fatal: [127.0.0.1]: FAILED!
=> {"changed": true, "cmd": "cd
/hxdepots/sdp/helix_binaries\n./get_helix_binaries.sh \n", "delta":
"0:00:28.722520", "end": "2024-02-07 11:05:22.200983", "msg": "non-zero return
code", "rc": 2, "start": "2024-02-07 11:04:53.478463", "stderr": " % Total %
Received % Xferd Average Speed Time Time Time Current\n
Dload Upload Total Spent Left Speed\n\r 0 0 0 0 0 0
0 0 --:--:-- --:--:-- --:--:-- 0* Trying 54.177.106.77:443...\n\r 0
0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0* Connected
to ftp.perforce.com (54.177.106.77) port 443 (#0)\n* ALPN: offers h2,http/1.1\n} [5
bytes data]\n* TLSv1.3 (OUT), TLS handshake, Client hello (1):\n} [512 bytes data]\
n* TLSv1.3 (IN), TLS handshake, Server hello (2):\n{ [108 bytes data]\n* TLSv1.2
(IN), TLS handshake, Certificate (11):\n{ [3028 bytes data]\n* TLSv1.2 (IN), TLS
handshake, Server key exchange (12):\n{ [333 bytes data]\n* TLSv1.2 (IN), TLS
handshake, Server finished (14):\n{ [4 bytes data]\n* TLSv1.2 (OUT), TLS handshake,
Client key exchange (16):\n} [70 bytes data]\n* TLSv1.2 (OUT), TLS change cipher,
Change cipher spec (1):\n} [1 bytes data]\n* TLSv1.2 (OUT), TLS handshake, Finished
(20):\n} [16 bytes data]\n* TLSv1.2 (IN), TLS handshake, Finished (20):\n{ [16
bytes data]\n* SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384\n* ALPN:
server accepted http/1.1\n* Server certificate:\n* subject: C=US; ST=California;
L=Alameda; O=Perforce Software, Inc.; CN=ftp.perforce.com\n* start date: Jul 13
00:00:00 2023 GMT\n* expire date: Jul 30 23:59:59 2024 GMT\n* issuer: C=US;
O=DigiCert Inc; CN=DigiCert Global G2 TLS RSA SHA256 2020 CA1\n* SSL certificate
verify result: unable to get local issuer certificate (20), continuing anyway.\n*
using HTTP/1.1\n} [5 bytes data]\n> GET /perforce/r23.2/bin.linux26x86_64/p4p
HTTP/1.1\r\n> Host: ftp.perforce.com\r\n> User-Agent: curl/7.88.1\r\n> Accept: */*\
r\n> \r\n{ [5 bytes data]\n< HTTP/1.1 200 OK\r\n< Date: Wed, 07 Feb 2024 16:05:12
GMT\r\n< Server: Apache/2.4.58 () OpenSSL/1.0.2k-fips\r\n< Strict-Transport-
Security: max-age=63072000\r\n< Upgrade: h2,h2c\r\n< Connection: Upgrade\r\n< Last-
Modified: Wed, 20 Dec 2023 05:23:13 GMT\r\n< ETag: \"7b6ec0-60cea2df25240\"\r\n<
Accept-Ranges: bytes\r\n< Content-Length: 8089280\r\n< \r\n{ [7884 bytes data]\n\r
0 7899k 0 55884 0 0 41592 0 0:03:14 0:00:01 0:03:13 41580*
Failure writing output to destination\n\r 8 7899k 8 679k 0 0 337k
0 0:00:23 0:00:02 0:00:21 337k\n* Closing connection 0\n{ [5 bytes data]\n*
TLSv1.2 (OUT), TLS alert, close notify (256):\n} [2 bytes data]\ncurl: (23) Failure
writing output to destination\n % Total % Received % Xferd Average Speed
Time Time Time Current\n Dload Upload
Total Spent Left Speed\n\r 0 0 0 0 0 0 0 0
--:--:-- --:--:-- --:--:-- 0* Trying 54.177.106.77:443...\n\r 0 0 0
0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0* Connected to
ftp.perforce.com (54.177.106.77) port 443 (#0)\n* ALPN: offers h2,http/1.1\n} [5
bytes data]\n* TLSv1.3 (OUT), TLS handshake, Client hello (1):\n} [512 bytes data]\
n* TLSv1.3 (IN), TLS handshake, Server hello (2):\n{ [108 bytes data]\n* TLSv1.2
(IN), TLS handshake, Certificate (11):\n{ [3028 bytes data]\n* TLSv1.2 (IN), TLS
handshake, Server key exchange (12):\n{ [333 bytes data]\n* TLSv1.2 (IN), TLS
handshake, Server finished (14):\n{ [4 bytes data]\n* TLSv1.2 (OUT), TLS handshake,
Client key exchange (16):\n} [70 bytes data]\n* TLSv1.2 (OUT), TLS change cipher,
Change cipher spec (1):\n} [1 bytes data]\n* TLSv1.2 (OUT), TLS handshake, Finished
(20):\n} [16 bytes data]\n* TLSv1.2 (IN), TLS handshake, Finished (20):\n{ [16
bytes data]\n* SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384\n* ALPN:
server accepted http/1.1\n* Server certificate:\n* subject: C=US; ST=California;
L=Alameda; O=Perforce Software, Inc.; CN=ftp.perforce.com\n* start date: Jul 13
00:00:00 2023 GMT\n* expire date: Jul 30 23:59:59 2024 GMT\n* issuer: C=US;
O=DigiCert Inc; CN=DigiCert Global G2 TLS RSA SHA256 2020 CA1\n* SSL certificate
verify result: unable to get local issuer certificate (20), continuing anyway.\n*
using HTTP/1.1\n} [5 bytes data]\n> GET /perforce/r23.2/bin.linux26x86_64/p4p
HTTP/1.1\r\n> Host: ftp.perforce.com\r\n> User-Agent: curl/7.88.1\r\n> Accept: */*\
r\n> \r\n{ [5 bytes data]\n< HTTP/1.1 200 OK\r\n< Date: Wed, 07 Feb 2024 16:05:16
GMT\r\n< Server: Apache/2.4.58 () OpenSSL/1.0.2k-fips\r\n< Strict-Transport-
Security: max-age=63072000\r\n< Upgrade: h2,h2c\r\n< Connection: Upgrade\r\n< Last-
Modified: Wed, 20 Dec 2023 05:23:13 GMT\r\n< ETag: \"7b6ec0-60cea2df25240\"\r\n<
Accept-Ranges: bytes\r\n< Content-Length: 8089280\r\n< \r\n{ [7884 bytes data]\n\r
0 7899k 0 39884 0 0 35643 0 0:03:46 0:00:01 0:03:45 35642*
Failure writing output to destination\n\r 8 7899k 8 679k 0 0 339k
0 0:00:23 0:00:02 0:00:21 339k\n* Closing connection 0\n{ [5 bytes data]\n*
TLSv1.2 (OUT), TLS alert, close notify (256):\n} [2 bytes data]\ncurl: (23) Failure
writing output to destination\n % Total % Received % Xferd Average Speed
Time Time Time Current\n Dload Upload
Total Spent Left Speed\n\r 0 0 0 0 0 0 0 0
--:--:-- --:--:-- --:--:-- 0* Trying 54.177.106.77:443...\n\r 0 0 0
0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0* Connected to
ftp.perforce.com (54.177.106.77) port 443 (#0)\n* ALPN: offers h2,http/1.1\n} [5
bytes data]\n* TLSv1.3 (OUT), TLS handshake, Client hello (1):\n} [512 bytes data]\
n* TLSv1.3 (IN), TLS handshake, Server hello (2):\n{ [108 bytes data]\n* TLSv1.2
(IN), TLS handshake, Certificate (11):\n{ [3028 bytes data]\n* TLSv1.2 (IN), TLS
handshake, Server key exchange (12):\n{ [333 bytes data]\n* TLSv1.2 (IN), TLS
handshake, Server finished (14):\n{ [4 bytes data]\n* TLSv1.2 (OUT), TLS handshake,
Client key exchange (16):\n} [70 bytes data]\n* TLSv1.2 (OUT), TLS change cipher,
Change cipher spec (1):\n} [1 bytes data]\n* TLSv1.2 (OUT), TLS handshake, Finished
(20):\n} [16 bytes data]\n* TLSv1.2 (IN), TLS handshake, Finished (20):\n{ [16
bytes data]\n* SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384\n* ALPN:
server accepted http/1.1\n* Server certificate:\n* subject: C=US; ST=California;
L=Alameda; O=Perforce Software, Inc.; CN=ftp.perforce.com\n* start date: Jul 13
00:00:00 2023 GMT\n* expire date: Jul 30 23:59:59 2024 GMT\n* issuer: C=US;
O=DigiCert Inc; CN=DigiCert Global G2 TLS RSA SHA256 2020 CA1\n* SSL certificate
verify result: unable to get local issuer certificate (20), continuing anyway.\n*
using HTTP/1.1\n} [5 bytes data]\n> GET /perforce/r23.2/bin.linux26x86_64/p4p
HTTP/1.1\r\n> Host: ftp.perforce.com\r\n> User-Agent: curl/7.88.1\r\n> Accept: */*\
r\n> \r\n{ [5 bytes data]\n< HTTP/1.1 200 OK\r\n< Date: Wed, 07 Feb 2024 16:05:20
GMT\r\n< Server: Apache/2.4.58 () OpenSSL/1.0.2k-fips\r\n< Strict-Transport-
Security: max-age=63072000\r\n< Upgrade: h2,h2c\r\n< Connection: Upgrade\r\n< Last-
Modified: Wed, 20 Dec 2023 05:23:13 GMT\r\n< ETag: \"7b6ec0-60cea2df25240\"\r\n<
Accept-Ranges: bytes\r\n< Content-Length: 8089280\r\n< \r\n{ [7884 bytes data]\n\r
0 7899k 0 23884 0 0 21370 0 0:06:18 0:00:01 0:06:17 21363*
Failure writing output to destination\n\r 8 7899k 8 679k 0 0 339k
0 0:00:23 0:00:02 0:00:21 339k\n* Closing connection 0\n{ [5 bytes data]\n*
TLSv1.2 (OUT), TLS alert, close notify (256):\n} [2 bytes data]\ncurl: (23) Failure
writing output to destination", "stderr_lines": [" % Total % Received % Xferd
Average Speed Time Time Time Current", "
Dload Upload Total Spent Left Speed", "", " 0 0 0 0 0 0
0 0 --:--:-- --:--:-- --:--:-- 0* Trying 54.177.106.77:443...", "", " 0
0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0* Connected
to ftp.perforce.com (54.177.106.77) port 443 (#0)", "* ALPN: offers h2,http/1.1",
"} [5 bytes data]", "* TLSv1.3 (OUT), TLS handshake, Client hello (1):", "} [512
bytes data]", "* TLSv1.3 (IN), TLS handshake, Server hello (2):", "{ [108 bytes
data]", "* TLSv1.2 (IN), TLS handshake, Certificate (11):", "{ [3028 bytes data]",
"* TLSv1.2 (IN), TLS handshake, Server key exchange (12):", "{ [333 bytes data]",
"* TLSv1.2 (IN), TLS handshake, Server finished (14):", "{ [4 bytes data]", "*
TLSv1.2 (OUT), TLS handshake, Client key exchange (16):", "} [70 bytes data]", "*
TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):", "} [1 bytes data]", "*
TLSv1.2 (OUT), TLS handshake, Finished (20):", "} [16 bytes data]", "* TLSv1.2
(IN), TLS handshake, Finished (20):", "{ [16 bytes data]", "* SSL connection using
TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384", "* ALPN: server accepted http/1.1", "*
Server certificate:", "* subject: C=US; ST=California; L=Alameda; O=Perforce
Software, Inc.; CN=ftp.perforce.com", "* start date: Jul 13 00:00:00 2023 GMT", "*
expire date: Jul 30 23:59:59 2024 GMT", "* issuer: C=US; O=DigiCert Inc;
CN=DigiCert Global G2 TLS RSA SHA256 2020 CA1", "* SSL certificate verify result:
unable to get local issuer certificate (20), continuing anyway.", "* using
HTTP/1.1", "} [5 bytes data]", "> GET /perforce/r23.2/bin.linux26x86_64/p4p
HTTP/1.1", "> Host: ftp.perforce.com", "> User-Agent: curl/7.88.1", "> Accept:
*/*", "> ", "{ [5 bytes data]", "< HTTP/1.1 200 OK", "< Date: Wed, 07 Feb 2024
16:05:12 GMT", "< Server: Apache/2.4.58 () OpenSSL/1.0.2k-fips", "< Strict-
Transport-Security: max-age=63072000", "< Upgrade: h2,h2c", "< Connection:
Upgrade", "< Last-Modified:
Wed, 20 Dec 2023 05:23:13 GMT", "< ETag: \"7b6ec0-60cea2df25240\"", "< Accept-
Ranges: bytes", "< Content-Length: 8089280", "< ", "{ [7884 bytes data]", "", " 0
7899k 0 55884 0 0 41592 0 0:03:14 0:00:01 0:03:13 41580* Failure
writing output to destination", "", " 8 7899k 8 679k 0 0 337k 0
0:00:23 0:00:02 0:00:21 337k", "* Closing connection 0", "{ [5 bytes data]", "*
TLSv1.2 (OUT), TLS alert, close notify (256):", "} [2 bytes data]", "curl: (23)
Failure writing output to destination", " % Total % Received % Xferd Average
Speed Time Time Time Current", " Dload
Upload Total Spent Left Speed", "", " 0 0 0 0 0 0 0
0 --:--:-- --:--:-- --:--:-- 0* Trying 54.177.106.77:443...", "", " 0 0
0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0* Connected to
ftp.perforce.com (54.177.106.77) port 443 (#0)", "* ALPN: offers h2,http/1.1", "}
[5 bytes data]", "* TLSv1.3 (OUT), TLS handshake, Client hello (1):", "} [512 bytes
data]", "* TLSv1.3 (IN), TLS handshake, Server hello (2):", "{ [108 bytes data]",
"* TLSv1.2 (IN), TLS handshake, Certificate (11):", "{ [3028 bytes data]", "*
TLSv1.2 (IN), TLS handshake, Server key exchange (12):", "{ [333 bytes data]", "*
TLSv1.2 (IN), TLS handshake, Server finished (14):", "{ [4 bytes data]", "* TLSv1.2
(OUT), TLS handshake, Client key exchange (16):", "} [70 bytes data]", "* TLSv1.2
(OUT), TLS change cipher, Change cipher spec (1):", "} [1 bytes data]", "* TLSv1.2
(OUT), TLS handshake, Finished (20):", "} [16 bytes data]", "* TLSv1.2 (IN), TLS
handshake, Finished (20):", "{ [16 bytes data]", "* SSL connection using TLSv1.2 /
ECDHE-RSA-AES256-GCM-SHA384", "* ALPN: server accepted http/1.1", "* Server
certificate:", "* subject: C=US; ST=California; L=Alameda; O=Perforce Software,
Inc.; CN=ftp.perforce.com", "* start date: Jul 13 00:00:00 2023 GMT", "* expire
date: Jul 30 23:59:59 2024 GMT", "* issuer: C=US; O=DigiCert Inc; CN=DigiCert
Global G2 TLS RSA SHA256 2020 CA1", "* SSL certificate verify result: unable to
get local issuer certificate (20), continuing anyway.", "* using HTTP/1.1", "} [5
bytes data]", "> GET /perforce/r23.2/bin.linux26x86_64/p4p HTTP/1.1", "> Host:
ftp.perforce.com", "> User-Agent: curl/7.88.1", "> Accept: */*", "> ", "{ [5 bytes
data]", "< HTTP/1.1 200 OK", "< Date: Wed, 07 Feb 2024 16:05:16 GMT", "< Server:
Apache/2.4.58 () OpenSSL/1.0.2k-fips", "< Strict-Transport-Security: max-
age=63072000", "< Upgrade: h2,h2c", "< Connection: Upgrade", "< Last-Modified: Wed,
20 Dec 2023 05:23:13 GMT", "< ETag: \"7b6ec0-60cea2df25240\"", "< Accept-Ranges:
bytes", "< Content-Length: 8089280", "< ", "{ [7884 bytes data]", "", " 0 7899k
0 39884 0 0 35643 0 0:03:46 0:00:01 0:03:45 35642* Failure writing
output to destination", "", " 8 7899k 8 679k 0 0 339k 0 0:00:23
0:00:02 0:00:21 339k", "* Closing connection 0", "{ [5 bytes data]", "* TLSv1.2
(OUT), TLS alert, close notify (256):", "} [2 bytes data]", "curl: (23) Failure
writing output to destination", " % Total % Received % Xferd Average Speed
Time Time Time Current", " Dload Upload
Total Spent Left Speed", "", " 0 0 0 0 0 0 0 0
--:--:-- --:--:-- --:--:-- 0* Trying 54.177.106.77:443...", "", " 0 0
0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0* Connected to
ftp.perforce.com (54.177.106.77) port 443 (#0)", "* ALPN: offers h2,http/1.1", "}
[5 bytes data]", "* TLSv1.3 (OUT), TLS handshake, Client hello (1):", "} [512 bytes
data]", "* TLSv1.3 (IN), TLS handshake, Server hello (2):", "{ [108 bytes data]",
"* TLSv1.2 (IN), TLS handshake, Certificate (11):", "{ [3028 bytes data]", "*
TLSv1.2 (IN), TLS handshake, Server key exchange (12):", "{ [333 bytes data]", "*
TLSv1.2 (IN), TLS handshake, Server finished (14):", "{ [4 bytes data]", "* TLSv1.2
(OUT), TLS handshake, Client key exchange (16):", "} [70 bytes data]", "* TLSv1.2
(OUT), TLS change cipher, Change cipher spec (1):", "} [1 bytes data]", "* TLSv1.2
(OUT), TLS handshake, Finished (20):", "} [16 bytes data]", "* TLSv1.2 (IN), TLS
handshake, Finished (20):", "{ [16 bytes data]", "* SSL connection using TLSv1.2 /
ECDHE-RSA-AES256-GCM-SHA384", "* ALPN: server accepted http/1.1", "* Server
certificate:", "* subject: C=US; ST=California; L=Alameda; O=Perforce Software,
Inc.; CN=ftp.perforce.com", "* start date: Jul 13 00:00:00 2023 GMT", "* expire
date: Jul 30 23:59:59 2024 GMT", "* issuer: C=US; O=DigiCert Inc; CN=DigiCert
Global G2 TLS RSA SHA256 2020 CA1", "* SSL certificate verify result: unable to
get local issuer certificate (20), continuing anyway.", "* using HTTP/1.1", "} [5
bytes data]", "> GET /perforce/r23.2/bin.linux26x86_64/p4p HTTP/1.1", "> Host:
ftp.perforce.com", "> User-Agent: curl/7.88.1", "> Accept: */*", "> ", "{ [5 bytes
data]", "< HTTP/1.1 200 OK", "< Date: Wed, 07 Feb 2024 16:05:20 GMT", "< Server:
Apache/2.4.58 () OpenSSL/1.0.2k-fips", "< Strict-Transport-Security: max-
age=63072000", "< Upgrade: h2,h2c", "< Connection: Upgrade", "< Last-Modified: Wed,
20 Dec 2023 05:23:13 GMT", "< ETag: \"7b6ec0-60cea2df25240\"", "< Accept-Ranges:
bytes", "< Content-Length: 8089280", "< ", "{ [7884 bytes data]", "", " 0 7899k
0 23884 0 0 21370 0 0:06:18 0:00:01 0:06:17 21363* Failure writing
output to destination", "", " 8 7899k 8 679k 0 0 339k 0 0:00:23
0:00:02 0:00:21 339k", "* Closing connection 0", "{ [5 bytes data]", "* TLSv1.2
(OUT), TLS alert, close notify (256):", "} [2 bytes data]", "curl: (23) Failure
writing output to destination"], "stdout": "\nStarted get_helix_binaries.sh v1.3.4
as root@perforce-server at Wed Feb 7 11:04:53 AM EST 2024.\n\nGetting p4 ...\nOld
version of p4: Rev. P4/LINUX26X86_64/2023.2/2535420 (2023/12/19).\nRunning: curl -s
-k -O https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4\nNew version of
p4: Rev. P4/LINUX26X86_64/2023.2/2535420 (2023/12/19).\n\nGetting p4d ...\nOld
version of p4d: Rev. P4D/LINUX26X86_64/2023.2/2535420 (2023/12/19).\nRunning: curl
-s -k -O https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4d\nNew version
of p4d: Rev. P4D/LINUX26X86_64/2023.2/2535420 (2023/12/19).\n\nGetting
p4broker ...\nOld version of p4broker: Rev. P4BROKER/LINUX26X86_64/2023.2/2535420
(2023/12/19).\nRunning: curl -s -k -O
https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4broker\nNew version of
p4broker: Rev. P4BROKER/LINUX26X86_64/2023.2/2535420 (2023/12/19).\n\nGetting
p4p ...\nRunning: curl -s -k -O
https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4p\n\nWarning: Failed to
download p4p with this URL:
https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4p\nRetrying ...\n\
nRetry 1 of p4p with command: curl -v -k -O
https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4p\n\nWarning: Retry 1
failed again to download p4p with this URL:
https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4p\n\nRetry 2 of p4p
with command: curl -v -k -O
https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4p\n\nWarning: Retry 2
failed again to download p4p with this URL:
https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4p\n\nRetry 3 of p4p
with command: curl -v -k -O
https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4p\n\nWarning: Retry 3
failed again to download p4p with this URL:
https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4p\n\n\nError: Failed to
download p4p with this URL:
https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4p\n\n\nError: \\There
were 1 errors attempting to download Perforce Helix binaries.", "stdout_lines":
["", "Started get_helix_binaries.sh v1.3.4 as root@perforce-server at Wed Feb 7
11:04:53 AM EST 2024.", "", "Getting p4 ...", "Old version of p4: Rev.
P4/LINUX26X86_64/2023.2/2535420 (2023/12/19).", "Running: curl -s -k -O
https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4", "New version of p4:
Rev. P4/LINUX26X86_64/2023.2/2535420 (2023/12/19).", "", "Getting p4d ...", "Old
version of p4d: Rev. P4D/LINUX26X86_64/2023.2/2535420 (2023/12/19).", "Running:
curl -s -k -O https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4d", "New
version of p4d: Rev. P4D/LINUX26X86_64/2023.2/2535420 (2023/12/19).", "", "Getting
p4broker ...", "Old version of p4broker: Rev. P4BROKER/LINUX26X86_64/2023.2/2535420
(2023/12/19).", "Running: curl -s -k -O
https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4broker", "New version
of p4broker: Rev. P4BROKER/LINUX26X86_64/2023.2/2535420 (2023/12/19).", "",
"Getting p4p ...", "Running: curl -s -k -O
https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4p", "", "Warning:
Failed to download p4p with this URL:
https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4p", "Retrying ...", "",
"Retry 1 of p4p with command: curl -v -k -O
https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4p", "", "Warning: Retry
1 failed again to download p4p with this URL:
https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4p", "", "Retry 2 of p4p
with command: curl -v -k -O
https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4p", "", "Warning: Retry
2 failed again to download p4p with this URL:
https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4p", "", "Retry 3 of p4p
with command: curl -v -k -O
https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4p", "", "Warning: Retry
3 failed again to download p4p with this URL:
https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4p", "", "", "Error:
Failed to download p4p with this URL:
https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4p", "", "", "Error: \\
There were 1 errors attempting to download Perforce Helix binaries."]}