**Warning:** managing versions will persist their data (the actual secret you want to protect) in the Terraform state in unencrypted form, accessible to any identity able to read or pull the state file.
| name | description | type | required | default |
|---|---|:---: |:---:|:---:|
| project_id | Project id where the keyring will be created. | <codetitle="">string</code> | ✓ | |
| *iam_members* | IAM members keyed by secret name and role. | <codetitle="map(map(list(string)))">map(map(list(string)))</code> | | <codetitle="">{}</code> |
| *iam_roles* | IAM roles keyed by secret name. | <codetitle="map(list(string))">map(list(string))</code> | | <codetitle="">{}</code> |
| *labels* | Optional labels for each secret. | <codetitle="map(map(string))">map(map(string))</code> | | <codetitle="">{}</code> |
| *secrets* | Map of secrets to manage and their locations. If locations is null, automatic management will be set. | <codetitle="map(list(string))">map(list(string))</code> | | <codetitle="">{}</code> |
| *versions* | Optional versions to manage for each secret. Version names are only used internally to track each version and must be unique for each secret/version pair. | <codetitle="map(list(object({ enabled = bool data = string name = string })))">map(list(object({...})))</code> | | <codetitle="">{}</code> |