Remove custom policy file and tempest role in case of contrail

Depends-On: https://gerrit.mcp.mirantis.com/41607
Change-Id: I6b3d9651a24b7933d2b1c3e7465a7466124493fc
Related-PROD: PROD-31393
diff --git a/_modules/runtest/tempest_sections/auth.py b/_modules/runtest/tempest_sections/auth.py
index 3d9b4ba..7f37e22 100644
--- a/_modules/runtest/tempest_sections/auth.py
+++ b/_modules/runtest/tempest_sections/auth.py
@@ -55,10 +55,6 @@
         # Assume if barbican is enabled in nova, its integration enabled globally.
 
         roles = []
-        contrail_enabled = conditions.BaseRule('*.opencontrail.control.enabled',
-                                               'eq', True, multiple='any')
-        if contrail_enabled.check(self.pillar):
-            roles.append("admin")
         c = conditions.BaseRule('nova.controller.enabled', 'eq', True)
         if self.get_item_when_condition_match('nova.controller.barbican.enabled', c):
             roles.append("creator")
diff --git a/_modules/runtest/tempest_sections/patrole_plugin.py b/_modules/runtest/tempest_sections/patrole_plugin.py
index 20f6a76..8276169 100644
--- a/_modules/runtest/tempest_sections/patrole_plugin.py
+++ b/_modules/runtest/tempest_sections/patrole_plugin.py
@@ -25,12 +25,7 @@
 
     @property
     def custom_policy_files(self):
-        contrail_enabled = conditions.BaseRule('*.opencontrail.control.enabled',
-                                               'eq', True, multiple='any')
-        if contrail_enabled.check(self.pillar):
-            return '/etc/opencontrail/policy.json'
-        else:
-            pass
+        pass
 
     @property
     def test_custom_requirements(self):