Your message dated Thu, 08 Dec 2016 18:00:11 +0000 with message-id <E1cF2zL-0005Ms-Oh@fasolo.debian.org> and subject line Bug#842766: fixed in scram 0.11.4-1 has caused the Debian Bug report #842766, regarding ITP: scram -- Probabilistic risk analysis tool to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 842766: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842766 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: submit@bugs.debian.org
- Cc: debian-devel@lists.debian.org
- Subject: ITP: scram -- Probabilistic risk analysis tool
- From: Olzhas Rakhimov <ol.rakhimov@gmail.com>
- Date: Mon, 31 Oct 2016 22:19:14 -0700
- Message-id: <CABQSSsucrUHLnqNOAL0G_b76SGVq=mZcaKKxE6mDDvirD_HT4w@mail.gmail.com>
Package: wnpp
Severity: wishlist
Owner: Olzhas Rakhimov <ol.rakhimov@gmail.com>
* Package name : scram
Version : 0.11.4
Upstream Author : Name <ol.rakhimov@gmail.com>
* URL : http://scram-pra.org/
* License : GPLv3
Programming Lang: C++
Description : Probabilistic risk analysis tool
This project aims to build a command line tool for probabilistic risk analysis.
SCRAM is capable of performing static fault tree analysis,
analysis with common cause failure models,
probability calculations with importance analysis,
and uncertainty analysis with Monte Carlo simulations.
SCRAM input and report files are based on OpenPSA (http://open-psa.org)
Model Exchange Format.
A complementary GUI front-end is under development
for visualization and manipulation of risk analysis models and reports.
To my knowledge, there has not been a tool in Debian
that addresses this issue.
Most risk analysis tools are commercial or institutional (academia)
and not distributed as open source solutions.
I am already providing this package via my Ubuntu PPA:
https://launchpad.net/~rakhimov/+archive/ubuntu/scram
I would like to get the packaging for Debian started
so that users don't need
to be restricted to Ubuntu-based distributions
and have root access to install from the PPA.
Moreover, universities usually have Debian machines
without the root access for students,
so providing this free software for educational purposes
is currently a hassle without an easy installation.
I will definitely need a sponsor and a mentor to package this tool.
The tool is still under active development,
so I guess it can be provided as experimental/unstable.
--- End Message ---
--- Begin Message ---
- To: 842766-close@bugs.debian.org
- Subject: Bug#842766: fixed in scram 0.11.4-1
- From: Olzhas Rakhimov <ol.rakhimov@gmail.com>
- Date: Thu, 08 Dec 2016 18:00:11 +0000
- Message-id: <E1cF2zL-0005Ms-Oh@fasolo.debian.org>
Source: scram Source-Version: 0.11.4-1 We believe that the bug you reported is fixed in the latest version of scram, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 842766@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Olzhas Rakhimov <ol.rakhimov@gmail.com> (supplier of updated scram package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmaster@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Tue, 06 Dec 2016 11:27:56 +0100 Source: scram Binary: scram Architecture: source amd64 Version: 0.11.4-1 Distribution: unstable Urgency: low Maintainer: Debian Science Maintainers <debian-science-maintainers@lists.alioth.debian.org> Changed-By: Olzhas Rakhimov <ol.rakhimov@gmail.com> Description: scram - Probabilistic Risk Analysis Tool Closes: 842766 Changes: scram (0.11.4-1) unstable; urgency=low . * Initial Debian Package (Closes: #842766) Checksums-Sha1: c18cb84eebd97b89da9ad462d99cd25f69e74590 2014 scram_0.11.4-1.dsc 44893b697842ca29871f63d7bde2441d4e660314 377852 scram_0.11.4.orig.tar.gz 2170365eaedea2f6c1e83cae0d7bbb1925bf6950 3616 scram_0.11.4-1.debian.tar.xz d4612e8ce85ac58c584102373d3e01fccf6a154c 8230886 scram-dbgsym_0.11.4-1_amd64.deb 2fd1db8d43d23b027a235dcaa5aa8e0e899bf81d 11391 scram_0.11.4-1_amd64.buildinfo 1c81ec18038cd8eef34cd387d72ce6d793b17284 436262 scram_0.11.4-1_amd64.deb Checksums-Sha256: 74324eb4c02bf0d64b0fc60ade22bffa3f295f93f3b1c43061fa88a9b76f7f11 2014 scram_0.11.4-1.dsc 2514c5715473194455b9f863d1350de34307e86fc38df8552d380bc1660f5bbd 377852 scram_0.11.4.orig.tar.gz 1349aa5d84d60ac1833f4382205c7fca6b296ea8504d1a58c2490c27bc464547 3616 scram_0.11.4-1.debian.tar.xz 9d367073a77617996a4329acfe3c51ae1e93574c2c9ad1cc829ae9ec4dd31ae2 8230886 scram-dbgsym_0.11.4-1_amd64.deb 99622acefff5e6e631a9cd5ed17e9db6346533b7f9e59d16192f5ad399d42dfb 11391 scram_0.11.4-1_amd64.buildinfo 37594fea110b6a3172b8a72b9f7da58e59a3fead8c2186e9c49a3833fadecad9 436262 scram_0.11.4-1_amd64.deb Files: 8912a0112beae63ef43af8796f5d6e56 2014 science optional scram_0.11.4-1.dsc 2662f1fb63033ac83b0f3954869a9a58 377852 science optional scram_0.11.4.orig.tar.gz 98f1f69ed30d1152486f6e94fa8c0638 3616 science optional scram_0.11.4-1.debian.tar.xz 8df021128ebb56a9600be8f4fa1d8b8f 8230886 debug extra scram-dbgsym_0.11.4-1_amd64.deb d414f946735d4390b04885c4e96f2eb1 11391 science optional scram_0.11.4-1_amd64.buildinfo 89d91e0640d1944faa85c09296e66248 436262 science optional scram_0.11.4-1_amd64.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAEBCgAGBQJYRpXzAAoJEAgWueGMdiutduEP/jdGsuGLyP5rkqI5XoAiWxmi Lk9uw43awWeYaWKMsYdLfffLWP8waZ9sKa0qAZrF0OGI7zDliLitTW3pZJN/uU1R 7x5x7KBdFHSBbdBy7p/+TUU+2YQY/fvr3Z5PavzW14Ys30ZsHjXwLw1oHBSsDANC wo7f1snyiLE040XNgVv1dYjBapdsjGsXW0Y1iZKz8RbQNXKGs/48upfBriLkanBo IQyfFEZoZ/ulylbcdlVzMt1M65BQtka5b6R8ht8J1suJJnPH5xxrNt9hfx7+SCf8 6K4XWEaBEs6cna/k82hVg+Axia2ii+v2Ex/dVPGrj9Zo0/+GWkhrNmu1wocBsmgk J/xi7uHwpqZ+y5T6WgocHoCBZwnYeF0dm32X9gW1+GNBor/xL62bVuj8bJj3Tajc TnhglkP54LzBjeIF81DUXU0x/Xw0KL3cmfz5rX/uJCzzLqEyuWDy9iyev3udZJiu RldPMwHCDda3CyO9h6wD5au1WgXz+ikk00rcpDcAtD5ZT1Type4xxobf17tqZtCf 6F4uHUSZcxD2e1hFHnaJOus/+ZJP+0OqrB+7u/oYydK0YEy+088EMnG5edk83tNH n14sehpOjoYMQKaCdltJyt+tf0ity6h7/eISARtsQTLzFzN4iUSpQ9sSJ6pmH/b8 BMop91WYctKUaU5aiRus =XJg9 -----END PGP SIGNATURE-----
--- End Message ---