mir-analyzer 0.7.0

Analysis engine for the mir PHP static analyzer
Documentation
// Generated from stubs/exif/ — version 1.0.0 | php >= 8.0
// Run `cargo run -p mir-stubs-gen -- exif` to regenerate
// DO NOT EDIT DIRECTLY
// input-hash: blake3:950c7c8a2578283764a38bcc46d1939b19a8426c7e1a5c58624549bd708c5508

static DATA: &[u8] = &[
    0x00, 0x00, 0x00, 0x00, 0x05, 0x0e, 0x65, 0x78, 0x69, 0x66, 0x5f, 0x69, 0x6d, 0x61, 0x67, 0x65,
    0x74, 0x79, 0x70, 0x65, 0x0e, 0x65, 0x78, 0x69, 0x66, 0x5f, 0x69, 0x6d, 0x61, 0x67, 0x65, 0x74,
    0x79, 0x70, 0x65, 0x01, 0x08, 0x66, 0x69, 0x6c, 0x65, 0x6e, 0x61, 0x6d, 0x65, 0x01, 0x01, 0x00,
    0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x02, 0x05, 0x0f, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00,
    0x00, 0x00, 0x00, 0x0e, 0x65, 0x78, 0x69, 0x66, 0x5f, 0x72, 0x65, 0x61, 0x64, 0x5f, 0x64, 0x61,
    0x74, 0x61, 0x0e, 0x65, 0x78, 0x69, 0x66, 0x5f, 0x72, 0x65, 0x61, 0x64, 0x5f, 0x64, 0x61, 0x74,
    0x61, 0x04, 0x04, 0x66, 0x69, 0x6c, 0x65, 0x01, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
    0x11, 0x72, 0x65, 0x71, 0x75, 0x69, 0x72, 0x65, 0x64, 0x5f, 0x73, 0x65, 0x63, 0x74, 0x69, 0x6f,
    0x6e, 0x73, 0x01, 0x02, 0x00, 0x10, 0x00, 0x00, 0x01, 0x01, 0x13, 0x00, 0x00, 0x00, 0x00, 0x01,
    0x09, 0x61, 0x73, 0x5f, 0x61, 0x72, 0x72, 0x61, 0x79, 0x73, 0x01, 0x01, 0x0d, 0x00, 0x00, 0x01,
    0x01, 0x13, 0x00, 0x00, 0x00, 0x00, 0x01, 0x0e, 0x72, 0x65, 0x61, 0x64, 0x5f, 0x74, 0x68, 0x75,
    0x6d, 0x62, 0x6e, 0x61, 0x69, 0x6c, 0x01, 0x01, 0x0d, 0x00, 0x00, 0x01, 0x01, 0x13, 0x00, 0x00,
    0x00, 0x00, 0x01, 0x01, 0x02, 0x1d, 0x01, 0x13, 0x00, 0x00, 0x01, 0x13, 0x00, 0x00, 0x0f, 0x00,
    0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x0c, 0x65, 0x78, 0x69, 0x66, 0x5f, 0x74, 0x61,
    0x67, 0x6e, 0x61, 0x6d, 0x65, 0x0c, 0x65, 0x78, 0x69, 0x66, 0x5f, 0x74, 0x61, 0x67, 0x6e, 0x61,
    0x6d, 0x65, 0x01, 0x05, 0x69, 0x6e, 0x64, 0x65, 0x78, 0x01, 0x01, 0x05, 0x00, 0x00, 0x00, 0x00,
    0x00, 0x00, 0x01, 0x02, 0x00, 0x0f, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x0e,
    0x65, 0x78, 0x69, 0x66, 0x5f, 0x74, 0x68, 0x75, 0x6d, 0x62, 0x6e, 0x61, 0x69, 0x6c, 0x0e, 0x65,
    0x78, 0x69, 0x66, 0x5f, 0x74, 0x68, 0x75, 0x6d, 0x62, 0x6e, 0x61, 0x69, 0x6c, 0x04, 0x04, 0x66,
    0x69, 0x6c, 0x65, 0x01, 0x01, 0x13, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x05, 0x77, 0x69, 0x64,
    0x74, 0x68, 0x00, 0x01, 0x01, 0x13, 0x00, 0x00, 0x00, 0x01, 0x01, 0x06, 0x68, 0x65, 0x69, 0x67,
    0x68, 0x74, 0x00, 0x01, 0x01, 0x13, 0x00, 0x00, 0x00, 0x01, 0x01, 0x0a, 0x69, 0x6d, 0x61, 0x67,
    0x65, 0x5f, 0x74, 0x79, 0x70, 0x65, 0x00, 0x01, 0x01, 0x13, 0x00, 0x00, 0x00, 0x01, 0x01, 0x01,
    0x02, 0x00, 0x0f, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x0e, 0x72, 0x65, 0x61,
    0x64, 0x5f, 0x65, 0x78, 0x69, 0x66, 0x5f, 0x64, 0x61, 0x74, 0x61, 0x0e, 0x72, 0x65, 0x61, 0x64,
    0x5f, 0x65, 0x78, 0x69, 0x66, 0x5f, 0x64, 0x61, 0x74, 0x61, 0x04, 0x08, 0x66, 0x69, 0x6c, 0x65,
    0x6e, 0x61, 0x6d, 0x65, 0x00, 0x00, 0x00, 0x00, 0x00, 0x08, 0x73, 0x65, 0x63, 0x74, 0x69, 0x6f,
    0x6e, 0x73, 0x00, 0x01, 0x01, 0x13, 0x00, 0x00, 0x00, 0x00, 0x01, 0x06, 0x61, 0x72, 0x72, 0x61,
    0x79, 0x73, 0x00, 0x01, 0x01, 0x13, 0x00, 0x00, 0x00, 0x00, 0x01, 0x09, 0x74, 0x68, 0x75, 0x6d,
    0x62, 0x6e, 0x61, 0x69, 0x6c, 0x00, 0x01, 0x01, 0x13, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00,
    0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x11, 0x45, 0x58, 0x49, 0x46, 0x5f, 0x55, 0x53, 0x45,
    0x5f, 0x4d, 0x42, 0x53, 0x54, 0x52, 0x49, 0x4e, 0x47, 0x01, 0x13, 0x00, 0x00,
];

pub(crate) fn register(codebase: &mir_codebase::Codebase) {
    let (slice, _): (mir_codebase::StubSlice, _) =
        bincode::serde::decode_from_slice(DATA, bincode::config::standard())
            .expect("corrupt stubs_exif stub data");
    codebase.inject_stub_slice(slice);
}