Gdrive Cloudflare worker
Remote MCP server for Google Drive and Sheets running on Cloudflare Workers with full OAuth 2.0 support.
mcp-gdrive-cf
Remote MCP server for Google Drive and Sheets running on Cloudflare Workers with full OAuth 2.0 support.
Production Ready โ | 11 Tools | OAuth 2.0 | PKCE | Global Edge Network
Adapted from isaacphi/mcp-gdrive to run as a remote HTTP/SSE MCP server on Cloudflare's edge network with complete OAuth 2.0 authorization server capabilities.
๐ Quick Start
```bash
1. Clone and install
git clone https://github.com/brianmoney/mcp-gdrive-cf.git cd mcp-gdrive-cf npm install
2. Create KV namespaces
wrangler kv:namespace create KV_TOKENS wrangler kv:namespace create KV_CLIENTS
3. Update wrangler.toml with your namespace IDs
4. Configure Google OAuth credentials
wrangler secret put GOOGLE_CLIENT_SECRET
5. Deploy
wrangler deploy
6. Test with MCP Inspector
npx @modelcontextprotocol/inspector https://your-worker.workers.dev/sse ```
โจ Features
Drive Operations
- ๐ Search - Basic and advanced search with filters (MIME type, owner, dates, shared drives)
- ๐ Read - Read any file with 22+ export formats (PDF, DOCX, XLSX, Markdown, etc.)
- ๐ Create Folders - Organize files with nested folder structures
- โฌ๏ธ Upload - Upload files up to 5MB
- ๐๏ธ Delete - Move files to trash
- ๐ฆ Move - Reorganize files between folders
- ๐ Share - Add permissions (reader, writer, commenter, owner)
Sheets Operations
- ๐ Read - Batch read multiple ranges
- โ๏ธ Update - Update individual cells
- โ Append - Add rows to spreadsheets
Infrastructure
- โ๏ธ Global Edge Network - Runs on Cloudflare Workers worldwide
- ๐ OAuth 2.0 Server - Full authorization server with PKCE support
- ๐ Dynamic Client Registration - Automatic client onboarding
- ๐ Auto Token Refresh - Seamless Google token renewal
- ๐ก SSE Transport - Real-time Server-Sent Events
- ๐ก๏ธ Secure - HTTPS only, encrypted token storage
๐ฏ What Makes This Different
Unlike the original STDIO-based `mcp-gdrive`, this implementation:
- Runs remotely on Cloudflare Workers (no local process)
- Full OAuth 2.0 authorization server (not just OAuth client)
- Multi-client support via dynamic client registration
- PKCE security for public clients
- 22+ export formats for Drive files
- Write operations (create, delete, move, share, upload)
- Production tested with real workloads
๐ Prerequisites
Required
- Cloudflare Account with Workers enabled (free tier works)
- Google Cloud Project with Drive API and Sheets API enabled
- Node.js LTS (v18+)
- Wrangler CLI (`npm install -g wrangler`)
Google Cloud Setup
- Create a project at Google Cloud Console
- Enable APIs:
- Google Drive API
- Google Sheets API
- Create OAuth 2.0 credentials:
- Type: Web application
- Redirect URIs: `https://your-worker.workers.dev/google/callback\`
- Required OAuth scopes:
๐ง Installation & Deployment
1. Install Dependencies
```bash npm install ```
2. Create KV Namespaces
```bash
For user session tokens
wrangler kv:namespace create KV_TOKENS
For OAuth client registrations
wrangler kv:namespace create KV_CLIENTS ```
Copy the namespace IDs to `wrangler.toml`:
```toml [[kv_namespaces]] binding = "KV_TOKENS" id = "your-tokens-namespace-id"
[[kv_namespaces]] binding = "KV_CLIENTS" id = "your-clients-namespace-id" ```
3. Configure Environment Variables
Add to `wrangler.toml`:
```toml [vars] GOOGLE_CLIENT_ID = "your-client-id.apps.googleusercontent.com" ```
Set secrets:
```bash
Google OAuth client secret
wrangler secret put GOOGLE_CLIENT_SECRET ```
4. Deploy
```bash wrangler deploy ```
Your worker will be available at: `https://your-worker-name.your-account.workers.dev\`
๐ OAuth 2.0 Flow
This server implements a complete OAuth 2.0 authorization server per the MCP specification.
Using MCP Inspector
The easiest way to test the OAuth flow:
```bash npx @modelcontextprotocol/inspector https://your-worker.workers.dev/sse ```
- Discovery - Inspector auto-discovers OAuth endpoints
- Registration - Click "Guided Setup" โ registers client automatically
- Authorization - Redirects to Google โ authenticates โ redirects back
- Token Exchange - Automatically exchanges code for access token
- Use Tools - All 11 tools now available!
Security Features
- โ PKCE (RFC 7636) - Proof Key for Code Exchange
- โ State Parameter - CSRF protection
- โ HTTPS Only - Enforced by Cloudflare Workers
- โ Secure Token Storage - Encrypted in Workers KV
- โ Token Expiration - Access tokens expire in 1 hour
- โ Client Secret Hashing - SHA-256 hashed storage
- โ Authorization Code Single-Use - Codes deleted after exchange
๐ ๏ธ Available Tools
Drive Tools
- `gdrive_search` - Basic search across all files
- `gdrive_search_advanced` - Advanced search with filters
- `gdrive_read_file` - Read files with 22+ export formats
- `gdrive_create_folder` - Create folders
- `gdrive_upload_file` - Upload files (up to 5MB)
- `gdrive_delete_file` - Move files to trash
- `gdrive_move_file` - Move files between folders
- `gdrive_add_permission` - Share files/folders
Sheets Tools
- `gsheets_read` - Read multiple ranges
- `gsheets_update_cell` - Update single cells
- `gsheets_append_row` - Append rows
๐ Client Configuration
VS Code with MCP Extension
Create `.vscode/settings.json`:
```json { "mcp.servers": { "gdrive": { "url": "https://your-worker.workers.dev/sse", "authorization": { "type": "oauth2" } } } } ```
Claude Desktop / Cline
macOS/Linux: `~/Library/Application Support/Claude/claude_desktop_config.json`
Windows: `%APPDATA%\Claude\claude_desktop_config.json`
```json { "mcpServers": { "gdrive": { "url": "https://your-worker.workers.dev/sse" } } } ```
๐งช Testing
Local Development
```bash npm start
Server available at http://localhost:8788
```
Test with MCP Inspector
```bash npx @modelcontextprotocol/inspector http://localhost:8788/sse ```
Check CloudFlare Logs
```bash wrangler tail --format pretty ```
๐ Troubleshooting
"Failed to discover OAuth metadata"
Solution:
- Ensure `/.well-known/oauth-authorization-server` returns valid JSON
- Check CORS headers are present
- Verify latest version is deployed: `wrangler deploy`
"Token exchange failed: HTTP 400"
Solutions:
- Check code_verifier matches original code_challenge
- Ensure redirect_uri exactly matches registration
- Verify client credentials are correct
- Check CloudFlare logs: `wrangler tail`
Tools not working
Solutions:
- Check Google OAuth scopes include `drive` and `spreadsheets`
- Re-authenticate if scopes changed: visit `/google/authorize`
- Verify Worker has valid Google access token
- Check KV namespace bindings in `wrangler.toml`
๐ Performance & Limits
Resource | Limit | Notes |
---|---|---|
Request Timeout | 30 seconds | CloudFlare Workers limit |
File Upload | 5 MB | Simple upload API limit |
File Export | 10 MB | Google Drive export limit |
Token Storage | 30 days | Automatic cleanup |
Authorization Code | 10 minutes | Single-use |
Access Token | 1 hour | Auto-refreshed |
๐ Security Best Practices
- Never commit secrets - Use `wrangler secret put`
- Rotate client secrets - Periodically regenerate OAuth credentials
- Monitor access - Use CloudFlare Analytics to track usage
- Limit OAuth scopes - Only request necessary Google permissions
- Use PKCE - Always use PKCE for public clients
- Validate redirect URIs - Whitelist exact URIs in Google Console
- Enable 2FA - Protect your CloudFlare and Google accounts
๐ License
MIT License
๐ Acknowledgments
- isaacphi/mcp-gdrive - Original STDIO implementation
- Model Context Protocol - MCP specification
- CloudFlare Workers - Serverless platform
Made with โ๏ธ by Brian Money
Related Servers
Spotify
Control Spotify playback and manage your liked songs using LLMs.
Twelve Data
Interact with Twelve Data APIs to access real-time and historical financial market data for your AI agents.
ๅๆๅคงๆจกๅๅฎๅ จ MCP
A content security protection system for large language models, providing real-time risk identification and interception to ensure safe, compliant, and trustworthy model applications.
Alpaca MCP Server
Interact with Alpaca's Trading API for stock trading, portfolio management, and real-time market data.
Bigeye MCP Server
Interact with Bigeye's data quality monitoring platform via its Datawatch API. Supports dynamic API key authentication.
Cyclops MCP
Manage Kubernetes applications safely by creating and updating Cyclops Modules for AI agents.
Tembo Cloud
An MCP server for managing databases and services on the Tembo Cloud platform.
Uberall MCP Server
Integrates with the Uberall API to manage business listings, locations, and social media presence.
CloudStack MCP Server
Integrate with Apache CloudStack to manage cloud resources directly from your desktop.
Cloudflare DNS
Manage Cloudflare DNS records for your domains.