veyron/runtimes/google/ipc: Check caveats on the server's blessings.

This commit mostly (not completely) undoes the hack in
https://veyron-review.googlesource.com/#/q/I4c693a78ad0444ad5b474d44083ee18d3daf35b1
by changing things so that only third-party-caveat validation is skipped for
servers (rather that skipping validation for all caveats).

Change-Id: I1f1dcc2c1deadfc2af87ceabfb241dc7c5e6b365
diff --git a/runtimes/google/ipc/client.go b/runtimes/google/ipc/client.go
index 51f7706..1a749d0 100644
--- a/runtimes/google/ipc/client.go
+++ b/runtimes/google/ipc/client.go
@@ -11,6 +11,7 @@
 
 	"veyron.io/veyron/veyron/runtimes/google/ipc/version"
 	inaming "veyron.io/veyron/veyron/runtimes/google/naming"
+	isecurity "veyron.io/veyron/veyron/runtimes/google/security"
 	"veyron.io/veyron/veyron/runtimes/google/vtrace"
 
 	"veyron.io/veyron/veyron2"
@@ -271,14 +272,10 @@
 
 	// TODO(ataly): What should the label be for the context? Typically the label is the
 	// security.Label of the method but we don't have that information here at the client.
-	// TODO(ataly,andreser): Replace this statement with the commented code just below
-	// it once we have a mechanism for servers to send discharges for any third-party caveats
-	// on its PublicID.
-	authID, err := server, error(nil)
-	// authID, err := server.Authorize(isecurity.NewContext(isecurity.ContextArgs{
-	// 	LocalID:  client,
-	//	RemoteID: server,
-	// }))
+	authID, err := server.Authorize(isecurity.NewContext(isecurity.ContextArgs{
+		LocalID:  client,
+		RemoteID: server,
+	}))
 	if err != nil {
 		return nil, err
 	}