docs: update generated docs (#981)

diff --git a/docs/dyn/secretmanager_v1.projects.secrets.html b/docs/dyn/secretmanager_v1.projects.secrets.html
index 383fad4..c1fb308 100644
--- a/docs/dyn/secretmanager_v1.projects.secrets.html
+++ b/docs/dyn/secretmanager_v1.projects.secrets.html
@@ -95,7 +95,7 @@
   <code><a href="#getIamPolicy">getIamPolicy(resource, options_requestedPolicyVersion=None, x__xgafv=None)</a></code></p>
 <p class="firstline">Gets the access control policy for a secret.</p>
 <p class="toc_element">
-  <code><a href="#list">list(parent, pageToken=None, pageSize=None, x__xgafv=None)</a></code></p>
+  <code><a href="#list">list(parent, pageSize=None, pageToken=None, x__xgafv=None)</a></code></p>
 <p class="firstline">Lists Secrets.</p>
 <p class="toc_element">
   <code><a href="#list_next">list_next(previous_request, previous_response)</a></code></p>
@@ -140,13 +140,13 @@
     &quot;destroyTime&quot;: &quot;A String&quot;, # Output only. The time this SecretVersion was destroyed.
         # Only present if state is
         # DESTROYED.
-    &quot;createTime&quot;: &quot;A String&quot;, # Output only. The time at which the SecretVersion was created.
-    &quot;state&quot;: &quot;A String&quot;, # Output only. The current state of the SecretVersion.
     &quot;name&quot;: &quot;A String&quot;, # Output only. The resource name of the SecretVersion in the
         # format `projects/*/secrets/*/versions/*`.
         #
         # SecretVersion IDs in a Secret start at 1 and
         # are incremented for each subsequent version of the secret.
+    &quot;createTime&quot;: &quot;A String&quot;, # Output only. The time at which the SecretVersion was created.
+    &quot;state&quot;: &quot;A String&quot;, # Output only. The current state of the SecretVersion.
   }</pre>
 </div>
 
@@ -161,44 +161,44 @@
     The object takes the form of:
 
 { # A Secret is a logical secret whose value and versions can
-    # be accessed.
-    # 
-    # A Secret is made up of zero or more SecretVersions that
-    # represent the secret data.
-  &quot;name&quot;: &quot;A String&quot;, # Output only. The resource name of the Secret in the format `projects/*/secrets/*`.
-  &quot;replication&quot;: { # A policy that defines the replication configuration of data. # Required. Immutable. The replication policy of the secret data attached to the Secret.
+      # be accessed.
       # 
-      # The replication policy cannot be changed after the Secret has been created.
-    &quot;userManaged&quot;: { # A replication policy that replicates the Secret payload into the # The Secret will only be replicated into the locations specified.
-        # locations specified in Secret.replication.user_managed.replicas
-      &quot;replicas&quot;: [ # Required. The list of Replicas for this Secret.
-          #
-          # Cannot be empty.
-        { # Represents a Replica for this Secret.
-          &quot;location&quot;: &quot;A String&quot;, # The canonical IDs of the location to replicate data.
-              # For example: `&quot;us-east1&quot;`.
-        },
-      ],
+      # A Secret is made up of zero or more SecretVersions that
+      # represent the secret data.
+    &quot;name&quot;: &quot;A String&quot;, # Output only. The resource name of the Secret in the format `projects/*/secrets/*`.
+    &quot;createTime&quot;: &quot;A String&quot;, # Output only. The time at which the Secret was created.
+    &quot;labels&quot;: { # The labels assigned to this Secret.
+        # 
+        # Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
+        # of maximum 128 bytes, and must conform to the following PCRE regular
+        # expression: `\p{Ll}\p{Lo}{0,62}`
+        # 
+        # Label values must be between 0 and 63 characters long, have a UTF-8
+        # encoding of maximum 128 bytes, and must conform to the following PCRE
+        # regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
+        # 
+        # No more than 64 labels can be assigned to a given resource.
+      &quot;a_key&quot;: &quot;A String&quot;,
     },
-    &quot;automatic&quot;: { # A replication policy that replicates the Secret payload without any # The Secret will automatically be replicated without any restrictions.
-        # restrictions.
+    &quot;replication&quot;: { # A policy that defines the replication configuration of data. # Required. Immutable. The replication policy of the secret data attached to the Secret.
+        # 
+        # The replication policy cannot be changed after the Secret has been created.
+      &quot;automatic&quot;: { # A replication policy that replicates the Secret payload without any # The Secret will automatically be replicated without any restrictions.
+          # restrictions.
+      },
+      &quot;userManaged&quot;: { # A replication policy that replicates the Secret payload into the # The Secret will only be replicated into the locations specified.
+          # locations specified in Secret.replication.user_managed.replicas
+        &quot;replicas&quot;: [ # Required. The list of Replicas for this Secret.
+            #
+            # Cannot be empty.
+          { # Represents a Replica for this Secret.
+            &quot;location&quot;: &quot;A String&quot;, # The canonical IDs of the location to replicate data.
+                # For example: `&quot;us-east1&quot;`.
+          },
+        ],
+      },
     },
-  },
-  &quot;createTime&quot;: &quot;A String&quot;, # Output only. The time at which the Secret was created.
-  &quot;labels&quot;: { # The labels assigned to this Secret.
-      # 
-      # Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
-      # of maximum 128 bytes, and must conform to the following PCRE regular
-      # expression: `\p{Ll}\p{Lo}{0,62}`
-      # 
-      # Label values must be between 0 and 63 characters long, have a UTF-8
-      # encoding of maximum 128 bytes, and must conform to the following PCRE
-      # regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
-      # 
-      # No more than 64 labels can be assigned to a given resource.
-    &quot;a_key&quot;: &quot;A String&quot;,
-  },
-}
+  }
 
   secretId: string, Required. This must be unique within the project.
 
@@ -214,44 +214,44 @@
   An object of the form:
 
     { # A Secret is a logical secret whose value and versions can
-      # be accessed.
-      #
-      # A Secret is made up of zero or more SecretVersions that
-      # represent the secret data.
-    &quot;name&quot;: &quot;A String&quot;, # Output only. The resource name of the Secret in the format `projects/*/secrets/*`.
-    &quot;replication&quot;: { # A policy that defines the replication configuration of data. # Required. Immutable. The replication policy of the secret data attached to the Secret.
+        # be accessed.
         #
-        # The replication policy cannot be changed after the Secret has been created.
-      &quot;userManaged&quot;: { # A replication policy that replicates the Secret payload into the # The Secret will only be replicated into the locations specified.
-          # locations specified in Secret.replication.user_managed.replicas
-        &quot;replicas&quot;: [ # Required. The list of Replicas for this Secret.
-            #
-            # Cannot be empty.
-          { # Represents a Replica for this Secret.
-            &quot;location&quot;: &quot;A String&quot;, # The canonical IDs of the location to replicate data.
-                # For example: `&quot;us-east1&quot;`.
-          },
-        ],
+        # A Secret is made up of zero or more SecretVersions that
+        # represent the secret data.
+      &quot;name&quot;: &quot;A String&quot;, # Output only. The resource name of the Secret in the format `projects/*/secrets/*`.
+      &quot;createTime&quot;: &quot;A String&quot;, # Output only. The time at which the Secret was created.
+      &quot;labels&quot;: { # The labels assigned to this Secret.
+          #
+          # Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
+          # of maximum 128 bytes, and must conform to the following PCRE regular
+          # expression: `\p{Ll}\p{Lo}{0,62}`
+          #
+          # Label values must be between 0 and 63 characters long, have a UTF-8
+          # encoding of maximum 128 bytes, and must conform to the following PCRE
+          # regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
+          #
+          # No more than 64 labels can be assigned to a given resource.
+        &quot;a_key&quot;: &quot;A String&quot;,
       },
-      &quot;automatic&quot;: { # A replication policy that replicates the Secret payload without any # The Secret will automatically be replicated without any restrictions.
-          # restrictions.
+      &quot;replication&quot;: { # A policy that defines the replication configuration of data. # Required. Immutable. The replication policy of the secret data attached to the Secret.
+          #
+          # The replication policy cannot be changed after the Secret has been created.
+        &quot;automatic&quot;: { # A replication policy that replicates the Secret payload without any # The Secret will automatically be replicated without any restrictions.
+            # restrictions.
+        },
+        &quot;userManaged&quot;: { # A replication policy that replicates the Secret payload into the # The Secret will only be replicated into the locations specified.
+            # locations specified in Secret.replication.user_managed.replicas
+          &quot;replicas&quot;: [ # Required. The list of Replicas for this Secret.
+              #
+              # Cannot be empty.
+            { # Represents a Replica for this Secret.
+              &quot;location&quot;: &quot;A String&quot;, # The canonical IDs of the location to replicate data.
+                  # For example: `&quot;us-east1&quot;`.
+            },
+          ],
+        },
       },
-    },
-    &quot;createTime&quot;: &quot;A String&quot;, # Output only. The time at which the Secret was created.
-    &quot;labels&quot;: { # The labels assigned to this Secret.
-        #
-        # Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
-        # of maximum 128 bytes, and must conform to the following PCRE regular
-        # expression: `\p{Ll}\p{Lo}{0,62}`
-        #
-        # Label values must be between 0 and 63 characters long, have a UTF-8
-        # encoding of maximum 128 bytes, and must conform to the following PCRE
-        # regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
-        #
-        # No more than 64 labels can be assigned to a given resource.
-      &quot;a_key&quot;: &quot;A String&quot;,
-    },
-  }</pre>
+    }</pre>
 </div>
 
 <div class="method">
@@ -296,44 +296,44 @@
   An object of the form:
 
     { # A Secret is a logical secret whose value and versions can
-      # be accessed.
-      #
-      # A Secret is made up of zero or more SecretVersions that
-      # represent the secret data.
-    &quot;name&quot;: &quot;A String&quot;, # Output only. The resource name of the Secret in the format `projects/*/secrets/*`.
-    &quot;replication&quot;: { # A policy that defines the replication configuration of data. # Required. Immutable. The replication policy of the secret data attached to the Secret.
+        # be accessed.
         #
-        # The replication policy cannot be changed after the Secret has been created.
-      &quot;userManaged&quot;: { # A replication policy that replicates the Secret payload into the # The Secret will only be replicated into the locations specified.
-          # locations specified in Secret.replication.user_managed.replicas
-        &quot;replicas&quot;: [ # Required. The list of Replicas for this Secret.
-            #
-            # Cannot be empty.
-          { # Represents a Replica for this Secret.
-            &quot;location&quot;: &quot;A String&quot;, # The canonical IDs of the location to replicate data.
-                # For example: `&quot;us-east1&quot;`.
-          },
-        ],
+        # A Secret is made up of zero or more SecretVersions that
+        # represent the secret data.
+      &quot;name&quot;: &quot;A String&quot;, # Output only. The resource name of the Secret in the format `projects/*/secrets/*`.
+      &quot;createTime&quot;: &quot;A String&quot;, # Output only. The time at which the Secret was created.
+      &quot;labels&quot;: { # The labels assigned to this Secret.
+          #
+          # Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
+          # of maximum 128 bytes, and must conform to the following PCRE regular
+          # expression: `\p{Ll}\p{Lo}{0,62}`
+          #
+          # Label values must be between 0 and 63 characters long, have a UTF-8
+          # encoding of maximum 128 bytes, and must conform to the following PCRE
+          # regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
+          #
+          # No more than 64 labels can be assigned to a given resource.
+        &quot;a_key&quot;: &quot;A String&quot;,
       },
-      &quot;automatic&quot;: { # A replication policy that replicates the Secret payload without any # The Secret will automatically be replicated without any restrictions.
-          # restrictions.
+      &quot;replication&quot;: { # A policy that defines the replication configuration of data. # Required. Immutable. The replication policy of the secret data attached to the Secret.
+          #
+          # The replication policy cannot be changed after the Secret has been created.
+        &quot;automatic&quot;: { # A replication policy that replicates the Secret payload without any # The Secret will automatically be replicated without any restrictions.
+            # restrictions.
+        },
+        &quot;userManaged&quot;: { # A replication policy that replicates the Secret payload into the # The Secret will only be replicated into the locations specified.
+            # locations specified in Secret.replication.user_managed.replicas
+          &quot;replicas&quot;: [ # Required. The list of Replicas for this Secret.
+              #
+              # Cannot be empty.
+            { # Represents a Replica for this Secret.
+              &quot;location&quot;: &quot;A String&quot;, # The canonical IDs of the location to replicate data.
+                  # For example: `&quot;us-east1&quot;`.
+            },
+          ],
+        },
       },
-    },
-    &quot;createTime&quot;: &quot;A String&quot;, # Output only. The time at which the Secret was created.
-    &quot;labels&quot;: { # The labels assigned to this Secret.
-        #
-        # Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
-        # of maximum 128 bytes, and must conform to the following PCRE regular
-        # expression: `\p{Ll}\p{Lo}{0,62}`
-        #
-        # Label values must be between 0 and 63 characters long, have a UTF-8
-        # encoding of maximum 128 bytes, and must conform to the following PCRE
-        # regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
-        #
-        # No more than 64 labels can be assigned to a given resource.
-      &quot;a_key&quot;: &quot;A String&quot;,
-    },
-  }</pre>
+    }</pre>
 </div>
 
 <div class="method">
@@ -431,12 +431,131 @@
       #
       # For a description of IAM and its features, see the
       # [IAM documentation](https://cloud.google.com/iam/docs/).
+    &quot;auditConfigs&quot;: [ # Specifies cloud audit logging configuration for this policy.
+      { # Specifies the audit configuration for a service.
+          # The configuration determines which permission types are logged, and what
+          # identities, if any, are exempted from logging.
+          # An AuditConfig must have one or more AuditLogConfigs.
+          #
+          # If there are AuditConfigs for both `allServices` and a specific service,
+          # the union of the two AuditConfigs is used for that service: the log_types
+          # specified in each AuditConfig are enabled, and the exempted_members in each
+          # AuditLogConfig are exempted.
+          #
+          # Example Policy with multiple AuditConfigs:
+          #
+          #     {
+          #       &quot;audit_configs&quot;: [
+          #         {
+          #           &quot;service&quot;: &quot;allServices&quot;,
+          #           &quot;audit_log_configs&quot;: [
+          #             {
+          #               &quot;log_type&quot;: &quot;DATA_READ&quot;,
+          #               &quot;exempted_members&quot;: [
+          #                 &quot;user:jose@example.com&quot;
+          #               ]
+          #             },
+          #             {
+          #               &quot;log_type&quot;: &quot;DATA_WRITE&quot;
+          #             },
+          #             {
+          #               &quot;log_type&quot;: &quot;ADMIN_READ&quot;
+          #             }
+          #           ]
+          #         },
+          #         {
+          #           &quot;service&quot;: &quot;sampleservice.googleapis.com&quot;,
+          #           &quot;audit_log_configs&quot;: [
+          #             {
+          #               &quot;log_type&quot;: &quot;DATA_READ&quot;
+          #             },
+          #             {
+          #               &quot;log_type&quot;: &quot;DATA_WRITE&quot;,
+          #               &quot;exempted_members&quot;: [
+          #                 &quot;user:aliya@example.com&quot;
+          #               ]
+          #             }
+          #           ]
+          #         }
+          #       ]
+          #     }
+          #
+          # For sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ
+          # logging. It also exempts jose@example.com from DATA_READ logging, and
+          # aliya@example.com from DATA_WRITE logging.
+        &quot;service&quot;: &quot;A String&quot;, # Specifies a service that will be enabled for audit logging.
+            # For example, `storage.googleapis.com`, `cloudsql.googleapis.com`.
+            # `allServices` is a special value that covers all services.
+        &quot;auditLogConfigs&quot;: [ # The configuration for logging of each type of permission.
+          { # Provides the configuration for logging a type of permissions.
+              # Example:
+              #
+              #     {
+              #       &quot;audit_log_configs&quot;: [
+              #         {
+              #           &quot;log_type&quot;: &quot;DATA_READ&quot;,
+              #           &quot;exempted_members&quot;: [
+              #             &quot;user:jose@example.com&quot;
+              #           ]
+              #         },
+              #         {
+              #           &quot;log_type&quot;: &quot;DATA_WRITE&quot;
+              #         }
+              #       ]
+              #     }
+              #
+              # This enables &#x27;DATA_READ&#x27; and &#x27;DATA_WRITE&#x27; logging, while exempting
+              # jose@example.com from DATA_READ logging.
+            &quot;exemptedMembers&quot;: [ # Specifies the identities that do not cause logging for this type of
+                # permission.
+                # Follows the same format of Binding.members.
+              &quot;A String&quot;,
+            ],
+            &quot;logType&quot;: &quot;A String&quot;, # The log type that this config enables.
+          },
+        ],
+      },
+    ],
+    &quot;version&quot;: 42, # Specifies the format of the policy.
+        #
+        # Valid values are `0`, `1`, and `3`. Requests that specify an invalid value
+        # are rejected.
+        #
+        # Any operation that affects conditional role bindings must specify version
+        # `3`. This requirement applies to the following operations:
+        #
+        # * Getting a policy that includes a conditional role binding
+        # * Adding a conditional role binding to a policy
+        # * Changing a conditional role binding in a policy
+        # * Removing any role binding, with or without a condition, from a policy
+        #   that includes conditions
+        #
+        # **Important:** If you use IAM Conditions, you must include the `etag` field
+        # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
+        # you to overwrite a version `3` policy with a version `1` policy, and all of
+        # the conditions in the version `3` policy are lost.
+        #
+        # If a policy does not include any conditions, operations on that policy may
+        # specify any valid version or leave the field unset.
+        #
+        # To learn which resources support conditions in their IAM policies, see the
+        # [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
+    &quot;etag&quot;: &quot;A String&quot;, # `etag` is used for optimistic concurrency control as a way to help
+        # prevent simultaneous updates of a policy from overwriting each other.
+        # It is strongly suggested that systems make use of the `etag` in the
+        # read-modify-write cycle to perform policy updates in order to avoid race
+        # conditions: An `etag` is returned in the response to `getIamPolicy`, and
+        # systems are expected to put that etag in the request to `setIamPolicy` to
+        # ensure that their change will be applied to the same version of the policy.
+        #
+        # **Important:** If you use IAM Conditions, you must include the `etag` field
+        # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
+        # you to overwrite a version `3` policy with a version `1` policy, and all of
+        # the conditions in the version `3` policy are lost.
     &quot;bindings&quot;: [ # Associates a list of `members` to a `role`. Optionally, may specify a
         # `condition` that determines how and when the `bindings` are applied. Each
         # of the `bindings` must contain at least one member.
       { # Associates `members` with a `role`.
-        &quot;role&quot;: &quot;A String&quot;, # Role that is assigned to `members`.
-            # For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
         &quot;condition&quot;: { # Represents a textual expression in the Common Expression Language (CEL) # The condition that is associated with this binding.
             #
             # If the condition evaluates to `true`, then this binding applies to the
@@ -479,15 +598,15 @@
             # The exact variables and functions that may be referenced within an expression
             # are determined by the service that evaluates it. See the service
             # documentation for additional information.
+          &quot;expression&quot;: &quot;A String&quot;, # Textual representation of an expression in Common Expression Language
+              # syntax.
+          &quot;description&quot;: &quot;A String&quot;, # Optional. Description of the expression. This is a longer text which
+              # describes the expression, e.g. when hovered over it in a UI.
           &quot;title&quot;: &quot;A String&quot;, # Optional. Title for the expression, i.e. a short string describing
               # its purpose. This can be used e.g. in UIs which allow to enter the
               # expression.
           &quot;location&quot;: &quot;A String&quot;, # Optional. String indicating the location of the expression for error
               # reporting, e.g. a file name and a position in the file.
-          &quot;description&quot;: &quot;A String&quot;, # Optional. Description of the expression. This is a longer text which
-              # describes the expression, e.g. when hovered over it in a UI.
-          &quot;expression&quot;: &quot;A String&quot;, # Textual representation of an expression in Common Expression Language
-              # syntax.
         },
         &quot;members&quot;: [ # Specifies the identities requesting access for a Cloud Platform resource.
             # `members` can have the following values:
@@ -534,144 +653,25 @@
             #
           &quot;A String&quot;,
         ],
-      },
-    ],
-    &quot;etag&quot;: &quot;A String&quot;, # `etag` is used for optimistic concurrency control as a way to help
-        # prevent simultaneous updates of a policy from overwriting each other.
-        # It is strongly suggested that systems make use of the `etag` in the
-        # read-modify-write cycle to perform policy updates in order to avoid race
-        # conditions: An `etag` is returned in the response to `getIamPolicy`, and
-        # systems are expected to put that etag in the request to `setIamPolicy` to
-        # ensure that their change will be applied to the same version of the policy.
-        #
-        # **Important:** If you use IAM Conditions, you must include the `etag` field
-        # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
-        # you to overwrite a version `3` policy with a version `1` policy, and all of
-        # the conditions in the version `3` policy are lost.
-    &quot;version&quot;: 42, # Specifies the format of the policy.
-        #
-        # Valid values are `0`, `1`, and `3`. Requests that specify an invalid value
-        # are rejected.
-        #
-        # Any operation that affects conditional role bindings must specify version
-        # `3`. This requirement applies to the following operations:
-        #
-        # * Getting a policy that includes a conditional role binding
-        # * Adding a conditional role binding to a policy
-        # * Changing a conditional role binding in a policy
-        # * Removing any role binding, with or without a condition, from a policy
-        #   that includes conditions
-        #
-        # **Important:** If you use IAM Conditions, you must include the `etag` field
-        # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
-        # you to overwrite a version `3` policy with a version `1` policy, and all of
-        # the conditions in the version `3` policy are lost.
-        #
-        # If a policy does not include any conditions, operations on that policy may
-        # specify any valid version or leave the field unset.
-        #
-        # To learn which resources support conditions in their IAM policies, see the
-        # [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
-    &quot;auditConfigs&quot;: [ # Specifies cloud audit logging configuration for this policy.
-      { # Specifies the audit configuration for a service.
-          # The configuration determines which permission types are logged, and what
-          # identities, if any, are exempted from logging.
-          # An AuditConfig must have one or more AuditLogConfigs.
-          #
-          # If there are AuditConfigs for both `allServices` and a specific service,
-          # the union of the two AuditConfigs is used for that service: the log_types
-          # specified in each AuditConfig are enabled, and the exempted_members in each
-          # AuditLogConfig are exempted.
-          #
-          # Example Policy with multiple AuditConfigs:
-          #
-          #     {
-          #       &quot;audit_configs&quot;: [
-          #         {
-          #           &quot;service&quot;: &quot;allServices&quot;
-          #           &quot;audit_log_configs&quot;: [
-          #             {
-          #               &quot;log_type&quot;: &quot;DATA_READ&quot;,
-          #               &quot;exempted_members&quot;: [
-          #                 &quot;user:jose@example.com&quot;
-          #               ]
-          #             },
-          #             {
-          #               &quot;log_type&quot;: &quot;DATA_WRITE&quot;,
-          #             },
-          #             {
-          #               &quot;log_type&quot;: &quot;ADMIN_READ&quot;,
-          #             }
-          #           ]
-          #         },
-          #         {
-          #           &quot;service&quot;: &quot;sampleservice.googleapis.com&quot;
-          #           &quot;audit_log_configs&quot;: [
-          #             {
-          #               &quot;log_type&quot;: &quot;DATA_READ&quot;,
-          #             },
-          #             {
-          #               &quot;log_type&quot;: &quot;DATA_WRITE&quot;,
-          #               &quot;exempted_members&quot;: [
-          #                 &quot;user:aliya@example.com&quot;
-          #               ]
-          #             }
-          #           ]
-          #         }
-          #       ]
-          #     }
-          #
-          # For sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ
-          # logging. It also exempts jose@example.com from DATA_READ logging, and
-          # aliya@example.com from DATA_WRITE logging.
-        &quot;service&quot;: &quot;A String&quot;, # Specifies a service that will be enabled for audit logging.
-            # For example, `storage.googleapis.com`, `cloudsql.googleapis.com`.
-            # `allServices` is a special value that covers all services.
-        &quot;auditLogConfigs&quot;: [ # The configuration for logging of each type of permission.
-          { # Provides the configuration for logging a type of permissions.
-              # Example:
-              #
-              #     {
-              #       &quot;audit_log_configs&quot;: [
-              #         {
-              #           &quot;log_type&quot;: &quot;DATA_READ&quot;,
-              #           &quot;exempted_members&quot;: [
-              #             &quot;user:jose@example.com&quot;
-              #           ]
-              #         },
-              #         {
-              #           &quot;log_type&quot;: &quot;DATA_WRITE&quot;,
-              #         }
-              #       ]
-              #     }
-              #
-              # This enables &#x27;DATA_READ&#x27; and &#x27;DATA_WRITE&#x27; logging, while exempting
-              # jose@example.com from DATA_READ logging.
-            &quot;exemptedMembers&quot;: [ # Specifies the identities that do not cause logging for this type of
-                # permission.
-                # Follows the same format of Binding.members.
-              &quot;A String&quot;,
-            ],
-            &quot;logType&quot;: &quot;A String&quot;, # The log type that this config enables.
-          },
-        ],
+        &quot;role&quot;: &quot;A String&quot;, # Role that is assigned to `members`.
+            # For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
       },
     ],
   }</pre>
 </div>
 
 <div class="method">
-    <code class="details" id="list">list(parent, pageToken=None, pageSize=None, x__xgafv=None)</code>
+    <code class="details" id="list">list(parent, pageSize=None, pageToken=None, x__xgafv=None)</code>
   <pre>Lists Secrets.
 
 Args:
   parent: string, Required. The resource name of the project associated with the
 Secrets, in the format `projects/*`. (required)
-  pageToken: string, Optional. Pagination token, returned earlier via
-ListSecretsResponse.next_page_token.
   pageSize: integer, Optional. The maximum number of results to be returned in a single page. If
 set to 0, the server decides the number of results to return. If the
 number is greater than 25000, it is capped at 25000.
+  pageToken: string, Optional. Pagination token, returned earlier via
+ListSecretsResponse.next_page_token.
   x__xgafv: string, V1 error format.
     Allowed values
       1 - v1 error format
@@ -681,51 +681,51 @@
   An object of the form:
 
     { # Response message for SecretManagerService.ListSecrets.
+    &quot;totalSize&quot;: 42, # The total number of Secrets.
+    &quot;nextPageToken&quot;: &quot;A String&quot;, # A token to retrieve the next page of results. Pass this value in
+        # ListSecretsRequest.page_token to retrieve the next page.
     &quot;secrets&quot;: [ # The list of Secrets sorted in reverse by create_time (newest
         # first).
       { # A Secret is a logical secret whose value and versions can
-          # be accessed.
-          #
-          # A Secret is made up of zero or more SecretVersions that
-          # represent the secret data.
-        &quot;name&quot;: &quot;A String&quot;, # Output only. The resource name of the Secret in the format `projects/*/secrets/*`.
-        &quot;replication&quot;: { # A policy that defines the replication configuration of data. # Required. Immutable. The replication policy of the secret data attached to the Secret.
+            # be accessed.
             #
-            # The replication policy cannot be changed after the Secret has been created.
-          &quot;userManaged&quot;: { # A replication policy that replicates the Secret payload into the # The Secret will only be replicated into the locations specified.
-              # locations specified in Secret.replication.user_managed.replicas
-            &quot;replicas&quot;: [ # Required. The list of Replicas for this Secret.
-                #
-                # Cannot be empty.
-              { # Represents a Replica for this Secret.
-                &quot;location&quot;: &quot;A String&quot;, # The canonical IDs of the location to replicate data.
-                    # For example: `&quot;us-east1&quot;`.
-              },
-            ],
+            # A Secret is made up of zero or more SecretVersions that
+            # represent the secret data.
+          &quot;name&quot;: &quot;A String&quot;, # Output only. The resource name of the Secret in the format `projects/*/secrets/*`.
+          &quot;createTime&quot;: &quot;A String&quot;, # Output only. The time at which the Secret was created.
+          &quot;labels&quot;: { # The labels assigned to this Secret.
+              #
+              # Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
+              # of maximum 128 bytes, and must conform to the following PCRE regular
+              # expression: `\p{Ll}\p{Lo}{0,62}`
+              #
+              # Label values must be between 0 and 63 characters long, have a UTF-8
+              # encoding of maximum 128 bytes, and must conform to the following PCRE
+              # regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
+              #
+              # No more than 64 labels can be assigned to a given resource.
+            &quot;a_key&quot;: &quot;A String&quot;,
           },
-          &quot;automatic&quot;: { # A replication policy that replicates the Secret payload without any # The Secret will automatically be replicated without any restrictions.
-              # restrictions.
+          &quot;replication&quot;: { # A policy that defines the replication configuration of data. # Required. Immutable. The replication policy of the secret data attached to the Secret.
+              #
+              # The replication policy cannot be changed after the Secret has been created.
+            &quot;automatic&quot;: { # A replication policy that replicates the Secret payload without any # The Secret will automatically be replicated without any restrictions.
+                # restrictions.
+            },
+            &quot;userManaged&quot;: { # A replication policy that replicates the Secret payload into the # The Secret will only be replicated into the locations specified.
+                # locations specified in Secret.replication.user_managed.replicas
+              &quot;replicas&quot;: [ # Required. The list of Replicas for this Secret.
+                  #
+                  # Cannot be empty.
+                { # Represents a Replica for this Secret.
+                  &quot;location&quot;: &quot;A String&quot;, # The canonical IDs of the location to replicate data.
+                      # For example: `&quot;us-east1&quot;`.
+                },
+              ],
+            },
           },
         },
-        &quot;createTime&quot;: &quot;A String&quot;, # Output only. The time at which the Secret was created.
-        &quot;labels&quot;: { # The labels assigned to this Secret.
-            #
-            # Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
-            # of maximum 128 bytes, and must conform to the following PCRE regular
-            # expression: `\p{Ll}\p{Lo}{0,62}`
-            #
-            # Label values must be between 0 and 63 characters long, have a UTF-8
-            # encoding of maximum 128 bytes, and must conform to the following PCRE
-            # regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
-            #
-            # No more than 64 labels can be assigned to a given resource.
-          &quot;a_key&quot;: &quot;A String&quot;,
-        },
-      },
     ],
-    &quot;nextPageToken&quot;: &quot;A String&quot;, # A token to retrieve the next page of results. Pass this value in
-        # ListSecretsRequest.page_token to retrieve the next page.
-    &quot;totalSize&quot;: 42, # The total number of Secrets.
   }</pre>
 </div>
 
@@ -753,63 +753,31 @@
     The object takes the form of:
 
 { # A Secret is a logical secret whose value and versions can
-    # be accessed.
-    # 
-    # A Secret is made up of zero or more SecretVersions that
-    # represent the secret data.
-  &quot;name&quot;: &quot;A String&quot;, # Output only. The resource name of the Secret in the format `projects/*/secrets/*`.
-  &quot;replication&quot;: { # A policy that defines the replication configuration of data. # Required. Immutable. The replication policy of the secret data attached to the Secret.
-      # 
-      # The replication policy cannot be changed after the Secret has been created.
-    &quot;userManaged&quot;: { # A replication policy that replicates the Secret payload into the # The Secret will only be replicated into the locations specified.
-        # locations specified in Secret.replication.user_managed.replicas
-      &quot;replicas&quot;: [ # Required. The list of Replicas for this Secret.
-          #
-          # Cannot be empty.
-        { # Represents a Replica for this Secret.
-          &quot;location&quot;: &quot;A String&quot;, # The canonical IDs of the location to replicate data.
-              # For example: `&quot;us-east1&quot;`.
-        },
-      ],
-    },
-    &quot;automatic&quot;: { # A replication policy that replicates the Secret payload without any # The Secret will automatically be replicated without any restrictions.
-        # restrictions.
-    },
-  },
-  &quot;createTime&quot;: &quot;A String&quot;, # Output only. The time at which the Secret was created.
-  &quot;labels&quot;: { # The labels assigned to this Secret.
-      # 
-      # Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
-      # of maximum 128 bytes, and must conform to the following PCRE regular
-      # expression: `\p{Ll}\p{Lo}{0,62}`
-      # 
-      # Label values must be between 0 and 63 characters long, have a UTF-8
-      # encoding of maximum 128 bytes, and must conform to the following PCRE
-      # regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
-      # 
-      # No more than 64 labels can be assigned to a given resource.
-    &quot;a_key&quot;: &quot;A String&quot;,
-  },
-}
-
-  updateMask: string, Required. Specifies the fields to be updated.
-  x__xgafv: string, V1 error format.
-    Allowed values
-      1 - v1 error format
-      2 - v2 error format
-
-Returns:
-  An object of the form:
-
-    { # A Secret is a logical secret whose value and versions can
       # be accessed.
-      #
+      # 
       # A Secret is made up of zero or more SecretVersions that
       # represent the secret data.
     &quot;name&quot;: &quot;A String&quot;, # Output only. The resource name of the Secret in the format `projects/*/secrets/*`.
+    &quot;createTime&quot;: &quot;A String&quot;, # Output only. The time at which the Secret was created.
+    &quot;labels&quot;: { # The labels assigned to this Secret.
+        # 
+        # Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
+        # of maximum 128 bytes, and must conform to the following PCRE regular
+        # expression: `\p{Ll}\p{Lo}{0,62}`
+        # 
+        # Label values must be between 0 and 63 characters long, have a UTF-8
+        # encoding of maximum 128 bytes, and must conform to the following PCRE
+        # regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
+        # 
+        # No more than 64 labels can be assigned to a given resource.
+      &quot;a_key&quot;: &quot;A String&quot;,
+    },
     &quot;replication&quot;: { # A policy that defines the replication configuration of data. # Required. Immutable. The replication policy of the secret data attached to the Secret.
-        #
+        # 
         # The replication policy cannot be changed after the Secret has been created.
+      &quot;automatic&quot;: { # A replication policy that replicates the Secret payload without any # The Secret will automatically be replicated without any restrictions.
+          # restrictions.
+      },
       &quot;userManaged&quot;: { # A replication policy that replicates the Secret payload into the # The Secret will only be replicated into the locations specified.
           # locations specified in Secret.replication.user_managed.replicas
         &quot;replicas&quot;: [ # Required. The list of Replicas for this Secret.
@@ -821,25 +789,57 @@
           },
         ],
       },
-      &quot;automatic&quot;: { # A replication policy that replicates the Secret payload without any # The Secret will automatically be replicated without any restrictions.
-          # restrictions.
+    },
+  }
+
+  updateMask: string, Required. Specifies the fields to be updated.
+  x__xgafv: string, V1 error format.
+    Allowed values
+      1 - v1 error format
+      2 - v2 error format
+
+Returns:
+  An object of the form:
+
+    { # A Secret is a logical secret whose value and versions can
+        # be accessed.
+        #
+        # A Secret is made up of zero or more SecretVersions that
+        # represent the secret data.
+      &quot;name&quot;: &quot;A String&quot;, # Output only. The resource name of the Secret in the format `projects/*/secrets/*`.
+      &quot;createTime&quot;: &quot;A String&quot;, # Output only. The time at which the Secret was created.
+      &quot;labels&quot;: { # The labels assigned to this Secret.
+          #
+          # Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
+          # of maximum 128 bytes, and must conform to the following PCRE regular
+          # expression: `\p{Ll}\p{Lo}{0,62}`
+          #
+          # Label values must be between 0 and 63 characters long, have a UTF-8
+          # encoding of maximum 128 bytes, and must conform to the following PCRE
+          # regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
+          #
+          # No more than 64 labels can be assigned to a given resource.
+        &quot;a_key&quot;: &quot;A String&quot;,
       },
-    },
-    &quot;createTime&quot;: &quot;A String&quot;, # Output only. The time at which the Secret was created.
-    &quot;labels&quot;: { # The labels assigned to this Secret.
-        #
-        # Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
-        # of maximum 128 bytes, and must conform to the following PCRE regular
-        # expression: `\p{Ll}\p{Lo}{0,62}`
-        #
-        # Label values must be between 0 and 63 characters long, have a UTF-8
-        # encoding of maximum 128 bytes, and must conform to the following PCRE
-        # regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
-        #
-        # No more than 64 labels can be assigned to a given resource.
-      &quot;a_key&quot;: &quot;A String&quot;,
-    },
-  }</pre>
+      &quot;replication&quot;: { # A policy that defines the replication configuration of data. # Required. Immutable. The replication policy of the secret data attached to the Secret.
+          #
+          # The replication policy cannot be changed after the Secret has been created.
+        &quot;automatic&quot;: { # A replication policy that replicates the Secret payload without any # The Secret will automatically be replicated without any restrictions.
+            # restrictions.
+        },
+        &quot;userManaged&quot;: { # A replication policy that replicates the Secret payload into the # The Secret will only be replicated into the locations specified.
+            # locations specified in Secret.replication.user_managed.replicas
+          &quot;replicas&quot;: [ # Required. The list of Replicas for this Secret.
+              #
+              # Cannot be empty.
+            { # Represents a Replica for this Secret.
+              &quot;location&quot;: &quot;A String&quot;, # The canonical IDs of the location to replicate data.
+                  # For example: `&quot;us-east1&quot;`.
+            },
+          ],
+        },
+      },
+    }</pre>
 </div>
 
 <div class="method">
@@ -927,12 +927,131 @@
         #
         # For a description of IAM and its features, see the
         # [IAM documentation](https://cloud.google.com/iam/docs/).
+      &quot;auditConfigs&quot;: [ # Specifies cloud audit logging configuration for this policy.
+        { # Specifies the audit configuration for a service.
+            # The configuration determines which permission types are logged, and what
+            # identities, if any, are exempted from logging.
+            # An AuditConfig must have one or more AuditLogConfigs.
+            #
+            # If there are AuditConfigs for both `allServices` and a specific service,
+            # the union of the two AuditConfigs is used for that service: the log_types
+            # specified in each AuditConfig are enabled, and the exempted_members in each
+            # AuditLogConfig are exempted.
+            #
+            # Example Policy with multiple AuditConfigs:
+            #
+            #     {
+            #       &quot;audit_configs&quot;: [
+            #         {
+            #           &quot;service&quot;: &quot;allServices&quot;,
+            #           &quot;audit_log_configs&quot;: [
+            #             {
+            #               &quot;log_type&quot;: &quot;DATA_READ&quot;,
+            #               &quot;exempted_members&quot;: [
+            #                 &quot;user:jose@example.com&quot;
+            #               ]
+            #             },
+            #             {
+            #               &quot;log_type&quot;: &quot;DATA_WRITE&quot;
+            #             },
+            #             {
+            #               &quot;log_type&quot;: &quot;ADMIN_READ&quot;
+            #             }
+            #           ]
+            #         },
+            #         {
+            #           &quot;service&quot;: &quot;sampleservice.googleapis.com&quot;,
+            #           &quot;audit_log_configs&quot;: [
+            #             {
+            #               &quot;log_type&quot;: &quot;DATA_READ&quot;
+            #             },
+            #             {
+            #               &quot;log_type&quot;: &quot;DATA_WRITE&quot;,
+            #               &quot;exempted_members&quot;: [
+            #                 &quot;user:aliya@example.com&quot;
+            #               ]
+            #             }
+            #           ]
+            #         }
+            #       ]
+            #     }
+            #
+            # For sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ
+            # logging. It also exempts jose@example.com from DATA_READ logging, and
+            # aliya@example.com from DATA_WRITE logging.
+          &quot;service&quot;: &quot;A String&quot;, # Specifies a service that will be enabled for audit logging.
+              # For example, `storage.googleapis.com`, `cloudsql.googleapis.com`.
+              # `allServices` is a special value that covers all services.
+          &quot;auditLogConfigs&quot;: [ # The configuration for logging of each type of permission.
+            { # Provides the configuration for logging a type of permissions.
+                # Example:
+                #
+                #     {
+                #       &quot;audit_log_configs&quot;: [
+                #         {
+                #           &quot;log_type&quot;: &quot;DATA_READ&quot;,
+                #           &quot;exempted_members&quot;: [
+                #             &quot;user:jose@example.com&quot;
+                #           ]
+                #         },
+                #         {
+                #           &quot;log_type&quot;: &quot;DATA_WRITE&quot;
+                #         }
+                #       ]
+                #     }
+                #
+                # This enables &#x27;DATA_READ&#x27; and &#x27;DATA_WRITE&#x27; logging, while exempting
+                # jose@example.com from DATA_READ logging.
+              &quot;exemptedMembers&quot;: [ # Specifies the identities that do not cause logging for this type of
+                  # permission.
+                  # Follows the same format of Binding.members.
+                &quot;A String&quot;,
+              ],
+              &quot;logType&quot;: &quot;A String&quot;, # The log type that this config enables.
+            },
+          ],
+        },
+      ],
+      &quot;version&quot;: 42, # Specifies the format of the policy.
+          #
+          # Valid values are `0`, `1`, and `3`. Requests that specify an invalid value
+          # are rejected.
+          #
+          # Any operation that affects conditional role bindings must specify version
+          # `3`. This requirement applies to the following operations:
+          #
+          # * Getting a policy that includes a conditional role binding
+          # * Adding a conditional role binding to a policy
+          # * Changing a conditional role binding in a policy
+          # * Removing any role binding, with or without a condition, from a policy
+          #   that includes conditions
+          #
+          # **Important:** If you use IAM Conditions, you must include the `etag` field
+          # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
+          # you to overwrite a version `3` policy with a version `1` policy, and all of
+          # the conditions in the version `3` policy are lost.
+          #
+          # If a policy does not include any conditions, operations on that policy may
+          # specify any valid version or leave the field unset.
+          #
+          # To learn which resources support conditions in their IAM policies, see the
+          # [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
+      &quot;etag&quot;: &quot;A String&quot;, # `etag` is used for optimistic concurrency control as a way to help
+          # prevent simultaneous updates of a policy from overwriting each other.
+          # It is strongly suggested that systems make use of the `etag` in the
+          # read-modify-write cycle to perform policy updates in order to avoid race
+          # conditions: An `etag` is returned in the response to `getIamPolicy`, and
+          # systems are expected to put that etag in the request to `setIamPolicy` to
+          # ensure that their change will be applied to the same version of the policy.
+          #
+          # **Important:** If you use IAM Conditions, you must include the `etag` field
+          # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
+          # you to overwrite a version `3` policy with a version `1` policy, and all of
+          # the conditions in the version `3` policy are lost.
       &quot;bindings&quot;: [ # Associates a list of `members` to a `role`. Optionally, may specify a
           # `condition` that determines how and when the `bindings` are applied. Each
           # of the `bindings` must contain at least one member.
         { # Associates `members` with a `role`.
-          &quot;role&quot;: &quot;A String&quot;, # Role that is assigned to `members`.
-              # For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
           &quot;condition&quot;: { # Represents a textual expression in the Common Expression Language (CEL) # The condition that is associated with this binding.
               #
               # If the condition evaluates to `true`, then this binding applies to the
@@ -975,15 +1094,15 @@
               # The exact variables and functions that may be referenced within an expression
               # are determined by the service that evaluates it. See the service
               # documentation for additional information.
+            &quot;expression&quot;: &quot;A String&quot;, # Textual representation of an expression in Common Expression Language
+                # syntax.
+            &quot;description&quot;: &quot;A String&quot;, # Optional. Description of the expression. This is a longer text which
+                # describes the expression, e.g. when hovered over it in a UI.
             &quot;title&quot;: &quot;A String&quot;, # Optional. Title for the expression, i.e. a short string describing
                 # its purpose. This can be used e.g. in UIs which allow to enter the
                 # expression.
             &quot;location&quot;: &quot;A String&quot;, # Optional. String indicating the location of the expression for error
                 # reporting, e.g. a file name and a position in the file.
-            &quot;description&quot;: &quot;A String&quot;, # Optional. Description of the expression. This is a longer text which
-                # describes the expression, e.g. when hovered over it in a UI.
-            &quot;expression&quot;: &quot;A String&quot;, # Textual representation of an expression in Common Expression Language
-                # syntax.
           },
           &quot;members&quot;: [ # Specifies the identities requesting access for a Cloud Platform resource.
               # `members` can have the following values:
@@ -1030,127 +1149,8 @@
               #
             &quot;A String&quot;,
           ],
-        },
-      ],
-      &quot;etag&quot;: &quot;A String&quot;, # `etag` is used for optimistic concurrency control as a way to help
-          # prevent simultaneous updates of a policy from overwriting each other.
-          # It is strongly suggested that systems make use of the `etag` in the
-          # read-modify-write cycle to perform policy updates in order to avoid race
-          # conditions: An `etag` is returned in the response to `getIamPolicy`, and
-          # systems are expected to put that etag in the request to `setIamPolicy` to
-          # ensure that their change will be applied to the same version of the policy.
-          #
-          # **Important:** If you use IAM Conditions, you must include the `etag` field
-          # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
-          # you to overwrite a version `3` policy with a version `1` policy, and all of
-          # the conditions in the version `3` policy are lost.
-      &quot;version&quot;: 42, # Specifies the format of the policy.
-          #
-          # Valid values are `0`, `1`, and `3`. Requests that specify an invalid value
-          # are rejected.
-          #
-          # Any operation that affects conditional role bindings must specify version
-          # `3`. This requirement applies to the following operations:
-          #
-          # * Getting a policy that includes a conditional role binding
-          # * Adding a conditional role binding to a policy
-          # * Changing a conditional role binding in a policy
-          # * Removing any role binding, with or without a condition, from a policy
-          #   that includes conditions
-          #
-          # **Important:** If you use IAM Conditions, you must include the `etag` field
-          # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
-          # you to overwrite a version `3` policy with a version `1` policy, and all of
-          # the conditions in the version `3` policy are lost.
-          #
-          # If a policy does not include any conditions, operations on that policy may
-          # specify any valid version or leave the field unset.
-          #
-          # To learn which resources support conditions in their IAM policies, see the
-          # [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
-      &quot;auditConfigs&quot;: [ # Specifies cloud audit logging configuration for this policy.
-        { # Specifies the audit configuration for a service.
-            # The configuration determines which permission types are logged, and what
-            # identities, if any, are exempted from logging.
-            # An AuditConfig must have one or more AuditLogConfigs.
-            #
-            # If there are AuditConfigs for both `allServices` and a specific service,
-            # the union of the two AuditConfigs is used for that service: the log_types
-            # specified in each AuditConfig are enabled, and the exempted_members in each
-            # AuditLogConfig are exempted.
-            #
-            # Example Policy with multiple AuditConfigs:
-            #
-            #     {
-            #       &quot;audit_configs&quot;: [
-            #         {
-            #           &quot;service&quot;: &quot;allServices&quot;
-            #           &quot;audit_log_configs&quot;: [
-            #             {
-            #               &quot;log_type&quot;: &quot;DATA_READ&quot;,
-            #               &quot;exempted_members&quot;: [
-            #                 &quot;user:jose@example.com&quot;
-            #               ]
-            #             },
-            #             {
-            #               &quot;log_type&quot;: &quot;DATA_WRITE&quot;,
-            #             },
-            #             {
-            #               &quot;log_type&quot;: &quot;ADMIN_READ&quot;,
-            #             }
-            #           ]
-            #         },
-            #         {
-            #           &quot;service&quot;: &quot;sampleservice.googleapis.com&quot;
-            #           &quot;audit_log_configs&quot;: [
-            #             {
-            #               &quot;log_type&quot;: &quot;DATA_READ&quot;,
-            #             },
-            #             {
-            #               &quot;log_type&quot;: &quot;DATA_WRITE&quot;,
-            #               &quot;exempted_members&quot;: [
-            #                 &quot;user:aliya@example.com&quot;
-            #               ]
-            #             }
-            #           ]
-            #         }
-            #       ]
-            #     }
-            #
-            # For sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ
-            # logging. It also exempts jose@example.com from DATA_READ logging, and
-            # aliya@example.com from DATA_WRITE logging.
-          &quot;service&quot;: &quot;A String&quot;, # Specifies a service that will be enabled for audit logging.
-              # For example, `storage.googleapis.com`, `cloudsql.googleapis.com`.
-              # `allServices` is a special value that covers all services.
-          &quot;auditLogConfigs&quot;: [ # The configuration for logging of each type of permission.
-            { # Provides the configuration for logging a type of permissions.
-                # Example:
-                #
-                #     {
-                #       &quot;audit_log_configs&quot;: [
-                #         {
-                #           &quot;log_type&quot;: &quot;DATA_READ&quot;,
-                #           &quot;exempted_members&quot;: [
-                #             &quot;user:jose@example.com&quot;
-                #           ]
-                #         },
-                #         {
-                #           &quot;log_type&quot;: &quot;DATA_WRITE&quot;,
-                #         }
-                #       ]
-                #     }
-                #
-                # This enables &#x27;DATA_READ&#x27; and &#x27;DATA_WRITE&#x27; logging, while exempting
-                # jose@example.com from DATA_READ logging.
-              &quot;exemptedMembers&quot;: [ # Specifies the identities that do not cause logging for this type of
-                  # permission.
-                  # Follows the same format of Binding.members.
-                &quot;A String&quot;,
-              ],
-              &quot;logType&quot;: &quot;A String&quot;, # The log type that this config enables.
-            },
-          ],
+          &quot;role&quot;: &quot;A String&quot;, # Role that is assigned to `members`.
+              # For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
         },
       ],
     },
@@ -1236,12 +1236,131 @@
       #
       # For a description of IAM and its features, see the
       # [IAM documentation](https://cloud.google.com/iam/docs/).
+    &quot;auditConfigs&quot;: [ # Specifies cloud audit logging configuration for this policy.
+      { # Specifies the audit configuration for a service.
+          # The configuration determines which permission types are logged, and what
+          # identities, if any, are exempted from logging.
+          # An AuditConfig must have one or more AuditLogConfigs.
+          #
+          # If there are AuditConfigs for both `allServices` and a specific service,
+          # the union of the two AuditConfigs is used for that service: the log_types
+          # specified in each AuditConfig are enabled, and the exempted_members in each
+          # AuditLogConfig are exempted.
+          #
+          # Example Policy with multiple AuditConfigs:
+          #
+          #     {
+          #       &quot;audit_configs&quot;: [
+          #         {
+          #           &quot;service&quot;: &quot;allServices&quot;,
+          #           &quot;audit_log_configs&quot;: [
+          #             {
+          #               &quot;log_type&quot;: &quot;DATA_READ&quot;,
+          #               &quot;exempted_members&quot;: [
+          #                 &quot;user:jose@example.com&quot;
+          #               ]
+          #             },
+          #             {
+          #               &quot;log_type&quot;: &quot;DATA_WRITE&quot;
+          #             },
+          #             {
+          #               &quot;log_type&quot;: &quot;ADMIN_READ&quot;
+          #             }
+          #           ]
+          #         },
+          #         {
+          #           &quot;service&quot;: &quot;sampleservice.googleapis.com&quot;,
+          #           &quot;audit_log_configs&quot;: [
+          #             {
+          #               &quot;log_type&quot;: &quot;DATA_READ&quot;
+          #             },
+          #             {
+          #               &quot;log_type&quot;: &quot;DATA_WRITE&quot;,
+          #               &quot;exempted_members&quot;: [
+          #                 &quot;user:aliya@example.com&quot;
+          #               ]
+          #             }
+          #           ]
+          #         }
+          #       ]
+          #     }
+          #
+          # For sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ
+          # logging. It also exempts jose@example.com from DATA_READ logging, and
+          # aliya@example.com from DATA_WRITE logging.
+        &quot;service&quot;: &quot;A String&quot;, # Specifies a service that will be enabled for audit logging.
+            # For example, `storage.googleapis.com`, `cloudsql.googleapis.com`.
+            # `allServices` is a special value that covers all services.
+        &quot;auditLogConfigs&quot;: [ # The configuration for logging of each type of permission.
+          { # Provides the configuration for logging a type of permissions.
+              # Example:
+              #
+              #     {
+              #       &quot;audit_log_configs&quot;: [
+              #         {
+              #           &quot;log_type&quot;: &quot;DATA_READ&quot;,
+              #           &quot;exempted_members&quot;: [
+              #             &quot;user:jose@example.com&quot;
+              #           ]
+              #         },
+              #         {
+              #           &quot;log_type&quot;: &quot;DATA_WRITE&quot;
+              #         }
+              #       ]
+              #     }
+              #
+              # This enables &#x27;DATA_READ&#x27; and &#x27;DATA_WRITE&#x27; logging, while exempting
+              # jose@example.com from DATA_READ logging.
+            &quot;exemptedMembers&quot;: [ # Specifies the identities that do not cause logging for this type of
+                # permission.
+                # Follows the same format of Binding.members.
+              &quot;A String&quot;,
+            ],
+            &quot;logType&quot;: &quot;A String&quot;, # The log type that this config enables.
+          },
+        ],
+      },
+    ],
+    &quot;version&quot;: 42, # Specifies the format of the policy.
+        #
+        # Valid values are `0`, `1`, and `3`. Requests that specify an invalid value
+        # are rejected.
+        #
+        # Any operation that affects conditional role bindings must specify version
+        # `3`. This requirement applies to the following operations:
+        #
+        # * Getting a policy that includes a conditional role binding
+        # * Adding a conditional role binding to a policy
+        # * Changing a conditional role binding in a policy
+        # * Removing any role binding, with or without a condition, from a policy
+        #   that includes conditions
+        #
+        # **Important:** If you use IAM Conditions, you must include the `etag` field
+        # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
+        # you to overwrite a version `3` policy with a version `1` policy, and all of
+        # the conditions in the version `3` policy are lost.
+        #
+        # If a policy does not include any conditions, operations on that policy may
+        # specify any valid version or leave the field unset.
+        #
+        # To learn which resources support conditions in their IAM policies, see the
+        # [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
+    &quot;etag&quot;: &quot;A String&quot;, # `etag` is used for optimistic concurrency control as a way to help
+        # prevent simultaneous updates of a policy from overwriting each other.
+        # It is strongly suggested that systems make use of the `etag` in the
+        # read-modify-write cycle to perform policy updates in order to avoid race
+        # conditions: An `etag` is returned in the response to `getIamPolicy`, and
+        # systems are expected to put that etag in the request to `setIamPolicy` to
+        # ensure that their change will be applied to the same version of the policy.
+        #
+        # **Important:** If you use IAM Conditions, you must include the `etag` field
+        # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
+        # you to overwrite a version `3` policy with a version `1` policy, and all of
+        # the conditions in the version `3` policy are lost.
     &quot;bindings&quot;: [ # Associates a list of `members` to a `role`. Optionally, may specify a
         # `condition` that determines how and when the `bindings` are applied. Each
         # of the `bindings` must contain at least one member.
       { # Associates `members` with a `role`.
-        &quot;role&quot;: &quot;A String&quot;, # Role that is assigned to `members`.
-            # For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
         &quot;condition&quot;: { # Represents a textual expression in the Common Expression Language (CEL) # The condition that is associated with this binding.
             #
             # If the condition evaluates to `true`, then this binding applies to the
@@ -1284,15 +1403,15 @@
             # The exact variables and functions that may be referenced within an expression
             # are determined by the service that evaluates it. See the service
             # documentation for additional information.
+          &quot;expression&quot;: &quot;A String&quot;, # Textual representation of an expression in Common Expression Language
+              # syntax.
+          &quot;description&quot;: &quot;A String&quot;, # Optional. Description of the expression. This is a longer text which
+              # describes the expression, e.g. when hovered over it in a UI.
           &quot;title&quot;: &quot;A String&quot;, # Optional. Title for the expression, i.e. a short string describing
               # its purpose. This can be used e.g. in UIs which allow to enter the
               # expression.
           &quot;location&quot;: &quot;A String&quot;, # Optional. String indicating the location of the expression for error
               # reporting, e.g. a file name and a position in the file.
-          &quot;description&quot;: &quot;A String&quot;, # Optional. Description of the expression. This is a longer text which
-              # describes the expression, e.g. when hovered over it in a UI.
-          &quot;expression&quot;: &quot;A String&quot;, # Textual representation of an expression in Common Expression Language
-              # syntax.
         },
         &quot;members&quot;: [ # Specifies the identities requesting access for a Cloud Platform resource.
             # `members` can have the following values:
@@ -1339,127 +1458,8 @@
             #
           &quot;A String&quot;,
         ],
-      },
-    ],
-    &quot;etag&quot;: &quot;A String&quot;, # `etag` is used for optimistic concurrency control as a way to help
-        # prevent simultaneous updates of a policy from overwriting each other.
-        # It is strongly suggested that systems make use of the `etag` in the
-        # read-modify-write cycle to perform policy updates in order to avoid race
-        # conditions: An `etag` is returned in the response to `getIamPolicy`, and
-        # systems are expected to put that etag in the request to `setIamPolicy` to
-        # ensure that their change will be applied to the same version of the policy.
-        #
-        # **Important:** If you use IAM Conditions, you must include the `etag` field
-        # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
-        # you to overwrite a version `3` policy with a version `1` policy, and all of
-        # the conditions in the version `3` policy are lost.
-    &quot;version&quot;: 42, # Specifies the format of the policy.
-        #
-        # Valid values are `0`, `1`, and `3`. Requests that specify an invalid value
-        # are rejected.
-        #
-        # Any operation that affects conditional role bindings must specify version
-        # `3`. This requirement applies to the following operations:
-        #
-        # * Getting a policy that includes a conditional role binding
-        # * Adding a conditional role binding to a policy
-        # * Changing a conditional role binding in a policy
-        # * Removing any role binding, with or without a condition, from a policy
-        #   that includes conditions
-        #
-        # **Important:** If you use IAM Conditions, you must include the `etag` field
-        # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
-        # you to overwrite a version `3` policy with a version `1` policy, and all of
-        # the conditions in the version `3` policy are lost.
-        #
-        # If a policy does not include any conditions, operations on that policy may
-        # specify any valid version or leave the field unset.
-        #
-        # To learn which resources support conditions in their IAM policies, see the
-        # [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
-    &quot;auditConfigs&quot;: [ # Specifies cloud audit logging configuration for this policy.
-      { # Specifies the audit configuration for a service.
-          # The configuration determines which permission types are logged, and what
-          # identities, if any, are exempted from logging.
-          # An AuditConfig must have one or more AuditLogConfigs.
-          #
-          # If there are AuditConfigs for both `allServices` and a specific service,
-          # the union of the two AuditConfigs is used for that service: the log_types
-          # specified in each AuditConfig are enabled, and the exempted_members in each
-          # AuditLogConfig are exempted.
-          #
-          # Example Policy with multiple AuditConfigs:
-          #
-          #     {
-          #       &quot;audit_configs&quot;: [
-          #         {
-          #           &quot;service&quot;: &quot;allServices&quot;
-          #           &quot;audit_log_configs&quot;: [
-          #             {
-          #               &quot;log_type&quot;: &quot;DATA_READ&quot;,
-          #               &quot;exempted_members&quot;: [
-          #                 &quot;user:jose@example.com&quot;
-          #               ]
-          #             },
-          #             {
-          #               &quot;log_type&quot;: &quot;DATA_WRITE&quot;,
-          #             },
-          #             {
-          #               &quot;log_type&quot;: &quot;ADMIN_READ&quot;,
-          #             }
-          #           ]
-          #         },
-          #         {
-          #           &quot;service&quot;: &quot;sampleservice.googleapis.com&quot;
-          #           &quot;audit_log_configs&quot;: [
-          #             {
-          #               &quot;log_type&quot;: &quot;DATA_READ&quot;,
-          #             },
-          #             {
-          #               &quot;log_type&quot;: &quot;DATA_WRITE&quot;,
-          #               &quot;exempted_members&quot;: [
-          #                 &quot;user:aliya@example.com&quot;
-          #               ]
-          #             }
-          #           ]
-          #         }
-          #       ]
-          #     }
-          #
-          # For sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ
-          # logging. It also exempts jose@example.com from DATA_READ logging, and
-          # aliya@example.com from DATA_WRITE logging.
-        &quot;service&quot;: &quot;A String&quot;, # Specifies a service that will be enabled for audit logging.
-            # For example, `storage.googleapis.com`, `cloudsql.googleapis.com`.
-            # `allServices` is a special value that covers all services.
-        &quot;auditLogConfigs&quot;: [ # The configuration for logging of each type of permission.
-          { # Provides the configuration for logging a type of permissions.
-              # Example:
-              #
-              #     {
-              #       &quot;audit_log_configs&quot;: [
-              #         {
-              #           &quot;log_type&quot;: &quot;DATA_READ&quot;,
-              #           &quot;exempted_members&quot;: [
-              #             &quot;user:jose@example.com&quot;
-              #           ]
-              #         },
-              #         {
-              #           &quot;log_type&quot;: &quot;DATA_WRITE&quot;,
-              #         }
-              #       ]
-              #     }
-              #
-              # This enables &#x27;DATA_READ&#x27; and &#x27;DATA_WRITE&#x27; logging, while exempting
-              # jose@example.com from DATA_READ logging.
-            &quot;exemptedMembers&quot;: [ # Specifies the identities that do not cause logging for this type of
-                # permission.
-                # Follows the same format of Binding.members.
-              &quot;A String&quot;,
-            ],
-            &quot;logType&quot;: &quot;A String&quot;, # The log type that this config enables.
-          },
-        ],
+        &quot;role&quot;: &quot;A String&quot;, # Role that is assigned to `members`.
+            # For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
       },
     ],
   }</pre>