chore: Update discovery artifacts (#1462)

## Deleted keys were detected in the following stable discovery artifacts:
sqladmin v1 https://github.com/googleapis/google-api-python-client/commit/cef24d829ab5be71563a2b668b8f6cf5dda2c8e4

## Deleted keys were detected in the following pre-stable discovery artifacts:
alertcenter v1beta1 https://github.com/googleapis/google-api-python-client/commit/70810a52c85c6d0d6f00d7afb41c8608261eaebc

## Discovery Artifact Change Summary:
feat(alertcenter): update the api https://github.com/googleapis/google-api-python-client/commit/70810a52c85c6d0d6f00d7afb41c8608261eaebc
feat(chat): update the api https://github.com/googleapis/google-api-python-client/commit/a577cd0b71951176bbf849c1f7f139127205da54
feat(cloudbuild): update the api https://github.com/googleapis/google-api-python-client/commit/9066056a8b106d441fb7686fe84359484d0d58bc
feat(content): update the api https://github.com/googleapis/google-api-python-client/commit/b123349da33c11c0172a8efb3fadef685a30e6e1
feat(displayvideo): update the api https://github.com/googleapis/google-api-python-client/commit/c525d726ee6cffdd4bc7afd69080d5e52bae83a0
feat(dns): update the api https://github.com/googleapis/google-api-python-client/commit/13436ccd2b835fda5cb86952ac4ea991ee8651d8
feat(eventarc): update the api https://github.com/googleapis/google-api-python-client/commit/6be3394a64a5eb509f68ef779680fd36837708ee
feat(file): update the api https://github.com/googleapis/google-api-python-client/commit/817a0e636771445a988ef479bd52740f754b901a
feat(monitoring): update the api https://github.com/googleapis/google-api-python-client/commit/bd32149f308467f0f659119587afc77dcec65b14
feat(people): update the api https://github.com/googleapis/google-api-python-client/commit/aa6b47df40c5289f33aef6fb6aa007df2d038e20
feat(retail): update the api https://github.com/googleapis/google-api-python-client/commit/d39f06e2d77034bc837604a41dd52c577f158bf2
feat(securitycenter): update the api https://github.com/googleapis/google-api-python-client/commit/999fab5178208639c9eef289f9f441052ed832fc
feat(speech): update the api https://github.com/googleapis/google-api-python-client/commit/3b2c0fa62b2a0c86bba1e97f1b18f93250dbd551
feat(sqladmin): update the api https://github.com/googleapis/google-api-python-client/commit/cef24d829ab5be71563a2b668b8f6cf5dda2c8e4
diff --git a/docs/dyn/cloudfunctions_v1.projects.locations.functions.html b/docs/dyn/cloudfunctions_v1.projects.locations.functions.html
index 5f0964a..3c7682a 100644
--- a/docs/dyn/cloudfunctions_v1.projects.locations.functions.html
+++ b/docs/dyn/cloudfunctions_v1.projects.locations.functions.html
@@ -156,7 +156,7 @@
   body: object, The request body.
     The object takes the form of:
 
-{ # Describes a Cloud Function that contains user computation executed in response to an event. It encapsulate function and triggers configurations.
+{ # Describes a Cloud Function that contains user computation executed in response to an event. It encapsulate function and triggers configurations. Next tag: 35
   "availableMemoryMb": 42, # The amount of memory in MB available for a function. Defaults to 256MB.
   "buildEnvironmentVariables": { # Build environment variables that shall be available during build time.
     "a_key": "A String",
@@ -192,7 +192,7 @@
   "secretEnvironmentVariables": [ # Secret environment variables configuration.
     { # Configuration for a secret environment variable. It has the information necessary to fetch the secret value from secret manager and expose it as an environment variable. Secret value is not a part of the configuration. Secret values are only fetched when a new clone starts.
       "key": "A String", # Name of the environment variable.
-      "projectId": "A String", # Project whose secret manager data is being referenced. Cross project secrets are not supported.
+      "projectId": "A String", # Project identifier (preferrably project number but can also be the project ID) of the project that contains the secret. If not set, it will be populated with the function's project assuming that the secret exists in the same project as of the function.
       "secret": "A String", # Name of the secret in secret manager (not the full resource name).
       "version": "A String", # Version of the secret (version number or the string 'latest'). It is recommended to use a numeric version for secret environment variables as any updates to the secret value is not reflected until new clones start.
     },
@@ -200,7 +200,7 @@
   "secretVolumes": [ # Secret volumes configuration.
     { # Configuration for a secret volume. It has the information necessary to fetch the secret value from secret manager and make it available as files mounted at the requested paths within the application container. Secret value is not a part of the configuration. Every filesystem read operation performs a lookup in secret manager to retrieve the secret value.
       "mountPath": "A String", # The path within the container to mount the secret volume. For example, setting the mount_path as `/etc/secrets` would mount the secret value files under the `/etc/secrets` directory. This directory will also be completely shadowed and unavailable to mount any other secrets. Recommended mount paths: /etc/secrets Restricted mount paths: /cloudsql, /dev/log, /pod, /proc, /var/log
-      "projectId": "A String", # Project whose secret manager data is being referenced. Cross project secrets are not supported.
+      "projectId": "A String", # Project identifier (preferrably project number but can also be the project ID) of the project that contains the secret. If not set, it will be populated with the function's project assuming that the secret exists in the same project as of the function.
       "secret": "A String", # Name of the secret in secret manager (not the full resource name).
       "versions": [ # List of secret versions to mount for this secret. If empty, the `latest` version of the secret will be made available in a file named after the secret under the mount point.
         { # Configuration for a single version.
@@ -355,7 +355,7 @@
 Returns:
   An object of the form:
 
-    { # Describes a Cloud Function that contains user computation executed in response to an event. It encapsulate function and triggers configurations.
+    { # Describes a Cloud Function that contains user computation executed in response to an event. It encapsulate function and triggers configurations. Next tag: 35
   "availableMemoryMb": 42, # The amount of memory in MB available for a function. Defaults to 256MB.
   "buildEnvironmentVariables": { # Build environment variables that shall be available during build time.
     "a_key": "A String",
@@ -391,7 +391,7 @@
   "secretEnvironmentVariables": [ # Secret environment variables configuration.
     { # Configuration for a secret environment variable. It has the information necessary to fetch the secret value from secret manager and expose it as an environment variable. Secret value is not a part of the configuration. Secret values are only fetched when a new clone starts.
       "key": "A String", # Name of the environment variable.
-      "projectId": "A String", # Project whose secret manager data is being referenced. Cross project secrets are not supported.
+      "projectId": "A String", # Project identifier (preferrably project number but can also be the project ID) of the project that contains the secret. If not set, it will be populated with the function's project assuming that the secret exists in the same project as of the function.
       "secret": "A String", # Name of the secret in secret manager (not the full resource name).
       "version": "A String", # Version of the secret (version number or the string 'latest'). It is recommended to use a numeric version for secret environment variables as any updates to the secret value is not reflected until new clones start.
     },
@@ -399,7 +399,7 @@
   "secretVolumes": [ # Secret volumes configuration.
     { # Configuration for a secret volume. It has the information necessary to fetch the secret value from secret manager and make it available as files mounted at the requested paths within the application container. Secret value is not a part of the configuration. Every filesystem read operation performs a lookup in secret manager to retrieve the secret value.
       "mountPath": "A String", # The path within the container to mount the secret volume. For example, setting the mount_path as `/etc/secrets` would mount the secret value files under the `/etc/secrets` directory. This directory will also be completely shadowed and unavailable to mount any other secrets. Recommended mount paths: /etc/secrets Restricted mount paths: /cloudsql, /dev/log, /pod, /proc, /var/log
-      "projectId": "A String", # Project whose secret manager data is being referenced. Cross project secrets are not supported.
+      "projectId": "A String", # Project identifier (preferrably project number but can also be the project ID) of the project that contains the secret. If not set, it will be populated with the function's project assuming that the secret exists in the same project as of the function.
       "secret": "A String", # Name of the secret in secret manager (not the full resource name).
       "versions": [ # List of secret versions to mount for this secret. If empty, the `latest` version of the secret will be made available in a file named after the secret under the mount point.
         { # Configuration for a single version.
@@ -492,7 +492,7 @@
 
     { # Response for the `ListFunctions` method.
   "functions": [ # The functions that match the request.
-    { # Describes a Cloud Function that contains user computation executed in response to an event. It encapsulate function and triggers configurations.
+    { # Describes a Cloud Function that contains user computation executed in response to an event. It encapsulate function and triggers configurations. Next tag: 35
       "availableMemoryMb": 42, # The amount of memory in MB available for a function. Defaults to 256MB.
       "buildEnvironmentVariables": { # Build environment variables that shall be available during build time.
         "a_key": "A String",
@@ -528,7 +528,7 @@
       "secretEnvironmentVariables": [ # Secret environment variables configuration.
         { # Configuration for a secret environment variable. It has the information necessary to fetch the secret value from secret manager and expose it as an environment variable. Secret value is not a part of the configuration. Secret values are only fetched when a new clone starts.
           "key": "A String", # Name of the environment variable.
-          "projectId": "A String", # Project whose secret manager data is being referenced. Cross project secrets are not supported.
+          "projectId": "A String", # Project identifier (preferrably project number but can also be the project ID) of the project that contains the secret. If not set, it will be populated with the function's project assuming that the secret exists in the same project as of the function.
           "secret": "A String", # Name of the secret in secret manager (not the full resource name).
           "version": "A String", # Version of the secret (version number or the string 'latest'). It is recommended to use a numeric version for secret environment variables as any updates to the secret value is not reflected until new clones start.
         },
@@ -536,7 +536,7 @@
       "secretVolumes": [ # Secret volumes configuration.
         { # Configuration for a secret volume. It has the information necessary to fetch the secret value from secret manager and make it available as files mounted at the requested paths within the application container. Secret value is not a part of the configuration. Every filesystem read operation performs a lookup in secret manager to retrieve the secret value.
           "mountPath": "A String", # The path within the container to mount the secret volume. For example, setting the mount_path as `/etc/secrets` would mount the secret value files under the `/etc/secrets` directory. This directory will also be completely shadowed and unavailable to mount any other secrets. Recommended mount paths: /etc/secrets Restricted mount paths: /cloudsql, /dev/log, /pod, /proc, /var/log
-          "projectId": "A String", # Project whose secret manager data is being referenced. Cross project secrets are not supported.
+          "projectId": "A String", # Project identifier (preferrably project number but can also be the project ID) of the project that contains the secret. If not set, it will be populated with the function's project assuming that the secret exists in the same project as of the function.
           "secret": "A String", # Name of the secret in secret manager (not the full resource name).
           "versions": [ # List of secret versions to mount for this secret. If empty, the `latest` version of the secret will be made available in a file named after the secret under the mount point.
             { # Configuration for a single version.
@@ -592,7 +592,7 @@
   body: object, The request body.
     The object takes the form of:
 
-{ # Describes a Cloud Function that contains user computation executed in response to an event. It encapsulate function and triggers configurations.
+{ # Describes a Cloud Function that contains user computation executed in response to an event. It encapsulate function and triggers configurations. Next tag: 35
   "availableMemoryMb": 42, # The amount of memory in MB available for a function. Defaults to 256MB.
   "buildEnvironmentVariables": { # Build environment variables that shall be available during build time.
     "a_key": "A String",
@@ -628,7 +628,7 @@
   "secretEnvironmentVariables": [ # Secret environment variables configuration.
     { # Configuration for a secret environment variable. It has the information necessary to fetch the secret value from secret manager and expose it as an environment variable. Secret value is not a part of the configuration. Secret values are only fetched when a new clone starts.
       "key": "A String", # Name of the environment variable.
-      "projectId": "A String", # Project whose secret manager data is being referenced. Cross project secrets are not supported.
+      "projectId": "A String", # Project identifier (preferrably project number but can also be the project ID) of the project that contains the secret. If not set, it will be populated with the function's project assuming that the secret exists in the same project as of the function.
       "secret": "A String", # Name of the secret in secret manager (not the full resource name).
       "version": "A String", # Version of the secret (version number or the string 'latest'). It is recommended to use a numeric version for secret environment variables as any updates to the secret value is not reflected until new clones start.
     },
@@ -636,7 +636,7 @@
   "secretVolumes": [ # Secret volumes configuration.
     { # Configuration for a secret volume. It has the information necessary to fetch the secret value from secret manager and make it available as files mounted at the requested paths within the application container. Secret value is not a part of the configuration. Every filesystem read operation performs a lookup in secret manager to retrieve the secret value.
       "mountPath": "A String", # The path within the container to mount the secret volume. For example, setting the mount_path as `/etc/secrets` would mount the secret value files under the `/etc/secrets` directory. This directory will also be completely shadowed and unavailable to mount any other secrets. Recommended mount paths: /etc/secrets Restricted mount paths: /cloudsql, /dev/log, /pod, /proc, /var/log
-      "projectId": "A String", # Project whose secret manager data is being referenced. Cross project secrets are not supported.
+      "projectId": "A String", # Project identifier (preferrably project number but can also be the project ID) of the project that contains the secret. If not set, it will be populated with the function's project assuming that the secret exists in the same project as of the function.
       "secret": "A String", # Name of the secret in secret manager (not the full resource name).
       "versions": [ # List of secret versions to mount for this secret. If empty, the `latest` version of the secret will be made available in a file named after the secret under the mount point.
         { # Configuration for a single version.