image_signing: drop board hacking for lsb appid checks
BUG=chromium:605595
TEST=None
BRANCH=None
Change-Id: I8104d80d151440bdd8f419c88bd98592d9f44612
Reviewed-on: https://chromium-review.googlesource.com/371678
Commit-Ready: Mike Frysinger <vapier@chromium.org>
Tested-by: Mike Frysinger <vapier@chromium.org>
Reviewed-by: Hung-Te Lin <hungte@chromium.org>
diff --git a/scripts/image_signing/ensure_sane_lsb-release.sh b/scripts/image_signing/ensure_sane_lsb-release.sh
index a5abc3c..ded87fd 100755
--- a/scripts/image_signing/ensure_sane_lsb-release.sh
+++ b/scripts/image_signing/ensure_sane_lsb-release.sh
@@ -142,11 +142,9 @@
if check_keyval_in_list $lsb CHROMEOS_RELEASE_BOARD \
"${expected_boards[@]}"; then
- # Pick the right set of test-expectation data to use. The cuts
- # turn e.g. x86-foo-pvtkeys into x86-foo.
+ # Pick the right set of test-expectation data to use.
local board=$(lsbval $lsb CHROMEOS_RELEASE_BOARD |
- cut -d = -f 2 |
- cut -d - -f 1,2)
+ cut -d = -f 2)
# a copy of the board string with '-' squished to variable-name-safe '_'.
local boardvar=${board//-/_}
channel=$(lsbval $lsb CHROMEOS_RELEASE_TRACK)