VS: Connect to Secretkeeper lazily

Rather than attempting to connect to Sk immediately if we believe it's
present, wait until we need it (for maintenance, or when
creating/deleting/updating a VM secret).

This avoids an issue where we fail to connect when Isolated
Compilation runs a VM during boot, where Secretkeeper is not yet
started.

Slightly gratuitously, split up some long imports to allow
auto-reformatting to work.

Bug: 331417880
Test: atest MicrodroidTests
Test: atest virtualizationservice_test
Test: Manually run CompOS, check no delay
Change-Id: I3db2070417bb1911fd8349e4bef9a420144ac245
2 files changed
tree: 2aba1eb92c05cf9c74baad85679352b602bf7864
  1. apex/
  2. apkdmverity/
  3. authfs/
  4. compos/
  5. demo/
  6. demo_native/
  7. docs/
  8. encryptedstore/
  9. flags/
  10. java/
  11. launcher/
  12. libs/
  13. microdroid/
  14. microdroid_manager/
  15. pvmfw/
  16. rialto/
  17. service_vm/
  18. tests/
  19. virtualizationmanager/
  20. virtualizationservice/
  21. vm/
  22. vm_payload/
  23. vmbase/
  24. vmclient/
  25. vmlauncher_app/
  26. zipfuse/
  27. .clang-format
  28. .gitignore
  29. Android.bp
  30. avf_flags.aconfig
  31. OWNERS
  32. PREUPLOAD.cfg
  33. README.md
  34. rustfmt.toml
  35. TEST_MAPPING
README.md

Android Virtualization Framework (AVF)

Android Virtualization Framework (AVF) provides secure and private execution environments for executing code. AVF is ideal for security-oriented use cases that require stronger isolation assurances over those offered by Android’s app sandbox.

Visit our public doc site to learn more about what AVF is, what it is for, and how it is structured. This repository contains source code for userspace components of AVF.

If you want a quick start, see the getting started guideline and follow the steps there.

For in-depth explanations about individual topics and components, visit the following links.

AVF components:

AVF APIs:

How-Tos: