Skip to content

fix: update image paths in tutorials for consistency #47

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Jun 3, 2025
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions docs/tutorials/todo-manager/README.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -522,7 +522,7 @@ Now you can click the "Connect" button to see if the MCP inspector can connect t
4. You should see the "Run Tool" button in the right side. Click on it and enter required parameters to run the tool.
5. You should see the tool result with the JSON response `{"error": "Not implemented"}`.

![MCP inspector first run](./assets/inspector-first-run.png)
![MCP inspector first run](/docs-assets/images/tutorials/todo-manager/inspector-first-run.png)

## Integrate with your authorization server \{#integrate-with-your-authorization-server}

Expand Down Expand Up @@ -1118,7 +1118,7 @@ You can test these different permission levels by:

This demonstrates how role-based access control (RBAC) works in practice, where different users have different levels of access to the system's functionality.

![MCP inspector todo manager tool result](./assets/result.png)
![MCP inspector todo manager tool result](/docs-assets/images/tutorials/todo-manager/result.png)

<Tabs groupId="sdk">
<TabItem value="python" label="Python">
Expand Down
4 changes: 2 additions & 2 deletions docs/tutorials/whoami/README.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -280,7 +280,7 @@ Now you can click the "Connect" button to see if the MCP inspector can connect t
4. You should see the "Run Tool" button in the right side. Click on it to run the tool.
5. You should see the tool result with the JSON response `{"error": "Not authenticated"}`.

![MCP inspector first run](./assets/inspector-first-run.png)
![MCP inspector first run](/docs-assets/images/tutorials/whoami/inspector-first-run.png)

## Integrate with your authorization server \{#integrate-with-your-authorization-server}

Expand Down Expand Up @@ -575,7 +575,7 @@ Restart your MCP server and open the MCP inspector in your browser. When you cli

Once you sign in and back to the MCP inspector, repeat the actions we did in the previous checkpoint to run the `whoami` tool. This time, you should see the user identity information returned by the authorization server.

![MCP inspector whoami tool result](./assets/result.png)
![MCP inspector whoami tool result](/docs-assets/images/tutorials/whoami/result.png)

<Tabs groupId="sdk">
<TabItem value="python" label="Python">
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -522,7 +522,7 @@ Jetzt kannst du auf die Schaltfläche "Connect" klicken, um zu sehen, ob der MCP
4. Du solltest rechts die Schaltfläche "Run Tool" sehen. Klicke darauf und gib die erforderlichen Parameter ein, um das Tool auszuführen.
5. Du solltest das Tool-Ergebnis mit der JSON-Antwort `{"error": "Nicht implementiert"}` sehen.

![MCP Inspector erster Start](./assets/inspector-first-run.png)
![MCP Inspector erster Start](/docs-assets/images/tutorials/todo-manager/inspector-first-run.png)

## Mit deinem Autorisierungsserver integrieren \{#integrate-with-your-authorization-server}

Expand Down Expand Up @@ -1118,7 +1118,7 @@ Du kannst diese verschiedenen Berechtigungsstufen testen, indem du:

Das zeigt, wie rollenbasierte Zugangskontrolle (RBAC) in der Praxis funktioniert, wobei verschiedene Benutzer unterschiedliche Zugriffsebenen auf die Funktionen des Systems haben.

![MCP Inspector Todo-Manager-Tool-Ergebnis](./assets/result.png)
![MCP Inspector Todo-Manager-Tool-Ergebnis](/docs-assets/images/tutorials/todo-manager/result.png)

<Tabs groupId="sdk">
<TabItem value="python" label="Python">
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -280,7 +280,7 @@ Jetzt kannst du auf die Schaltfläche "Connect" klicken, um zu sehen, ob der MCP
4. Du solltest auf der rechten Seite die Schaltfläche "Run Tool" sehen. Klicke darauf, um das Tool auszuführen.
5. Du solltest das Tool-Ergebnis mit der JSON-Antwort `{"error": "Nicht authentifiziert"}` sehen.

![MCP Inspector erster Lauf](./assets/inspector-first-run.png)
![MCP Inspector erster Lauf](/docs-assets/images/tutorials/whoami/inspector-first-run.png)

## Integration mit deinem Autorisierungsserver \{#integrate-with-your-authorization-server}

Expand Down Expand Up @@ -575,7 +575,7 @@ Starte deinen MCP-Server neu und öffne den MCP Inspector in deinem Browser. Wen

Sobald du dich angemeldet hast und zum MCP Inspector zurückkehrst, wiederhole die Schritte aus dem vorherigen Checkpoint, um das `whoami`-Tool auszuführen. Dieses Mal solltest du die vom Autorisierungsserver zurückgegebenen Benutzeridentitätsinformationen sehen.

![MCP Inspector whoami Tool Ergebnis](./assets/result.png)
![MCP Inspector whoami Tool Ergebnis](/docs-assets/images/tutorials/whoami/result.png)

<Tabs groupId="sdk">
<TabItem value="python" label="Python">
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -164,7 +164,7 @@ const mcpAuth = new MCPAuth({
</TabItem>
</Tabs>

#### Proporcionar manualmente los metadatos{manually-provide-metadata} \{#manually-provide-metadata}
#### Proporcionar manualmente los metadatos \{#manually-provide-metadata}

Si tu proveedor no admite la obtención de metadatos, puedes proporcionar manualmente el objeto de metadatos:

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -522,7 +522,7 @@ Ahora puedes hacer clic en el botón "Connect" para ver si el inspector MCP pued
4. Deberías ver el botón "Run Tool" en el lado derecho. Haz clic en él e ingresa los parámetros requeridos para ejecutar la herramienta.
5. Deberías ver el resultado de la herramienta con la respuesta JSON `{"error": "No implementado"}`.

![Primera ejecución del inspector MCP](./assets/inspector-first-run.png)
![Primera ejecución del inspector MCP](/docs-assets/images/tutorials/todo-manager/inspector-first-run.png)

## Integra con tu servidor de autorización \{#integrate-with-your-authorization-server}

Expand Down Expand Up @@ -1118,7 +1118,7 @@ Puedes probar estos diferentes niveles de permisos:

Esto demuestra cómo funciona el control de acceso basado en roles (RBAC) en la práctica, donde diferentes usuarios tienen diferentes niveles de acceso a la funcionalidad del sistema.

![Resultado de la herramienta gestor de tareas en el inspector MCP](./assets/result.png)
![Resultado de la herramienta gestor de tareas en el inspector MCP](/docs-assets/images/tutorials/todo-manager/result.png)

<Tabs groupId="sdk">
<TabItem value="python" label="Python">
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -280,7 +280,7 @@ Ahora puedes hacer clic en el botón "Connect" para ver si el inspector MCP pued
4. Deberías ver el botón "Run Tool" en el lado derecho. Haz clic en él para ejecutar la herramienta.
5. Deberías ver el resultado de la herramienta con la respuesta JSON `{"error": "Not authenticated"}`.

![Primera ejecución del inspector MCP](./assets/inspector-first-run.png)
![Primera ejecución del inspector MCP](/docs-assets/images/tutorials/whoami/inspector-first-run.png)

## Integra con tu servidor de autorización \{#integrate-with-your-authorization-server}

Expand Down Expand Up @@ -575,7 +575,7 @@ Reinicia tu servidor MCP y abre el inspector MCP en tu navegador. Cuando hagas c

Una vez que inicies sesión y regreses al inspector MCP, repite las acciones que hicimos en el punto de control anterior para ejecutar la herramienta `whoami`. Esta vez, deberías ver la información de identidad del usuario retornada por el servidor de autorización.

![Resultado de la herramienta whoami en el inspector MCP](./assets/result.png)
![Resultado de la herramienta whoami en el inspector MCP](/docs-assets/images/tutorials/whoami/result.png)

<Tabs groupId="sdk">
<TabItem value="python" label="Python">
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -522,7 +522,7 @@ Vous pouvez maintenant cliquer sur le bouton "Connecter" pour voir si l’inspec
4. Vous devriez voir le bouton "Exécuter l’outil" à droite. Cliquez dessus et saisissez les paramètres requis pour exécuter l’outil.
5. Vous devriez voir le résultat de l’outil avec la réponse JSON `{"error": "Non implémenté"}`.

![Première exécution de l’inspecteur MCP](./assets/inspector-first-run.png)
![Première exécution de l’inspecteur MCP](/docs-assets/images/tutorials/todo-manager/inspector-first-run.png)

## Intégrer avec votre serveur d’autorisation \{#integrate-with-your-authorization-server}

Expand Down Expand Up @@ -1118,7 +1118,7 @@ Vous pouvez tester ces différents niveaux de permission en :

Cela démontre comment le contrôle d’accès basé sur les rôles (RBAC) fonctionne en pratique, où différents utilisateurs ont différents niveaux d’accès aux fonctionnalités du système.

![Résultat de l’outil todo manager dans l’inspecteur MCP](./assets/result.png)
![Résultat de l’outil todo manager dans l’inspecteur MCP](/docs-assets/images/tutorials/todo-manager/result.png)

<Tabs groupId="sdk">
<TabItem value="python" label="Python">
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -280,7 +280,7 @@ Vous pouvez maintenant cliquer sur le bouton "Connecter" pour voir si l’inspec
4. Vous devriez voir le bouton "Exécuter l’outil" à droite. Cliquez dessus pour exécuter l’outil.
5. Vous devriez voir le résultat de l’outil avec la réponse JSON `{"error": "Not authenticated"}`.

![Première exécution de l’inspecteur MCP](./assets/inspector-first-run.png)
![Première exécution de l’inspecteur MCP](/docs-assets/images/tutorials/whoami/inspector-first-run.png)

## Intégrer avec votre serveur d’autorisation \{#integrate-with-your-authorization-server}

Expand Down Expand Up @@ -575,7 +575,7 @@ Redémarrez votre serveur MCP et ouvrez l’inspecteur MCP dans votre navigateur

Une fois connecté et de retour dans l’inspecteur MCP, répétez les actions du point de contrôle précédent pour exécuter l’outil `whoami`. Cette fois, vous devriez voir les informations d'identité utilisateur retournées par le serveur d’autorisation.

![Résultat de l’outil whoami dans l’inspecteur MCP](./assets/result.png)
![Résultat de l’outil whoami dans l’inspecteur MCP](/docs-assets/images/tutorials/whoami/result.png)

<Tabs groupId="sdk">
<TabItem value="python" label="Python">
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -518,7 +518,7 @@ npm run dev
4. 右側に「Run Tool」ボタンが表示されます。クリックして必要なパラメータを入力し、ツールを実行します。
5. ツールの結果として `{"error": "Not implemented"}` という JSON レスポンスが表示されます。

![MCP inspector first run](./assets/inspector-first-run.png)
![MCP inspector first run](/docs-assets/images/tutorials/todo-manager/inspector-first-run.png)

## 認可サーバーと連携する \{#integrate-with-your-authorization-server}

Expand Down Expand Up @@ -1114,7 +1114,7 @@ MCP サーバーを再起動し、ブラウザで MCP inspector を開きます

これにより、ロールベースのアクセス制御 (RBAC) が実際にどのように機能するかを体験できます。

![MCP inspector todo manager tool result](./assets/result.png)
![MCP inspector todo manager tool result](/docs-assets/images/tutorials/todo-manager/result.png)

<Tabs groupId="sdk">
<TabItem value="python" label="Python">
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -280,7 +280,7 @@ npm run dev
4. 右側に「Run Tool」ボタンが表示されるのでクリック
5. ツールの結果として `{"error": "Not authenticated"}` という JSON レスポンスが表示されます。

![MCP inspector first run](./assets/inspector-first-run.png)
![MCP inspector first run](/docs-assets/images/tutorials/whoami/inspector-first-run.png)

## 認可 (Authorization) サーバーとの連携 \{#integrate-with-your-authorization-server}

Expand Down Expand Up @@ -570,7 +570,7 @@ MCP サーバーを再起動し、ブラウザで MCP inspector を開きます

サインイン後 MCP inspector に戻り、前回と同じ手順で `whoami` ツールを実行してください。今回は認可 (Authorization) サーバーから返されたユーザーのアイデンティティ情報が表示されるはずです。

![MCP inspector whoami tool result](./assets/result.png)
![MCP inspector whoami tool result](/docs-assets/images/tutorials/whoami/result.png)

<Tabs groupId="sdk">
<TabItem value="python" label="Python">
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -517,7 +517,7 @@ npm run dev
4. 우측에 "Run Tool" 버튼이 보입니다. 클릭 후 필요한 파라미터 입력하여 도구 실행
5. JSON 응답 `{"error": "Not implemented"}`와 함께 도구 결과가 표시됩니다.

![MCP inspector 첫 실행](./assets/inspector-first-run.png)
![MCP inspector 첫 실행](/docs-assets/images/tutorials/todo-manager/inspector-first-run.png)

## 인가 서버와 통합 (Integrate with your authorization server) \{#integrate-with-your-authorization-server}

Expand Down Expand Up @@ -1112,7 +1112,7 @@ MCP 서버를 재시작하고 브라우저에서 MCP inspector를 엽니다. "Co

이렇게 하면 역할 기반 접근 제어 (RBAC)가 실제로 어떻게 동작하는지 체험할 수 있습니다.

![MCP inspector todo manager 도구 결과](./assets/result.png)
![MCP inspector todo manager 도구 결과](/docs-assets/images/tutorials/todo-manager/result.png)

<Tabs groupId="sdk">
<TabItem value="python" label="Python">
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -280,7 +280,7 @@ npm run dev
4. 우측에 "Run Tool" 버튼이 보입니다. 클릭하여 도구 실행
5. JSON 응답 `{"error": "Not authenticated"}`가 결과로 표시되어야 합니다.

![MCP 인스펙터 첫 실행](./assets/inspector-first-run.png)
![MCP 인스펙터 첫 실행](/docs-assets/images/tutorials/whoami/inspector-first-run.png)

## 인가 (Authorization) 서버와 통합하기 \{#integrate-with-your-authorization-server}

Expand Down Expand Up @@ -575,7 +575,7 @@ MCP 서버를 재시작하고 MCP 인스펙터를 브라우저에서 엽니다.

로그인 후 MCP 인스펙터로 돌아오면, 이전 체크포인트에서 했던 것처럼 `whoami` 도구를 실행하세요. 이번에는 인가 (Authorization) 서버가 반환하는 사용자 아이덴티티 정보가 표시됩니다.

![MCP 인스펙터 whoami 도구 결과](./assets/result.png)
![MCP 인스펙터 whoami 도구 결과](/docs-assets/images/tutorials/whoami/result.png)

<Tabs groupId="sdk">
<TabItem value="python" label="Python">
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -522,7 +522,7 @@ Agora você pode clicar no botão "Connect" para ver se o MCP inspector consegue
4. Você deve ver o botão "Run Tool" no lado direito. Clique nele e insira os parâmetros necessários para executar a ferramenta.
5. Você verá o resultado da ferramenta com a resposta JSON `{"error": "Não implementado"}`.

![Primeira execução do MCP inspector](./assets/inspector-first-run.png)
![Primeira execução do MCP inspector](/docs-assets/images/tutorials/todo-manager/inspector-first-run.png)

## Integre com seu servidor de autorização \{#integrate-with-your-authorization-server}

Expand Down Expand Up @@ -1118,7 +1118,7 @@ Você pode testar esses diferentes níveis de permissão:

Isso demonstra como o controle de acesso baseado em papel (RBAC) funciona na prática, onde diferentes usuários têm diferentes níveis de acesso à funcionalidade do sistema.

![Resultado da ferramenta do gerenciador de tarefas no MCP inspector](./assets/result.png)
![Resultado da ferramenta do gerenciador de tarefas no MCP inspector](/docs-assets/images/tutorials/todo-manager/result.png)

<Tabs groupId="sdk">
<TabItem value="python" label="Python">
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -280,7 +280,7 @@ Agora você pode clicar no botão "Connect" para ver se o MCP inspector consegue
4. Você deve ver o botão "Run Tool" no lado direito. Clique nele para executar a ferramenta.
5. Você deve ver o resultado da ferramenta com a resposta JSON `{"error": "Not authenticated"}`.

![Primeira execução do MCP inspector](./assets/inspector-first-run.png)
![Primeira execução do MCP inspector](/docs-assets/images/tutorials/whoami/inspector-first-run.png)

## Integre com seu servidor de autorização (Integrate with your authorization server) \{#integrate-with-your-authorization-server}

Expand Down Expand Up @@ -575,7 +575,7 @@ Reinicie seu servidor MCP e abra o MCP inspector no navegador. Ao clicar no bot

Depois de fazer login e retornar ao MCP inspector, repita as ações que fizemos no ponto de verificação anterior para executar a ferramenta `whoami`. Desta vez, você deve ver as informações de identidade do usuário retornadas pelo servidor de autorização.

![Resultado da ferramenta whoami no MCP inspector](./assets/result.png)
![Resultado da ferramenta whoami no MCP inspector](/docs-assets/images/tutorials/whoami/result.png)

<Tabs groupId="sdk">
<TabItem value="python" label="Python">
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -522,7 +522,7 @@ npm run dev
4. 你将在右侧看到“Run Tool”按钮。点击并输入所需参数运行工具。
5. 你将看到工具返回的 JSON 响应 `{"error": "Not implemented"}`。

![MCP inspector 首次运行](./assets/inspector-first-run.png)
![MCP inspector 首次运行](/docs-assets/images/tutorials/todo-manager/inspector-first-run.png)

## 集成你的授权 (Authorization) 服务器 \{#integrate-with-your-authorization-server}

Expand Down Expand Up @@ -1118,7 +1118,7 @@ server.tool(

这展示了基于角色的访问控制 (RBAC) 在实际中的工作方式,不同用户对系统功能有不同访问级别。

![MCP inspector 待办事项管理工具结果](./assets/result.png)
![MCP inspector 待办事项管理工具结果](/docs-assets/images/tutorials/todo-manager/result.png)

<Tabs groupId="sdk">
<TabItem value="python" label="Python">
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -280,7 +280,7 @@ npm run dev
4. 在右侧你会看到 "Run Tool" 按钮,点击运行该工具。
5. 你将看到工具返回的 JSON 响应 `{"error": "Not authenticated"}`。

![MCP inspector 首次运行](./assets/inspector-first-run.png)
![MCP inspector 首次运行](/docs-assets/images/tutorials/whoami/inspector-first-run.png)

## 集成你的授权 (Authorization) 服务器 (Integrate with your authorization server) \{#integrate-with-your-authorization-server}

Expand Down Expand Up @@ -575,7 +575,7 @@ app.use(mcpAuth.bearerAuth(verifyToken));

登录后返回 MCP inspector,重复上一个检查点的操作运行 `whoami` 工具。这一次,你应该能看到授权 (Authorization) 服务器返回的用户身份信息。

![MCP inspector whoami 工具结果](./assets/result.png)
![MCP inspector whoami 工具结果](/docs-assets/images/tutorials/whoami/result.png)

<Tabs groupId="sdk">
<TabItem value="python" label="Python">
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -522,7 +522,7 @@ npm run dev
4. 右側會有「Run Tool」按鈕,點擊並輸入必要參數執行工具
5. 應會看到工具回傳結果為 `{"error": "Not implemented"}` 的 JSON

![MCP inspector 首次執行畫面](./assets/inspector-first-run.png)
![MCP inspector 首次執行畫面](/docs-assets/images/tutorials/todo-manager/inspector-first-run.png)

## 與授權伺服器整合 (Integrate with your authorization server) \{#integrate-with-your-authorization-server}

Expand Down Expand Up @@ -1118,7 +1118,7 @@ server.tool(

這展示了角色型存取控制 (RBAC) 的實際運作,不同使用者對系統功能有不同存取層級。

![MCP inspector todo manager 工具結果](./assets/result.png)
![MCP inspector todo manager 工具結果](/docs-assets/images/tutorials/todo-manager/result.png)

<Tabs groupId="sdk">
<TabItem value="python" label="Python">
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -280,7 +280,7 @@ npm run dev
4. 右側會出現「Run Tool」按鈕,點擊執行工具。
5. 你應該會看到工具回傳結果為 JSON:`{"error": "Not authenticated"}`。

![MCP inspector 首次執行畫面](./assets/inspector-first-run.png)
![MCP inspector 首次執行畫面](/docs-assets/images/tutorials/whoami/inspector-first-run.png)

## 與授權伺服器整合 (Integrate with your authorization server) \{#integrate-with-your-authorization-server}

Expand Down Expand Up @@ -575,7 +575,7 @@ app.use(mcpAuth.bearerAuth(verifyToken));

登入後回到 MCP inspector,重複前述步驟執行 `whoami` 工具。這次你應該會看到授權伺服器回傳的使用者身分資訊。

![MCP inspector whoami 工具結果](./assets/result.png)
![MCP inspector whoami 工具結果](/docs-assets/images/tutorials/whoami/result.png)

<Tabs groupId="sdk">
<TabItem value="python" label="Python">
Expand Down
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.