Index: runtime/bin/BUILD.gn |
diff --git a/runtime/bin/BUILD.gn b/runtime/bin/BUILD.gn |
index a377332a4a1bd5ce738627bd342a0c9dcfd2ff39..856f8e68c0d41434bdcfabb8cc90d46f42c700c2 100644 |
--- a/runtime/bin/BUILD.gn |
+++ b/runtime/bin/BUILD.gn |
@@ -3,27 +3,7 @@ |
# BSD-style license that can be found in the LICENSE file. |
import("gypi_contents.gni") |
- |
-declare_args() { |
- # Whether to fall back to built-in root certificates when they cannot be |
- # verified at the operating system level. |
- dart_use_fallback_root_certificates = false |
- |
- # The BUILD.gn file that we pull from chromium as part of zlib has a |
- # dependence on //base, which we don't pull in. In a standalone build of the |
- # VM, we set this to //runtime/bin/zlib where we have a BUILD.gn file without |
- # a dependence on //base. |
- dart_zlib_path = "//third_party/zlib" |
- |
- # Whether to link the standalone VM against tcmalloc. The standalone build of |
- # the VM enables this only for Linux builds. |
- dart_use_tcmalloc = false |
-} |
- |
-# TODO(zra): Remove this when Fuchsia has a root cert cache on the filesystem. |
-if (defined(is_fuchsia) && is_fuchsia) { |
- dart_use_fallback_root_certificates = true |
-} |
+import("../runtime_args.gni") |
# Generate a resources.cc file for the service isolate without Observatory. |
action("gen_resources_cc") { |
@@ -590,12 +570,13 @@ template("dart_executable") { |
"$dart_zlib_path", |
] + extra_deps |
+ defines = extra_defines |
+ |
if (dart_use_tcmalloc) { |
deps += [ "//third_party/tcmalloc" ] |
+ defines += [ "DART_USE_TCMALLOC" ] |
} |
- defines = extra_defines |
- |
sources = [ |
"main.cc", |
"vmservice_impl.cc", |
@@ -810,6 +791,7 @@ executable("run_vm_tests") { |
if (dart_use_tcmalloc) { |
deps += [ "//third_party/tcmalloc" ] |
+ defines += [ "DART_USE_TCMALLOC" ] |
} |
# The VM sources are already included in libdart, so we just want to add in |