diff --git a/cmd/secrets/common/browser_flow.go b/cmd/secrets/common/browser_flow.go index a979eeda..6b4be935 100644 --- a/cmd/secrets/common/browser_flow.go +++ b/cmd/secrets/common/browser_flow.go @@ -55,7 +55,7 @@ func vaultPermissionForMethod(method string) (string, error) { } func digestHexString(digest [32]byte) string { - return "0x" + hex.EncodeToString(digest[:]) + return hex.EncodeToString(digest[:]) } // executeBrowserUpsert handles secrets create/update when the user signs in with their organization account. diff --git a/cmd/secrets/common/browser_flow_test.go b/cmd/secrets/common/browser_flow_test.go index 7d80447e..43e96392 100644 --- a/cmd/secrets/common/browser_flow_test.go +++ b/cmd/secrets/common/browser_flow_test.go @@ -42,7 +42,7 @@ func TestVaultPermissionForMethod(t *testing.T) { func TestDigestHexString(t *testing.T) { var d [32]byte copy(d[:], []byte{1, 2, 3}) - assert.Equal(t, "0x0102030000000000000000000000000000000000000000000000000000000000", digestHexString(d)) + assert.Equal(t, "0102030000000000000000000000000000000000000000000000000000000000", digestHexString(d)) } // TestBrowserFlowPKCE checks PKCE S256 (RFC 7636) used by the browser secrets authorization step.