Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
50 views5 pages

Error

The script failed to download helix binaries from the Perforce server with a non-zero return code. It attempted to download the files over TLS multiple times but failed each attempt with a "Failure writing output to destination" error.

Uploaded by

s.nair
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views5 pages

Error

The script failed to download helix binaries from the Perforce server with a non-zero return code. It attempted to download the files over TLS multiple times but failed each attempt with a "Failure writing output to destination" error.

Uploaded by

s.nair
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 5

fatal: [127.0.0.1]: FAILED!

=> {"changed": true, "cmd": "cd


/hxdepots/sdp/helix_binaries\n./get_helix_binaries.sh \n", "delta":
"0:00:28.722520", "end": "2024-02-07 11:05:22.200983", "msg": "non-zero return
code", "rc": 2, "start": "2024-02-07 11:04:53.478463", "stderr": " % Total %
Received % Xferd Average Speed Time Time Time Current\n
Dload Upload Total Spent Left Speed\n\r 0 0 0 0 0 0
0 0 --:--:-- --:--:-- --:--:-- 0* Trying 54.177.106.77:443...\n\r 0
0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0* Connected
to ftp.perforce.com (54.177.106.77) port 443 (#0)\n* ALPN: offers h2,http/1.1\n} [5
bytes data]\n* TLSv1.3 (OUT), TLS handshake, Client hello (1):\n} [512 bytes data]\
n* TLSv1.3 (IN), TLS handshake, Server hello (2):\n{ [108 bytes data]\n* TLSv1.2
(IN), TLS handshake, Certificate (11):\n{ [3028 bytes data]\n* TLSv1.2 (IN), TLS
handshake, Server key exchange (12):\n{ [333 bytes data]\n* TLSv1.2 (IN), TLS
handshake, Server finished (14):\n{ [4 bytes data]\n* TLSv1.2 (OUT), TLS handshake,
Client key exchange (16):\n} [70 bytes data]\n* TLSv1.2 (OUT), TLS change cipher,
Change cipher spec (1):\n} [1 bytes data]\n* TLSv1.2 (OUT), TLS handshake, Finished
(20):\n} [16 bytes data]\n* TLSv1.2 (IN), TLS handshake, Finished (20):\n{ [16
bytes data]\n* SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384\n* ALPN:
server accepted http/1.1\n* Server certificate:\n* subject: C=US; ST=California;
L=Alameda; O=Perforce Software, Inc.; CN=ftp.perforce.com\n* start date: Jul 13
00:00:00 2023 GMT\n* expire date: Jul 30 23:59:59 2024 GMT\n* issuer: C=US;
O=DigiCert Inc; CN=DigiCert Global G2 TLS RSA SHA256 2020 CA1\n* SSL certificate
verify result: unable to get local issuer certificate (20), continuing anyway.\n*
using HTTP/1.1\n} [5 bytes data]\n> GET /perforce/r23.2/bin.linux26x86_64/p4p
HTTP/1.1\r\n> Host: ftp.perforce.com\r\n> User-Agent: curl/7.88.1\r\n> Accept: */*\
r\n> \r\n{ [5 bytes data]\n< HTTP/1.1 200 OK\r\n< Date: Wed, 07 Feb 2024 16:05:12
GMT\r\n< Server: Apache/2.4.58 () OpenSSL/1.0.2k-fips\r\n< Strict-Transport-
Security: max-age=63072000\r\n< Upgrade: h2,h2c\r\n< Connection: Upgrade\r\n< Last-
Modified: Wed, 20 Dec 2023 05:23:13 GMT\r\n< ETag: \"7b6ec0-60cea2df25240\"\r\n<
Accept-Ranges: bytes\r\n< Content-Length: 8089280\r\n< \r\n{ [7884 bytes data]\n\r
0 7899k 0 55884 0 0 41592 0 0:03:14 0:00:01 0:03:13 41580*
Failure writing output to destination\n\r 8 7899k 8 679k 0 0 337k
0 0:00:23 0:00:02 0:00:21 337k\n* Closing connection 0\n{ [5 bytes data]\n*
TLSv1.2 (OUT), TLS alert, close notify (256):\n} [2 bytes data]\ncurl: (23) Failure
writing output to destination\n % Total % Received % Xferd Average Speed
Time Time Time Current\n Dload Upload
Total Spent Left Speed\n\r 0 0 0 0 0 0 0 0
--:--:-- --:--:-- --:--:-- 0* Trying 54.177.106.77:443...\n\r 0 0 0
0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0* Connected to
ftp.perforce.com (54.177.106.77) port 443 (#0)\n* ALPN: offers h2,http/1.1\n} [5
bytes data]\n* TLSv1.3 (OUT), TLS handshake, Client hello (1):\n} [512 bytes data]\
n* TLSv1.3 (IN), TLS handshake, Server hello (2):\n{ [108 bytes data]\n* TLSv1.2
(IN), TLS handshake, Certificate (11):\n{ [3028 bytes data]\n* TLSv1.2 (IN), TLS
handshake, Server key exchange (12):\n{ [333 bytes data]\n* TLSv1.2 (IN), TLS
handshake, Server finished (14):\n{ [4 bytes data]\n* TLSv1.2 (OUT), TLS handshake,
Client key exchange (16):\n} [70 bytes data]\n* TLSv1.2 (OUT), TLS change cipher,
Change cipher spec (1):\n} [1 bytes data]\n* TLSv1.2 (OUT), TLS handshake, Finished
(20):\n} [16 bytes data]\n* TLSv1.2 (IN), TLS handshake, Finished (20):\n{ [16
bytes data]\n* SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384\n* ALPN:
server accepted http/1.1\n* Server certificate:\n* subject: C=US; ST=California;
L=Alameda; O=Perforce Software, Inc.; CN=ftp.perforce.com\n* start date: Jul 13
00:00:00 2023 GMT\n* expire date: Jul 30 23:59:59 2024 GMT\n* issuer: C=US;
O=DigiCert Inc; CN=DigiCert Global G2 TLS RSA SHA256 2020 CA1\n* SSL certificate
verify result: unable to get local issuer certificate (20), continuing anyway.\n*
using HTTP/1.1\n} [5 bytes data]\n> GET /perforce/r23.2/bin.linux26x86_64/p4p
HTTP/1.1\r\n> Host: ftp.perforce.com\r\n> User-Agent: curl/7.88.1\r\n> Accept: */*\
r\n> \r\n{ [5 bytes data]\n< HTTP/1.1 200 OK\r\n< Date: Wed, 07 Feb 2024 16:05:16
GMT\r\n< Server: Apache/2.4.58 () OpenSSL/1.0.2k-fips\r\n< Strict-Transport-
Security: max-age=63072000\r\n< Upgrade: h2,h2c\r\n< Connection: Upgrade\r\n< Last-
Modified: Wed, 20 Dec 2023 05:23:13 GMT\r\n< ETag: \"7b6ec0-60cea2df25240\"\r\n<
Accept-Ranges: bytes\r\n< Content-Length: 8089280\r\n< \r\n{ [7884 bytes data]\n\r
0 7899k 0 39884 0 0 35643 0 0:03:46 0:00:01 0:03:45 35642*
Failure writing output to destination\n\r 8 7899k 8 679k 0 0 339k
0 0:00:23 0:00:02 0:00:21 339k\n* Closing connection 0\n{ [5 bytes data]\n*
TLSv1.2 (OUT), TLS alert, close notify (256):\n} [2 bytes data]\ncurl: (23) Failure
writing output to destination\n % Total % Received % Xferd Average Speed
Time Time Time Current\n Dload Upload
Total Spent Left Speed\n\r 0 0 0 0 0 0 0 0
--:--:-- --:--:-- --:--:-- 0* Trying 54.177.106.77:443...\n\r 0 0 0
0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0* Connected to
ftp.perforce.com (54.177.106.77) port 443 (#0)\n* ALPN: offers h2,http/1.1\n} [5
bytes data]\n* TLSv1.3 (OUT), TLS handshake, Client hello (1):\n} [512 bytes data]\
n* TLSv1.3 (IN), TLS handshake, Server hello (2):\n{ [108 bytes data]\n* TLSv1.2
(IN), TLS handshake, Certificate (11):\n{ [3028 bytes data]\n* TLSv1.2 (IN), TLS
handshake, Server key exchange (12):\n{ [333 bytes data]\n* TLSv1.2 (IN), TLS
handshake, Server finished (14):\n{ [4 bytes data]\n* TLSv1.2 (OUT), TLS handshake,
Client key exchange (16):\n} [70 bytes data]\n* TLSv1.2 (OUT), TLS change cipher,
Change cipher spec (1):\n} [1 bytes data]\n* TLSv1.2 (OUT), TLS handshake, Finished
(20):\n} [16 bytes data]\n* TLSv1.2 (IN), TLS handshake, Finished (20):\n{ [16
bytes data]\n* SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384\n* ALPN:
server accepted http/1.1\n* Server certificate:\n* subject: C=US; ST=California;
L=Alameda; O=Perforce Software, Inc.; CN=ftp.perforce.com\n* start date: Jul 13
00:00:00 2023 GMT\n* expire date: Jul 30 23:59:59 2024 GMT\n* issuer: C=US;
O=DigiCert Inc; CN=DigiCert Global G2 TLS RSA SHA256 2020 CA1\n* SSL certificate
verify result: unable to get local issuer certificate (20), continuing anyway.\n*
using HTTP/1.1\n} [5 bytes data]\n> GET /perforce/r23.2/bin.linux26x86_64/p4p
HTTP/1.1\r\n> Host: ftp.perforce.com\r\n> User-Agent: curl/7.88.1\r\n> Accept: */*\
r\n> \r\n{ [5 bytes data]\n< HTTP/1.1 200 OK\r\n< Date: Wed, 07 Feb 2024 16:05:20
GMT\r\n< Server: Apache/2.4.58 () OpenSSL/1.0.2k-fips\r\n< Strict-Transport-
Security: max-age=63072000\r\n< Upgrade: h2,h2c\r\n< Connection: Upgrade\r\n< Last-
Modified: Wed, 20 Dec 2023 05:23:13 GMT\r\n< ETag: \"7b6ec0-60cea2df25240\"\r\n<
Accept-Ranges: bytes\r\n< Content-Length: 8089280\r\n< \r\n{ [7884 bytes data]\n\r
0 7899k 0 23884 0 0 21370 0 0:06:18 0:00:01 0:06:17 21363*
Failure writing output to destination\n\r 8 7899k 8 679k 0 0 339k
0 0:00:23 0:00:02 0:00:21 339k\n* Closing connection 0\n{ [5 bytes data]\n*
TLSv1.2 (OUT), TLS alert, close notify (256):\n} [2 bytes data]\ncurl: (23) Failure
writing output to destination", "stderr_lines": [" % Total % Received % Xferd
Average Speed Time Time Time Current", "
Dload Upload Total Spent Left Speed", "", " 0 0 0 0 0 0
0 0 --:--:-- --:--:-- --:--:-- 0* Trying 54.177.106.77:443...", "", " 0
0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0* Connected
to ftp.perforce.com (54.177.106.77) port 443 (#0)", "* ALPN: offers h2,http/1.1",
"} [5 bytes data]", "* TLSv1.3 (OUT), TLS handshake, Client hello (1):", "} [512
bytes data]", "* TLSv1.3 (IN), TLS handshake, Server hello (2):", "{ [108 bytes
data]", "* TLSv1.2 (IN), TLS handshake, Certificate (11):", "{ [3028 bytes data]",
"* TLSv1.2 (IN), TLS handshake, Server key exchange (12):", "{ [333 bytes data]",
"* TLSv1.2 (IN), TLS handshake, Server finished (14):", "{ [4 bytes data]", "*
TLSv1.2 (OUT), TLS handshake, Client key exchange (16):", "} [70 bytes data]", "*
TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):", "} [1 bytes data]", "*
TLSv1.2 (OUT), TLS handshake, Finished (20):", "} [16 bytes data]", "* TLSv1.2
(IN), TLS handshake, Finished (20):", "{ [16 bytes data]", "* SSL connection using
TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384", "* ALPN: server accepted http/1.1", "*
Server certificate:", "* subject: C=US; ST=California; L=Alameda; O=Perforce
Software, Inc.; CN=ftp.perforce.com", "* start date: Jul 13 00:00:00 2023 GMT", "*
expire date: Jul 30 23:59:59 2024 GMT", "* issuer: C=US; O=DigiCert Inc;
CN=DigiCert Global G2 TLS RSA SHA256 2020 CA1", "* SSL certificate verify result:
unable to get local issuer certificate (20), continuing anyway.", "* using
HTTP/1.1", "} [5 bytes data]", "> GET /perforce/r23.2/bin.linux26x86_64/p4p
HTTP/1.1", "> Host: ftp.perforce.com", "> User-Agent: curl/7.88.1", "> Accept:
*/*", "> ", "{ [5 bytes data]", "< HTTP/1.1 200 OK", "< Date: Wed, 07 Feb 2024
16:05:12 GMT", "< Server: Apache/2.4.58 () OpenSSL/1.0.2k-fips", "< Strict-
Transport-Security: max-age=63072000", "< Upgrade: h2,h2c", "< Connection:
Upgrade", "< Last-Modified:
Wed, 20 Dec 2023 05:23:13 GMT", "< ETag: \"7b6ec0-60cea2df25240\"", "< Accept-
Ranges: bytes", "< Content-Length: 8089280", "< ", "{ [7884 bytes data]", "", " 0
7899k 0 55884 0 0 41592 0 0:03:14 0:00:01 0:03:13 41580* Failure
writing output to destination", "", " 8 7899k 8 679k 0 0 337k 0
0:00:23 0:00:02 0:00:21 337k", "* Closing connection 0", "{ [5 bytes data]", "*
TLSv1.2 (OUT), TLS alert, close notify (256):", "} [2 bytes data]", "curl: (23)
Failure writing output to destination", " % Total % Received % Xferd Average
Speed Time Time Time Current", " Dload
Upload Total Spent Left Speed", "", " 0 0 0 0 0 0 0
0 --:--:-- --:--:-- --:--:-- 0* Trying 54.177.106.77:443...", "", " 0 0
0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0* Connected to
ftp.perforce.com (54.177.106.77) port 443 (#0)", "* ALPN: offers h2,http/1.1", "}
[5 bytes data]", "* TLSv1.3 (OUT), TLS handshake, Client hello (1):", "} [512 bytes
data]", "* TLSv1.3 (IN), TLS handshake, Server hello (2):", "{ [108 bytes data]",
"* TLSv1.2 (IN), TLS handshake, Certificate (11):", "{ [3028 bytes data]", "*
TLSv1.2 (IN), TLS handshake, Server key exchange (12):", "{ [333 bytes data]", "*
TLSv1.2 (IN), TLS handshake, Server finished (14):", "{ [4 bytes data]", "* TLSv1.2
(OUT), TLS handshake, Client key exchange (16):", "} [70 bytes data]", "* TLSv1.2
(OUT), TLS change cipher, Change cipher spec (1):", "} [1 bytes data]", "* TLSv1.2
(OUT), TLS handshake, Finished (20):", "} [16 bytes data]", "* TLSv1.2 (IN), TLS
handshake, Finished (20):", "{ [16 bytes data]", "* SSL connection using TLSv1.2 /
ECDHE-RSA-AES256-GCM-SHA384", "* ALPN: server accepted http/1.1", "* Server
certificate:", "* subject: C=US; ST=California; L=Alameda; O=Perforce Software,
Inc.; CN=ftp.perforce.com", "* start date: Jul 13 00:00:00 2023 GMT", "* expire
date: Jul 30 23:59:59 2024 GMT", "* issuer: C=US; O=DigiCert Inc; CN=DigiCert
Global G2 TLS RSA SHA256 2020 CA1", "* SSL certificate verify result: unable to
get local issuer certificate (20), continuing anyway.", "* using HTTP/1.1", "} [5
bytes data]", "> GET /perforce/r23.2/bin.linux26x86_64/p4p HTTP/1.1", "> Host:
ftp.perforce.com", "> User-Agent: curl/7.88.1", "> Accept: */*", "> ", "{ [5 bytes
data]", "< HTTP/1.1 200 OK", "< Date: Wed, 07 Feb 2024 16:05:16 GMT", "< Server:
Apache/2.4.58 () OpenSSL/1.0.2k-fips", "< Strict-Transport-Security: max-
age=63072000", "< Upgrade: h2,h2c", "< Connection: Upgrade", "< Last-Modified: Wed,
20 Dec 2023 05:23:13 GMT", "< ETag: \"7b6ec0-60cea2df25240\"", "< Accept-Ranges:
bytes", "< Content-Length: 8089280", "< ", "{ [7884 bytes data]", "", " 0 7899k
0 39884 0 0 35643 0 0:03:46 0:00:01 0:03:45 35642* Failure writing
output to destination", "", " 8 7899k 8 679k 0 0 339k 0 0:00:23
0:00:02 0:00:21 339k", "* Closing connection 0", "{ [5 bytes data]", "* TLSv1.2
(OUT), TLS alert, close notify (256):", "} [2 bytes data]", "curl: (23) Failure
writing output to destination", " % Total % Received % Xferd Average Speed
Time Time Time Current", " Dload Upload
Total Spent Left Speed", "", " 0 0 0 0 0 0 0 0
--:--:-- --:--:-- --:--:-- 0* Trying 54.177.106.77:443...", "", " 0 0
0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0* Connected to
ftp.perforce.com (54.177.106.77) port 443 (#0)", "* ALPN: offers h2,http/1.1", "}
[5 bytes data]", "* TLSv1.3 (OUT), TLS handshake, Client hello (1):", "} [512 bytes
data]", "* TLSv1.3 (IN), TLS handshake, Server hello (2):", "{ [108 bytes data]",
"* TLSv1.2 (IN), TLS handshake, Certificate (11):", "{ [3028 bytes data]", "*
TLSv1.2 (IN), TLS handshake, Server key exchange (12):", "{ [333 bytes data]", "*
TLSv1.2 (IN), TLS handshake, Server finished (14):", "{ [4 bytes data]", "* TLSv1.2
(OUT), TLS handshake, Client key exchange (16):", "} [70 bytes data]", "* TLSv1.2
(OUT), TLS change cipher, Change cipher spec (1):", "} [1 bytes data]", "* TLSv1.2
(OUT), TLS handshake, Finished (20):", "} [16 bytes data]", "* TLSv1.2 (IN), TLS
handshake, Finished (20):", "{ [16 bytes data]", "* SSL connection using TLSv1.2 /
ECDHE-RSA-AES256-GCM-SHA384", "* ALPN: server accepted http/1.1", "* Server
certificate:", "* subject: C=US; ST=California; L=Alameda; O=Perforce Software,
Inc.; CN=ftp.perforce.com", "* start date: Jul 13 00:00:00 2023 GMT", "* expire
date: Jul 30 23:59:59 2024 GMT", "* issuer: C=US; O=DigiCert Inc; CN=DigiCert
Global G2 TLS RSA SHA256 2020 CA1", "* SSL certificate verify result: unable to
get local issuer certificate (20), continuing anyway.", "* using HTTP/1.1", "} [5
bytes data]", "> GET /perforce/r23.2/bin.linux26x86_64/p4p HTTP/1.1", "> Host:
ftp.perforce.com", "> User-Agent: curl/7.88.1", "> Accept: */*", "> ", "{ [5 bytes
data]", "< HTTP/1.1 200 OK", "< Date: Wed, 07 Feb 2024 16:05:20 GMT", "< Server:
Apache/2.4.58 () OpenSSL/1.0.2k-fips", "< Strict-Transport-Security: max-
age=63072000", "< Upgrade: h2,h2c", "< Connection: Upgrade", "< Last-Modified: Wed,
20 Dec 2023 05:23:13 GMT", "< ETag: \"7b6ec0-60cea2df25240\"", "< Accept-Ranges:
bytes", "< Content-Length: 8089280", "< ", "{ [7884 bytes data]", "", " 0 7899k
0 23884 0 0 21370 0 0:06:18 0:00:01 0:06:17 21363* Failure writing
output to destination", "", " 8 7899k 8 679k 0 0 339k 0 0:00:23
0:00:02 0:00:21 339k", "* Closing connection 0", "{ [5 bytes data]", "* TLSv1.2
(OUT), TLS alert, close notify (256):", "} [2 bytes data]", "curl: (23) Failure
writing output to destination"], "stdout": "\nStarted get_helix_binaries.sh v1.3.4
as root@perforce-server at Wed Feb 7 11:04:53 AM EST 2024.\n\nGetting p4 ...\nOld
version of p4: Rev. P4/LINUX26X86_64/2023.2/2535420 (2023/12/19).\nRunning: curl -s
-k -O https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4\nNew version of
p4: Rev. P4/LINUX26X86_64/2023.2/2535420 (2023/12/19).\n\nGetting p4d ...\nOld
version of p4d: Rev. P4D/LINUX26X86_64/2023.2/2535420 (2023/12/19).\nRunning: curl
-s -k -O https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4d\nNew version
of p4d: Rev. P4D/LINUX26X86_64/2023.2/2535420 (2023/12/19).\n\nGetting
p4broker ...\nOld version of p4broker: Rev. P4BROKER/LINUX26X86_64/2023.2/2535420
(2023/12/19).\nRunning: curl -s -k -O
https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4broker\nNew version of
p4broker: Rev. P4BROKER/LINUX26X86_64/2023.2/2535420 (2023/12/19).\n\nGetting
p4p ...\nRunning: curl -s -k -O
https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4p\n\nWarning: Failed to
download p4p with this URL:
https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4p\nRetrying ...\n\
nRetry 1 of p4p with command: curl -v -k -O
https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4p\n\nWarning: Retry 1
failed again to download p4p with this URL:
https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4p\n\nRetry 2 of p4p
with command: curl -v -k -O
https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4p\n\nWarning: Retry 2
failed again to download p4p with this URL:
https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4p\n\nRetry 3 of p4p
with command: curl -v -k -O
https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4p\n\nWarning: Retry 3
failed again to download p4p with this URL:
https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4p\n\n\nError: Failed to
download p4p with this URL:
https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4p\n\n\nError: \\There
were 1 errors attempting to download Perforce Helix binaries.", "stdout_lines":
["", "Started get_helix_binaries.sh v1.3.4 as root@perforce-server at Wed Feb 7
11:04:53 AM EST 2024.", "", "Getting p4 ...", "Old version of p4: Rev.
P4/LINUX26X86_64/2023.2/2535420 (2023/12/19).", "Running: curl -s -k -O
https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4", "New version of p4:
Rev. P4/LINUX26X86_64/2023.2/2535420 (2023/12/19).", "", "Getting p4d ...", "Old
version of p4d: Rev. P4D/LINUX26X86_64/2023.2/2535420 (2023/12/19).", "Running:
curl -s -k -O https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4d", "New
version of p4d: Rev. P4D/LINUX26X86_64/2023.2/2535420 (2023/12/19).", "", "Getting
p4broker ...", "Old version of p4broker: Rev. P4BROKER/LINUX26X86_64/2023.2/2535420
(2023/12/19).", "Running: curl -s -k -O
https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4broker", "New version
of p4broker: Rev. P4BROKER/LINUX26X86_64/2023.2/2535420 (2023/12/19).", "",
"Getting p4p ...", "Running: curl -s -k -O
https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4p", "", "Warning:
Failed to download p4p with this URL:
https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4p", "Retrying ...", "",
"Retry 1 of p4p with command: curl -v -k -O
https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4p", "", "Warning: Retry
1 failed again to download p4p with this URL:
https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4p", "", "Retry 2 of p4p
with command: curl -v -k -O
https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4p", "", "Warning: Retry
2 failed again to download p4p with this URL:
https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4p", "", "Retry 3 of p4p
with command: curl -v -k -O
https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4p", "", "Warning: Retry
3 failed again to download p4p with this URL:
https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4p", "", "", "Error:
Failed to download p4p with this URL:
https://ftp.perforce.com/perforce/r23.2/bin.linux26x86_64/p4p", "", "", "Error: \\
There were 1 errors attempting to download Perforce Helix binaries."]}

You might also like