build: run docs regen in synth.py (#1059)

diff --git a/docs/dyn/safebrowsing_v4.encodedFullHashes.html b/docs/dyn/safebrowsing_v4.encodedFullHashes.html
index cab608a..ce24a8c 100644
--- a/docs/dyn/safebrowsing_v4.encodedFullHashes.html
+++ b/docs/dyn/safebrowsing_v4.encodedFullHashes.html
@@ -103,18 +103,9 @@
   An object of the form:
 
     {
-    "negativeCacheDuration": "A String", # For requested entities that did not match the threat list, how long to cache the response.
-    "minimumWaitDuration": "A String", # The minimum duration the client must wait before issuing any find hashes request. If this field is not set, clients can issue a request as soon as they want.
     "matches": [ # The full hashes that matched the requested prefixes.
       { # A match when checking a threat entry in the Safe Browsing threat lists.
-        "cacheDuration": "A String", # The cache lifetime for the returned match. Clients must not cache this response for more than this duration to avoid false positives.
-        "threat": { # An individual threat; for example, a malicious URL or its hash representation. Only one of these fields should be set. # The threat matching this threat.
-          "hash": "A String", # A hash prefix, consisting of the most significant 4-32 bytes of a SHA256 hash. This field is in binary format. For JSON requests, hashes are base64-encoded.
-          "digest": "A String", # The digest of an executable in SHA256 format. The API supports both binary and hex digests. For JSON requests, digests are base64-encoded.
-          "url": "A String", # A URL.
-        },
         "threatType": "A String", # The threat type matching this threat.
-        "platformType": "A String", # The platform type matching this threat.
         "threatEntryMetadata": { # The metadata associated with a specific threat entry. The client is expected to know the metadata key/value pairs associated with each threat type. # Optional metadata associated with this threat.
           "entries": [ # The metadata entries.
             { # A single metadata entry.
@@ -124,8 +115,17 @@
           ],
         },
         "threatEntryType": "A String", # The threat entry type matching this threat.
+        "threat": { # An individual threat; for example, a malicious URL or its hash representation. Only one of these fields should be set. # The threat matching this threat.
+          "digest": "A String", # The digest of an executable in SHA256 format. The API supports both binary and hex digests. For JSON requests, digests are base64-encoded.
+          "hash": "A String", # A hash prefix, consisting of the most significant 4-32 bytes of a SHA256 hash. This field is in binary format. For JSON requests, hashes are base64-encoded.
+          "url": "A String", # A URL.
+        },
+        "cacheDuration": "A String", # The cache lifetime for the returned match. Clients must not cache this response for more than this duration to avoid false positives.
+        "platformType": "A String", # The platform type matching this threat.
       },
     ],
+    "minimumWaitDuration": "A String", # The minimum duration the client must wait before issuing any find hashes request. If this field is not set, clients can issue a request as soon as they want.
+    "negativeCacheDuration": "A String", # For requested entities that did not match the threat list, how long to cache the response.
   }</pre>
 </div>