -21206,12 +21159,8 @@ export function init(RuntimeName, PHPLoader) {
);
if (currentFullscreenStrategy.canvasResizedCallback) {
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 37,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
0,
currentFullscreenStrategy.canvasResizedCallbackUserData
);
@@ -21317,12 +21266,8 @@ export function init(RuntimeName, PHPLoader) {
currentFullscreenStrategy = strategy;
if (strategy.canvasResizedCallback) {
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 37,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
0,
strategy.canvasResizedCallbackUserData
);
@@ -21424,12 +21369,8 @@ export function init(RuntimeName, PHPLoader) {
!inCenteredWithoutScalingFullscreenMode &&
currentFullscreenStrategy.canvasResizedCallback
) {
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 37,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
0,
currentFullscreenStrategy.canvasResizedCallbackUserData
);
@@ -21528,12 +21469,8 @@ export function init(RuntimeName, PHPLoader) {
softFullscreenResizeWebGLRenderTarget
);
if (strategy.canvasResizedCallback) {
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 37,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
0,
strategy.canvasResizedCallbackUserData
);
@@ -21546,12 +21483,8 @@ export function init(RuntimeName, PHPLoader) {
// Inform the caller that the canvas size has changed.
if (strategy.canvasResizedCallback) {
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 37,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
0,
strategy.canvasResizedCallbackUserData
);
@@ -21619,12 +21552,8 @@ export function init(RuntimeName, PHPLoader) {
fillPointerlockChangeEventData(pointerlockChangeEvent);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
pointerlockChangeEvent,
userData
)
@@ -21714,12 +21643,8 @@ export function init(RuntimeName, PHPLoader) {
) => {
var pointerlockErrorEventHandlerFunc = (e = event) => {
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
0,
userData
)
@@ -21919,12 +21844,8 @@ export function init(RuntimeName, PHPLoader) {
fillVisibilityChangeEventData(visibilityChangeEvent);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
visibilityChangeEvent,
userData
)
@@ -22044,12 +21965,8 @@ export function init(RuntimeName, PHPLoader) {
HEAP32[(touchEvent + 8) >> 2] = numTouches;
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
touchEvent,
userData
)
@@ -22187,12 +22104,8 @@ export function init(RuntimeName, PHPLoader) {
fillGamepadEventData(gamepadEvent, e['gamepad']);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
gamepadEvent,
userData
)
@@ -22294,12 +22207,8 @@ export function init(RuntimeName, PHPLoader) {
) => {
var beforeUnloadEventHandlerFunc = (e = event) => {
// Note: This is always called on the main browser thread, since it needs synchronously return a value!
- var confirmationMessage = ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ var confirmationMessage = ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
0,
userData
);
@@ -22370,12 +22279,8 @@ export function init(RuntimeName, PHPLoader) {
fillBatteryEventData(batteryEvent, battery());
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
batteryEvent,
userData
)
@@ -22465,11 +22370,8 @@ export function init(RuntimeName, PHPLoader) {
var _emscripten_request_animation_frame = (cb, userData) =>
requestAnimationFrame((timeStamp) =>
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- timeStamp,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp,
userData
)
);
@@ -22481,11 +22383,8 @@ export function init(RuntimeName, PHPLoader) {
var _emscripten_request_animation_frame_loop = (cb, userData) => {
function tick(timeStamp) {
if (
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- timeStamp,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp,
userData
)
) {
@@ -22710,10 +22609,8 @@ export function init(RuntimeName, PHPLoader) {
return emSetImmediate(() => {
runtimeKeepalivePop();
callUserCallback(() =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userData
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
)
);
});
@@ -22730,10 +22627,8 @@ export function init(RuntimeName, PHPLoader) {
function tick() {
callUserCallback(() => {
if (
- ((
- a1
- ) => {}) /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userData
+ ((a1) => {})(
+ /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
)
) {
emSetImmediate(tick);
@@ -22750,10 +22645,8 @@ export function init(RuntimeName, PHPLoader) {
var _emscripten_set_timeout = (cb, msecs, userData) =>
safeSetTimeout(
() =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userData
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
),
msecs
);
@@ -22769,11 +22662,8 @@ export function init(RuntimeName, PHPLoader) {
runtimeKeepalivePop();
callUserCallback(() => {
if (
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- t,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ t,
userData
)
) {
@@ -22797,10 +22687,8 @@ export function init(RuntimeName, PHPLoader) {
runtimeKeepalivePush();
return setInterval(() => {
callUserCallback(() =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userData
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
)
);
}, msecs);
@@ -22815,10 +22703,8 @@ export function init(RuntimeName, PHPLoader) {
var _emscripten_async_call = (func, arg, millis) => {
var wrapper = () =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
if (
@@ -22851,7 +22737,7 @@ export function init(RuntimeName, PHPLoader) {
var _emscripten_set_main_loop = (func, fps, simulateInfiniteLoop) => {
var iterFunc =
- () => {} /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */;
+ () => {}; /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */
setMainLoop(iterFunc, fps, simulateInfiniteLoop);
};
_emscripten_set_main_loop.sig = 'vpii';
@@ -22863,10 +22749,8 @@ export function init(RuntimeName, PHPLoader) {
simulateInfiniteLoop
) => {
var iterFunc = () =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
setMainLoop(iterFunc, fps, simulateInfiniteLoop, arg);
};
@@ -22887,10 +22771,8 @@ export function init(RuntimeName, PHPLoader) {
var __emscripten_push_main_loop_blocker = (func, arg, name) => {
MainLoop.queue.push({
func: () => {
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
},
name: UTF8ToString(name),
@@ -22903,10 +22785,8 @@ export function init(RuntimeName, PHPLoader) {
var __emscripten_push_uncounted_main_loop_blocker = (func, arg, name) => {
MainLoop.queue.push({
func: () => {
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
},
name: UTF8ToString(name),
@@ -22940,12 +22820,8 @@ export function init(RuntimeName, PHPLoader) {
var resultPtr = stackAlloc(POINTER_SIZE);
HEAPU32[resultPtr >> 2] = 0;
try {
- var result = ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- resultPtr,
+ var result = ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ resultPtr,
userData,
value
);
@@ -23881,19 +23757,15 @@ export function init(RuntimeName, PHPLoader) {
() => {
runtimeKeepalivePop();
if (onload)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- file
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file
);
},
() => {
runtimeKeepalivePop();
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- file
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file
);
},
true // don'tCreateFile - it's already there
@@ -23927,21 +23799,16 @@ export function init(RuntimeName, PHPLoader) {
() => {
runtimeKeepalivePop();
if (onload)
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
cname
);
},
() => {
runtimeKeepalivePop();
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
},
true // don'tCreateFile - it's already there
@@ -24214,10 +24081,10 @@ export function init(RuntimeName, PHPLoader) {
runtimeKeepalivePop();
callUserCallback(() => {
var sp = stackSave();
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- stringToUTF8OnStack(_file)
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stringToUTF8OnStack(
+ _file
+ )
);
stackRestore(sp);
});
@@ -24261,12 +24128,8 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
var buffer = _malloc(byteArray.length);
HEAPU8.set(byteArray, buffer);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userdata,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata,
buffer,
byteArray.length
);
@@ -24276,10 +24139,8 @@ export function init(RuntimeName, PHPLoader) {
if (onerror) {
runtimeKeepalivePop();
callUserCallback(() => {
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userdata
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata
);
});
}
@@ -24336,12 +24197,8 @@ export function init(RuntimeName, PHPLoader) {
);
if (onload) {
var sp = stackSave();
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
stringToUTF8OnStack(_file)
);
@@ -24349,12 +24206,8 @@ export function init(RuntimeName, PHPLoader) {
}
} else {
if (onerror)
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
http.status
);
@@ -24367,12 +24220,8 @@ export function init(RuntimeName, PHPLoader) {
http.onerror = (e) => {
runtimeKeepalivePop();
if (onerror)
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
http.status
);
@@ -24387,12 +24236,8 @@ export function init(RuntimeName, PHPLoader) {
) {
var percentComplete = (e.loaded / e.total) * 100;
if (onprogress)
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
percentComplete
);
@@ -24449,13 +24294,8 @@ export function init(RuntimeName, PHPLoader) {
if (http.statusText) {
statusText = stringToUTF8OnStack(http.statusText);
}
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
http.status,
statusText
@@ -24476,13 +24316,8 @@ export function init(RuntimeName, PHPLoader) {
var buffer = _malloc(byteArray.length);
HEAPU8.set(byteArray, buffer);
if (onload)
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
buffer,
byteArray.length
@@ -24503,13 +24338,8 @@ export function init(RuntimeName, PHPLoader) {
// PROGRESS
http.onprogress = (e) => {
if (onprogress)
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
e.loaded,
e.lengthComputable || e.lengthComputable === undefined
@@ -24629,24 +24459,16 @@ export function init(RuntimeName, PHPLoader) {
if (event === 'error') {
withStackSave(() => {
var msg = stringToUTF8OnStack(data[2]);
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- data[0],
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data[0],
data[1],
msg,
userData
);
});
} else {
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- data,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data,
userData
);
}
@@ -25112,12 +24934,8 @@ export function init(RuntimeName, PHPLoader) {
) => {
var webGlEventHandlerFunc = (e = event) => {
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
0,
userData
)
@@ -25336,21 +25154,15 @@ export function init(RuntimeName, PHPLoader) {
) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- lastX,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX,
lastY
);
} else if (GLUT.buttons != 0 && GLUT.motionFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- lastX,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX,
lastY
);
}
@@ -25511,12 +25323,8 @@ export function init(RuntimeName, PHPLoader) {
if (GLUT.specialFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- key,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
Browser.mouseX,
Browser.mouseY
);
@@ -25526,12 +25334,8 @@ export function init(RuntimeName, PHPLoader) {
if (key !== null && GLUT.keyboardFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- key,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
Browser.mouseX,
Browser.mouseY
);
@@ -25546,12 +25350,8 @@ export function init(RuntimeName, PHPLoader) {
if (GLUT.specialUpFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- key,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
Browser.mouseX,
Browser.mouseY
);
@@ -25561,12 +25361,8 @@ export function init(RuntimeName, PHPLoader) {
if (key !== null && GLUT.keyboardUpFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- key,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
Browser.mouseX,
Browser.mouseY
);
@@ -25630,13 +25426,10 @@ export function init(RuntimeName, PHPLoader) {
} catch (e) {}
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- event['button'],
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[
+ 'button'
+ ],
0 /*GLUT_DOWN*/,
Browser.mouseX,
Browser.mouseY
@@ -25651,13 +25444,10 @@ export function init(RuntimeName, PHPLoader) {
if (GLUT.mouseFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- event['button'],
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[
+ 'button'
+ ],
1 /*GLUT_UP*/,
Browser.mouseX,
Browser.mouseY
@@ -25686,13 +25476,8 @@ export function init(RuntimeName, PHPLoader) {
if (GLUT.mouseFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- button,
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ button,
0 /*GLUT_DOWN*/,
Browser.mouseX,
Browser.mouseY
@@ -25735,11 +25520,8 @@ export function init(RuntimeName, PHPLoader) {
/* Can't call _glutReshapeWindow as that requests cancelling fullscreen. */
if (GLUT.reshapeFunc) {
// out("GLUT.reshapeFunc (from FS): " + width + ", " + height);
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- width,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
height
);
}
@@ -25782,11 +25564,8 @@ export function init(RuntimeName, PHPLoader) {
Browser.resizeListeners.push((width, height) => {
if (GLUT.reshapeFunc) {
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- width,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
height
);
}
@@ -25899,10 +25678,8 @@ export function init(RuntimeName, PHPLoader) {
var _glutTimerFunc = (msec, func, value) =>
safeSetTimeout(
() =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- value
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ value
),
msec
);
@@ -26062,11 +25839,8 @@ export function init(RuntimeName, PHPLoader) {
Browser.setCanvasSize(width, height, true); // N.B. GLUT.reshapeFunc is also registered as a canvas resize callback.
// Just call it once here.
if (GLUT.reshapeFunc) {
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- width,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
height
);
}
@@ -27128,21 +26902,15 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
if (error) {
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
return;
}
var buffer = _malloc(byteArray.length);
HEAPU8.set(byteArray, buffer);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
buffer,
byteArray.length
);
@@ -27174,18 +26942,14 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
if (error) {
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
return;
}
if (onstore)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
});
}
@@ -27200,18 +26964,14 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
if (error) {
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
return;
}
if (ondelete)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
});
});
@@ -27228,19 +26988,14 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
if (error) {
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
return;
}
if (oncheck)
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
exists
);
});
@@ -27256,18 +27011,14 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
if (error) {
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
return;
}
if (onclear)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
});
});
@@ -27424,11 +27175,8 @@ export function init(RuntimeName, PHPLoader) {
safeSetTimeout(() => {
var stackBegin = Asyncify.currData + 12;
var stackEnd = HEAPU32[Asyncify.currData >> 2];
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- stackBegin,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stackBegin,
stackEnd
);
wakeUp();
@@ -27489,10 +27237,8 @@ export function init(RuntimeName, PHPLoader) {
HEAPU32[(newFiber + 12) >> 2] = 0;
var userData = HEAPU32[(newFiber + 16) >> 2];
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userData
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
);
} else {
var asyncifyData = newFiber + 20;
@@ -28504,11 +28250,8 @@ export function init(RuntimeName, PHPLoader) {
if (!SDL.eventHandler) return;
while (SDL.pollEvent(SDL.eventHandlerTemp)) {
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- SDL.eventHandlerContext,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL.eventHandlerContext,
SDL.eventHandlerTemp
);
}
@@ -30141,12 +29884,9 @@ export function init(RuntimeName, PHPLoader) {
return;
// Ask SDL audio data from the user code.
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- SDL.audio.userdata,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL
+ .audio.userdata,
SDL.audio.buffer,
SDL.audio.bufferSize
);
@@ -30604,10 +30344,8 @@ export function init(RuntimeName, PHPLoader) {
info.audio = null;
}
if (SDL.channelFinished) {
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- channel
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel
);
}
}
@@ -30676,10 +30414,8 @@ export function init(RuntimeName, PHPLoader) {
channelInfo.audio = null;
}
if (SDL.channelFinished)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- channel
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel
);
};
if (channelInfo.audio) {
@@ -31427,11 +31163,8 @@ export function init(RuntimeName, PHPLoader) {
var _SDL_AddTimer = (interval, callback, param) =>
safeSetTimeout(
() =>
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- interval,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ interval,
param
),
interval
@@ -31802,12 +31535,8 @@ export function init(RuntimeName, PHPLoader) {
socket.onopen = function (e) {
var eventPtr = WS.getSocketEvent(socketId);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 0 /*TODO*/,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
eventPtr,
userData
);
@@ -31829,12 +31558,8 @@ export function init(RuntimeName, PHPLoader) {
socket.onerror = function (e) {
var eventPtr = WS.getSocketEvent(socketId);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 0 /*TODO*/,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
eventPtr,
userData
);
@@ -31859,12 +31584,8 @@ export function init(RuntimeName, PHPLoader) {
(HEAP8[eventPtr + 4] = e.wasClean),
(HEAP16[(eventPtr + 6) >> 1] = e.code),
stringToUTF8(e.reason, eventPtr + 8, 512);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 0 /*TODO*/,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
eventPtr,
userData
);
@@ -31898,12 +31619,8 @@ export function init(RuntimeName, PHPLoader) {
(HEAPU32[(eventPtr + 4) >> 2] = buf),
(HEAP32[(eventPtr + 8) >> 2] = len),
(HEAP8[eventPtr + 12] = isText),
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 0 /*TODO*/,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
eventPtr,
userData
);
diff --git a/packages/php-wasm/node/asyncify/php_8_4.js b/packages/php-wasm/node/asyncify/php_8_4.js
index 83b36fecec..efe1fccc18 100644
--- a/packages/php-wasm/node/asyncify/php_8_4.js
+++ b/packages/php-wasm/node/asyncify/php_8_4.js
@@ -1774,10 +1774,8 @@ export function init(RuntimeName, PHPLoader) {
);
var ___call_sighandler = (fp, sig) =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- sig
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ sig
);
___call_sighandler.sig = 'vpi';
@@ -8802,11 +8800,8 @@ export function init(RuntimeName, PHPLoader) {
dlSetError(`'Could not load dynamic lib: ${filename}\n${e}`);
runtimeKeepalivePop();
callUserCallback(() =>
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
user_data
)
);
@@ -8814,11 +8809,8 @@ export function init(RuntimeName, PHPLoader) {
function successCallback() {
runtimeKeepalivePop();
callUserCallback(() =>
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
user_data
)
);
@@ -19488,11 +19480,8 @@ export function init(RuntimeName, PHPLoader) {
var trace = getCallstack();
var parts = trace.split('\n');
for (var i = 0; i < parts.length; i++) {
- var ret = ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 0,
+ var ret = ((a1, a2) => {})(
+ /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0,
arg
);
if (ret !== 0) return;
@@ -20068,12 +20057,8 @@ export function init(RuntimeName, PHPLoader) {
stringToUTF8(e.locale || '', keyEventData + 128, 32);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
keyEventData,
userData
)
@@ -20191,12 +20176,8 @@ export function init(RuntimeName, PHPLoader) {
fillMouseEventData(JSEvents.mouseEvent, e, target);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
JSEvents.mouseEvent,
userData
)
@@ -20410,12 +20391,8 @@ export function init(RuntimeName, PHPLoader) {
HEAPF64[(wheelEvent + 80) >> 3] = e['deltaZ'];
HEAP32[(wheelEvent + 88) >> 2] = e['deltaMode'];
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
wheelEvent,
userData
)
@@ -20496,12 +20473,8 @@ export function init(RuntimeName, PHPLoader) {
HEAP32[(uiEvent + 28) >> 2] = pageXOffset | 0; // scroll offsets are float
HEAP32[(uiEvent + 32) >> 2] = pageYOffset | 0;
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
uiEvent,
userData
)
@@ -20575,12 +20548,8 @@ export function init(RuntimeName, PHPLoader) {
stringToUTF8(id, focusEvent + 128, 128);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
focusEvent,
userData
)
@@ -20696,12 +20665,8 @@ export function init(RuntimeName, PHPLoader) {
); // TODO: Thread-safety with respect to emscripten_get_deviceorientation_status()
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
JSEvents.deviceOrientationEvent,
userData
)
@@ -20784,12 +20749,8 @@ export function init(RuntimeName, PHPLoader) {
fillDeviceMotionEventData(JSEvents.deviceMotionEvent, e, target); // TODO: Thread-safety with respect to emscripten_get_devicemotion_status()
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
JSEvents.deviceMotionEvent,
userData
)
@@ -20899,12 +20860,8 @@ export function init(RuntimeName, PHPLoader) {
fillOrientationChangeEventData(orientationChangeEvent);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
orientationChangeEvent,
userData
)
@@ -21037,12 +20994,8 @@ export function init(RuntimeName, PHPLoader) {
fillFullscreenChangeEventData(fullscreenChangeEvent);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
fullscreenChangeEvent,
userData
)
@@ -21206,12 +21159,8 @@ export function init(RuntimeName, PHPLoader) {
);
if (currentFullscreenStrategy.canvasResizedCallback) {
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 37,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
0,
currentFullscreenStrategy.canvasResizedCallbackUserData
);
@@ -21317,12 +21266,8 @@ export function init(RuntimeName, PHPLoader) {
currentFullscreenStrategy = strategy;
if (strategy.canvasResizedCallback) {
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 37,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
0,
strategy.canvasResizedCallbackUserData
);
@@ -21424,12 +21369,8 @@ export function init(RuntimeName, PHPLoader) {
!inCenteredWithoutScalingFullscreenMode &&
currentFullscreenStrategy.canvasResizedCallback
) {
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 37,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
0,
currentFullscreenStrategy.canvasResizedCallbackUserData
);
@@ -21528,12 +21469,8 @@ export function init(RuntimeName, PHPLoader) {
softFullscreenResizeWebGLRenderTarget
);
if (strategy.canvasResizedCallback) {
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 37,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
0,
strategy.canvasResizedCallbackUserData
);
@@ -21546,12 +21483,8 @@ export function init(RuntimeName, PHPLoader) {
// Inform the caller that the canvas size has changed.
if (strategy.canvasResizedCallback) {
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 37,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
0,
strategy.canvasResizedCallbackUserData
);
@@ -21619,12 +21552,8 @@ export function init(RuntimeName, PHPLoader) {
fillPointerlockChangeEventData(pointerlockChangeEvent);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
pointerlockChangeEvent,
userData
)
@@ -21714,12 +21643,8 @@ export function init(RuntimeName, PHPLoader) {
) => {
var pointerlockErrorEventHandlerFunc = (e = event) => {
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
0,
userData
)
@@ -21919,12 +21844,8 @@ export function init(RuntimeName, PHPLoader) {
fillVisibilityChangeEventData(visibilityChangeEvent);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
visibilityChangeEvent,
userData
)
@@ -22044,12 +21965,8 @@ export function init(RuntimeName, PHPLoader) {
HEAP32[(touchEvent + 8) >> 2] = numTouches;
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
touchEvent,
userData
)
@@ -22187,12 +22104,8 @@ export function init(RuntimeName, PHPLoader) {
fillGamepadEventData(gamepadEvent, e['gamepad']);
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
gamepadEvent,
userData
)
@@ -22294,12 +22207,8 @@ export function init(RuntimeName, PHPLoader) {
) => {
var beforeUnloadEventHandlerFunc = (e = event) => {
// Note: This is always called on the main browser thread, since it needs synchronously return a value!
- var confirmationMessage = ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ var confirmationMessage = ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
0,
userData
);
@@ -22370,12 +22279,8 @@ export function init(RuntimeName, PHPLoader) {
fillBatteryEventData(batteryEvent, battery());
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
batteryEvent,
userData
)
@@ -22465,11 +22370,8 @@ export function init(RuntimeName, PHPLoader) {
var _emscripten_request_animation_frame = (cb, userData) =>
requestAnimationFrame((timeStamp) =>
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- timeStamp,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp,
userData
)
);
@@ -22481,11 +22383,8 @@ export function init(RuntimeName, PHPLoader) {
var _emscripten_request_animation_frame_loop = (cb, userData) => {
function tick(timeStamp) {
if (
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- timeStamp,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp,
userData
)
) {
@@ -22710,10 +22609,8 @@ export function init(RuntimeName, PHPLoader) {
return emSetImmediate(() => {
runtimeKeepalivePop();
callUserCallback(() =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userData
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
)
);
});
@@ -22730,10 +22627,8 @@ export function init(RuntimeName, PHPLoader) {
function tick() {
callUserCallback(() => {
if (
- ((
- a1
- ) => {}) /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userData
+ ((a1) => {})(
+ /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
)
) {
emSetImmediate(tick);
@@ -22750,10 +22645,8 @@ export function init(RuntimeName, PHPLoader) {
var _emscripten_set_timeout = (cb, msecs, userData) =>
safeSetTimeout(
() =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userData
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
),
msecs
);
@@ -22769,11 +22662,8 @@ export function init(RuntimeName, PHPLoader) {
runtimeKeepalivePop();
callUserCallback(() => {
if (
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- t,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ t,
userData
)
) {
@@ -22797,10 +22687,8 @@ export function init(RuntimeName, PHPLoader) {
runtimeKeepalivePush();
return setInterval(() => {
callUserCallback(() =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userData
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
)
);
}, msecs);
@@ -22815,10 +22703,8 @@ export function init(RuntimeName, PHPLoader) {
var _emscripten_async_call = (func, arg, millis) => {
var wrapper = () =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
if (
@@ -22851,7 +22737,7 @@ export function init(RuntimeName, PHPLoader) {
var _emscripten_set_main_loop = (func, fps, simulateInfiniteLoop) => {
var iterFunc =
- () => {} /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */;
+ () => {}; /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */
setMainLoop(iterFunc, fps, simulateInfiniteLoop);
};
_emscripten_set_main_loop.sig = 'vpii';
@@ -22863,10 +22749,8 @@ export function init(RuntimeName, PHPLoader) {
simulateInfiniteLoop
) => {
var iterFunc = () =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
setMainLoop(iterFunc, fps, simulateInfiniteLoop, arg);
};
@@ -22887,10 +22771,8 @@ export function init(RuntimeName, PHPLoader) {
var __emscripten_push_main_loop_blocker = (func, arg, name) => {
MainLoop.queue.push({
func: () => {
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
},
name: UTF8ToString(name),
@@ -22903,10 +22785,8 @@ export function init(RuntimeName, PHPLoader) {
var __emscripten_push_uncounted_main_loop_blocker = (func, arg, name) => {
MainLoop.queue.push({
func: () => {
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
},
name: UTF8ToString(name),
@@ -22940,12 +22820,8 @@ export function init(RuntimeName, PHPLoader) {
var resultPtr = stackAlloc(POINTER_SIZE);
HEAPU32[resultPtr >> 2] = 0;
try {
- var result = ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- resultPtr,
+ var result = ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ resultPtr,
userData,
value
);
@@ -23881,19 +23757,15 @@ export function init(RuntimeName, PHPLoader) {
() => {
runtimeKeepalivePop();
if (onload)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- file
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file
);
},
() => {
runtimeKeepalivePop();
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- file
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file
);
},
true // don'tCreateFile - it's already there
@@ -23927,21 +23799,16 @@ export function init(RuntimeName, PHPLoader) {
() => {
runtimeKeepalivePop();
if (onload)
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
cname
);
},
() => {
runtimeKeepalivePop();
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
},
true // don'tCreateFile - it's already there
@@ -24214,10 +24081,10 @@ export function init(RuntimeName, PHPLoader) {
runtimeKeepalivePop();
callUserCallback(() => {
var sp = stackSave();
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- stringToUTF8OnStack(_file)
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stringToUTF8OnStack(
+ _file
+ )
);
stackRestore(sp);
});
@@ -24261,12 +24128,8 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
var buffer = _malloc(byteArray.length);
HEAPU8.set(byteArray, buffer);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userdata,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata,
buffer,
byteArray.length
);
@@ -24276,10 +24139,8 @@ export function init(RuntimeName, PHPLoader) {
if (onerror) {
runtimeKeepalivePop();
callUserCallback(() => {
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userdata
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata
);
});
}
@@ -24336,12 +24197,8 @@ export function init(RuntimeName, PHPLoader) {
);
if (onload) {
var sp = stackSave();
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
stringToUTF8OnStack(_file)
);
@@ -24349,12 +24206,8 @@ export function init(RuntimeName, PHPLoader) {
}
} else {
if (onerror)
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
http.status
);
@@ -24367,12 +24220,8 @@ export function init(RuntimeName, PHPLoader) {
http.onerror = (e) => {
runtimeKeepalivePop();
if (onerror)
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
http.status
);
@@ -24387,12 +24236,8 @@ export function init(RuntimeName, PHPLoader) {
) {
var percentComplete = (e.loaded / e.total) * 100;
if (onprogress)
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
percentComplete
);
@@ -24449,13 +24294,8 @@ export function init(RuntimeName, PHPLoader) {
if (http.statusText) {
statusText = stringToUTF8OnStack(http.statusText);
}
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
http.status,
statusText
@@ -24476,13 +24316,8 @@ export function init(RuntimeName, PHPLoader) {
var buffer = _malloc(byteArray.length);
HEAPU8.set(byteArray, buffer);
if (onload)
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
buffer,
byteArray.length
@@ -24503,13 +24338,8 @@ export function init(RuntimeName, PHPLoader) {
// PROGRESS
http.onprogress = (e) => {
if (onprogress)
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- handle,
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
userdata,
e.loaded,
e.lengthComputable || e.lengthComputable === undefined
@@ -24629,24 +24459,16 @@ export function init(RuntimeName, PHPLoader) {
if (event === 'error') {
withStackSave(() => {
var msg = stringToUTF8OnStack(data[2]);
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- data[0],
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data[0],
data[1],
msg,
userData
);
});
} else {
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- data,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data,
userData
);
}
@@ -25112,12 +24934,8 @@ export function init(RuntimeName, PHPLoader) {
) => {
var webGlEventHandlerFunc = (e = event) => {
if (
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- eventTypeId,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
0,
userData
)
@@ -25336,21 +25154,15 @@ export function init(RuntimeName, PHPLoader) {
) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- lastX,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX,
lastY
);
} else if (GLUT.buttons != 0 && GLUT.motionFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- lastX,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX,
lastY
);
}
@@ -25511,12 +25323,8 @@ export function init(RuntimeName, PHPLoader) {
if (GLUT.specialFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- key,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
Browser.mouseX,
Browser.mouseY
);
@@ -25526,12 +25334,8 @@ export function init(RuntimeName, PHPLoader) {
if (key !== null && GLUT.keyboardFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- key,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
Browser.mouseX,
Browser.mouseY
);
@@ -25546,12 +25350,8 @@ export function init(RuntimeName, PHPLoader) {
if (GLUT.specialUpFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- key,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
Browser.mouseX,
Browser.mouseY
);
@@ -25561,12 +25361,8 @@ export function init(RuntimeName, PHPLoader) {
if (key !== null && GLUT.keyboardUpFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- key,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
Browser.mouseX,
Browser.mouseY
);
@@ -25630,13 +25426,10 @@ export function init(RuntimeName, PHPLoader) {
} catch (e) {}
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- event['button'],
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[
+ 'button'
+ ],
0 /*GLUT_DOWN*/,
Browser.mouseX,
Browser.mouseY
@@ -25651,13 +25444,10 @@ export function init(RuntimeName, PHPLoader) {
if (GLUT.mouseFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- event['button'],
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[
+ 'button'
+ ],
1 /*GLUT_UP*/,
Browser.mouseX,
Browser.mouseY
@@ -25686,13 +25476,8 @@ export function init(RuntimeName, PHPLoader) {
if (GLUT.mouseFunc) {
event.preventDefault();
GLUT.saveModifiers(event);
- ((
- a1,
- a2,
- a3,
- a4
- ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- button,
+ ((a1, a2, a3, a4) => {})(
+ /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ button,
0 /*GLUT_DOWN*/,
Browser.mouseX,
Browser.mouseY
@@ -25735,11 +25520,8 @@ export function init(RuntimeName, PHPLoader) {
/* Can't call _glutReshapeWindow as that requests cancelling fullscreen. */
if (GLUT.reshapeFunc) {
// out("GLUT.reshapeFunc (from FS): " + width + ", " + height);
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- width,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
height
);
}
@@ -25782,11 +25564,8 @@ export function init(RuntimeName, PHPLoader) {
Browser.resizeListeners.push((width, height) => {
if (GLUT.reshapeFunc) {
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- width,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
height
);
}
@@ -25899,10 +25678,8 @@ export function init(RuntimeName, PHPLoader) {
var _glutTimerFunc = (msec, func, value) =>
safeSetTimeout(
() =>
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- value
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ value
),
msec
);
@@ -26062,11 +25839,8 @@ export function init(RuntimeName, PHPLoader) {
Browser.setCanvasSize(width, height, true); // N.B. GLUT.reshapeFunc is also registered as a canvas resize callback.
// Just call it once here.
if (GLUT.reshapeFunc) {
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- width,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
height
);
}
@@ -27128,21 +26902,15 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
if (error) {
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
return;
}
var buffer = _malloc(byteArray.length);
HEAPU8.set(byteArray, buffer);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
buffer,
byteArray.length
);
@@ -27174,18 +26942,14 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
if (error) {
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
return;
}
if (onstore)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
});
}
@@ -27200,18 +26964,14 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
if (error) {
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
return;
}
if (ondelete)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
});
});
@@ -27228,19 +26988,14 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
if (error) {
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
return;
}
if (oncheck)
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
exists
);
});
@@ -27256,18 +27011,14 @@ export function init(RuntimeName, PHPLoader) {
callUserCallback(() => {
if (error) {
if (onerror)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
return;
}
if (onclear)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- arg
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
);
});
});
@@ -27424,11 +27175,8 @@ export function init(RuntimeName, PHPLoader) {
safeSetTimeout(() => {
var stackBegin = Asyncify.currData + 12;
var stackEnd = HEAPU32[Asyncify.currData >> 2];
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- stackBegin,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stackBegin,
stackEnd
);
wakeUp();
@@ -27489,10 +27237,8 @@ export function init(RuntimeName, PHPLoader) {
HEAPU32[(newFiber + 12) >> 2] = 0;
var userData = HEAPU32[(newFiber + 16) >> 2];
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- userData
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
);
} else {
var asyncifyData = newFiber + 20;
@@ -28504,11 +28250,8 @@ export function init(RuntimeName, PHPLoader) {
if (!SDL.eventHandler) return;
while (SDL.pollEvent(SDL.eventHandlerTemp)) {
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- SDL.eventHandlerContext,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL.eventHandlerContext,
SDL.eventHandlerTemp
);
}
@@ -30141,12 +29884,9 @@ export function init(RuntimeName, PHPLoader) {
return;
// Ask SDL audio data from the user code.
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- SDL.audio.userdata,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL
+ .audio.userdata,
SDL.audio.buffer,
SDL.audio.bufferSize
);
@@ -30604,10 +30344,8 @@ export function init(RuntimeName, PHPLoader) {
info.audio = null;
}
if (SDL.channelFinished) {
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- channel
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel
);
}
}
@@ -30676,10 +30414,8 @@ export function init(RuntimeName, PHPLoader) {
channelInfo.audio = null;
}
if (SDL.channelFinished)
- ((
- a1
- ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- channel
+ ((a1) => {})(
+ /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel
);
};
if (channelInfo.audio) {
@@ -31427,11 +31163,8 @@ export function init(RuntimeName, PHPLoader) {
var _SDL_AddTimer = (interval, callback, param) =>
safeSetTimeout(
() =>
- ((
- a1,
- a2
- ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- interval,
+ ((a1, a2) => {})(
+ /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ interval,
param
),
interval
@@ -31802,12 +31535,8 @@ export function init(RuntimeName, PHPLoader) {
socket.onopen = function (e) {
var eventPtr = WS.getSocketEvent(socketId);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 0 /*TODO*/,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
eventPtr,
userData
);
@@ -31829,12 +31558,8 @@ export function init(RuntimeName, PHPLoader) {
socket.onerror = function (e) {
var eventPtr = WS.getSocketEvent(socketId);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 0 /*TODO*/,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
eventPtr,
userData
);
@@ -31859,12 +31584,8 @@ export function init(RuntimeName, PHPLoader) {
(HEAP8[eventPtr + 4] = e.wasClean),
(HEAP16[(eventPtr + 6) >> 1] = e.code),
stringToUTF8(e.reason, eventPtr + 8, 512);
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 0 /*TODO*/,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
eventPtr,
userData
);
@@ -31898,12 +31619,8 @@ export function init(RuntimeName, PHPLoader) {
(HEAPU32[(eventPtr + 4) >> 2] = buf),
(HEAP32[(eventPtr + 8) >> 2] = len),
(HEAP8[eventPtr + 12] = isText),
- ((
- a1,
- a2,
- a3
- ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
- 0 /*TODO*/,
+ ((a1, a2, a3) => {})(
+ /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
eventPtr,
userData
);
diff --git a/packages/php-wasm/xdebug-bridge/project.json b/packages/php-wasm/xdebug-bridge/project.json
index 12d126e850..535063450e 100644
--- a/packages/php-wasm/xdebug-bridge/project.json
+++ b/packages/php-wasm/xdebug-bridge/project.json
@@ -67,8 +67,7 @@
"{workspaceRoot}/coverage/packages/php-wasm/xdebug-bridge"
],
"options": {
- "reportsDirectory": "../../../coverage/packages/php-wasm/xdebug-bridge",
- "testFiles": ["mock-test.spec.ts"]
+ "reportsDirectory": "../../../coverage/packages/php-wasm/xdebug-bridge"
}
},
"typecheck": {
diff --git a/packages/php-wasm/xdebug-bridge/src/lib/cdp-server.ts b/packages/php-wasm/xdebug-bridge/src/lib/cdp-server.ts
index 2cf0130146..d0fb17c4cb 100644
--- a/packages/php-wasm/xdebug-bridge/src/lib/cdp-server.ts
+++ b/packages/php-wasm/xdebug-bridge/src/lib/cdp-server.ts
@@ -47,4 +47,8 @@ export class CDPServer extends EventEmitter {
console.log('\x1b[1;32m[CDP][send]\x1b[0m', json);
this.ws.send(json);
}
+
+ close() {
+ this.wss.close();
+ }
}
diff --git a/packages/php-wasm/xdebug-bridge/src/lib/dbgp-session.ts b/packages/php-wasm/xdebug-bridge/src/lib/dbgp-session.ts
index fb2a4e2a89..add8d412ad 100644
--- a/packages/php-wasm/xdebug-bridge/src/lib/dbgp-session.ts
+++ b/packages/php-wasm/xdebug-bridge/src/lib/dbgp-session.ts
@@ -80,4 +80,8 @@ export class DbgpSession extends EventEmitter {
// Commands must end with null terminator
this.socket.write(command + '\x00');
}
+
+ close() {
+ this.server.close();
+ }
}
diff --git a/packages/php-wasm/xdebug-bridge/src/lib/xdebug-cdp-bridge.ts b/packages/php-wasm/xdebug-bridge/src/lib/xdebug-cdp-bridge.ts
index 10b192bd22..75dae703fd 100644
--- a/packages/php-wasm/xdebug-bridge/src/lib/xdebug-cdp-bridge.ts
+++ b/packages/php-wasm/xdebug-bridge/src/lib/xdebug-cdp-bridge.ts
@@ -22,6 +22,10 @@ interface ObjectHandle {
contextId?: number;
depth: number;
fullname?: string;
+ // Add pagination support
+ currentPage?: number;
+ totalPages?: number;
+ aggregatedProps?: any[];
}
export interface XdebugCDPBridgeConfig {
@@ -136,6 +140,11 @@ export class XdebugCDPBridge {
});
}
+ stop() {
+ this.dbgp.close();
+ this.cdp.close();
+ }
+
private sendInitialScripts() {
// Send scriptParsed for the main file if not already sent
if (this.initFileUri && !this.scriptIdByUrl.has(this.initFileUri)) {
@@ -387,20 +396,36 @@ export class XdebugCDPBridge {
if (handle.type === 'context') {
const contextId = handle.contextId ?? 0;
const depth = handle.depth;
- // Get variables in the context
- const cmd = `context_get -d ${depth} -c ${contextId}`;
+ // Get variables in the context with pagination support (32 items per page)
+ const cmd = `context_get -d ${depth} -c ${contextId} -p 0 -m 32`;
const txn = this.sendDbgpCommand(cmd);
+ // Initialize pagination state
+ const updatedHandle = {
+ ...handle,
+ currentPage: 0,
+ aggregatedProps: [],
+ };
+ this.objectHandles.set(objectId, updatedHandle);
this.pendingCommands.set(txn, {
cdpId: id,
cdpMethod: method,
+ params: { objectId: objectId },
});
sendResponse = false;
} else if (handle.type === 'property') {
const depth = handle.depth;
const fullname = handle.fullname!;
const fmtName = this.formatPropertyFullName(fullname);
- const cmd = `property_get -d ${depth} -n ${fmtName}`;
+ // Get property with pagination support (32 items per page)
+ const cmd = `property_get -d ${depth} -n ${fmtName} -p 0 -m 32`;
const txn = this.sendDbgpCommand(cmd);
+ // Initialize pagination state
+ const updatedHandle = {
+ ...handle,
+ currentPage: 0,
+ aggregatedProps: [],
+ };
+ this.objectHandles.set(objectId, updatedHandle);
this.pendingCommands.set(txn, {
cdpId: id,
cdpMethod: method,
@@ -686,13 +711,26 @@ export class XdebugCDPBridge {
case 'context_get':
case 'property_get': {
if (pending && pending.cdpId !== undefined) {
- // Handle variables or object properties retrieval
- const props: any = [];
- const responseProps = response.property;
+ // Handle variables or object properties retrieval with pagination
+ const objectId =
+ pending.params?.objectId ||
+ pending.params?.parentObjectId;
+ const handle = objectId
+ ? this.objectHandles.get(objectId)
+ : null;
+
+ // @TODO: This is hacky. It enables browsing arrays. Without it,
+ // the debugger shows $_SERVER as an array with a single property called
+ // $_SERVER.
+ const responseProps =
+ response.property?.property ?? response.property;
+
+ const currentProps: any[] = [];
if (responseProps) {
const propertiesArray = Array.isArray(responseProps)
? responseProps
: [responseProps];
+
for (const prop of propertiesArray) {
const name =
prop.$.name || prop.$.fullname || '';
@@ -722,7 +760,7 @@ export class XdebugCDPBridge {
const className =
prop.$.classname ||
(type === 'array' ? 'Array' : 'Object');
- const objectId = String(
+ const childObjectId = String(
this.nextObjectId++
);
// Store handle
@@ -745,19 +783,20 @@ export class XdebugCDPBridge {
)?.depth || 0
: 0;
// Use same depth/context as parent
- this.objectHandles.set(objectId, {
+ this.objectHandles.set(childObjectId, {
type: 'property',
depth: depth,
contextId: contextId,
fullname: prop.$.fullname || name,
});
- props.push({
+
+ currentProps.push({
name: prop.$.key || name,
value: {
type: 'object',
className: className,
description: className,
- objectId: objectId,
+ objectId: childObjectId,
},
writable: false,
configurable: false,
@@ -802,7 +841,7 @@ export class XdebugCDPBridge {
};
if (subtype) valueObj.subtype = subtype;
valueObj.value = value;
- props.push({
+ currentProps.push({
name: prop.$.key || name,
value: valueObj,
writable: false,
@@ -812,9 +851,71 @@ export class XdebugCDPBridge {
}
}
}
- const result = { result: props };
- this.cdp.sendMessage({ id: pending.cdpId, result });
- this.pendingCommands.delete(transId);
+
+ // Handle pagination
+ if (handle) {
+ // Add current page props to aggregated results
+ const aggregatedProps = (
+ handle.aggregatedProps || []
+ ).concat(currentProps);
+
+ // Check if there are more pages - if we got exactly 32 items (page size), there might be more
+ const pageSize = 32;
+ const hasMorePages =
+ currentProps.length === pageSize;
+
+ if (hasMorePages) {
+ // More pages available, fetch next page
+ const nextPage = (handle.currentPage || 0) + 1;
+ const updatedHandle = {
+ ...handle,
+ currentPage: nextPage,
+ aggregatedProps: aggregatedProps,
+ };
+ this.objectHandles.set(
+ objectId!,
+ updatedHandle
+ );
+
+ // Send command for next page
+ let nextCmd: string;
+ if (command === 'context_get') {
+ const contextId = handle.contextId ?? 0;
+ const depth = handle.depth;
+ nextCmd = `context_get -d ${depth} -c ${contextId} -p ${nextPage} -m ${pageSize}`;
+ } else {
+ // property_get
+ const depth = handle.depth;
+ const fullname = handle.fullname!;
+ const fmtName =
+ this.formatPropertyFullName(fullname);
+ nextCmd = `property_get -d ${depth} -n ${fmtName} -p ${nextPage} -m ${pageSize}`;
+ }
+
+ const txn = this.sendDbgpCommand(nextCmd);
+ this.pendingCommands.set(txn, {
+ cdpId: pending.cdpId,
+ cdpMethod: pending.cdpMethod,
+ params: pending.params,
+ });
+ // Don't send response yet, wait for more pages
+ this.pendingCommands.delete(transId);
+ return;
+ } else {
+ // No more pages or last page, send final response
+ const result = { result: aggregatedProps };
+ this.cdp.sendMessage({
+ id: pending.cdpId,
+ result,
+ });
+ this.pendingCommands.delete(transId);
+ }
+ } else {
+ // No handle, send current props
+ const result = { result: currentProps };
+ this.cdp.sendMessage({ id: pending.cdpId, result });
+ this.pendingCommands.delete(transId);
+ }
}
break;
}
diff --git a/packages/php-wasm/xdebug-bridge/src/tests/cdp-server.spec.ts b/packages/php-wasm/xdebug-bridge/src/tests/cdp-server.spec.ts
new file mode 100644
index 0000000000..418da4931e
--- /dev/null
+++ b/packages/php-wasm/xdebug-bridge/src/tests/cdp-server.spec.ts
@@ -0,0 +1,106 @@
+import './mocker';
+import { vi } from 'vitest';
+import { WebSocket } from 'ws';
+import { CDPServer } from '../lib/cdp-server';
+
+describe('CDPServer', () => {
+ let server: any;
+ let socket: any;
+
+ beforeEach(() => {
+ // @ts-ignore
+ socket = new WebSocket();
+ server = new CDPServer(9999);
+ });
+
+ afterEach(() => {
+ server.removeAllListeners();
+ vi.clearAllMocks();
+ });
+
+ it('emits clientConnected on new connection', () => {
+ const onClientConnected = vi.fn();
+
+ server.on('clientConnected', onClientConnected);
+ server.wss.emit('connection', socket);
+
+ expect(onClientConnected).toHaveBeenCalled();
+ });
+
+ it('only allows one client at a time', () => {
+ // @ts-ignore
+ const client = new WebSocket();
+ const spy = vi.spyOn(client, 'close');
+
+ server.wss.emit('connection', socket);
+ server.wss.emit('connection', client);
+
+ expect(spy).toHaveBeenCalledTimes(1);
+ });
+
+ it('emits message when a valid JSON message is received', () => {
+ const msg = { id: 1, method: 'Debugger.enable' };
+ const onMessage = vi.fn();
+
+ server.on('message', onMessage);
+ server.wss.emit('connection', socket);
+ socket.emit('message', JSON.stringify(msg));
+
+ expect(onMessage).toHaveBeenCalledWith(msg);
+ });
+
+ it('ignores invalid JSON messages', () => {
+ const onMessage = vi.fn();
+
+ server.on('message', onMessage);
+ server.wss.emit('connection', socket);
+ socket.emit('message', '{ invalid json }');
+
+ expect(onMessage).not.toHaveBeenCalled();
+ });
+
+ it('emits clientDisconnected when client closes', () => {
+ const onDisconnect = vi.fn();
+
+ server.on('clientDisconnected', onDisconnect);
+ server.wss.emit('connection', socket);
+ socket.emit('close');
+
+ expect(onDisconnect).toHaveBeenCalled();
+ });
+
+ it('emits error on websocket error', () => {
+ const error = new Error('Test error');
+ const onError = vi.fn();
+
+ server.on('error', onError);
+ server.wss.emit('connection', socket);
+ socket.emit('error', error);
+
+ expect(onError).toHaveBeenCalledWith(error);
+ });
+
+ it('sends a message if client is connected and open', () => {
+ const msg = { id: 1, result: 'ok' };
+
+ server.wss.emit('connection', socket);
+ server.sendMessage(msg);
+
+ expect(socket.send).toHaveBeenCalledWith(JSON.stringify(msg));
+ });
+
+ it('does not send message if no client connected', () => {
+ server.sendMessage({ hello: 'world' });
+
+ expect(socket.send).not.toHaveBeenCalled();
+ });
+
+ it('does not send message if client is not OPEN', () => {
+ socket.readyState = 0;
+
+ server.wss.emit('connection', socket);
+ server.sendMessage({ id: 1 });
+
+ expect(socket.send).not.toHaveBeenCalled();
+ });
+});
diff --git a/packages/php-wasm/xdebug-bridge/src/tests/dbgp-session.spec.ts b/packages/php-wasm/xdebug-bridge/src/tests/dbgp-session.spec.ts
new file mode 100644
index 0000000000..58d58a6d7b
--- /dev/null
+++ b/packages/php-wasm/xdebug-bridge/src/tests/dbgp-session.spec.ts
@@ -0,0 +1,113 @@
+import './mocker';
+import net from 'net';
+import { vi } from 'vitest';
+import { DbgpSession } from '../lib/dbgp-session';
+
+describe('DbgpSession', () => {
+ let server: any;
+ let socket: any;
+
+ beforeEach(() => {
+ socket = new net.Socket();
+ server = new net.Server();
+
+ vi.spyOn(net, 'createServer').mockImplementation(() => server);
+ });
+
+ afterEach(() => {
+ vi.clearAllMocks();
+ });
+
+ it('listens on specified port', () => {
+ new DbgpSession(1234);
+
+ expect(net.createServer).toHaveBeenCalled();
+ expect(server.listen).toHaveBeenCalledWith(1234);
+ });
+
+ it('emits connected on first connection', () => {
+ const session = new DbgpSession();
+
+ const onConnected = vi.fn();
+ session.on('connected', onConnected);
+ server.onConnectionHandler(socket);
+
+ expect(socket.setEncoding).toHaveBeenCalledWith('utf8');
+ expect(onConnected).toHaveBeenCalled();
+ });
+
+ it('rejects second connection', () => {
+ new DbgpSession();
+ server.onConnectionHandler(socket);
+
+ const secondSocket = new net.Socket();
+ secondSocket.destroy = vi.fn();
+
+ server.onConnectionHandler(secondSocket);
+ expect(secondSocket.destroy).toHaveBeenCalled();
+ });
+
+ it('emits message when receiving valid length-prefixed XML data', () => {
+ const session = new DbgpSession();
+ server.onConnectionHandler(socket);
+
+ const onMessage = vi.fn();
+ session.on('message', onMessage);
+
+ socket.emit('data', '25\x00test\x00');
+
+ expect(onMessage).toHaveBeenCalledWith('test');
+ });
+
+ it('handles partial and multiple messages correctly', () => {
+ const session = new DbgpSession();
+ server.onConnectionHandler(socket);
+
+ const onMessage = vi.fn();
+ session.on('message', onMessage);
+
+ socket.emit('data', '24\x00foo\x00');
+
+ expect(onMessage).toHaveBeenCalledWith('foo');
+
+ socket.emit(
+ 'data',
+ '24\x00bar\x0024\x00baz\x00'
+ );
+
+ expect(onMessage).toHaveBeenCalledWith('bar');
+ expect(onMessage).toHaveBeenCalledWith('baz');
+ });
+
+ it('sends command with null terminator', () => {
+ const session = new DbgpSession();
+ server.onConnectionHandler(socket);
+
+ session.sendCommand('run -i 1');
+ expect(socket.write).toHaveBeenCalledWith('run -i 1\x00');
+ });
+
+ it('emits close and reset socket on close', () => {
+ const session = new DbgpSession();
+ server.onConnectionHandler(socket);
+
+ const onClose = vi.fn();
+ session.on('close', onClose);
+
+ socket.emit('close');
+ expect(onClose).toHaveBeenCalled();
+ });
+
+ it('emits error events', () => {
+ const session = new DbgpSession();
+ server.onConnectionHandler(socket);
+
+ const onError = vi.fn();
+ session.on('error', onError);
+
+ const err = new Error('Test');
+ socket.emit('error', err);
+ expect(onError).toHaveBeenCalledWith(err);
+ });
+});
diff --git a/packages/php-wasm/xdebug-bridge/src/tests/fixtures/array.php b/packages/php-wasm/xdebug-bridge/src/tests/fixtures/array.php
new file mode 100644
index 0000000000..322e87d3a0
--- /dev/null
+++ b/packages/php-wasm/xdebug-bridge/src/tests/fixtures/array.php
@@ -0,0 +1,16 @@
+ "bar",
+ "baz" => [
+ "qux" => "quux",
+ "corge" => [
+ "grault" => "garply",
+ "waldo" => "fred"
+ ]
+ ]
+];
+
+$test = 42;
+
+echo "Stop!\n";
diff --git a/packages/php-wasm/xdebug-bridge/src/tests/fixtures/test.php b/packages/php-wasm/xdebug-bridge/src/tests/fixtures/test.php
new file mode 100644
index 0000000000..0bb2aa8f0c
--- /dev/null
+++ b/packages/php-wasm/xdebug-bridge/src/tests/fixtures/test.php
@@ -0,0 +1,11 @@
+ {
+ const { EventEmitter } = await import('events');
+
+ class WebSocket extends EventEmitter {
+ readyState = 1;
+ OPEN = 1;
+ send = vi.fn();
+ close = vi.fn();
+ }
+ class WebSocketServer extends EventEmitter {
+ constructor() {
+ super();
+ }
+ }
+ return {
+ WebSocketServer,
+ WebSocket,
+ };
+});
+
+vi.mock('net', async () => {
+ const { EventEmitter } = await import('events');
+
+ class Socket extends EventEmitter {
+ setEncoding = vi.fn();
+ write = vi.fn();
+ destroy = vi.fn();
+ }
+
+ class Server extends EventEmitter {
+ // eslint-disable-next-line @typescript-eslint/no-unsafe-function-type
+ onConnectionHandler: Function | undefined;
+
+ listen = vi.fn();
+ // eslint-disable-next-line @typescript-eslint/no-unsafe-function-type
+ override on = vi.fn((event: string, handler: Function) => {
+ if (event === 'connection') this.onConnectionHandler = handler;
+
+ return this;
+ });
+ }
+
+ return {
+ default: {
+ createServer: vi.fn(() => new Server()),
+ Socket,
+ Server,
+ },
+ };
+});
+
+vi.mock(import('fs'), async (original) => {
+ const fs = await original();
+ return {
+ ...fs,
+ readdirSync: vi.fn().mockReturnValue(['foo.js', 'bar.md', 'baz.php']),
+ lstatSync: vi.fn().mockReturnValue({ isDirectory: () => false }),
+ readFileSync: vi.fn().mockReturnValue(' {
+ const path = await original();
+ return {
+ ...path,
+ join: vi.fn((...args: string[]) => args.join('/')),
+ };
+});
diff --git a/packages/php-wasm/xdebug-bridge/src/tests/run-cli.spec.ts b/packages/php-wasm/xdebug-bridge/src/tests/run-cli.spec.ts
new file mode 100644
index 0000000000..f354a2fb44
--- /dev/null
+++ b/packages/php-wasm/xdebug-bridge/src/tests/run-cli.spec.ts
@@ -0,0 +1,70 @@
+import './mocker';
+import { vi } from 'vitest';
+import { main } from '../lib/run-cli';
+import { startBridge } from '../lib/start-bridge';
+import type { XdebugCDPBridge } from '../lib/xdebug-cdp-bridge';
+
+describe('CLI', () => {
+ const argv = process.argv;
+
+ beforeEach(async () => {
+ process.argv = [...argv.slice(0, 2)];
+
+ vi.spyOn(
+ await import('../lib/start-bridge'),
+ 'startBridge'
+ ).mockResolvedValue({ start: vi.fn() } as unknown as XdebugCDPBridge);
+ });
+
+ afterEach(() => {
+ process.argv = argv;
+
+ vi.clearAllMocks();
+ });
+
+ it('calls startBridge with default arguments', async () => {
+ await main();
+
+ expect(startBridge).toHaveBeenCalledWith({
+ cdpPort: 9229,
+ cdpHost: 'localhost',
+ dbgpPort: 9003,
+ phpRoot: './',
+ });
+
+ const bridge = await (startBridge as any).mock.results[0].value;
+ expect(bridge.start).toHaveBeenCalled();
+ });
+
+ it('passes custom arguments correctly', async () => {
+ process.argv.push(
+ '--port',
+ '9000',
+ '--host',
+ '127.0.0.1',
+ '--php-root',
+ '/var/www'
+ );
+
+ await main();
+
+ expect(startBridge).toHaveBeenCalledWith({
+ cdpPort: 9229,
+ cdpHost: '127.0.0.1',
+ dbgpPort: 9000,
+ phpRoot: '/var/www',
+ });
+ });
+
+ it('does not start bridge when help argument is passed', async () => {
+ process.argv.push('--help');
+
+ try {
+ await main();
+ } catch (e: any) {
+ expect(e.message).toBe('process.exit unexpectedly called with "0"');
+ }
+
+ expect(startBridge).not.toHaveBeenCalled();
+ });
+});
diff --git a/packages/php-wasm/xdebug-bridge/src/tests/start-bridge.spec.ts b/packages/php-wasm/xdebug-bridge/src/tests/start-bridge.spec.ts
new file mode 100644
index 0000000000..761b952bcc
--- /dev/null
+++ b/packages/php-wasm/xdebug-bridge/src/tests/start-bridge.spec.ts
@@ -0,0 +1,101 @@
+import './mocker';
+import { vi } from 'vitest';
+import type { PHP } from '@php-wasm/universal';
+import { EventEmitter } from 'events';
+import { startBridge } from '../lib/start-bridge';
+import { CDPServer } from '../lib/cdp-server';
+import { DbgpSession } from '../lib/dbgp-session';
+import { XdebugCDPBridge } from '../lib/xdebug-cdp-bridge';
+
+describe('Bridge', () => {
+ beforeEach(async () => {
+ vi.spyOn(global, 'setTimeout').mockImplementation(
+ (cb) => global.setImmediate(() => cb()) as unknown as NodeJS.Timeout
+ );
+ vi.spyOn(EventEmitter.prototype, 'on').mockImplementation(function (
+ this: EventEmitter,
+ event,
+ cb
+ ) {
+ if (event === 'clientConnected') {
+ setTimeout(cb, 0);
+ }
+ return this;
+ });
+
+ vi.spyOn(
+ await import('../lib/cdp-server'),
+ 'CDPServer'
+ ).mockReturnThis();
+ vi.spyOn(
+ await import('../lib/dbgp-session'),
+ 'DbgpSession'
+ ).mockReturnThis();
+ vi.spyOn(
+ await import('../lib/xdebug-cdp-bridge'),
+ 'XdebugCDPBridge'
+ ).mockReturnThis();
+ });
+
+ afterEach(() => {
+ vi.clearAllMocks();
+ });
+
+ it('starts the bridge with default config', async () => {
+ const bridge = await startBridge({});
+
+ expect(CDPServer).toHaveBeenCalledWith(9229);
+ expect(DbgpSession).toHaveBeenCalledWith(9003);
+ expect(XdebugCDPBridge).toHaveBeenCalled();
+ expect(bridge).toBeInstanceOf(XdebugCDPBridge);
+ });
+
+ it('respects custom ports and hosts', async () => {
+ await startBridge({
+ cdpPort: 9999,
+ dbgpPort: 8888,
+ });
+
+ expect(CDPServer).toHaveBeenCalledWith(9999);
+ expect(DbgpSession).toHaveBeenCalledWith(8888);
+ });
+
+ it('finds PHP files', async () => {
+ await startBridge({ phpRoot: '/foo/bar' });
+
+ const args = (XdebugCDPBridge as any).mock.calls[0][2];
+ expect(args.knownScriptUrls).toContain('file:///foo/bar/baz.php');
+
+ expect(typeof args.getPHPFile).toBe('function');
+ const content = await args.getPHPFile('file:///foo/bar/baz.php');
+ expect(content).toBe(' {
+ const php = {
+ readFileAsText: vi
+ .fn()
+ .mockResolvedValue(' {
+ const getPHPFile = vi
+ .fn()
+ .mockResolvedValue(' {
+ let php: PHP;
+ let dbgpSession: DbgpSession;
+ let cdpServer: CDPServer;
+ let bridge: XdebugCDPBridge;
+
+ beforeEach(async () => {
+ php = new PHP(
+ await loadNodeRuntime(RecommendedPHPVersion, { withXdebug: true })
+ );
+
+ dbgpSession = new DbgpSession();
+ cdpServer = new CDPServer();
+ bridge = new XdebugCDPBridge(dbgpSession, cdpServer, {
+ knownScriptUrls: fs.readdirSync(`${import.meta.dirname}/fixtures`),
+ getPHPFile: (file) => php.readFileAsText(file),
+ });
+
+ vi.spyOn(dbgpSession, 'sendCommand');
+ vi.spyOn(dbgpSession, 'on');
+ vi.spyOn(cdpServer, 'sendMessage');
+ vi.spyOn(cdpServer, 'on');
+ });
+
+ afterEach(() => {
+ vi.clearAllMocks();
+
+ bridge.stop();
+
+ php.exit();
+ });
+
+ it('initializes with correct script IDs', () => {
+ expect(bridge['scriptIdByUrl'].get('array.php')).toBe('1');
+ expect(bridge['scriptIdByUrl'].get('test.php')).toBe('2');
+ });
+
+ it('registers event handlers in start function', () => {
+ bridge.start();
+
+ expect(dbgpSession.on).toHaveBeenCalledWith(
+ 'connected',
+ expect.any(Function)
+ );
+ expect(dbgpSession.on).toHaveBeenCalledWith(
+ 'message',
+ expect.any(Function)
+ );
+ expect(dbgpSession.on).toHaveBeenCalledWith(
+ 'close',
+ expect.any(Function)
+ );
+
+ expect(cdpServer.on).toHaveBeenCalledWith(
+ 'clientConnected',
+ expect.any(Function)
+ );
+ expect(cdpServer.on).toHaveBeenCalledWith(
+ 'message',
+ expect.any(Function)
+ );
+ expect(cdpServer.on).toHaveBeenCalledWith(
+ 'clientDisconnected',
+ expect.any(Function)
+ );
+ });
+
+ it('sends command with correct transaction ID', () => {
+ const txn = bridge['sendDbgpCommand']('run');
+ expect(txn).toBe('1');
+ expect(dbgpSession.sendCommand).toHaveBeenCalledWith('run -i 1');
+ });
+
+ it('formats property fullname with escaping', () => {
+ const formatted = bridge['formatPropertyFullName'](
+ `$_SERVER["HTTP_HOST"]`
+ );
+ expect(formatted).toBe('"$_SERVER[\\"HTTP_HOST\\"]"');
+ });
+
+ it('handles Debugger.resume and send run command', () => {
+ bridge['xdebugConnected'] = true;
+
+ bridge['handleCdpMessage']({
+ id: 101,
+ method: 'Debugger.resume',
+ params: {},
+ });
+
+ expect(dbgpSession.sendCommand).toHaveBeenCalledWith(
+ expect.stringContaining('run')
+ );
+ expect(cdpServer.sendMessage).toHaveBeenCalledWith({
+ id: 101,
+ result: {},
+ });
+ });
+
+ it('handles Debugger.setBreakpointByUrl when xdebug is not connected', () => {
+ bridge['xdebugConnected'] = false;
+
+ bridge['handleCdpMessage']({
+ id: 202,
+ method: 'Debugger.setBreakpointByUrl',
+ params: {
+ url: 'file:///test.php',
+ lineNumber: 4,
+ },
+ });
+
+ expect(cdpServer.sendMessage).toHaveBeenCalledWith({
+ id: 202,
+ result: {
+ breakpointId: '1',
+ locations: [
+ {
+ scriptId: '3',
+ lineNumber: 4,
+ columnNumber: 0,
+ },
+ ],
+ },
+ });
+ });
+
+ it('handles Debugger.removeBreakpoint and update internal state', () => {
+ bridge['breakpoints'].set('1', {
+ cdpId: '1',
+ xdebugId: null,
+ file: 'file:///test.php',
+ line: 5,
+ });
+
+ bridge['handleCdpMessage']({
+ id: 303,
+ method: 'Debugger.removeBreakpoint',
+ params: { breakpointId: '1' },
+ });
+
+ expect(bridge['breakpoints'].has('1')).toBe(false);
+ expect(cdpServer.sendMessage).toHaveBeenCalledWith({
+ id: 303,
+ result: {},
+ });
+ });
+
+ it('connects to Xdebug and pauses at a breakpoint', async () => {
+ bridge.start();
+
+ const script = fs.readFileSync(
+ `${import.meta.dirname}/fixtures/test.php`
+ );
+
+ await php.runStream({ code: script.toString() });
+
+ await new Promise((resolve) => {
+ const original = cdpServer.sendMessage.bind(cdpServer);
+ vi.spyOn(cdpServer, 'sendMessage').mockImplementation((msg) => {
+ if (msg.method === 'Debugger.paused') resolve(msg);
+ return original(msg);
+ });
+ });
+
+ expect(cdpServer.sendMessage).toHaveBeenCalledWith(
+ expect.objectContaining({ method: 'Debugger.paused' })
+ );
+ });
+
+ it('connects to Xdebug, pause at a breakpoint, steps over and returns correct stack', async () => {
+ bridge.start();
+
+ const script = fs.readFileSync(
+ `${import.meta.dirname}/fixtures/array.php`
+ );
+
+ await php.runStream({ code: script.toString() });
+
+ // 5 transactions were already sent before the first pause.
+ let steps = 5;
+ const transactions: Record =
+ {};
+
+ await new Promise((resolve) => {
+ const originalSendMessage = cdpServer.sendMessage.bind(cdpServer);
+ vi.spyOn(cdpServer, 'sendMessage').mockImplementation((message) => {
+ if (message.method === 'Debugger.paused') {
+ if (steps < 8) {
+ dbgpSession.sendCommand(`step_over -i ${steps}`);
+ } else if (steps == 8) {
+ dbgpSession.sendCommand(
+ `property_get -d 0 -n $nested_array -p 0 -m 32 -i ${steps}`
+ );
+ }
+ steps++;
+ }
+ return originalSendMessage(message);
+ });
+
+ const originalOnData = (dbgpSession as any).onData.bind(
+ dbgpSession
+ );
+ vi.spyOn(dbgpSession as any, 'onData').mockImplementation(
+ (data) => {
+ if ((data as string).includes('command="property_get')) {
+ if (steps == 9) {
+ dbgpSession.sendCommand(
+ `property_get -d 0 -n $nested_array["baz"] -p 0 -m 32 -i ${steps}`
+ );
+ } else if (steps == 10) {
+ dbgpSession.sendCommand(
+ `property_get -d 0 -n $nested_array["baz"]["corge"] -p 0 -m 32 -i ${steps}`
+ );
+ } else {
+ resolve();
+ }
+ steps++;
+
+ const id = (data as string).match(
+ /transaction_id="([^"]+)"/
+ )![1];
+ const matches = [
+ ...(data as string).matchAll(
+ /]+)>/g
+ ),
+ ];
+
+ const children = matches.slice(1).map((m) => {
+ const attrs = m[1];
+ const nameMatch = attrs.match(/name="([^"]+)"/);
+ const typeMatch = attrs.match(/type="([^"]+)"/);
+ return {
+ name: nameMatch ? nameMatch[1] : '',
+ type: typeMatch ? typeMatch[1] : '',
+ };
+ });
+
+ transactions[id] = children;
+ }
+
+ return originalOnData(data);
+ }
+ );
+ });
+
+ expect(transactions[8]).toEqual([
+ { name: 'foo', type: 'string' },
+ { name: 'baz', type: 'array' },
+ ]);
+ expect(transactions[9]).toEqual([
+ { name: 'qux', type: 'string' },
+ { name: 'corge', type: 'array' },
+ ]);
+ expect(transactions[10]).toEqual([
+ { name: 'grault', type: 'string' },
+ { name: 'waldo', type: 'string' },
+ ]);
+ });
+});
diff --git a/packages/php-wasm/xdebug-bridge/tests/mock-test.spec.ts b/packages/php-wasm/xdebug-bridge/tests/mock-test.spec.ts
deleted file mode 100644
index f40ba17587..0000000000
--- a/packages/php-wasm/xdebug-bridge/tests/mock-test.spec.ts
+++ /dev/null
@@ -1,7 +0,0 @@
-import { test, expect } from 'vitest';
-
-test('mock test to prevent vitest from failing', () => {
- // This is a placeholder test to ensure vitest doesn't fail due to no tests
- // TODO: Add actual tests for the xdebug-bridge functionality
- expect(true).toBe(true);
-});
diff --git a/packages/php-wasm/xdebug-bridge/tsconfig.json b/packages/php-wasm/xdebug-bridge/tsconfig.json
index e4e0c46e69..a6f5201524 100644
--- a/packages/php-wasm/xdebug-bridge/tsconfig.json
+++ b/packages/php-wasm/xdebug-bridge/tsconfig.json
@@ -4,9 +4,11 @@
"forceConsistentCasingInFileNames": true,
"strict": true,
"noImplicitOverride": true,
+ "allowSyntheticDefaultImports": true,
"noPropertyAccessFromIndexSignature": true,
"noImplicitReturns": true,
- "noFallthroughCasesInSwitch": true
+ "noFallthroughCasesInSwitch": true,
+ "types": ["vitest"]
},
"files": [],
"include": [],
diff --git a/packages/php-wasm/xdebug-bridge/vite.config.ts b/packages/php-wasm/xdebug-bridge/vite.config.ts
index 921542c587..48f44ddf89 100644
--- a/packages/php-wasm/xdebug-bridge/vite.config.ts
+++ b/packages/php-wasm/xdebug-bridge/vite.config.ts
@@ -1,6 +1,7 @@
///
import { join } from 'path';
-import { defineConfig } from 'vite';
+import { defineConfig, type Plugin } from 'vite';
+import path from 'path';
import dts from 'vite-plugin-dts';
// eslint-disable-next-line @nx/enforce-module-boundaries
@@ -19,6 +20,37 @@ export default defineConfig({
viteTsConfigPaths({
root: '../../../',
}),
+ {
+ name: 'import-url',
+ enforce: 'pre',
+
+ resolveId(id: string, importer: string): any {
+ if (id.startsWith('import-url:')) {
+ return id;
+ }
+
+ if (!path.isAbsolute(id) && id.endsWith('?url')) {
+ const filepath = path.resolve(path.dirname(importer), id);
+ return `import-url:${filepath}`;
+ }
+
+ return null;
+ },
+
+ load(id: string): any {
+ if (id.startsWith('import-url:')) {
+ const encodedPath = id.slice('import-url:'.length);
+ const filePath = encodedPath.replace('?url', '');
+
+ return {
+ code: `export default ${JSON.stringify(filePath)};`,
+ map: null,
+ };
+ }
+
+ return null;
+ },
+ } as Plugin,
],
build: {
diff --git a/packages/playground/wordpress-builds/src/sqlite-database-integration/get-sqlite-driver-module-details.ts b/packages/playground/wordpress-builds/src/sqlite-database-integration/get-sqlite-driver-module-details.ts
index e4e0ed4e51..63cb0be6e3 100644
--- a/packages/playground/wordpress-builds/src/sqlite-database-integration/get-sqlite-driver-module-details.ts
+++ b/packages/playground/wordpress-builds/src/sqlite-database-integration/get-sqlite-driver-module-details.ts
@@ -19,7 +19,6 @@ export function getSqliteDriverModuleDetails(
url: string;
} {
switch (version) {
-
case 'develop':
/** @ts-ignore */
return {