image_signing: drop board hacking for lsb appid checks

BUG=chromium:605595
TEST=None
BRANCH=None

Change-Id: I8104d80d151440bdd8f419c88bd98592d9f44612
Reviewed-on: https://chromium-review.googlesource.com/371678
Commit-Ready: Mike Frysinger <vapier@chromium.org>
Tested-by: Mike Frysinger <vapier@chromium.org>
Reviewed-by: Hung-Te Lin <hungte@chromium.org>
diff --git a/scripts/image_signing/ensure_sane_lsb-release.sh b/scripts/image_signing/ensure_sane_lsb-release.sh
index a5abc3c..ded87fd 100755
--- a/scripts/image_signing/ensure_sane_lsb-release.sh
+++ b/scripts/image_signing/ensure_sane_lsb-release.sh
@@ -142,11 +142,9 @@
 
   if check_keyval_in_list $lsb CHROMEOS_RELEASE_BOARD \
     "${expected_boards[@]}"; then
-    # Pick the right set of test-expectation data to use. The cuts
-    # turn e.g. x86-foo-pvtkeys into x86-foo.
+    # Pick the right set of test-expectation data to use.
     local board=$(lsbval $lsb CHROMEOS_RELEASE_BOARD |
-                  cut -d = -f 2 |
-                  cut -d - -f 1,2)
+                  cut -d = -f 2)
     # a copy of the board string with '-' squished to variable-name-safe '_'.
     local boardvar=${board//-/_}
     channel=$(lsbval $lsb CHROMEOS_RELEASE_TRACK)