Add path for policy

Change-Id: I9c79df304d9c0afa2a1f922461a97ecf21d11933
Related-prod: PROD-29518
diff --git a/_modules/runtest/tempest_sections/__init__.py b/_modules/runtest/tempest_sections/__init__.py
index a320ce8..caf8b03 100644
--- a/_modules/runtest/tempest_sections/__init__.py
+++ b/_modules/runtest/tempest_sections/__init__.py
@@ -52,6 +52,7 @@
     object_storage_feature_enabled.ObjectStorageFeatureEnabled,
     orchestration.Orchestration,
     oslo_concurrency.OsloConcurrency,
+    patrole_plugin.PatrolePlugin,
     scenario.Scenario,
     service_clients.ServiceClients,
     service_available.ServiceAvailable,
diff --git a/_modules/runtest/tempest_sections/patrole_plugin.py b/_modules/runtest/tempest_sections/patrole_plugin.py
new file mode 100644
index 0000000..9bbaabf
--- /dev/null
+++ b/_modules/runtest/tempest_sections/patrole_plugin.py
@@ -0,0 +1,46 @@
+
+import base_section
+
+from runtest import conditions
+
+
+DEFAULT_PATROLE_PLUGIN_PARAMETERS = {
+    'custom_policy_files': '/etc/%s/policy.json,/etc/%s/policy.yaml'
+}
+
+
+class PatrolePlugin(base_section.BaseSection):
+
+    name = "patrole"
+    options = [
+        'enable_rbac',
+        'rbac_test_role',
+        'custom_policy_files',
+        'test_custom_requirements',
+        'custom_requirements_file',
+    ]
+
+    @property
+    def enable_rbac(self):
+        return False
+
+    @property
+    def rbac_test_role(self):
+        pass
+
+    @property
+    def custom_policy_files(self):
+        contrail_enabled = conditions.BaseRule('*.opencontrail.control.enabled',
+                                               'eq', True, multiple='any')
+        if contrail_enabled.check(self.pillar):
+            return '/etc/opencontrail/policy.json'
+        else:
+            return DEFAULT_PATROLE_PLUGIN_PARAMETERS['custom_policy_files']
+
+    @property
+    def test_custom_requirements(self):
+        pass
+
+    @property
+    def custom_requirements_file(self):
+        pass