From 8304b08139b3b335ed6e57ee23db697936ac5028 Mon Sep 17 00:00:00 2001 From: Maria Elisabeth Schreiber Date: Mon, 10 Jun 2024 14:10:43 -0600 Subject: [PATCH] Update router terminology --- docs/source/commands/license.mdx | 2 +- docs/source/commands/persisted-queries.mdx | 2 +- docs/source/commands/supergraphs.mdx | 4 ++-- 3 files changed, 4 insertions(+), 4 deletions(-) diff --git a/docs/source/commands/license.mdx b/docs/source/commands/license.mdx index 95f339e5c..dd07af162 100644 --- a/docs/source/commands/license.mdx +++ b/docs/source/commands/license.mdx @@ -17,7 +17,7 @@ Offline Enterprise license support is available on an as-needed basis. Send a re -Run `rover license fetch` to fetch an offline license from GraphOS for a graph with a GraphOS Enterprise plan. Use the fetched license to enable enterprise features while running offline and disconnected from GraphOS, as supported when [running the Apollo Router with an offline license](/router/enterprise-features/#set-up-offline-license-for-the-apollo-router). +Run `rover license fetch` to fetch an offline license from GraphOS for a graph with a GraphOS Enterprise plan. Use the fetched license to enable enterprise features while running offline and disconnected from GraphOS, as supported when [running the GraphOS Router with an offline license](/router/enterprise-features/#set-up-offline-license-for-the-apollo-router). Specify the graph to fetch from with a `--graph-id` argument: diff --git a/docs/source/commands/persisted-queries.mdx b/docs/source/commands/persisted-queries.mdx index 6dfc37c8d..ba4cbbb67 100644 --- a/docs/source/commands/persisted-queries.mdx +++ b/docs/source/commands/persisted-queries.mdx @@ -7,7 +7,7 @@ description: Publish persisted query manifests for safelisting and performance o import AuthNotice from '../../shared/auth-notice.mdx'; -With [GraphOS Enterprise](/graphos/enterprise/), you can enhance a graph's security by maintaining a **persisted query list** (**PQL**) for your graph's self-hosted router. The [Apollo Router](/router/) checks incoming requests against the PQL, and can be configured to reject operations that aren't registered in the list. +With [GraphOS Enterprise](/graphos/enterprise/), you can enhance a graph's security by maintaining a **persisted query list** (**PQL**) for your graph's self-hosted router. The [GraphOS Router](/router/) checks incoming requests against the PQL, and can be configured to reject operations that aren't registered in the list. Registering operations to a PQL has two steps: diff --git a/docs/source/commands/supergraphs.mdx b/docs/source/commands/supergraphs.mdx index c87edcb39..7b90b9b8b 100644 --- a/docs/source/commands/supergraphs.mdx +++ b/docs/source/commands/supergraphs.mdx @@ -106,11 +106,11 @@ subgraphs: #### Variable expansion -The `supergraph.yaml` file supports variable expansion using [the same syntax as Apollo Router](/router/configuration/overview/#variable-expansion). +The `supergraph.yaml` file supports variable expansion using [the same syntax as GraphOS Router](/router/configuration/overview/#variable-expansion). ### Output format -By default, `rover supergraph compose` outputs a [supergraph schema](/federation/federated-types/overview/) document to `stdout`. You provide this artifact to [`@apollo/gateway`](/apollo-server/using-federation/api/apollo-gateway/) or the [🦀 Apollo Router](/router/) on startup. +By default, `rover supergraph compose` outputs a [supergraph schema](/federation/federated-types/overview/) document to `stdout`. You provide this artifact to [`@apollo/gateway`](/apollo-server/using-federation/api/apollo-gateway/) or the [🦀 GraphOS Router](/router/) on startup.