Clean and regen docs (#401)

diff --git a/docs/dyn/cloudkms_v1.projects.locations.keyRings.html b/docs/dyn/cloudkms_v1.projects.locations.keyRings.html
index aae8bfd..92de95e 100644
--- a/docs/dyn/cloudkms_v1.projects.locations.keyRings.html
+++ b/docs/dyn/cloudkms_v1.projects.locations.keyRings.html
@@ -89,7 +89,7 @@
   <code><a href="#getIamPolicy">getIamPolicy(resource, x__xgafv=None)</a></code></p>
 <p class="firstline">Gets the access control policy for a resource.</p>
 <p class="toc_element">
-  <code><a href="#list">list(parent, pageSize=None, pageToken=None, x__xgafv=None)</a></code></p>
+  <code><a href="#list">list(parent, pageToken=None, x__xgafv=None, pageSize=None)</a></code></p>
 <p class="firstline">Lists KeyRings.</p>
 <p class="toc_element">
   <code><a href="#list_next">list_next(previous_request, previous_response)</a></code></p>
@@ -207,48 +207,51 @@
       { # Specifies the audit configuration for a service.
           # The configuration determines which permission types are logged, and what
           # identities, if any, are exempted from logging.
-          # An AuditConifg must have one or more AuditLogConfigs.
+          # An AuditConfig must have one or more AuditLogConfigs.
           #
           # If there are AuditConfigs for both `allServices` and a specific service,
           # the union of the two AuditConfigs is used for that service: the log_types
           # specified in each AuditConfig are enabled, and the exempted_members in each
           # AuditConfig are exempted.
+          #
           # Example Policy with multiple AuditConfigs:
-          # {
-          #   "audit_configs": [
+          #
           #     {
-          #       "service": "allServices"
-          #       "audit_log_configs": [
+          #       "audit_configs": [
           #         {
-          #           "log_type": "DATA_READ",
-          #           "exempted_members": [
-          #             "user:foo@gmail.com"
+          #           "service": "allServices"
+          #           "audit_log_configs": [
+          #             {
+          #               "log_type": "DATA_READ",
+          #               "exempted_members": [
+          #                 "user:foo@gmail.com"
+          #               ]
+          #             },
+          #             {
+          #               "log_type": "DATA_WRITE",
+          #             },
+          #             {
+          #               "log_type": "ADMIN_READ",
+          #             }
           #           ]
           #         },
           #         {
-          #           "log_type": "DATA_WRITE",
-          #         },
-          #         {
-          #           "log_type": "ADMIN_READ",
-          #         }
-          #       ]
-          #     },
-          #     {
-          #       "service": "fooservice@googleapis.com"
-          #       "audit_log_configs": [
-          #         {
-          #           "log_type": "DATA_READ",
-          #         },
-          #         {
-          #           "log_type": "DATA_WRITE",
-          #           "exempted_members": [
-          #             "user:bar@gmail.com"
+          #           "service": "fooservice.googleapis.com"
+          #           "audit_log_configs": [
+          #             {
+          #               "log_type": "DATA_READ",
+          #             },
+          #             {
+          #               "log_type": "DATA_WRITE",
+          #               "exempted_members": [
+          #                 "user:bar@gmail.com"
+          #               ]
+          #             }
           #           ]
           #         }
           #       ]
           #     }
-          #   ]
-          # }
+          #
           # For fooservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ
           # logging. It also exempts foo@gmail.com from DATA_READ logging, and
           # bar@gmail.com from DATA_WRITE logging.
@@ -334,6 +337,7 @@
             "dataAccess": { # Write a Data Access (Gin) log # Data access options.
             },
             "cloudAudit": { # Write a Cloud Audit log # Cloud audit options.
+              "logName": "A String", # The log_name to populate in the Cloud Audit Record.
             },
           },
         ],
@@ -356,7 +360,6 @@
         # If no `etag` is provided in the call to `setIamPolicy`, then the existing
         # policy is overwritten blindly.
     "bindings": [ # Associates a list of `members` to a `role`.
-        # Multiple `bindings` must not be specified for the same `role`.
         # `bindings` with no members will result in an error.
       { # Associates `members` with a `role`.
         "role": "A String", # Role that is assigned to `members`.
@@ -381,11 +384,34 @@
             # * `group:{emailid}`: An email address that represents a Google group.
             #    For example, `admins@example.com`.
             #
+            #
             # * `domain:{domain}`: A Google Apps domain name that represents all the
             #    users of that domain. For example, `google.com` or `example.com`.
             #
           "A String",
         ],
+        "condition": { # Represents an expression text. Example: # The condition that is associated with this binding.
+            # NOTE: an unsatisfied condition will not allow user access via current
+            # binding. Different bindings, including their conditions, are examined
+            # independently.
+            # This field is GOOGLE_INTERNAL.
+            #
+            #     title: "User account presence"
+            #     description: "Determines whether the request has a user account"
+            #     expression: "size(request.user) > 0"
+          "location": "A String", # An optional string indicating the location of the expression for error
+              # reporting, e.g. a file name and a position in the file.
+          "expression": "A String", # Textual representation of an expression in
+              # [Common Expression Language](http://go/api-expr) syntax.
+              #
+              # The application context of the containing message determines which
+              # well-known feature set of CEL is supported.
+          "description": "A String", # An optional description of the expression. This is a longer text which
+              # describes the expression, e.g. when hovered over it in a UI.
+          "title": "A String", # An optional title for the expression, i.e. a short string describing
+              # its purpose. This can be used e.g. in UIs which allow to enter the
+              # expression.
+        },
       },
     ],
     "iamOwned": True or False,
@@ -393,22 +419,22 @@
 </div>
 
 <div class="method">
-    <code class="details" id="list">list(parent, pageSize=None, pageToken=None, x__xgafv=None)</code>
+    <code class="details" id="list">list(parent, pageToken=None, x__xgafv=None, pageSize=None)</code>
   <pre>Lists KeyRings.
 
 Args:
   parent: string, Required. The resource name of the location associated with the
 KeyRings, in the format `projects/*/locations/*`. (required)
-  pageSize: integer, Optional limit on the number of KeyRings to include in the
-response.  Further KeyRings can subsequently be obtained by
-including the ListKeyRingsResponse.next_page_token in a subsequent
-request.  If unspecified, the server will pick an appropriate default.
   pageToken: string, Optional pagination token, returned earlier via
 ListKeyRingsResponse.next_page_token.
   x__xgafv: string, V1 error format.
     Allowed values
       1 - v1 error format
       2 - v2 error format
+  pageSize: integer, Optional limit on the number of KeyRings to include in the
+response.  Further KeyRings can subsequently be obtained by
+including the ListKeyRingsResponse.next_page_token in a subsequent
+request.  If unspecified, the server will pick an appropriate default.
 
 Returns:
   An object of the form:
@@ -491,48 +517,51 @@
         { # Specifies the audit configuration for a service.
             # The configuration determines which permission types are logged, and what
             # identities, if any, are exempted from logging.
-            # An AuditConifg must have one or more AuditLogConfigs.
+            # An AuditConfig must have one or more AuditLogConfigs.
             #
             # If there are AuditConfigs for both `allServices` and a specific service,
             # the union of the two AuditConfigs is used for that service: the log_types
             # specified in each AuditConfig are enabled, and the exempted_members in each
             # AuditConfig are exempted.
+            #
             # Example Policy with multiple AuditConfigs:
-            # {
-            #   "audit_configs": [
+            #
             #     {
-            #       "service": "allServices"
-            #       "audit_log_configs": [
+            #       "audit_configs": [
             #         {
-            #           "log_type": "DATA_READ",
-            #           "exempted_members": [
-            #             "user:foo@gmail.com"
+            #           "service": "allServices"
+            #           "audit_log_configs": [
+            #             {
+            #               "log_type": "DATA_READ",
+            #               "exempted_members": [
+            #                 "user:foo@gmail.com"
+            #               ]
+            #             },
+            #             {
+            #               "log_type": "DATA_WRITE",
+            #             },
+            #             {
+            #               "log_type": "ADMIN_READ",
+            #             }
             #           ]
             #         },
             #         {
-            #           "log_type": "DATA_WRITE",
-            #         },
-            #         {
-            #           "log_type": "ADMIN_READ",
-            #         }
-            #       ]
-            #     },
-            #     {
-            #       "service": "fooservice@googleapis.com"
-            #       "audit_log_configs": [
-            #         {
-            #           "log_type": "DATA_READ",
-            #         },
-            #         {
-            #           "log_type": "DATA_WRITE",
-            #           "exempted_members": [
-            #             "user:bar@gmail.com"
+            #           "service": "fooservice.googleapis.com"
+            #           "audit_log_configs": [
+            #             {
+            #               "log_type": "DATA_READ",
+            #             },
+            #             {
+            #               "log_type": "DATA_WRITE",
+            #               "exempted_members": [
+            #                 "user:bar@gmail.com"
+            #               ]
+            #             }
             #           ]
             #         }
             #       ]
             #     }
-            #   ]
-            # }
+            #
             # For fooservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ
             # logging. It also exempts foo@gmail.com from DATA_READ logging, and
             # bar@gmail.com from DATA_WRITE logging.
@@ -618,6 +647,7 @@
               "dataAccess": { # Write a Data Access (Gin) log # Data access options.
               },
               "cloudAudit": { # Write a Cloud Audit log # Cloud audit options.
+                "logName": "A String", # The log_name to populate in the Cloud Audit Record.
               },
             },
           ],
@@ -640,7 +670,6 @@
           # If no `etag` is provided in the call to `setIamPolicy`, then the existing
           # policy is overwritten blindly.
       "bindings": [ # Associates a list of `members` to a `role`.
-          # Multiple `bindings` must not be specified for the same `role`.
           # `bindings` with no members will result in an error.
         { # Associates `members` with a `role`.
           "role": "A String", # Role that is assigned to `members`.
@@ -665,11 +694,34 @@
               # * `group:{emailid}`: An email address that represents a Google group.
               #    For example, `admins@example.com`.
               #
+              #
               # * `domain:{domain}`: A Google Apps domain name that represents all the
               #    users of that domain. For example, `google.com` or `example.com`.
               #
             "A String",
           ],
+          "condition": { # Represents an expression text. Example: # The condition that is associated with this binding.
+              # NOTE: an unsatisfied condition will not allow user access via current
+              # binding. Different bindings, including their conditions, are examined
+              # independently.
+              # This field is GOOGLE_INTERNAL.
+              #
+              #     title: "User account presence"
+              #     description: "Determines whether the request has a user account"
+              #     expression: "size(request.user) > 0"
+            "location": "A String", # An optional string indicating the location of the expression for error
+                # reporting, e.g. a file name and a position in the file.
+            "expression": "A String", # Textual representation of an expression in
+                # [Common Expression Language](http://go/api-expr) syntax.
+                #
+                # The application context of the containing message determines which
+                # well-known feature set of CEL is supported.
+            "description": "A String", # An optional description of the expression. This is a longer text which
+                # describes the expression, e.g. when hovered over it in a UI.
+            "title": "A String", # An optional title for the expression, i.e. a short string describing
+                # its purpose. This can be used e.g. in UIs which allow to enter the
+                # expression.
+          },
         },
       ],
       "iamOwned": True or False,
@@ -724,48 +776,51 @@
       { # Specifies the audit configuration for a service.
           # The configuration determines which permission types are logged, and what
           # identities, if any, are exempted from logging.
-          # An AuditConifg must have one or more AuditLogConfigs.
+          # An AuditConfig must have one or more AuditLogConfigs.
           #
           # If there are AuditConfigs for both `allServices` and a specific service,
           # the union of the two AuditConfigs is used for that service: the log_types
           # specified in each AuditConfig are enabled, and the exempted_members in each
           # AuditConfig are exempted.
+          #
           # Example Policy with multiple AuditConfigs:
-          # {
-          #   "audit_configs": [
+          #
           #     {
-          #       "service": "allServices"
-          #       "audit_log_configs": [
+          #       "audit_configs": [
           #         {
-          #           "log_type": "DATA_READ",
-          #           "exempted_members": [
-          #             "user:foo@gmail.com"
+          #           "service": "allServices"
+          #           "audit_log_configs": [
+          #             {
+          #               "log_type": "DATA_READ",
+          #               "exempted_members": [
+          #                 "user:foo@gmail.com"
+          #               ]
+          #             },
+          #             {
+          #               "log_type": "DATA_WRITE",
+          #             },
+          #             {
+          #               "log_type": "ADMIN_READ",
+          #             }
           #           ]
           #         },
           #         {
-          #           "log_type": "DATA_WRITE",
-          #         },
-          #         {
-          #           "log_type": "ADMIN_READ",
-          #         }
-          #       ]
-          #     },
-          #     {
-          #       "service": "fooservice@googleapis.com"
-          #       "audit_log_configs": [
-          #         {
-          #           "log_type": "DATA_READ",
-          #         },
-          #         {
-          #           "log_type": "DATA_WRITE",
-          #           "exempted_members": [
-          #             "user:bar@gmail.com"
+          #           "service": "fooservice.googleapis.com"
+          #           "audit_log_configs": [
+          #             {
+          #               "log_type": "DATA_READ",
+          #             },
+          #             {
+          #               "log_type": "DATA_WRITE",
+          #               "exempted_members": [
+          #                 "user:bar@gmail.com"
+          #               ]
+          #             }
           #           ]
           #         }
           #       ]
           #     }
-          #   ]
-          # }
+          #
           # For fooservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ
           # logging. It also exempts foo@gmail.com from DATA_READ logging, and
           # bar@gmail.com from DATA_WRITE logging.
@@ -851,6 +906,7 @@
             "dataAccess": { # Write a Data Access (Gin) log # Data access options.
             },
             "cloudAudit": { # Write a Cloud Audit log # Cloud audit options.
+              "logName": "A String", # The log_name to populate in the Cloud Audit Record.
             },
           },
         ],
@@ -873,7 +929,6 @@
         # If no `etag` is provided in the call to `setIamPolicy`, then the existing
         # policy is overwritten blindly.
     "bindings": [ # Associates a list of `members` to a `role`.
-        # Multiple `bindings` must not be specified for the same `role`.
         # `bindings` with no members will result in an error.
       { # Associates `members` with a `role`.
         "role": "A String", # Role that is assigned to `members`.
@@ -898,11 +953,34 @@
             # * `group:{emailid}`: An email address that represents a Google group.
             #    For example, `admins@example.com`.
             #
+            #
             # * `domain:{domain}`: A Google Apps domain name that represents all the
             #    users of that domain. For example, `google.com` or `example.com`.
             #
           "A String",
         ],
+        "condition": { # Represents an expression text. Example: # The condition that is associated with this binding.
+            # NOTE: an unsatisfied condition will not allow user access via current
+            # binding. Different bindings, including their conditions, are examined
+            # independently.
+            # This field is GOOGLE_INTERNAL.
+            #
+            #     title: "User account presence"
+            #     description: "Determines whether the request has a user account"
+            #     expression: "size(request.user) > 0"
+          "location": "A String", # An optional string indicating the location of the expression for error
+              # reporting, e.g. a file name and a position in the file.
+          "expression": "A String", # Textual representation of an expression in
+              # [Common Expression Language](http://go/api-expr) syntax.
+              #
+              # The application context of the containing message determines which
+              # well-known feature set of CEL is supported.
+          "description": "A String", # An optional description of the expression. This is a longer text which
+              # describes the expression, e.g. when hovered over it in a UI.
+          "title": "A String", # An optional title for the expression, i.e. a short string describing
+              # its purpose. This can be used e.g. in UIs which allow to enter the
+              # expression.
+        },
       },
     ],
     "iamOwned": True or False,