Add path for policy
Change-Id: I9c79df304d9c0afa2a1f922461a97ecf21d11933
Related-prod: PROD-29518
diff --git a/_modules/runtest/tempest_sections/__init__.py b/_modules/runtest/tempest_sections/__init__.py
index a320ce8..caf8b03 100644
--- a/_modules/runtest/tempest_sections/__init__.py
+++ b/_modules/runtest/tempest_sections/__init__.py
@@ -52,6 +52,7 @@
object_storage_feature_enabled.ObjectStorageFeatureEnabled,
orchestration.Orchestration,
oslo_concurrency.OsloConcurrency,
+ patrole_plugin.PatrolePlugin,
scenario.Scenario,
service_clients.ServiceClients,
service_available.ServiceAvailable,
diff --git a/_modules/runtest/tempest_sections/patrole_plugin.py b/_modules/runtest/tempest_sections/patrole_plugin.py
new file mode 100644
index 0000000..9bbaabf
--- /dev/null
+++ b/_modules/runtest/tempest_sections/patrole_plugin.py
@@ -0,0 +1,46 @@
+
+import base_section
+
+from runtest import conditions
+
+
+DEFAULT_PATROLE_PLUGIN_PARAMETERS = {
+ 'custom_policy_files': '/etc/%s/policy.json,/etc/%s/policy.yaml'
+}
+
+
+class PatrolePlugin(base_section.BaseSection):
+
+ name = "patrole"
+ options = [
+ 'enable_rbac',
+ 'rbac_test_role',
+ 'custom_policy_files',
+ 'test_custom_requirements',
+ 'custom_requirements_file',
+ ]
+
+ @property
+ def enable_rbac(self):
+ return False
+
+ @property
+ def rbac_test_role(self):
+ pass
+
+ @property
+ def custom_policy_files(self):
+ contrail_enabled = conditions.BaseRule('*.opencontrail.control.enabled',
+ 'eq', True, multiple='any')
+ if contrail_enabled.check(self.pillar):
+ return '/etc/opencontrail/policy.json'
+ else:
+ return DEFAULT_PATROLE_PLUGIN_PARAMETERS['custom_policy_files']
+
+ @property
+ def test_custom_requirements(self):
+ pass
+
+ @property
+ def custom_requirements_file(self):
+ pass