jakarta.ws.rs
diff --git a/kitchensink/src/main/java/org/jboss/as/quickstarts/kitchensink/rest/JaxRsActivator.java b/kitchensink/src/main/java/org/jboss/as/quickstarts/kitchensink/rest/JaxRsActivator.java
index cff6e84754..40d01ca8ca 100644
--- a/kitchensink/src/main/java/org/jboss/as/quickstarts/kitchensink/rest/JaxRsActivator.java
+++ b/kitchensink/src/main/java/org/jboss/as/quickstarts/kitchensink/rest/JaxRsActivator.java
@@ -21,7 +21,7 @@
/**
* A class extending {@link Application} and annotated with @ApplicationPath is the Jakarta EE "no XML" approach to activating
- * JAX-RS.
+ * Jakarta REST.
*
*
* Resources are served relative to the servlet path specified in the {@link ApplicationPath} annotation.
diff --git a/kitchensink/src/main/java/org/jboss/as/quickstarts/kitchensink/rest/MemberResourceRESTService.java b/kitchensink/src/main/java/org/jboss/as/quickstarts/kitchensink/rest/MemberResourceRESTService.java
index 670ddbfaf3..8bcce87ddc 100644
--- a/kitchensink/src/main/java/org/jboss/as/quickstarts/kitchensink/rest/MemberResourceRESTService.java
+++ b/kitchensink/src/main/java/org/jboss/as/quickstarts/kitchensink/rest/MemberResourceRESTService.java
@@ -45,7 +45,7 @@
import org.jboss.as.quickstarts.kitchensink.service.MemberRegistration;
/**
- * JAX-RS Example
+ * Jakarta REST Example
*
* This class produces a RESTful service to read/write the contents of the members table.
*/
@@ -83,7 +83,7 @@ public Member lookupMemberById(@PathParam("id") long id) {
}
/**
- * Creates a new member from the values provided. Performs validation, and will return a JAX-RS response with either 200 ok,
+ * Creates a new member from the values provided. Performs validation, and will return a Jakarta REST response with either 200 ok,
* or with a map of fields, and related errors.
*/
@POST
@@ -148,11 +148,11 @@ private void validateMember(Member member) throws ConstraintViolationException,
}
/**
- * Creates a JAX-RS "Bad Request" response including a map of all violation fields, and their message. This can then be used
+ * Creates a Jakarta REST "Bad Request" response including a map of all violation fields, and their message. This can then be used
* by clients to show violations.
*
* @param violations A set of violations that needs to be reported
- * @return JAX-RS response containing all violations
+ * @return Jakarta REST response containing all violations
*/
private Response.ResponseBuilder createViolationResponse(Set> violations) {
log.fine("Validation completed. violations found: " + violations.size());
diff --git a/microprofile-config/README-source.adoc b/microprofile-config/README-source.adoc
index 7dcec08530..7945d62cfd 100644
--- a/microprofile-config/README-source.adoc
+++ b/microprofile-config/README-source.adoc
@@ -164,7 +164,7 @@ Now we are ready to start working with MicroProfile Config.
== Injecting a configuration value
Let's start by creating a new CDI bean which will use for the injection of our
-configuration values. This CDI bean will also be a JAX-RS resource. Create a new
+configuration values. This CDI bean will also be a Jakarta REST resource. Create a new
class `org.wildfly.quickstarts.microprofile.config.ConfigResource`;
To inject any configuration value, MicroProfile Config provides a custom qualifier
diff --git a/microprofile-fault-tolerance/README-source.adoc b/microprofile-fault-tolerance/README-source.adoc
index efe5c03250..6f71891616 100644
--- a/microprofile-fault-tolerance/README-source.adoc
+++ b/microprofile-fault-tolerance/README-source.adoc
@@ -49,7 +49,7 @@ include::../shared-doc/start-the-standalone-server.adoc[leveloffset=+1]
[[project-from-scratch]]
== Creating an Application from Scratch
-In this section we will go through the steps to create a new JAX-RS deployment from scratch and then make it more
+In this section we will go through the steps to create a new Jakarta REST deployment from scratch and then make it more
resilient by using MicroProfile Fault Tolerance annotations.
=== Project Generation
@@ -200,7 +200,7 @@ public class Coffee {
}
----
-Now, lets expose our JAX-RS application at the context path:
+Now, lets expose our Jakarta REST application at the context path:
[source,java]
----
diff --git a/microprofile-fault-tolerance/src/main/java/org/wildfly/quickstarts/microprofile/faulttolerance/CoffeeResource.java b/microprofile-fault-tolerance/src/main/java/org/wildfly/quickstarts/microprofile/faulttolerance/CoffeeResource.java
index a5fb22a169..0a6b4acbd7 100644
--- a/microprofile-fault-tolerance/src/main/java/org/wildfly/quickstarts/microprofile/faulttolerance/CoffeeResource.java
+++ b/microprofile-fault-tolerance/src/main/java/org/wildfly/quickstarts/microprofile/faulttolerance/CoffeeResource.java
@@ -36,7 +36,7 @@
import org.jboss.logging.Logger;
/**
- * A JAX-RS resource that provides information about kinds of coffees we have on store and numbers of packages available.
+ * A Jakarta REST resource that provides information about kinds of coffees we have on store and numbers of packages available.
* Demonstrates {@link Retry}, {@link CircuitBreaker}, {@link Timeout} and {@link Fallback} policies.
*
* @author Radoslav Husar
diff --git a/microprofile-jwt/README-source.adoc b/microprofile-jwt/README-source.adoc
index c568518e43..22c0b969f4 100644
--- a/microprofile-jwt/README-source.adoc
+++ b/microprofile-jwt/README-source.adoc
@@ -118,13 +118,13 @@ include::../shared-doc/undeploy-the-quickstart.adoc[leveloffset=+1]
== Starting from Scratch
-In this section we will go through the steps to create a new JAX-RS deployment from scratch and incrementally
+In this section we will go through the steps to create a new Jakarta REST deployment from scratch and incrementally
add support for MicroProfile JWT including token generation, activation of authorization and the injection
of claims.
=== Project Generation
-This quickstart will be making use of JAX-RS endpoints secured using MicroProfile JWT so the first step
+This quickstart will be making use of Jakarta REST endpoints secured using MicroProfile JWT so the first step
is to generate a new `webapp` project: -
[source,options="nowrap"]
@@ -259,10 +259,10 @@ Once the project has been developed this plug-in will handle the deployment to t
// Setup required repositories
include::../shared-doc/setup-repositories.adoc[leveloffset=+1]
-==== JAX-RS Conversion
+==== Jakarta REST Conversion
The generated project is a standard web application so the next step will be to delete the files not
-required by this quickstart and add the JAX-RS application and a `helloWorld` endpoint.
+required by this quickstart and add the Jakarta REST application and a `helloWorld` endpoint.
Under `src/main/webapp` delete the generated `index.jsp`.
@@ -272,7 +272,7 @@ to enable CDI for the deployment.
Under `src/main` create a new `java` directory to hold the Java class to be added to the project.
Add the following class in the `org.wildfly.quickstarts.mpjwt` package, this will be the main trigger to
-process the deployment as a JAX-RS deployment.
+process the deployment as a Jakarta REST deployment.
[source,java]
----
@@ -310,7 +310,7 @@ public class SampleEndPoint {
}
----
-At this stage the project contains a simple JAX-RS endpoint we can deploy to the server and invoke to verify
+At this stage the project contains a simple Jakarta REST endpoint we can deploy to the server and invoke to verify
everything is working as expected before moving on to enable JWT based authentication and authorization.
First build the example and deploy it to the previously started application server.
@@ -522,7 +522,7 @@ We now have everything we need to activate `MP-JWT` authentication on the deploy
=== Activating MicroProfile JWT
-At this stage we have a basic JAX-RS deployment, a pair of keys for the generation of and validation of JWT tokens and a utility to generate JWT tokens.
+At this stage we have a basic Jakarta REST deployment, a pair of keys for the generation of and validation of JWT tokens and a utility to generate JWT tokens.
Our next step is to activate MicroProfile JWT authentication for the deployment and we can then make use of some of the advanced features such as role
based access control using the groups from within the token and access to individual claims within the token.
@@ -590,7 +590,7 @@ public String helloRolesAllowed(@Context SecurityContext ctx) {
----
-Within WildFly the JAX-RS deployment is handled by RESTEasy so under `src/main/webapp/WEB-INF` add the following to the web.xml to enable RESTEasy authorization checks.
+Within WildFly the Jakarta REST deployment is handled by RESTEasy so under `src/main/webapp/WEB-INF` add the following to the web.xml to enable RESTEasy authorization checks.
[source,xml]
----
diff --git a/microprofile-jwt/pom.xml b/microprofile-jwt/pom.xml
index 49d7d32da1..414072805b 100644
--- a/microprofile-jwt/pom.xml
+++ b/microprofile-jwt/pom.xml
@@ -100,7 +100,7 @@
provided
-
+