[secrets] Remove unecessary stripping of secrets in server

The issue with garbage appearing client-side is now known to be
chunked-size encoding, which the HTTP client does not currently handle.

Bug: IN-418
Change-Id: I32e7855e6b0f6d70e66230c1455d6128d71e45df
diff --git a/secrets/server.go b/secrets/server.go
index 93ccb37..2d30326 100644
--- a/secrets/server.go
+++ b/secrets/server.go
@@ -30,17 +30,7 @@
 		return
 	}
 	log.Printf("Serving secret for \"%s\"\n", testName)
-
-	// If the secret is a JSON string, strip any garbage that may have been prepended or
-	// appended in transit.
-	start := strings.Index(secret, "{")
-	end := strings.LastIndex(secret, "}")
-	if start >= 0 && end >= 0 {
-		log.Printf("SHA256 before stripping the secret: %x", sha256.Sum256([]byte(secret)))
-		secret = secret[start:end+1]
-		log.Printf("SHA256 after stripping the secret: %x", sha256.Sum256([]byte(secret)))
-	}
-
+	log.Printf("SHA256 of secret: %x", sha256.Sum256([]byte(secret)))
 	w.WriteHeader(http.StatusOK)
 	w.Write([]byte(secret))
 }