Index: remoting/host/daemon_process_win.cc |
diff --git a/remoting/host/daemon_process_win.cc b/remoting/host/daemon_process_win.cc |
index c29ebb644562729cc56c64c005836448824af3aa..d18c61e16f64b1a33485667219c461c79495e04d 100644 |
--- a/remoting/host/daemon_process_win.cc |
+++ b/remoting/host/daemon_process_win.cc |
@@ -29,10 +29,6 @@ namespace { |
const FilePath::CharType kMe2meHostBinaryName[] = |
FILE_PATH_LITERAL("remoting_host.exe"); |
-// The security descriptor of the daemon IPC endpoint. It gives full access |
-// to LocalSystem and denies access by anyone else. |
-const char kDaemonPipeSecurityDescriptor[] = "O:SYG:SYD:(A;;GA;;;SY)"; |
- |
} // namespace |
namespace remoting { |
@@ -90,11 +86,8 @@ void DaemonProcessWin::LaunchNetworkProcess() { |
scoped_ptr<UnprivilegedProcessDelegate> delegate( |
new UnprivilegedProcessDelegate(main_task_runner(), io_task_runner(), |
dir_path.Append(kMe2meHostBinaryName))); |
- launcher_.reset(new WorkerProcessLauncher(main_task_runner(), |
- io_task_runner(), |
- delegate.Pass(), |
- this, |
- kDaemonPipeSecurityDescriptor)); |
+ launcher_.reset(new WorkerProcessLauncher( |
+ main_task_runner(), delegate.Pass(), this)); |
} |
void DaemonProcessWin::Send(IPC::Message* message) { |