veyron/services/wspr:  Take out assocIdentity stuff because it's broken
and I'm about to reimplement it anyways.

Change-Id: I24c5b2b654727e90a9e33e2b3a4f815f85f9bb5a
diff --git a/services/wsprd/wspr/pipe.go b/services/wsprd/wspr/pipe.go
index 3349f85..fbae344 100644
--- a/services/wsprd/wspr/pipe.go
+++ b/services/wsprd/wspr/pipe.go
@@ -233,8 +233,6 @@
 			go p.controller.HandleServerResponse(msg.Id, msg.Data)
 		case websocketSignatureRequest:
 			go p.controller.HandleSignatureRequest(msg.Data, ww)
-		case websocketAssocIdentity:
-			p.handleAssocIdentity(msg.Data, ww)
 		default:
 			ww.Error(verror.Unknownf("unknown message type: %v", msg.Type))
 		}
@@ -242,46 +240,6 @@
 	p.cleanup()
 }
 
-type assocIdentityData struct {
-	Account  string
-	Identity string // base64(vom(security.PrivateID))
-	Origin   string
-}
-
-// handleAssocIdentityRequest associates the identity with the origin
-func (p *pipe) handleAssocIdentity(data string, w lib.ClientWriter) {
-	// Decode the request
-	var parsedData assocIdentityData
-	decoder := json.NewDecoder(bytes.NewBufferString(data))
-	if err := decoder.Decode(&parsedData); err != nil {
-		w.Error(verror.Internalf("can't unmarshal JSONMessage: %v", err))
-		return
-	}
-
-	p.logger.VI(2).Info("associating name %v and private id %v to origin %v",
-		parsedData.Account,
-		parsedData.Identity,
-		parsedData.Origin)
-
-	idManager := p.wspr.idManager
-
-	id := decodeIdentity(p.logger, parsedData.Identity)
-	p.controller.UpdateIdentity(id)
-
-	if err := idManager.AddAccount(parsedData.Account, id); err != nil {
-		w.Error(verror.Internalf("identity.AddAccount(%v, %v) failed: %v", parsedData.Account, id, err))
-	}
-
-	if err := idManager.AddOrigin(parsedData.Origin, parsedData.Account, []security.ServiceCaveat{}); err != nil {
-		w.Error(verror.Internalf("identity.AddOrigin(%v, %v, %v) failed: %v", parsedData.Origin, parsedData.Account, []security.ServiceCaveat{}, err))
-	}
-
-	if err := w.Send(lib.ResponseFinal, nil); err != nil {
-		w.Error(verror.Internalf("error marshalling results: %v", err))
-		return
-	}
-}
-
 func decodeIdentity(logger vlog.Logger, msg string) security.PrivateID {
 	if len(msg) == 0 {
 		return nil
diff --git a/services/wsprd/wspr/pipe_test.go b/services/wsprd/wspr/pipe_test.go
index 843d9a2..8a271c6 100644
--- a/services/wsprd/wspr/pipe_test.go
+++ b/services/wsprd/wspr/pipe_test.go
@@ -1,7 +1,6 @@
 package wspr
 
 import (
-	"encoding/json"
 	"testing"
 	"veyron/services/wsprd/lib"
 	"veyron2"
@@ -20,35 +19,6 @@
 func (*testWriter) Send(lib.ResponseType, interface{}) error { return nil }
 func (*testWriter) Error(error)                              {}
 
-func TestHandleAssocIdentity(t *testing.T) {
-	wspr := NewWSPR(0, "mockVeyronProxyEP")
-	p := pipe{wspr: wspr, logger: wspr.rt.Logger()}
-	p.setup()
-
-	privateId := security.FakePrivateID("/fake/private/id")
-	identityData := assocIdentityData{
-		Account:  "test@example.org",
-		Identity: encodeIdentity(wspr.logger, privateId),
-		Origin:   "my.webapp.com",
-	}
-	jsonIdentityDataBytes, err := json.Marshal(identityData)
-	if err != nil {
-		t.Errorf("json.Marshal(%v) failed: %v", identityData, err)
-	}
-	jsonIdentityData := string(jsonIdentityDataBytes)
-	writer := testWriter{}
-	p.handleAssocIdentity(jsonIdentityData, lib.ClientWriter(&writer))
-	// Check that the pipe has the privateId
-	if p.controller.RT().Identity() != privateId {
-		t.Errorf("p.privateId was not set. got: %v, expected: %v", p.controller.RT().Identity(), identityData.Identity)
-	}
-	// Check that wspr idManager has the origin
-	_, err = wspr.idManager.Identity(identityData.Origin)
-	if err != nil {
-		t.Errorf("wspr.idManager.Identity(%v) failed: %v", identityData.Origin, err)
-	}
-}
-
 func TestEncodeDecodeIdentity(t *testing.T) {
 	identity := security.FakePrivateID("/fake/private/id")
 	resultIdentity := decodeIdentity(r.Logger(), encodeIdentity(r.Logger(), identity))