Clean and regen docs (#401)

diff --git a/docs/dyn/compute_alpha.disks.html b/docs/dyn/compute_alpha.disks.html
index c75b0a6..00e79a5 100644
--- a/docs/dyn/compute_alpha.disks.html
+++ b/docs/dyn/compute_alpha.disks.html
@@ -155,6 +155,7 @@
                     # - The key is wrapped using a RSA public key certificate provided by Google.
                     # - After being wrapped, the key must be encoded in RFC 4648 base64 encoding.  Get the RSA public key certificate provided by Google at:
                     # https://cloud-certs.storage.googleapis.com/google-cloud-csek-ingress.pem
+                "kmsKeyName": "A String", # The name of the encryption key that is stored in Google Cloud KMS.
               },
               "labels": { # Labels to apply to this disk. These can be later modified by the setLabels method.
                 "a_key": "A String",
@@ -182,6 +183,7 @@
                     # - The key is wrapped using a RSA public key certificate provided by Google.
                     # - After being wrapped, the key must be encoded in RFC 4648 base64 encoding.  Get the RSA public key certificate provided by Google at:
                     # https://cloud-certs.storage.googleapis.com/google-cloud-csek-ingress.pem
+                "kmsKeyName": "A String", # The name of the encryption key that is stored in Google Cloud KMS.
               },
               "zone": "A String", # [Output Only] URL of the zone where the disk resides.
               "lastAttachTimestamp": "A String", # [Output Only] Last attach timestamp in RFC3339 text format.
@@ -217,6 +219,7 @@
                     # - The key is wrapped using a RSA public key certificate provided by Google.
                     # - After being wrapped, the key must be encoded in RFC 4648 base64 encoding.  Get the RSA public key certificate provided by Google at:
                     # https://cloud-certs.storage.googleapis.com/google-cloud-csek-ingress.pem
+                "kmsKeyName": "A String", # The name of the encryption key that is stored in Google Cloud KMS.
               },
               "options": "A String", # Internal use only.
               "selfLink": "A String", # [Output Only] Server-defined fully-qualified URL for this resource.
@@ -295,6 +298,7 @@
           # - The key is wrapped using a RSA public key certificate provided by Google.
           # - After being wrapped, the key must be encoded in RFC 4648 base64 encoding.  Get the RSA public key certificate provided by Google at:
           # https://cloud-certs.storage.googleapis.com/google-cloud-csek-ingress.pem
+      "kmsKeyName": "A String", # The name of the encryption key that is stored in Google Cloud KMS.
     },
     "storageBytes": "A String", # [Output Only] A size of the the storage used by the snapshot. As snapshots share storage, this number is expected to change with snapshot creation/deletion.
     "description": "A String", # An optional description of this resource. Provide this property when you create the resource.
@@ -314,6 +318,7 @@
           # - The key is wrapped using a RSA public key certificate provided by Google.
           # - After being wrapped, the key must be encoded in RFC 4648 base64 encoding.  Get the RSA public key certificate provided by Google at:
           # https://cloud-certs.storage.googleapis.com/google-cloud-csek-ingress.pem
+      "kmsKeyName": "A String", # The name of the encryption key that is stored in Google Cloud KMS.
     },
     "storageBytesStatus": "A String", # [Output Only] An indicator whether storageBytes is in a stable state or it is being adjusted as a result of shared storage reallocation. This status can either be UPDATING, meaning the size of the snapshot is being updated, or UP_TO_DATE, meaning the size of the snapshot is up-to-date.
     "labelFingerprint": "A String", # A fingerprint for the labels being applied to this snapshot, which is essentially a hash of the labels set used for optimistic locking. The fingerprint is initially generated by Compute Engine and changes after every request to modify or update labels. You must always provide an up-to-date fingerprint hash in order to update or change labels.
@@ -468,6 +473,7 @@
             # - The key is wrapped using a RSA public key certificate provided by Google.
             # - After being wrapped, the key must be encoded in RFC 4648 base64 encoding.  Get the RSA public key certificate provided by Google at:
             # https://cloud-certs.storage.googleapis.com/google-cloud-csek-ingress.pem
+        "kmsKeyName": "A String", # The name of the encryption key that is stored in Google Cloud KMS.
       },
       "labels": { # Labels to apply to this disk. These can be later modified by the setLabels method.
         "a_key": "A String",
@@ -495,6 +501,7 @@
             # - The key is wrapped using a RSA public key certificate provided by Google.
             # - After being wrapped, the key must be encoded in RFC 4648 base64 encoding.  Get the RSA public key certificate provided by Google at:
             # https://cloud-certs.storage.googleapis.com/google-cloud-csek-ingress.pem
+        "kmsKeyName": "A String", # The name of the encryption key that is stored in Google Cloud KMS.
       },
       "zone": "A String", # [Output Only] URL of the zone where the disk resides.
       "lastAttachTimestamp": "A String", # [Output Only] Last attach timestamp in RFC3339 text format.
@@ -530,6 +537,7 @@
             # - The key is wrapped using a RSA public key certificate provided by Google.
             # - After being wrapped, the key must be encoded in RFC 4648 base64 encoding.  Get the RSA public key certificate provided by Google at:
             # https://cloud-certs.storage.googleapis.com/google-cloud-csek-ingress.pem
+        "kmsKeyName": "A String", # The name of the encryption key that is stored in Google Cloud KMS.
       },
       "options": "A String", # Internal use only.
       "selfLink": "A String", # [Output Only] Server-defined fully-qualified URL for this resource.
@@ -577,9 +585,15 @@
       #
       # For a description of IAM and its features, see the [IAM developer's guide](https://cloud.google.com/iam).
     "auditConfigs": [ # Specifies cloud audit logging configuration for this policy.
-      { # Specifies the audit configuration for a service. It consists of which permission types are logged, and what identities, if any, are exempted from logging. An AuditConifg must have one or more AuditLogConfigs.
+      { # Specifies the audit configuration for a service. The configuration determines which permission types are logged, and what identities, if any, are exempted from logging. An AuditConfig must have one or more AuditLogConfigs.
           #
-          # If there are AuditConfigs for both `allServices` and a specific service, the union of the two AuditConfigs is used for that service: the log_types specified in each AuditConfig are enabled, and the exempted_members in each AuditConfig are exempted. Example Policy with multiple AuditConfigs: { "audit_configs": [ { "service": "allServices" "audit_log_configs": [ { "log_type": "DATA_READ", "exempted_members": [ "user:foo@gmail.com" ] }, { "log_type": "DATA_WRITE", }, { "log_type": "ADMIN_READ", } ] }, { "service": "fooservice@googleapis.com" "audit_log_configs": [ { "log_type": "DATA_READ", }, { "log_type": "DATA_WRITE", "exempted_members": [ "user:bar@gmail.com" ] } ] } ] } For fooservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ logging. It also exempts foo@gmail.com from DATA_READ logging, and bar@gmail.com from DATA_WRITE logging.
+          # If there are AuditConfigs for both `allServices` and a specific service, the union of the two AuditConfigs is used for that service: the log_types specified in each AuditConfig are enabled, and the exempted_members in each AuditConfig are exempted.
+          #
+          # Example Policy with multiple AuditConfigs:
+          #
+          # { "audit_configs": [ { "service": "allServices" "audit_log_configs": [ { "log_type": "DATA_READ", "exempted_members": [ "user:foo@gmail.com" ] }, { "log_type": "DATA_WRITE", }, { "log_type": "ADMIN_READ", } ] }, { "service": "fooservice.googleapis.com" "audit_log_configs": [ { "log_type": "DATA_READ", }, { "log_type": "DATA_WRITE", "exempted_members": [ "user:bar@gmail.com" ] } ] } ] }
+          #
+          # For fooservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ logging. It also exempts foo@gmail.com from DATA_READ logging, and bar@gmail.com from DATA_WRITE logging.
         "exemptedMembers": [
           "A String",
         ],
@@ -595,7 +609,7 @@
             "logType": "A String", # The log type that this config enables.
           },
         ],
-        "service": "A String", # Specifies a service that will be enabled for audit logging. For example, `resourcemanager`, `storage`, `compute`. `allServices` is a special value that covers all services.
+        "service": "A String", # Specifies a service that will be enabled for audit logging. For example, `storage.googleapis.com`, `cloudsql.googleapis.com`. `allServices` is a special value that covers all services.
       },
     ],
     "rules": [ # If more than one rule is specified, the rules are applied in the following manner: - All matching LOG rules are always applied. - If any DENY/DENY_WITH_LOG rule matches, permission is denied. Logging will be applied if one or more matching rule requires logging. - Otherwise, if any ALLOW/ALLOW_WITH_LOG rule matches, permission is granted. Logging will be applied if one or more matching rule requires logging. - Otherwise, if no rule applies, permission is denied.
@@ -606,6 +620,9 @@
               "field": "A String", # The field value to attribute.
               "metric": "A String", # The metric to update.
             },
+            "cloudAudit": { # Write a Cloud Audit log # Cloud audit options.
+              "logName": "A String", # The log_name to populate in the Cloud Audit Record.
+            },
           },
         ],
         "notIns": [ # If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries.
@@ -654,6 +671,8 @@
             #
             # * `group:{emailid}`: An email address that represents a Google group. For example, `admins@example.com`.
             #
+            #
+            #
             # * `domain:{domain}`: A Google Apps domain name that represents all the users of that domain. For example, `google.com` or `example.com`.
           "A String",
         ],
@@ -683,6 +702,7 @@
           # - The key is wrapped using a RSA public key certificate provided by Google.
           # - After being wrapped, the key must be encoded in RFC 4648 base64 encoding.  Get the RSA public key certificate provided by Google at:
           # https://cloud-certs.storage.googleapis.com/google-cloud-csek-ingress.pem
+      "kmsKeyName": "A String", # The name of the encryption key that is stored in Google Cloud KMS.
     },
     "labels": { # Labels to apply to this disk. These can be later modified by the setLabels method.
       "a_key": "A String",
@@ -710,6 +730,7 @@
           # - The key is wrapped using a RSA public key certificate provided by Google.
           # - After being wrapped, the key must be encoded in RFC 4648 base64 encoding.  Get the RSA public key certificate provided by Google at:
           # https://cloud-certs.storage.googleapis.com/google-cloud-csek-ingress.pem
+      "kmsKeyName": "A String", # The name of the encryption key that is stored in Google Cloud KMS.
     },
     "zone": "A String", # [Output Only] URL of the zone where the disk resides.
     "lastAttachTimestamp": "A String", # [Output Only] Last attach timestamp in RFC3339 text format.
@@ -745,6 +766,7 @@
           # - The key is wrapped using a RSA public key certificate provided by Google.
           # - After being wrapped, the key must be encoded in RFC 4648 base64 encoding.  Get the RSA public key certificate provided by Google at:
           # https://cloud-certs.storage.googleapis.com/google-cloud-csek-ingress.pem
+      "kmsKeyName": "A String", # The name of the encryption key that is stored in Google Cloud KMS.
     },
     "options": "A String", # Internal use only.
     "selfLink": "A String", # [Output Only] Server-defined fully-qualified URL for this resource.
@@ -860,6 +882,7 @@
                 # - The key is wrapped using a RSA public key certificate provided by Google.
                 # - After being wrapped, the key must be encoded in RFC 4648 base64 encoding.  Get the RSA public key certificate provided by Google at:
                 # https://cloud-certs.storage.googleapis.com/google-cloud-csek-ingress.pem
+            "kmsKeyName": "A String", # The name of the encryption key that is stored in Google Cloud KMS.
           },
           "labels": { # Labels to apply to this disk. These can be later modified by the setLabels method.
             "a_key": "A String",
@@ -887,6 +910,7 @@
                 # - The key is wrapped using a RSA public key certificate provided by Google.
                 # - After being wrapped, the key must be encoded in RFC 4648 base64 encoding.  Get the RSA public key certificate provided by Google at:
                 # https://cloud-certs.storage.googleapis.com/google-cloud-csek-ingress.pem
+            "kmsKeyName": "A String", # The name of the encryption key that is stored in Google Cloud KMS.
           },
           "zone": "A String", # [Output Only] URL of the zone where the disk resides.
           "lastAttachTimestamp": "A String", # [Output Only] Last attach timestamp in RFC3339 text format.
@@ -922,6 +946,7 @@
                 # - The key is wrapped using a RSA public key certificate provided by Google.
                 # - After being wrapped, the key must be encoded in RFC 4648 base64 encoding.  Get the RSA public key certificate provided by Google at:
                 # https://cloud-certs.storage.googleapis.com/google-cloud-csek-ingress.pem
+            "kmsKeyName": "A String", # The name of the encryption key that is stored in Google Cloud KMS.
           },
           "options": "A String", # Internal use only.
           "selfLink": "A String", # [Output Only] Server-defined fully-qualified URL for this resource.
@@ -1054,9 +1079,15 @@
     # 
     # For a description of IAM and its features, see the [IAM developer's guide](https://cloud.google.com/iam).
   "auditConfigs": [ # Specifies cloud audit logging configuration for this policy.
-    { # Specifies the audit configuration for a service. It consists of which permission types are logged, and what identities, if any, are exempted from logging. An AuditConifg must have one or more AuditLogConfigs.
+    { # Specifies the audit configuration for a service. The configuration determines which permission types are logged, and what identities, if any, are exempted from logging. An AuditConfig must have one or more AuditLogConfigs.
         #
-        # If there are AuditConfigs for both `allServices` and a specific service, the union of the two AuditConfigs is used for that service: the log_types specified in each AuditConfig are enabled, and the exempted_members in each AuditConfig are exempted. Example Policy with multiple AuditConfigs: { "audit_configs": [ { "service": "allServices" "audit_log_configs": [ { "log_type": "DATA_READ", "exempted_members": [ "user:foo@gmail.com" ] }, { "log_type": "DATA_WRITE", }, { "log_type": "ADMIN_READ", } ] }, { "service": "fooservice@googleapis.com" "audit_log_configs": [ { "log_type": "DATA_READ", }, { "log_type": "DATA_WRITE", "exempted_members": [ "user:bar@gmail.com" ] } ] } ] } For fooservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ logging. It also exempts foo@gmail.com from DATA_READ logging, and bar@gmail.com from DATA_WRITE logging.
+        # If there are AuditConfigs for both `allServices` and a specific service, the union of the two AuditConfigs is used for that service: the log_types specified in each AuditConfig are enabled, and the exempted_members in each AuditConfig are exempted.
+        #
+        # Example Policy with multiple AuditConfigs:
+        #
+        # { "audit_configs": [ { "service": "allServices" "audit_log_configs": [ { "log_type": "DATA_READ", "exempted_members": [ "user:foo@gmail.com" ] }, { "log_type": "DATA_WRITE", }, { "log_type": "ADMIN_READ", } ] }, { "service": "fooservice.googleapis.com" "audit_log_configs": [ { "log_type": "DATA_READ", }, { "log_type": "DATA_WRITE", "exempted_members": [ "user:bar@gmail.com" ] } ] } ] }
+        #
+        # For fooservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ logging. It also exempts foo@gmail.com from DATA_READ logging, and bar@gmail.com from DATA_WRITE logging.
       "exemptedMembers": [
         "A String",
       ],
@@ -1072,7 +1103,7 @@
           "logType": "A String", # The log type that this config enables.
         },
       ],
-      "service": "A String", # Specifies a service that will be enabled for audit logging. For example, `resourcemanager`, `storage`, `compute`. `allServices` is a special value that covers all services.
+      "service": "A String", # Specifies a service that will be enabled for audit logging. For example, `storage.googleapis.com`, `cloudsql.googleapis.com`. `allServices` is a special value that covers all services.
     },
   ],
   "rules": [ # If more than one rule is specified, the rules are applied in the following manner: - All matching LOG rules are always applied. - If any DENY/DENY_WITH_LOG rule matches, permission is denied. Logging will be applied if one or more matching rule requires logging. - Otherwise, if any ALLOW/ALLOW_WITH_LOG rule matches, permission is granted. Logging will be applied if one or more matching rule requires logging. - Otherwise, if no rule applies, permission is denied.
@@ -1083,6 +1114,9 @@
             "field": "A String", # The field value to attribute.
             "metric": "A String", # The metric to update.
           },
+          "cloudAudit": { # Write a Cloud Audit log # Cloud audit options.
+            "logName": "A String", # The log_name to populate in the Cloud Audit Record.
+          },
         },
       ],
       "notIns": [ # If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries.
@@ -1131,6 +1165,8 @@
           #
           # * `group:{emailid}`: An email address that represents a Google group. For example, `admins@example.com`.
           #
+          #
+          #
           # * `domain:{domain}`: A Google Apps domain name that represents all the users of that domain. For example, `google.com` or `example.com`.
         "A String",
       ],
@@ -1155,9 +1191,15 @@
       #
       # For a description of IAM and its features, see the [IAM developer's guide](https://cloud.google.com/iam).
     "auditConfigs": [ # Specifies cloud audit logging configuration for this policy.
-      { # Specifies the audit configuration for a service. It consists of which permission types are logged, and what identities, if any, are exempted from logging. An AuditConifg must have one or more AuditLogConfigs.
+      { # Specifies the audit configuration for a service. The configuration determines which permission types are logged, and what identities, if any, are exempted from logging. An AuditConfig must have one or more AuditLogConfigs.
           #
-          # If there are AuditConfigs for both `allServices` and a specific service, the union of the two AuditConfigs is used for that service: the log_types specified in each AuditConfig are enabled, and the exempted_members in each AuditConfig are exempted. Example Policy with multiple AuditConfigs: { "audit_configs": [ { "service": "allServices" "audit_log_configs": [ { "log_type": "DATA_READ", "exempted_members": [ "user:foo@gmail.com" ] }, { "log_type": "DATA_WRITE", }, { "log_type": "ADMIN_READ", } ] }, { "service": "fooservice@googleapis.com" "audit_log_configs": [ { "log_type": "DATA_READ", }, { "log_type": "DATA_WRITE", "exempted_members": [ "user:bar@gmail.com" ] } ] } ] } For fooservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ logging. It also exempts foo@gmail.com from DATA_READ logging, and bar@gmail.com from DATA_WRITE logging.
+          # If there are AuditConfigs for both `allServices` and a specific service, the union of the two AuditConfigs is used for that service: the log_types specified in each AuditConfig are enabled, and the exempted_members in each AuditConfig are exempted.
+          #
+          # Example Policy with multiple AuditConfigs:
+          #
+          # { "audit_configs": [ { "service": "allServices" "audit_log_configs": [ { "log_type": "DATA_READ", "exempted_members": [ "user:foo@gmail.com" ] }, { "log_type": "DATA_WRITE", }, { "log_type": "ADMIN_READ", } ] }, { "service": "fooservice.googleapis.com" "audit_log_configs": [ { "log_type": "DATA_READ", }, { "log_type": "DATA_WRITE", "exempted_members": [ "user:bar@gmail.com" ] } ] } ] }
+          #
+          # For fooservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ logging. It also exempts foo@gmail.com from DATA_READ logging, and bar@gmail.com from DATA_WRITE logging.
         "exemptedMembers": [
           "A String",
         ],
@@ -1173,7 +1215,7 @@
             "logType": "A String", # The log type that this config enables.
           },
         ],
-        "service": "A String", # Specifies a service that will be enabled for audit logging. For example, `resourcemanager`, `storage`, `compute`. `allServices` is a special value that covers all services.
+        "service": "A String", # Specifies a service that will be enabled for audit logging. For example, `storage.googleapis.com`, `cloudsql.googleapis.com`. `allServices` is a special value that covers all services.
       },
     ],
     "rules": [ # If more than one rule is specified, the rules are applied in the following manner: - All matching LOG rules are always applied. - If any DENY/DENY_WITH_LOG rule matches, permission is denied. Logging will be applied if one or more matching rule requires logging. - Otherwise, if any ALLOW/ALLOW_WITH_LOG rule matches, permission is granted. Logging will be applied if one or more matching rule requires logging. - Otherwise, if no rule applies, permission is denied.
@@ -1184,6 +1226,9 @@
               "field": "A String", # The field value to attribute.
               "metric": "A String", # The metric to update.
             },
+            "cloudAudit": { # Write a Cloud Audit log # Cloud audit options.
+              "logName": "A String", # The log_name to populate in the Cloud Audit Record.
+            },
           },
         ],
         "notIns": [ # If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries.
@@ -1232,6 +1277,8 @@
             #
             # * `group:{emailid}`: An email address that represents a Google group. For example, `admins@example.com`.
             #
+            #
+            #
             # * `domain:{domain}`: A Google Apps domain name that represents all the users of that domain. For example, `google.com` or `example.com`.
           "A String",
         ],