[secrets] Remove unecessary stripping of secrets in server
The issue with garbage appearing client-side is now known to be
chunked-size encoding, which the HTTP client does not currently handle.
Bug: IN-418
Change-Id: I32e7855e6b0f6d70e66230c1455d6128d71e45df
diff --git a/secrets/server.go b/secrets/server.go
index 93ccb37..2d30326 100644
--- a/secrets/server.go
+++ b/secrets/server.go
@@ -30,17 +30,7 @@
return
}
log.Printf("Serving secret for \"%s\"\n", testName)
-
- // If the secret is a JSON string, strip any garbage that may have been prepended or
- // appended in transit.
- start := strings.Index(secret, "{")
- end := strings.LastIndex(secret, "}")
- if start >= 0 && end >= 0 {
- log.Printf("SHA256 before stripping the secret: %x", sha256.Sum256([]byte(secret)))
- secret = secret[start:end+1]
- log.Printf("SHA256 after stripping the secret: %x", sha256.Sum256([]byte(secret)))
- }
-
+ log.Printf("SHA256 of secret: %x", sha256.Sum256([]byte(secret)))
w.WriteHeader(http.StatusOK)
w.Write([]byte(secret))
}