Gdrive Cloudflare worker
Remote MCP server for Google Drive and Sheets running on Cloudflare Workers with full OAuth 2.0 support.
mcp-gdrive-cf
Remote MCP server for Google Drive and Sheets running on Cloudflare Workers with full OAuth 2.0 support.
Production Ready โ | 11 Tools | OAuth 2.0 | PKCE | Global Edge Network
Adapted from isaacphi/mcp-gdrive to run as a remote HTTP/SSE MCP server on Cloudflare's edge network with complete OAuth 2.0 authorization server capabilities.
๐ Quick Start
```bash
1. Clone and install
git clone https://github.com/brianmoney/mcp-gdrive-cf.git cd mcp-gdrive-cf npm install
2. Create KV namespaces
wrangler kv:namespace create KV_TOKENS wrangler kv:namespace create KV_CLIENTS
3. Update wrangler.toml with your namespace IDs
4. Configure Google OAuth credentials
wrangler secret put GOOGLE_CLIENT_SECRET
5. Deploy
wrangler deploy
6. Test with MCP Inspector
npx @modelcontextprotocol/inspector https://your-worker.workers.dev/sse ```
โจ Features
Drive Operations
- ๐ Search - Basic and advanced search with filters (MIME type, owner, dates, shared drives)
- ๐ Read - Read any file with 22+ export formats (PDF, DOCX, XLSX, Markdown, etc.)
- ๐ Create Folders - Organize files with nested folder structures
- โฌ๏ธ Upload - Upload files up to 5MB
- ๐๏ธ Delete - Move files to trash
- ๐ฆ Move - Reorganize files between folders
- ๐ Share - Add permissions (reader, writer, commenter, owner)
Sheets Operations
- ๐ Read - Batch read multiple ranges
- โ๏ธ Update - Update individual cells
- โ Append - Add rows to spreadsheets
Infrastructure
- โ๏ธ Global Edge Network - Runs on Cloudflare Workers worldwide
- ๐ OAuth 2.0 Server - Full authorization server with PKCE support
- ๐ Dynamic Client Registration - Automatic client onboarding
- ๐ Auto Token Refresh - Seamless Google token renewal
- ๐ก SSE Transport - Real-time Server-Sent Events
- ๐ก๏ธ Secure - HTTPS only, encrypted token storage
๐ฏ What Makes This Different
Unlike the original STDIO-based `mcp-gdrive`, this implementation:
- Runs remotely on Cloudflare Workers (no local process)
- Full OAuth 2.0 authorization server (not just OAuth client)
- Multi-client support via dynamic client registration
- PKCE security for public clients
- 22+ export formats for Drive files
- Write operations (create, delete, move, share, upload)
- Production tested with real workloads
๐ Prerequisites
Required
- Cloudflare Account with Workers enabled (free tier works)
- Google Cloud Project with Drive API and Sheets API enabled
- Node.js LTS (v18+)
- Wrangler CLI (`npm install -g wrangler`)
Google Cloud Setup
- Create a project at Google Cloud Console
- Enable APIs:
- Google Drive API
- Google Sheets API
- Create OAuth 2.0 credentials:
- Type: Web application
- Redirect URIs: `https://your-worker.workers.dev/google/callback\`
- Required OAuth scopes:
๐ง Installation & Deployment
1. Install Dependencies
```bash npm install ```
2. Create KV Namespaces
```bash
For user session tokens
wrangler kv:namespace create KV_TOKENS
For OAuth client registrations
wrangler kv:namespace create KV_CLIENTS ```
Copy the namespace IDs to `wrangler.toml`:
```toml [[kv_namespaces]] binding = "KV_TOKENS" id = "your-tokens-namespace-id"
[[kv_namespaces]] binding = "KV_CLIENTS" id = "your-clients-namespace-id" ```
3. Configure Environment Variables
Add to `wrangler.toml`:
```toml [vars] GOOGLE_CLIENT_ID = "your-client-id.apps.googleusercontent.com" ```
Set secrets:
```bash
Google OAuth client secret
wrangler secret put GOOGLE_CLIENT_SECRET ```
4. Deploy
```bash wrangler deploy ```
Your worker will be available at: `https://your-worker-name.your-account.workers.dev\`
๐ OAuth 2.0 Flow
This server implements a complete OAuth 2.0 authorization server per the MCP specification.
Using MCP Inspector
The easiest way to test the OAuth flow:
```bash npx @modelcontextprotocol/inspector https://your-worker.workers.dev/sse ```
- Discovery - Inspector auto-discovers OAuth endpoints
- Registration - Click "Guided Setup" โ registers client automatically
- Authorization - Redirects to Google โ authenticates โ redirects back
- Token Exchange - Automatically exchanges code for access token
- Use Tools - All 11 tools now available!
Security Features
- โ PKCE (RFC 7636) - Proof Key for Code Exchange
- โ State Parameter - CSRF protection
- โ HTTPS Only - Enforced by Cloudflare Workers
- โ Secure Token Storage - Encrypted in Workers KV
- โ Token Expiration - Access tokens expire in 1 hour
- โ Client Secret Hashing - SHA-256 hashed storage
- โ Authorization Code Single-Use - Codes deleted after exchange
๐ ๏ธ Available Tools
Drive Tools
- `gdrive_search` - Basic search across all files
- `gdrive_search_advanced` - Advanced search with filters
- `gdrive_read_file` - Read files with 22+ export formats
- `gdrive_create_folder` - Create folders
- `gdrive_upload_file` - Upload files (up to 5MB)
- `gdrive_delete_file` - Move files to trash
- `gdrive_move_file` - Move files between folders
- `gdrive_add_permission` - Share files/folders
Sheets Tools
- `gsheets_read` - Read multiple ranges
- `gsheets_update_cell` - Update single cells
- `gsheets_append_row` - Append rows
๐ Client Configuration
VS Code with MCP Extension
Create `.vscode/settings.json`:
```json { "mcp.servers": { "gdrive": { "url": "https://your-worker.workers.dev/sse", "authorization": { "type": "oauth2" } } } } ```
Claude Desktop / Cline
macOS/Linux: `~/Library/Application Support/Claude/claude_desktop_config.json`
Windows: `%APPDATA%\Claude\claude_desktop_config.json`
```json { "mcpServers": { "gdrive": { "url": "https://your-worker.workers.dev/sse" } } } ```
๐งช Testing
Local Development
```bash npm start
Server available at http://localhost:8788
```
Test with MCP Inspector
```bash npx @modelcontextprotocol/inspector http://localhost:8788/sse ```
Check CloudFlare Logs
```bash wrangler tail --format pretty ```
๐ Troubleshooting
"Failed to discover OAuth metadata"
Solution:
- Ensure `/.well-known/oauth-authorization-server` returns valid JSON
- Check CORS headers are present
- Verify latest version is deployed: `wrangler deploy`
"Token exchange failed: HTTP 400"
Solutions:
- Check code_verifier matches original code_challenge
- Ensure redirect_uri exactly matches registration
- Verify client credentials are correct
- Check CloudFlare logs: `wrangler tail`
Tools not working
Solutions:
- Check Google OAuth scopes include `drive` and `spreadsheets`
- Re-authenticate if scopes changed: visit `/google/authorize`
- Verify Worker has valid Google access token
- Check KV namespace bindings in `wrangler.toml`
๐ Performance & Limits
| Resource | Limit | Notes |
|---|---|---|
| Request Timeout | 30 seconds | CloudFlare Workers limit |
| File Upload | 5 MB | Simple upload API limit |
| File Export | 10 MB | Google Drive export limit |
| Token Storage | 30 days | Automatic cleanup |
| Authorization Code | 10 minutes | Single-use |
| Access Token | 1 hour | Auto-refreshed |
๐ Security Best Practices
- Never commit secrets - Use `wrangler secret put`
- Rotate client secrets - Periodically regenerate OAuth credentials
- Monitor access - Use CloudFlare Analytics to track usage
- Limit OAuth scopes - Only request necessary Google permissions
- Use PKCE - Always use PKCE for public clients
- Validate redirect URIs - Whitelist exact URIs in Google Console
- Enable 2FA - Protect your CloudFlare and Google accounts
๐ License
MIT License
๐ Acknowledgments
- isaacphi/mcp-gdrive - Original STDIO implementation
- Model Context Protocol - MCP specification
- CloudFlare Workers - Serverless platform
Made with โ๏ธ by Brian Money
Related Servers
Azure Pricing MCP Server
Query Azure retail pricing information using the Azure Retail Prices API.
Flutterwave
Interact with the Flutterwave API to manage transactions, generate payment links, and handle customer support.
Workday by CData
A read-only server for querying live Workday data using LLMs, powered by the CData JDBC Driver.
Marvel MCP Server
Interact with the Marvel Developer API to access data on characters and comics.
Realize MCP - Taboola
Interact with the Taboola advertising platform using natural language via the Taboola Realize API.
Microsoft Entra ID MCP Server
A Python MCP server for Microsoft Entra ID (Azure AD) directory, user, group, device, sign-in, and security operations via Microsoft Graph.
YouTube
An MCP server for interacting with YouTube's data and services.
1Password Credential Retrieval Server
Securely retrieve credentials from 1Password for use by Agentic AI.
Tencent Cloud Live
An MCP server for interacting with the Tencent Cloud Live Streaming service API.
Remote MCP Server on Cloudflare
A remote MCP server for Cloudflare Workers with OAuth login support, using Cloudflare KV for storage.