Skip to main content

zeph_memory/
eviction.rs

1// SPDX-FileCopyrightText: 2026 Andrei G <bug-ops>
2// SPDX-License-Identifier: MIT OR Apache-2.0
3
4//! Memory eviction subsystem.
5//!
6//! Provides a trait-based eviction policy framework with an Ebbinghaus
7//! forgetting curve implementation. The background sweep loop runs
8//! periodically, scoring entries and soft-deleting the lowest-scoring ones
9//! from `SQLite` before removing their `Qdrant` vectors in a second phase.
10//!
11//! Two-phase design ensures crash safety: soft-deleted `SQLite` rows are
12//! invisible to the application immediately, and `Qdrant` cleanup is retried
13//! on the next sweep if the agent crashes between phases.
14
15use std::sync::Arc;
16
17use tokio::task::JoinHandle;
18use tokio::time::{Duration, interval};
19use tokio_util::sync::CancellationToken;
20
21use crate::error::MemoryError;
22use crate::sqlite::SqliteStore;
23use crate::types::MessageId;
24
25// ── Public types ──────────────────────────────────────────────────────────────
26
27/// An entry passed to `EvictionPolicy::score`.
28#[derive(Debug, Clone)]
29pub struct EvictionEntry {
30    pub id: MessageId,
31    /// ISO 8601 creation timestamp (TEXT column from `SQLite`).
32    pub created_at: String,
33    /// ISO 8601 last-accessed timestamp, or `None` if never accessed after creation.
34    pub last_accessed: Option<String>,
35    /// Number of times this message has been retrieved.
36    pub access_count: u32,
37}
38
39/// Trait for eviction scoring strategies.
40///
41/// Implementations must be `Send + Sync` so they can be shared across threads.
42pub trait EvictionPolicy: Send + Sync {
43    /// Compute a retention score for the given entry.
44    ///
45    /// Higher scores mean the entry is more likely to be retained.
46    /// Lower scores mean the entry is a candidate for eviction.
47    fn score(&self, entry: &EvictionEntry) -> f64;
48}
49
50/// Configuration for the eviction subsystem.
51#[derive(Debug, Clone, serde::Deserialize, serde::Serialize)]
52#[serde(default)]
53pub struct EvictionConfig {
54    /// Policy name. Currently only `"ebbinghaus"` is supported.
55    pub policy: String,
56    /// Maximum number of entries to retain. `0` means unlimited (eviction disabled).
57    pub max_entries: usize,
58    /// How often to run the eviction sweep, in seconds.
59    pub sweep_interval_secs: u64,
60}
61
62impl Default for EvictionConfig {
63    fn default() -> Self {
64        Self {
65            policy: "ebbinghaus".to_owned(),
66            max_entries: 0,
67            sweep_interval_secs: 3600,
68        }
69    }
70}
71
72// ── Ebbinghaus policy ─────────────────────────────────────────────────────────
73
74/// Ebbinghaus forgetting curve eviction policy.
75///
76/// Score formula:
77///   `score = exp(-t / (S * ln(1 + n)))`
78///
79/// Where:
80/// - `t` = seconds since `last_accessed` (or `created_at` if never accessed)
81/// - `S` = `retention_strength` (higher = slower decay)
82/// - `n` = `access_count`
83///
84/// Entries with a high access count or recent access get higher scores
85/// and are less likely to be evicted.
86pub struct EbbinghausPolicy {
87    retention_strength: f64,
88}
89
90impl EbbinghausPolicy {
91    /// Create a new policy with the given retention strength.
92    ///
93    /// A good default is `86400.0` (one day in seconds).
94    #[must_use]
95    pub fn new(retention_strength: f64) -> Self {
96        Self { retention_strength }
97    }
98}
99
100impl Default for EbbinghausPolicy {
101    fn default() -> Self {
102        Self::new(86_400.0) // 1 day
103    }
104}
105
106impl EvictionPolicy for EbbinghausPolicy {
107    fn score(&self, entry: &EvictionEntry) -> f64 {
108        let now_secs = unix_now_secs();
109
110        let reference_secs = entry
111            .last_accessed
112            .as_deref()
113            .and_then(parse_sqlite_timestamp_secs)
114            .unwrap_or_else(|| parse_sqlite_timestamp_secs(&entry.created_at).unwrap_or(now_secs));
115
116        // Clamp t >= 0 to handle clock skew or future timestamps.
117        #[allow(clippy::cast_precision_loss)]
118        let t = now_secs.saturating_sub(reference_secs) as f64;
119        let n = f64::from(entry.access_count);
120
121        // ln(1 + 0) = 0 which would divide by zero — use 1.0 as minimum denominator.
122        let denominator = (self.retention_strength * (1.0_f64 + n).ln()).max(1.0);
123        (-t / denominator).exp()
124    }
125}
126
127fn unix_now_secs() -> u64 {
128    std::time::SystemTime::now()
129        .duration_since(std::time::UNIX_EPOCH)
130        .map(|d| d.as_secs())
131        .unwrap_or(0)
132}
133
134/// Parse a `SQLite` TEXT timestamp ("YYYY-MM-DD HH:MM:SS") into Unix seconds.
135///
136/// Does not use `chrono` to avoid adding a dependency to `zeph-memory`.
137fn parse_sqlite_timestamp_secs(s: &str) -> Option<u64> {
138    // Expected format: "YYYY-MM-DD HH:MM:SS"
139    let s = s.trim();
140    if s.len() < 19 {
141        return None;
142    }
143    let year: u64 = s[0..4].parse().ok()?;
144    let month: u64 = s[5..7].parse().ok()?;
145    let day: u64 = s[8..10].parse().ok()?;
146    let hour: u64 = s[11..13].parse().ok()?;
147    let min: u64 = s[14..16].parse().ok()?;
148    let sec: u64 = s[17..19].parse().ok()?;
149
150    // Days since Unix epoch (1970-01-01). Simple but accurate for years 1970-2099.
151    // Leap year calculation: divisible by 4 and not 100, or divisible by 400.
152    let is_leap = |y: u64| (y.is_multiple_of(4) && !y.is_multiple_of(100)) || y.is_multiple_of(400);
153    let days_in_month = |y: u64, m: u64| -> u64 {
154        match m {
155            1 | 3 | 5 | 7 | 8 | 10 | 12 => 31,
156            4 | 6 | 9 | 11 => 30,
157            2 => {
158                if is_leap(y) {
159                    29
160                } else {
161                    28
162                }
163            }
164            _ => 0,
165        }
166    };
167
168    let mut days: u64 = 0;
169    for y in 1970..year {
170        days += if is_leap(y) { 366 } else { 365 };
171    }
172    for m in 1..month {
173        days += days_in_month(year, m);
174    }
175    days += day.saturating_sub(1);
176
177    Some(days * 86400 + hour * 3600 + min * 60 + sec)
178}
179
180// ── Sweep loop ────────────────────────────────────────────────────────────────
181
182/// Start the background eviction loop.
183///
184/// The loop runs every `config.sweep_interval_secs` seconds. Each iteration:
185/// 1. Queries `SQLite` for all non-deleted entries and their eviction metadata.
186/// 2. Scores each entry using `policy`.
187/// 3. If the count exceeds `config.max_entries`, soft-deletes the excess lowest-scoring rows.
188/// 4. Queries for all soft-deleted rows and attempts to remove their Qdrant vectors.
189///    If Qdrant removal fails, it is retried on the next sweep cycle.
190///
191/// If `config.max_entries == 0`, the loop exits immediately without doing anything.
192///
193/// # Errors (non-fatal)
194///
195/// Database and Qdrant errors are logged but do not stop the loop.
196pub fn start_eviction_loop(
197    store: Arc<SqliteStore>,
198    config: &EvictionConfig,
199    policy: Arc<dyn EvictionPolicy + 'static>,
200    cancel: CancellationToken,
201) -> JoinHandle<()> {
202    let config = config.clone();
203    tokio::spawn(async move {
204        if config.max_entries == 0 {
205            tracing::debug!("eviction disabled (max_entries = 0)");
206            return;
207        }
208
209        let mut ticker = interval(Duration::from_secs(config.sweep_interval_secs));
210        // Skip the first immediate tick so the loop doesn't run at startup.
211        ticker.tick().await;
212
213        loop {
214            tokio::select! {
215                () = cancel.cancelled() => {
216                    tracing::debug!("eviction loop shutting down");
217                    return;
218                }
219                _ = ticker.tick() => {}
220            }
221
222            tracing::debug!(max_entries = config.max_entries, "running eviction sweep");
223
224            // Phase 1: score and soft-delete excess entries.
225            match run_eviction_phase1(&store, &*policy, config.max_entries).await {
226                Ok(deleted) => {
227                    if deleted > 0 {
228                        tracing::info!(deleted, "eviction phase 1: soft-deleted entries");
229                    }
230                }
231                Err(e) => {
232                    tracing::warn!(error = %e, "eviction phase 1 failed, will retry next sweep");
233                }
234            }
235
236            // Phase 2: clean up soft-deleted entries from Qdrant.
237            // On startup or after a crash, this also cleans up any orphaned vectors.
238            match run_eviction_phase2(&store).await {
239                Ok(cleaned) => {
240                    if cleaned > 0 {
241                        tracing::info!(cleaned, "eviction phase 2: removed Qdrant vectors");
242                    }
243                }
244                Err(e) => {
245                    tracing::warn!(error = %e, "eviction phase 2 failed, will retry next sweep");
246                }
247            }
248        }
249    })
250}
251
252async fn run_eviction_phase1(
253    store: &SqliteStore,
254    policy: &dyn EvictionPolicy,
255    max_entries: usize,
256) -> Result<usize, MemoryError> {
257    let candidates = store.get_eviction_candidates().await?;
258    let total = candidates.len();
259
260    if total <= max_entries {
261        return Ok(0);
262    }
263
264    let excess = total - max_entries;
265    let mut scored: Vec<(f64, MessageId)> = candidates
266        .into_iter()
267        .map(|e| (policy.score(&e), e.id))
268        .collect();
269
270    // Sort ascending by score — lowest scores (most forgettable) first.
271    scored.sort_by(|a, b| a.0.partial_cmp(&b.0).unwrap_or(std::cmp::Ordering::Equal));
272
273    let ids_to_delete: Vec<MessageId> = scored.into_iter().take(excess).map(|(_, id)| id).collect();
274    store.soft_delete_messages(&ids_to_delete).await?;
275
276    Ok(ids_to_delete.len())
277}
278
279async fn run_eviction_phase2(store: &SqliteStore) -> Result<usize, MemoryError> {
280    // Find all soft-deleted entries that haven't been cleaned from Qdrant yet.
281    let ids = store.get_soft_deleted_message_ids().await?;
282    if ids.is_empty() {
283        return Ok(0);
284    }
285
286    // TODO: call Qdrant delete-vectors API here before marking as cleaned.
287    // The embedding_store handles vector lifecycle separately; when that API
288    // is wired in, the call should happen here and mark_qdrant_cleaned should
289    // only be called on success. Tracked in issue: phase-2 Qdrant cleanup.
290    tracing::warn!(
291        count = ids.len(),
292        "eviction phase 2: Qdrant vector removal not yet wired — marking cleaned without actual deletion (MVP)"
293    );
294
295    // Mark as cleaned after the (future) Qdrant call succeeds. For now this
296    // prevents infinite retries on every sweep cycle.
297    store.mark_qdrant_cleaned(&ids).await?;
298    Ok(ids.len())
299}
300
301// ── Tests ─────────────────────────────────────────────────────────────────────
302
303#[cfg(test)]
304mod tests {
305    use super::*;
306
307    /// Build a timestamp string for a time N seconds ago from now.
308    ///
309    /// Returns a string parseable by `parse_sqlite_timestamp_secs`.
310    fn ts_ago(seconds_ago: u64) -> String {
311        let ts = unix_now_secs().saturating_sub(seconds_ago);
312        // Convert back to "YYYY-MM-DD HH:MM:SS" using the same logic as parse_sqlite_timestamp_secs
313        let sec = ts % 60;
314        let min = (ts / 60) % 60;
315        let hour = (ts / 3600) % 24;
316        let mut total_days = ts / 86400;
317        let is_leap =
318            |y: u64| (y.is_multiple_of(4) && !y.is_multiple_of(100)) || y.is_multiple_of(400);
319        let mut year = 1970u64;
320        loop {
321            let days_in_year = if is_leap(year) { 366 } else { 365 };
322            if total_days < days_in_year {
323                break;
324            }
325            total_days -= days_in_year;
326            year += 1;
327        }
328        let month_days = [
329            0u64,
330            31,
331            28 + u64::from(is_leap(year)),
332            31,
333            30,
334            31,
335            30,
336            31,
337            31,
338            30,
339            31,
340            30,
341            31,
342        ];
343        let mut month = 1u64;
344        while month <= 12 && total_days >= month_days[month as usize] {
345            total_days -= month_days[month as usize];
346            month += 1;
347        }
348        let day = total_days + 1;
349        format!("{year:04}-{month:02}-{day:02} {hour:02}:{min:02}:{sec:02}")
350    }
351
352    fn make_entry(access_count: u32, seconds_ago: u64) -> EvictionEntry {
353        let ts = ts_ago(seconds_ago);
354        EvictionEntry {
355            id: MessageId(1),
356            created_at: ts.clone(),
357            last_accessed: Some(ts),
358            access_count,
359        }
360    }
361
362    #[test]
363    fn ebbinghaus_recent_high_access_scores_near_one() {
364        let policy = EbbinghausPolicy::default();
365        // Use 1 second ago to ensure t is close to 0
366        let entry = make_entry(10, 1);
367        let score = policy.score(&entry);
368        // t = 1, n = 10, denominator = 86400 * ln(11) ≈ 207_946; exp(-1/207_946) ≈ 1.0
369        assert!(
370            score > 0.99,
371            "score should be near 1.0 for recently accessed entry, got {score}"
372        );
373    }
374
375    #[test]
376    fn ebbinghaus_old_zero_access_scores_lower() {
377        let policy = EbbinghausPolicy::default();
378        let old = make_entry(0, 7 * 24 * 3600); // 7 days ago, never accessed
379        let recent = make_entry(0, 60); // 1 minute ago
380        assert!(
381            policy.score(&old) < policy.score(&recent),
382            "old entry must score lower than recent"
383        );
384    }
385
386    #[test]
387    fn ebbinghaus_high_access_decays_slower() {
388        let policy = EbbinghausPolicy::default();
389        let low = make_entry(1, 3600); // accessed 1 hour ago, 1 time
390        let high = make_entry(20, 3600); // accessed 1 hour ago, 20 times
391        assert!(
392            policy.score(&high) > policy.score(&low),
393            "high access count should yield higher score"
394        );
395    }
396
397    #[test]
398    fn ebbinghaus_never_accessed_uses_created_at_as_reference() {
399        let policy = EbbinghausPolicy::default();
400        // An old entry (7 days ago) with last_accessed = None.
401        // Score should be the same as make_entry(0, 7 days) because both use created_at.
402        let old_with_no_last_accessed = EvictionEntry {
403            id: MessageId(2),
404            created_at: ts_ago(7 * 24 * 3600),
405            last_accessed: None,
406            access_count: 0,
407        };
408        let old_with_same_last_accessed = make_entry(0, 7 * 24 * 3600);
409        let score_no_access = policy.score(&old_with_no_last_accessed);
410        let score_same = policy.score(&old_with_same_last_accessed);
411        // Both reference the same time; scores should be approximately equal
412        let diff = (score_no_access - score_same).abs();
413        assert!(diff < 1e-6, "scores should match; diff = {diff}");
414    }
415
416    #[test]
417    fn eviction_config_default_is_disabled() {
418        let config = EvictionConfig::default();
419        assert_eq!(
420            config.max_entries, 0,
421            "eviction must be disabled by default"
422        );
423    }
424
425    #[test]
426    fn parse_sqlite_timestamp_known_value() {
427        // 2024-01-01 00:00:00 UTC
428        let ts = parse_sqlite_timestamp_secs("2024-01-01 00:00:00").unwrap();
429        // Days from 1970 to 2024: 54 years, roughly
430        // Reference: 2024-01-01 00:00:00 UTC = 1704067200
431        assert_eq!(
432            ts, 1_704_067_200,
433            "2024-01-01 must parse to known timestamp"
434        );
435    }
436}