chore: Update discovery artifacts (#1609)

## Deleted keys were detected in the following stable discovery artifacts:
compute v1 https://github.com/googleapis/google-api-python-client/commit/574d4ace68dc1bd844f01ec13419b7d055fa857e

## Deleted keys were detected in the following pre-stable discovery artifacts:
compute alpha https://github.com/googleapis/google-api-python-client/commit/574d4ace68dc1bd844f01ec13419b7d055fa857e
compute beta https://github.com/googleapis/google-api-python-client/commit/574d4ace68dc1bd844f01ec13419b7d055fa857e
gameservices v1beta https://github.com/googleapis/google-api-python-client/commit/8016e68c4c2ac2f065fc1a0c7e86aac35329cf25

## Discovery Artifact Change Summary:
feat(artifactregistry): update the api https://github.com/googleapis/google-api-python-client/commit/faa6c7f4fab2190989c9a587f35998203517ff2a
feat(assuredworkloads): update the api https://github.com/googleapis/google-api-python-client/commit/c0f6be757e47a62337e7963bea576858cbf17341
feat(cloudbuild): update the api https://github.com/googleapis/google-api-python-client/commit/536d4b0a61e15b45439f3f3066410236d50e228b
feat(composer): update the api https://github.com/googleapis/google-api-python-client/commit/bc7ce92bf38d4eed3fce35cd080bf40b43855ba4
feat(compute): update the api https://github.com/googleapis/google-api-python-client/commit/574d4ace68dc1bd844f01ec13419b7d055fa857e
feat(container): update the api https://github.com/googleapis/google-api-python-client/commit/c4cdd10e83565119457494a21f1abe128ac59083
feat(containeranalysis): update the api https://github.com/googleapis/google-api-python-client/commit/a86a46ed4f6098a6da8d3bc2db8ae1642e4300f3
feat(datastream): update the api https://github.com/googleapis/google-api-python-client/commit/f54ebeac6f8829b81b975a9fcabde5423f769ea9
feat(dialogflow): update the api https://github.com/googleapis/google-api-python-client/commit/2b33ab2f6823916a872f33c23c9da86b993f0fc0
feat(dlp): update the api https://github.com/googleapis/google-api-python-client/commit/0406443bd63e9bf9312c3ac7a7398ca0a60dac51
feat(gameservices): update the api https://github.com/googleapis/google-api-python-client/commit/8016e68c4c2ac2f065fc1a0c7e86aac35329cf25
feat(gkehub): update the api https://github.com/googleapis/google-api-python-client/commit/fbcb756aa75d122f9929a6319b3bdd413cebc293
feat(logging): update the api https://github.com/googleapis/google-api-python-client/commit/8ce3b8583936958cabce8c7a0cd72ad16817de0c
feat(ml): update the api https://github.com/googleapis/google-api-python-client/commit/cfe625ae36d61eda2f496115ad515a7000d8973c
feat(networkconnectivity): update the api https://github.com/googleapis/google-api-python-client/commit/6348dd518b3be79230e3d23beb4e4f2527d67855
feat(osconfig): update the api https://github.com/googleapis/google-api-python-client/commit/0c6c8148b57f793fab971f2f815acef70fde478b
feat(storagetransfer): update the api https://github.com/googleapis/google-api-python-client/commit/5758865ada7f1c87525752f002f82ca8681e927d
diff --git a/docs/dyn/dialogflow_v3.projects.locations.agents.webhooks.html b/docs/dyn/dialogflow_v3.projects.locations.agents.webhooks.html
index 8221bb5..78788e4 100644
--- a/docs/dyn/dialogflow_v3.projects.locations.agents.webhooks.html
+++ b/docs/dyn/dialogflow_v3.projects.locations.agents.webhooks.html
@@ -114,6 +114,9 @@
   "disabled": True or False, # Indicates whether the webhook is disabled.
   "displayName": "A String", # Required. The human-readable name of the webhook, unique within the agent.
   "genericWebService": { # Represents configuration for a generic web service. # Configuration for a generic web service.
+    "allowedCaCerts": [ # Optional. Specifies a list of allowed custom CA certificates (in DER format) for HTTPS verification. This overrides the default SSL trust store. If this is empty or unspecified, Dialogflow will use Google's default trust store to verify certificates. N.B. Make sure the HTTPS server certificates are signed with "subject alt name". For instance a certificate can be self-signed using the following command, openssl x509 -req -days 200 -in example.com.csr \ -signkey example.com.key \ -out example.com.crt \ -extfile <(printf "\nsubjectAltName='DNS:www.example.com'")
+      "A String",
+    ],
     "password": "A String", # The password for HTTP Basic authentication.
     "requestHeaders": { # The HTTP request headers to send together with webhook requests.
       "a_key": "A String",
@@ -124,6 +127,9 @@
   "name": "A String", # The unique identifier of the webhook. Required for the Webhooks.UpdateWebhook method. Webhooks.CreateWebhook populates the name automatically. Format: `projects//locations//agents//webhooks/`.
   "serviceDirectory": { # Represents configuration for a [Service Directory](https://cloud.google.com/service-directory) service. # Configuration for a [Service Directory](https://cloud.google.com/service-directory) service.
     "genericWebService": { # Represents configuration for a generic web service. # Generic Service configuration of this webhook.
+      "allowedCaCerts": [ # Optional. Specifies a list of allowed custom CA certificates (in DER format) for HTTPS verification. This overrides the default SSL trust store. If this is empty or unspecified, Dialogflow will use Google's default trust store to verify certificates. N.B. Make sure the HTTPS server certificates are signed with "subject alt name". For instance a certificate can be self-signed using the following command, openssl x509 -req -days 200 -in example.com.csr \ -signkey example.com.key \ -out example.com.crt \ -extfile <(printf "\nsubjectAltName='DNS:www.example.com'")
+        "A String",
+      ],
       "password": "A String", # The password for HTTP Basic authentication.
       "requestHeaders": { # The HTTP request headers to send together with webhook requests.
         "a_key": "A String",
@@ -148,6 +154,9 @@
   "disabled": True or False, # Indicates whether the webhook is disabled.
   "displayName": "A String", # Required. The human-readable name of the webhook, unique within the agent.
   "genericWebService": { # Represents configuration for a generic web service. # Configuration for a generic web service.
+    "allowedCaCerts": [ # Optional. Specifies a list of allowed custom CA certificates (in DER format) for HTTPS verification. This overrides the default SSL trust store. If this is empty or unspecified, Dialogflow will use Google's default trust store to verify certificates. N.B. Make sure the HTTPS server certificates are signed with "subject alt name". For instance a certificate can be self-signed using the following command, openssl x509 -req -days 200 -in example.com.csr \ -signkey example.com.key \ -out example.com.crt \ -extfile <(printf "\nsubjectAltName='DNS:www.example.com'")
+      "A String",
+    ],
     "password": "A String", # The password for HTTP Basic authentication.
     "requestHeaders": { # The HTTP request headers to send together with webhook requests.
       "a_key": "A String",
@@ -158,6 +167,9 @@
   "name": "A String", # The unique identifier of the webhook. Required for the Webhooks.UpdateWebhook method. Webhooks.CreateWebhook populates the name automatically. Format: `projects//locations//agents//webhooks/`.
   "serviceDirectory": { # Represents configuration for a [Service Directory](https://cloud.google.com/service-directory) service. # Configuration for a [Service Directory](https://cloud.google.com/service-directory) service.
     "genericWebService": { # Represents configuration for a generic web service. # Generic Service configuration of this webhook.
+      "allowedCaCerts": [ # Optional. Specifies a list of allowed custom CA certificates (in DER format) for HTTPS verification. This overrides the default SSL trust store. If this is empty or unspecified, Dialogflow will use Google's default trust store to verify certificates. N.B. Make sure the HTTPS server certificates are signed with "subject alt name". For instance a certificate can be self-signed using the following command, openssl x509 -req -days 200 -in example.com.csr \ -signkey example.com.key \ -out example.com.crt \ -extfile <(printf "\nsubjectAltName='DNS:www.example.com'")
+        "A String",
+      ],
       "password": "A String", # The password for HTTP Basic authentication.
       "requestHeaders": { # The HTTP request headers to send together with webhook requests.
         "a_key": "A String",
@@ -208,6 +220,9 @@
   "disabled": True or False, # Indicates whether the webhook is disabled.
   "displayName": "A String", # Required. The human-readable name of the webhook, unique within the agent.
   "genericWebService": { # Represents configuration for a generic web service. # Configuration for a generic web service.
+    "allowedCaCerts": [ # Optional. Specifies a list of allowed custom CA certificates (in DER format) for HTTPS verification. This overrides the default SSL trust store. If this is empty or unspecified, Dialogflow will use Google's default trust store to verify certificates. N.B. Make sure the HTTPS server certificates are signed with "subject alt name". For instance a certificate can be self-signed using the following command, openssl x509 -req -days 200 -in example.com.csr \ -signkey example.com.key \ -out example.com.crt \ -extfile <(printf "\nsubjectAltName='DNS:www.example.com'")
+      "A String",
+    ],
     "password": "A String", # The password for HTTP Basic authentication.
     "requestHeaders": { # The HTTP request headers to send together with webhook requests.
       "a_key": "A String",
@@ -218,6 +233,9 @@
   "name": "A String", # The unique identifier of the webhook. Required for the Webhooks.UpdateWebhook method. Webhooks.CreateWebhook populates the name automatically. Format: `projects//locations//agents//webhooks/`.
   "serviceDirectory": { # Represents configuration for a [Service Directory](https://cloud.google.com/service-directory) service. # Configuration for a [Service Directory](https://cloud.google.com/service-directory) service.
     "genericWebService": { # Represents configuration for a generic web service. # Generic Service configuration of this webhook.
+      "allowedCaCerts": [ # Optional. Specifies a list of allowed custom CA certificates (in DER format) for HTTPS verification. This overrides the default SSL trust store. If this is empty or unspecified, Dialogflow will use Google's default trust store to verify certificates. N.B. Make sure the HTTPS server certificates are signed with "subject alt name". For instance a certificate can be self-signed using the following command, openssl x509 -req -days 200 -in example.com.csr \ -signkey example.com.key \ -out example.com.crt \ -extfile <(printf "\nsubjectAltName='DNS:www.example.com'")
+        "A String",
+      ],
       "password": "A String", # The password for HTTP Basic authentication.
       "requestHeaders": { # The HTTP request headers to send together with webhook requests.
         "a_key": "A String",
@@ -254,6 +272,9 @@
       "disabled": True or False, # Indicates whether the webhook is disabled.
       "displayName": "A String", # Required. The human-readable name of the webhook, unique within the agent.
       "genericWebService": { # Represents configuration for a generic web service. # Configuration for a generic web service.
+        "allowedCaCerts": [ # Optional. Specifies a list of allowed custom CA certificates (in DER format) for HTTPS verification. This overrides the default SSL trust store. If this is empty or unspecified, Dialogflow will use Google's default trust store to verify certificates. N.B. Make sure the HTTPS server certificates are signed with "subject alt name". For instance a certificate can be self-signed using the following command, openssl x509 -req -days 200 -in example.com.csr \ -signkey example.com.key \ -out example.com.crt \ -extfile <(printf "\nsubjectAltName='DNS:www.example.com'")
+          "A String",
+        ],
         "password": "A String", # The password for HTTP Basic authentication.
         "requestHeaders": { # The HTTP request headers to send together with webhook requests.
           "a_key": "A String",
@@ -264,6 +285,9 @@
       "name": "A String", # The unique identifier of the webhook. Required for the Webhooks.UpdateWebhook method. Webhooks.CreateWebhook populates the name automatically. Format: `projects//locations//agents//webhooks/`.
       "serviceDirectory": { # Represents configuration for a [Service Directory](https://cloud.google.com/service-directory) service. # Configuration for a [Service Directory](https://cloud.google.com/service-directory) service.
         "genericWebService": { # Represents configuration for a generic web service. # Generic Service configuration of this webhook.
+          "allowedCaCerts": [ # Optional. Specifies a list of allowed custom CA certificates (in DER format) for HTTPS verification. This overrides the default SSL trust store. If this is empty or unspecified, Dialogflow will use Google's default trust store to verify certificates. N.B. Make sure the HTTPS server certificates are signed with "subject alt name". For instance a certificate can be self-signed using the following command, openssl x509 -req -days 200 -in example.com.csr \ -signkey example.com.key \ -out example.com.crt \ -extfile <(printf "\nsubjectAltName='DNS:www.example.com'")
+            "A String",
+          ],
           "password": "A String", # The password for HTTP Basic authentication.
           "requestHeaders": { # The HTTP request headers to send together with webhook requests.
             "a_key": "A String",
@@ -306,6 +330,9 @@
   "disabled": True or False, # Indicates whether the webhook is disabled.
   "displayName": "A String", # Required. The human-readable name of the webhook, unique within the agent.
   "genericWebService": { # Represents configuration for a generic web service. # Configuration for a generic web service.
+    "allowedCaCerts": [ # Optional. Specifies a list of allowed custom CA certificates (in DER format) for HTTPS verification. This overrides the default SSL trust store. If this is empty or unspecified, Dialogflow will use Google's default trust store to verify certificates. N.B. Make sure the HTTPS server certificates are signed with "subject alt name". For instance a certificate can be self-signed using the following command, openssl x509 -req -days 200 -in example.com.csr \ -signkey example.com.key \ -out example.com.crt \ -extfile <(printf "\nsubjectAltName='DNS:www.example.com'")
+      "A String",
+    ],
     "password": "A String", # The password for HTTP Basic authentication.
     "requestHeaders": { # The HTTP request headers to send together with webhook requests.
       "a_key": "A String",
@@ -316,6 +343,9 @@
   "name": "A String", # The unique identifier of the webhook. Required for the Webhooks.UpdateWebhook method. Webhooks.CreateWebhook populates the name automatically. Format: `projects//locations//agents//webhooks/`.
   "serviceDirectory": { # Represents configuration for a [Service Directory](https://cloud.google.com/service-directory) service. # Configuration for a [Service Directory](https://cloud.google.com/service-directory) service.
     "genericWebService": { # Represents configuration for a generic web service. # Generic Service configuration of this webhook.
+      "allowedCaCerts": [ # Optional. Specifies a list of allowed custom CA certificates (in DER format) for HTTPS verification. This overrides the default SSL trust store. If this is empty or unspecified, Dialogflow will use Google's default trust store to verify certificates. N.B. Make sure the HTTPS server certificates are signed with "subject alt name". For instance a certificate can be self-signed using the following command, openssl x509 -req -days 200 -in example.com.csr \ -signkey example.com.key \ -out example.com.crt \ -extfile <(printf "\nsubjectAltName='DNS:www.example.com'")
+        "A String",
+      ],
       "password": "A String", # The password for HTTP Basic authentication.
       "requestHeaders": { # The HTTP request headers to send together with webhook requests.
         "a_key": "A String",
@@ -341,6 +371,9 @@
   "disabled": True or False, # Indicates whether the webhook is disabled.
   "displayName": "A String", # Required. The human-readable name of the webhook, unique within the agent.
   "genericWebService": { # Represents configuration for a generic web service. # Configuration for a generic web service.
+    "allowedCaCerts": [ # Optional. Specifies a list of allowed custom CA certificates (in DER format) for HTTPS verification. This overrides the default SSL trust store. If this is empty or unspecified, Dialogflow will use Google's default trust store to verify certificates. N.B. Make sure the HTTPS server certificates are signed with "subject alt name". For instance a certificate can be self-signed using the following command, openssl x509 -req -days 200 -in example.com.csr \ -signkey example.com.key \ -out example.com.crt \ -extfile <(printf "\nsubjectAltName='DNS:www.example.com'")
+      "A String",
+    ],
     "password": "A String", # The password for HTTP Basic authentication.
     "requestHeaders": { # The HTTP request headers to send together with webhook requests.
       "a_key": "A String",
@@ -351,6 +384,9 @@
   "name": "A String", # The unique identifier of the webhook. Required for the Webhooks.UpdateWebhook method. Webhooks.CreateWebhook populates the name automatically. Format: `projects//locations//agents//webhooks/`.
   "serviceDirectory": { # Represents configuration for a [Service Directory](https://cloud.google.com/service-directory) service. # Configuration for a [Service Directory](https://cloud.google.com/service-directory) service.
     "genericWebService": { # Represents configuration for a generic web service. # Generic Service configuration of this webhook.
+      "allowedCaCerts": [ # Optional. Specifies a list of allowed custom CA certificates (in DER format) for HTTPS verification. This overrides the default SSL trust store. If this is empty or unspecified, Dialogflow will use Google's default trust store to verify certificates. N.B. Make sure the HTTPS server certificates are signed with "subject alt name". For instance a certificate can be self-signed using the following command, openssl x509 -req -days 200 -in example.com.csr \ -signkey example.com.key \ -out example.com.crt \ -extfile <(printf "\nsubjectAltName='DNS:www.example.com'")
+        "A String",
+      ],
       "password": "A String", # The password for HTTP Basic authentication.
       "requestHeaders": { # The HTTP request headers to send together with webhook requests.
         "a_key": "A String",