diff --git a/src/ChatPage.cpp b/src/ChatPage.cpp
index 639f3818..88d393ce 100644
--- a/src/ChatPage.cpp
+++ b/src/ChatPage.cpp
@@ -994,7 +994,7 @@ ChatPage::getBackupVersion()
}
// switch to UI thread for secrets stuff
- QTimer::singleShot(0, this, [this, res] {
+ QTimer::singleShot(0, this, [res] {
auto auth_data = nlohmann::json::parse(res.auth_data);
if (res.algorithm == "m.megolm_backup.v1.curve25519-aes-sha2") {
@@ -1025,46 +1025,6 @@ ChatPage::getBackupVersion()
data.algorithm = res.algorithm;
data.version = res.version;
cache::client()->saveBackupVersion(data);
-
- // We really don't need to add our signature.
- // if (!auth_data["signatures"]
- // [http::client()->user_id().to_string()]
- // .contains("ed25519:" +
- // http::client()->device_id())) {
- // // add our signature
- // // This is not strictly necessary, but some Element
- // // clients rely on it. We assume the master_key
- // signature
- // // already exists and add our device signature just to
- // be
- // // safe, even though just the master signature is
- // enough,
- // // if cross-signing is used.
- // auto signatures = auth_data["signatures"];
- // auth_data.erase("signatures");
- // auth_data.erase("unsigned");
- // signatures[http::client()->user_id().to_string()]
- // ["ed25519:" + http::client()->device_id()] =
- // olm::client()->sign_message(auth_data.dump());
- // auth_data["signatures"] = signatures;
-
- // auto copy = res;
- // copy.auth_data = auth_data.dump();
- // http::client()->update_backup_version(
- // res.version, copy, [](mtx::http::RequestErr e) {
- // if (e) {
- // nhlog::crypto()->error(
- // "Failed to update online backup "
- // "signatures: {} - {}",
- // mtx::errors::to_string(
- // e->matrix_error.errcode),
- // e->matrix_error.error);
- // } else {
- // nhlog::crypto()->info(
- // "Updated key backup signatures");
- // }
- // });
- //}
} else {
nhlog::crypto()->info("Unsupported key backup algorithm: {}",
res.algorithm);
|