MCP server to interact with Google products, rewritten using the fastmcp library.
This project is a fork of mcp-gsuite.
Right now, this MCP server supports Gmail and Calendar integration with the following capabilities:
- General
- Multiple google accounts
- Gmail
- Get your Gmail user information
- Query emails with flexible search (e.g., unread, from specific senders, date ranges, with attachments)
- Retrieve complete email content by ID
- Create new draft emails with recipients, subject, body and CC options
- Delete draft emails
- Reply to existing emails (can either send immediately or save as draft)
- Retrieve multiple emails at once by their IDs.
- Save multiple attachments from emails to your local system.
- Calendar
- Manage multiple calendars
- Get calendar events within specified time ranges
- Create calendar events with:
- Title, start/end times
- Optional location and description
- Optional attendees
- Custom timezone support
- Notification preferences
- Delete calendar events
Example prompts you can try:
-
Retrieve my latest unread messages
-
Search my emails from the Scrum Master
-
Retrieve all emails from accounting
-
Take the email about ABC and summarize it
-
Write a nice response to Alice's last email and upload a draft.
-
Reply to Bob's email with a Thank you note. Store it as draft
-
What do I have on my agenda tomorrow?
-
Check my private account's Family agenda for next week
-
I need to plan an event with Tim for 2hrs next week. Suggest some time slots.
The easiest way to set up authentication is using the interactive setup command:
# Install the package
pip install fastmcp-gsuite
# or with uv
uv pip install fastmcp-gsuite
# Run interactive setup
uv run fastmcp-gsuite-setupPrerequisites:
- Create OAuth2 credentials in Google Cloud Console
- Select "Desktop app" as application type
- Enable Gmail API, Google Calendar API, and Google Drive API
The setup wizard will guide you through:
- Entering your Google OAuth2 Client ID and Client Secret
- Authorizing your Google account(s) in browser
- Copying the authorization code from browser back to terminal
- Automatically creating all necessary configuration files
Additional Commands:
# Add another Google account
uv run fastmcp-gsuite-setup --add-account
# List configured accounts
uv run fastmcp-gsuite-setup --list
# Remove an account
uv run fastmcp-gsuite-setup --remove-account [email protected]Click to expand manual setup instructions
Google Workspace (G Suite) APIs require OAuth2 authorization. Follow these steps to set up authentication manually:
-
Create OAuth2 Credentials:
- Go to the Google Cloud Console
- Create a new project or select an existing one
- Enable the Gmail API, Google Calendar API, and Google Drive API for your project
- Go to "Credentials" → "Create Credentials" → "OAuth client ID"
- Select "Desktop app" as the application type
- Configure the OAuth consent screen with required information
- Note: For desktop/CLI applications, the redirect URI
urn:ietf:wg:oauth:2.0:oobwill be used automatically
-
Required OAuth2 Scopes:
[
"openid",
"https://mail.google.com/",
"https://www.googleapis.com/auth/calendar",
"https://www.googleapis.com/auth/drive",
"https://www.googleapis.com/auth/userinfo.email"
]- Create a
.gauth.jsonin your working directory:
{
"installed": {
"client_id": "$your_client_id",
"client_secret": "$your_client_secret",
"redirect_uris": ["urn:ietf:wg:oauth:2.0:oob", "http://localhost"],
"auth_uri": "https://accounts.google.com/o/oauth2/auth",
"token_uri": "https://oauth2.googleapis.com/token"
}
}Note:
- Use
"installed"for Desktop app credentials (recommended) - Alternatively,
"web"format also works with this library urn:ietf:wg:oauth:2.0:oobis the Out-of-Band (OOB) redirect URI- Google will display the authorization code in the browser for you to copy and paste
- Create a
.accounts.jsonfile with account information:
{
"accounts": [
{
"email": "[email protected]",
"account_type": "personal",
"extra_info": "Additional info that you want to tell Claude: E.g. 'Contains Family Calendar'"
}
]
}You can specify multiple accounts. Make sure they have access in your Google Auth app. The extra_info field is especially interesting as you can add info here that you want to tell the AI about the account (e.g. whether it has a specific agenda).
- Run the authentication script to generate credentials:
# Set environment variables
export GOOGLE_ACCOUNT_EMAIL="[email protected]"
export GOOGLE_CLIENT_ID="your-client-id"
export GOOGLE_CLIENT_SECRET="your-client-secret"
# Run the script
uv run python scripts/get_refresh_token.pyThis will open a browser for authorization and create .oauth2.{email}.json credential files.
On MacOS: ~/Library/Application\ Support/Claude/claude_desktop_config.json
On Windows: %APPDATA%/Claude/claude_desktop_config.json
Development/Unpublished Servers Configuration
{
"mcpServers": {
"gsuite": {
"command": "uv",
"args": [
"--directory",
"<dir_to>/fastmcp-gsuite",
"run",
"fastmcp-gsuite"
]
}
}
}Note: Configuration is now primarily handled via environment variables or a .env file in the working directory, using pydantic-settings . See the Configuration Options section below.
{
"mcpServers": {
"fastmcp-gsuite": {
"command": "uv",
"args": [
"--directory",
"<dir_to>/fastmcp-gsuite",
"run",
"fastmcp-gsuite" # Use the new entry point
# Configuration via .env or environment variables is preferred now
]
}
}
}Published Servers Configuration
{
"mcpServers": {
"fastmcp-gsuite": {
"command": "uvx",
"args": [
"fastmcp-gsuite" # Use the new entry point
# Configuration via .env or environment variables is preferred now
]
}
}
}Configuration is now managed using pydantic-settings . Create a .env file in the directory where you run the server, or set environment variables:
GAUTH_FILE: Path to the.gauth.jsonfile containing OAuth2 client configuration. Default:./.gauth.jsonACCOUNTS_FILE: Path to the.accounts.jsonfile containing Google account information. Default:./.accounts.jsonCREDENTIALS_DIR: Directory to store the generated.oauth2.{email}.jsoncredential files. Default:.(current directory)
Example .env file:
GAUTH_FILE=/path/to/your/.gauth.json
ACCOUNTS_FILE=/path/to/your/.accounts.json
CREDENTIALS_DIR=/path/to/your/credentialsThis allows for flexible configuration without command-line arguments when running the server.
Problem: "No refresh token received"
- Cause: You may have already authorized the app previously
- Solution: Go to https://myaccount.google.com/permissions and revoke access, then try setup again
Problem: "Browser doesn't open automatically"
- Solution: Copy the authorization URL displayed in the terminal and open it manually in your browser
Problem: "Redirect URI mismatch" error
- Cause: Google Cloud Console has wrong redirect URI configured
- Solution: In Google Cloud Console, ensure your OAuth client is configured as "Desktop app" type. Desktop apps automatically use
urn:ietf:wg:oauth:2.0:oobas the redirect URI
Problem: "Permission denied when creating .gauth.json"
- Cause: Insufficient write permissions in current directory
- Solution: Run setup in a directory where you have write permissions, or use
GAUTH_FILEenvironment variable to specify a different location
Problem: "Account already exists" when adding account
- Solution: Use
--remove-accountto remove the old account first, or choose to overwrite when prompted
Problem: Setup works but MCP server can't find credentials
- Solution: Ensure you're running the MCP server from the same directory where you ran setup, or set
GAUTH_FILE,ACCOUNTS_FILE, andCREDENTIALS_DIRenvironment variables to point to the correct locations
For more help, see the GitHub Issues.
To prepare the package for distribution:
- Sync dependencies and update lockfile:
uv sync- Build package distributions:
uv buildThis will create source and wheel distributions in the dist/ directory.
- Publish to PyPI:
uv publishNote: You'll need to set PyPI credentials via environment variables or command flags:
- Token:
--tokenorUV_PUBLISH_TOKEN - Or username/password:
--username/UV_PUBLISH_USERNAMEand--password/UV_PUBLISH_PASSWORD
This project is configured to automatically publish to PyPI when a tag is pushed to the repository. The publishing process is handled by a GitHub Actions workflow.
To publish a new version:
- Update the version in
pyproject.toml - Commit the changes
- Tag the commit with a version tag (e.g.,
v0.4.2) - Push the tag to GitHub
# Example workflow to release a new version
git add pyproject.toml
git commit -m "Bump version to 0.4.2"
git tag -a v0.4.2 -m "Version 0.4.2"
git push && git push --tagsThe GitHub Actions workflow will automatically build and publish the package to PyPI. Make sure to set the following secrets in your GitHub repository:
PYPI_API_TOKEN: Your PyPI API token
You can also use the version bumping commands in the Makefile:
# Bump patch version (0.4.1 -> 0.4.2)
make bump-patch
# Bump minor version (0.4.1 -> 0.5.0)
make bump-minor
# Bump major version (0.4.1 -> 1.0.0)
make bump-majorSince MCP servers run over stdio, debugging can be challenging. For the best debugging experience, we strongly recommend using the MCP Inspector.
You can launch the MCP Inspector via npm with this command:
npx @modelcontextprotocol/inspector uv --directory /path/to/fastmcp-gsuite run fastmcp-gsuiteUpon launching, the Inspector will display a URL that you can access in your browser to begin debugging.
You can also watch the server logs with this command:
tail -n 20 -f ~/Library/Logs/Claude/mcp-server-fastmcp-gsuite.log # Log filename might change based on the server nameTo run the standard E2E tests, you need to set up the necessary environment variables with valid Google credentials:
# Make sure valid Google credentials are set in your environment variables
dotenvx run -f .env.local -- uv run make e2e-testsThese tests use the Google API libraries directly to authenticate and test the functionality.
There are also MCP-based E2E tests that test the functionality through the MCP protocol, simulating how Claude or other clients would interact with the MCP server:
# Specify the environment file containing your Google credentials
make mcp-e2e-tests ENV_FILE=.env.localThis will run tests that:
- Start the MCP G-Suite server
- Connect to it using the chuk-mcp client
- Test various tools like Gmail message listing and Calendar event retrieval
The environment file should contain the following variables:
GSUITE_CREDENTIALS_JSON- Base64 encoded JSON credentialsGOOGLE_ACCOUNT_EMAIL- Your Google account emailGOOGLE_PROJECT_ID- Your Google Cloud project IDGOOGLE_CLIENT_ID- Your OAuth client IDGOOGLE_CLIENT_SECRET- Your OAuth client secret
Both types of E2E tests are excluded from CI pipelines and should only be run locally with valid credentials.
This project implements end-to-end (E2E) tests using real Google accounts. You can run the E2E tests using the following steps.
To run E2E tests, you need:
-
A
.env.localfile with the following environment variables:GSUITE_CREDENTIALS_JSON: Base64 encoded Google credentialsGOOGLE_ACCOUNT_EMAIL: Google account email for testingGOOGLE_PROJECT_ID: Google project IDGOOGLE_CLIENT_ID: Google client IDGOOGLE_CLIENT_SECRET: Google client secret
-
E2E test dependencies installed:
uv pip install -e ".[e2e]"- Run all E2E tests:
dotenvx run -f .env.local -- uv run make mcp-all-e2e-tests- Run tests for individual services:
# Gmail tests
dotenvx run -f .env.local -- uv run make mcp-e2e-tests
# Google Calendar tests
dotenvx run -f .env.local -- uv run make mcp-google-e2e-tests
# Google Drive tests
dotenvx run -f .env.local -- uv run make mcp-gdrive-e2e-tests
# Google Tasks tests
dotenvx run -f .env.local -- uv run make mcp-tasks-e2e-tests
# Google Contacts tests
dotenvx run -f .env.local -- uv run make mcp-contacts-e2e-tests- E2E tests access real Google accounts, so be careful not to affect production environments
- E2E tests are automatically skipped in CI environments
- Temporary authentication files are created during test execution but are automatically deleted afterward