Streamlining of CodeAnalysis. .ii files are kept for reverse engineering
authorfca <fca@f7af4fe6-9843-0410-8265-dc069ae4e863>
Wed, 17 May 2000 06:52:22 +0000 (06:52 +0000)
committerfca <fca@f7af4fe6-9843-0410-8265-dc069ae4e863>
Wed, 17 May 2000 06:52:22 +0000 (06:52 +0000)
ALIFAST/Makefile

index a55414e..58fbb76 100644 (file)
@@ -63,20 +63,10 @@ TOCLEAN                     = $(OBJS) *Cint.h *Cint.cxx
 
 include $(ALICE_ROOT)/conf/GeneralMacros
 
+CHECKS        = $(patsubst %.cxx,check/%.viol,$(SRCS))
+
 ############################ Dependencies #####################################
 
 -include tgt_$(ALICE_TARGET)/Make-depend 
 
 
-
-
-
-### Target check creates violation reports (.viol), which depend on
-### stripped files (.ii), which in turn depend on preprocessed
-### files (.i). Dependences are in conf/GeneralDef.
-
-CHECKS        = $(patsubst %.cxx,check/%.viol,$(SRCS))
-
-check:          $(CHECKS)
-
-