Google Tasks MCP
Manage Google Tasks from your AI assistant using natural language.
Google Tasks MCP Server
A self-hosted MCP server that connects any MCP-compatible client to Google Tasks. Tools return only what the model needs — compact task objects, no Google API envelope fields.
Quickstart
git clone https://github.com/ebmurha/google-tasks-mcp.git
cd google-tasks-mcp
python3.11 -m venv .venv && . .venv/bin/activate
pip install -e .
cp .env.example .env # set GOOGLE_CLIENT_ID, GOOGLE_CLIENT_SECRET, MCP_BEARER_TOKEN
Generate MCP_BEARER_TOKEN with python -c "import secrets; print(secrets.token_urlsafe(48))".
Use it on HTTP MCP requests as Authorization: Bearer <token>.
Bootstrap OAuth (once):
google-tasks-mcp-bootstrap
# Open the printed URL, approve, paste back the code.
Start the server:
python -m google_tasks_mcp
Health check: curl http://127.0.0.1:8787/healthz → {"ok":true}
Connect your MCP client
Remote HTTP (server on a VPS or local machine):
URL: http://127.0.0.1:8787/mcp
Auth: Bearer <MCP_BEARER_TOKEN>
Local stdio (MCP client spawns the process directly):
command: /path/to/.venv/bin/python
args: ["-m", "google_tasks_mcp", "--transport", "stdio"]
MCP_BEARER_TOKEN is not required for stdio.
Authentication modes
The HTTP server starts in one of two modes depending on environment variables:
Bearer-token mode (default, when MCP_OAUTH_ISSUER is not set) — /mcp requires Authorization: Bearer <MCP_BEARER_TOKEN>. Right for Claude Desktop, Codex, and any client that holds a pre-configured token.
OAuth 2.0 gateway mode (when MCP_OAUTH_ISSUER is set) — the server also serves /.well-known/oauth-authorization-server, /authorize, /token, and /revoke. /mcp accepts both OAuth-issued tokens and the legacy MCP_BEARER_TOKEN. Right for MCP web clients (e.g. Claude.ai) that perform a full OAuth flow. See .env.example for the required variables (MCP_OAUTH_CLIENT_ID, MCP_OAUTH_CLIENT_SECRET, MCP_OAUTH_SIGNING_SECRET). MCP_OAUTH_REDIRECT_URIS is optional — leave it unset to keep OAuth disabled even when MCP_OAUTH_ISSUER is present.
Tools
The same 19 tools are available over local stdio, bearer-token HTTP, and OAuth 2.0 gateway HTTP modes.
| Tool | What it does |
|---|---|
list_tasklists | List your task lists |
create_tasklist | Create a task list and return compact metadata with human_summary |
get_tasklist | Get a task list by ID or exact title |
update_tasklist | Rename a task list by ID only |
delete_tasklist | Delete a task list by ID after confirm: true; non-empty lists require force: true |
list_tasks | List tasks with date, completion, deleted, hidden, assigned, pagination, and timezone filters; auto-fetches up to 1000 tasks |
clear_completed | Hide completed tasks in a list after confirm: true and report cleared_count |
today | Incomplete tasks due today |
overdue | Incomplete overdue tasks |
upcoming | Tasks due within N days (default 7) |
search | Case-insensitive title + notes search |
get_task | Single task by ID or exact title, with notes, parent, position, and web link |
digest | Short text summary (~30–100 tokens) |
add | Create a task or subtask, optionally after a sibling, and return a rich mutation response with human_summary |
complete | Mark a task done by ID or exact title and return title, due date, tasklist, and human_summary |
update | Edit a task by ID, or by exact title for non-title fields; status may be needsAction or completed |
uncomplete | Reopen a completed task by ID or exact title and return a rich mutation response |
delete | Delete a task by ID or exact title and return pre-deletion task details with deleted: true |
move | Move a task by ID or exact title, optionally changing tasklist, parent, or sibling order |
All tasklist arguments accept both a list ID and a friendly title. Task title lookup is exact after trimming whitespace and ignores case; if more than one active task matches, the server returns a structured ambiguity error with candidate IDs. When tasklist is omitted, the server uses DEFAULT_TASKLIST from .env, or the first list returned by Google. Task list rename and delete tools require an ID to reduce accidental destructive changes. Cross-list task moves are emulated by creating the task in the destination list and deleting the original, so the moved task has a new Google task ID.
Limitations
These are Google Tasks REST API limits, not MCP gaps — no workaround exists in this server:
- Due dates are date-only. Any time-of-day component on
dueis silently dropped by Google. - No recurrence. The REST API has no
recurrencefield; recurring tasks created in the Google Tasks UI cannot be created or read through the API. clearhides, doesn't delete. Cleared completed tasks are marked hidden — they survive in the account and reappear when listed withshow_hidden.
Google Cloud setup
- Create a project → enable the Google Tasks API → configure the OAuth consent screen.
- Create an OAuth 2.0 Client ID.
Recommended: Web application
- Use this for normal local, VPS, Docker, and other server-style installs.
- Add the exact callback URL to Authorized redirect URIs.
- For local installs, use
http://127.0.0.1:8787/callback. - For remote servers, use
https://your-domain.example/callback. - Set
GOOGLE_CLIENT_ID,GOOGLE_CLIENT_SECRET, andGOOGLE_REDIRECT_URIin.env. GOOGLE_REDIRECT_URImust exactly match one of the authorized redirect URIs.
Example .env values for a local Web application OAuth client:
GOOGLE_CLIENT_ID=your-client-id.apps.googleusercontent.com
GOOGLE_CLIENT_SECRET=your-client-secret
GOOGLE_REDIRECT_URI=http://127.0.0.1:8787/callback
Local-only alternative: Desktop app
- Choose Desktop app as the OAuth client application type.
- Use this only for a personal local install where the app runs on your own machine.
- Download the client JSON, store it outside the repo, and point
GOOGLE_OAUTH_KEYS_PATHto the file. - You may leave
GOOGLE_CLIENT_IDandGOOGLE_CLIENT_SECRETempty when using the JSON file. - You may omit
GOOGLE_REDIRECT_URIif the JSON containsredirect_uris; otherwise set it to one of the JSON file's redirect URIs.
Example .env values for a Desktop app OAuth client:
GOOGLE_CLIENT_ID=
GOOGLE_CLIENT_SECRET=
GOOGLE_REDIRECT_URI=
GOOGLE_OAUTH_KEYS_PATH=/home/you/.config/google-tasks-mcp/gcp-oauth.keys.json
The repo-root fallback name gcp-oauth.keys.json is supported for convenience, but keeping OAuth credential JSON outside the repo is preferred.
If the consent screen is in testing mode, add your Google account as a test user or refresh tokens will expire after 7 days.
Docker
docker compose up --build
Keep .env, gcp-oauth.keys.json, and database files outside the image — mount a named volume for the database directory.
VPS / systemd
Template files are in deploy/:
deploy/caddy/Caddyfile— Caddy reverse proxy with HTTPSdeploy/systemd/google-tasks-mcp.service— systemd unit
Replace all placeholder domains, paths, and users before deploying.
Tests
pytest
Máy chủ liên quan
Kone.vc
nhà tài trợMonetize your AI agent with contextual product recommendations
Zephyr Scale
Manage Zephyr Scale test cases through the Atlassian REST API.
Misar.Blog MCP
AI-first blogging platform MCP server — publish posts, track analytics, manage series, run newsletter campaigns.
Atlassian-mcp-server
MCP server for Atlassian Cloud (Confluence & Jira) with seamless OAuth 2.0 authentication.
Attio MCP Server
Interact with data in Attio, the AI-native CRM, enabling AI assistants to access and manage your customer relationship information.
ClickUp MCP Server
Apify-hosted MCP server for ClickUp with 20 tools. Tasks, spaces, folders, lists, views, docs, and custom fields. No local setup needed.
MCBU Campus Assistant
A chatbot for Manisa Celal Bayar University student affairs, featuring a web scraper, student database, and API integration tools for automation.
Goodday
A read-only server for the Goodday project management platform.
Chatvolt Agent Server
A simple notes system with resources, tools, and prompts.
PostalForm MCP
Mail real letters from agents: PDF → checkout → status.
MCP Desktop Automation
Automate desktop actions like mouse control, keyboard input, and taking screenshots.