Skip to main content

zeph_memory/
eviction.rs

1// SPDX-FileCopyrightText: 2026 Andrei G <bug-ops>
2// SPDX-License-Identifier: MIT OR Apache-2.0
3
4//! Memory eviction subsystem.
5//!
6//! Provides a trait-based eviction policy framework with an Ebbinghaus
7//! forgetting curve implementation. The background sweep loop runs
8//! periodically, scoring entries and soft-deleting the lowest-scoring ones
9//! from `SQLite` before removing their `Qdrant` vectors in a second phase.
10//!
11//! Two-phase design ensures crash safety: soft-deleted `SQLite` rows are
12//! invisible to the application immediately, and `Qdrant` cleanup is retried
13//! on the next sweep if the agent crashes between phases.
14
15use std::sync::Arc;
16
17use tokio::time::{Duration, interval};
18use tokio_util::sync::CancellationToken;
19
20use crate::error::MemoryError;
21use crate::store::SqliteStore;
22use crate::types::MessageId;
23
24// ── Public types ──────────────────────────────────────────────────────────────
25
26/// Metadata for a single memory entry evaluated by [`EvictionPolicy::score`].
27#[derive(Debug, Clone)]
28pub struct EvictionEntry {
29    /// `SQLite` row ID of the message.
30    pub id: MessageId,
31    /// ISO 8601 creation timestamp (TEXT column from `SQLite`, UTC).
32    pub created_at: String,
33    /// ISO 8601 last-accessed timestamp, or `None` if never accessed after creation.
34    pub last_accessed: Option<String>,
35    /// Number of times this message has been retrieved via recall.
36    pub access_count: u32,
37}
38
39/// Trait for eviction scoring strategies.
40///
41/// Implementations must be `Send + Sync` so they can be shared across threads.
42pub trait EvictionPolicy: Send + Sync {
43    /// Compute a retention score for the given entry.
44    ///
45    /// Higher scores mean the entry is more likely to be retained.
46    /// Lower scores mean the entry is a candidate for eviction.
47    fn score(&self, entry: &EvictionEntry) -> f64;
48}
49
50/// Configuration for the eviction subsystem.
51#[derive(Debug, Clone, serde::Deserialize, serde::Serialize)]
52#[serde(default)]
53pub struct EvictionConfig {
54    /// Policy name. Currently only `"ebbinghaus"` is supported.
55    pub policy: String,
56    /// Maximum number of entries to retain. `0` means unlimited (eviction disabled).
57    pub max_entries: usize,
58    /// How often to run the eviction sweep, in seconds.
59    pub sweep_interval_secs: u64,
60}
61
62impl Default for EvictionConfig {
63    fn default() -> Self {
64        Self {
65            policy: "ebbinghaus".to_owned(),
66            max_entries: 0,
67            sweep_interval_secs: 3600,
68        }
69    }
70}
71
72// ── Ebbinghaus policy ─────────────────────────────────────────────────────────
73
74/// Ebbinghaus forgetting curve eviction policy.
75///
76/// Score formula:
77///   `score = exp(-t / (S * ln(1 + n)))`
78///
79/// Where:
80/// - `t` = seconds since `last_accessed` (or `created_at` if never accessed)
81/// - `S` = `retention_strength` (higher = slower decay)
82/// - `n` = `access_count`
83///
84/// Entries with a high access count or recent access get higher scores
85/// and are less likely to be evicted.
86pub struct EbbinghausPolicy {
87    retention_strength: f64,
88}
89
90impl EbbinghausPolicy {
91    /// Create a new policy with the given retention strength.
92    ///
93    /// A good default is `86400.0` (one day in seconds).
94    #[must_use]
95    pub fn new(retention_strength: f64) -> Self {
96        Self { retention_strength }
97    }
98}
99
100impl Default for EbbinghausPolicy {
101    fn default() -> Self {
102        Self::new(86_400.0) // 1 day
103    }
104}
105
106impl EvictionPolicy for EbbinghausPolicy {
107    fn score(&self, entry: &EvictionEntry) -> f64 {
108        let now_secs = unix_now_secs();
109
110        let reference_secs = entry
111            .last_accessed
112            .as_deref()
113            .and_then(parse_sqlite_timestamp_secs)
114            .unwrap_or_else(|| parse_sqlite_timestamp_secs(&entry.created_at).unwrap_or(now_secs));
115
116        // Clamp t >= 0 to handle clock skew or future timestamps.
117        #[allow(clippy::cast_precision_loss)]
118        let t = now_secs.saturating_sub(reference_secs) as f64;
119        let n = f64::from(entry.access_count);
120
121        // ln(1 + 0) = 0 which would divide by zero — use 1.0 as minimum denominator.
122        let denominator = (self.retention_strength * (1.0_f64 + n).ln()).max(1.0);
123        (-t / denominator).exp()
124    }
125}
126
127fn unix_now_secs() -> u64 {
128    std::time::SystemTime::now()
129        .duration_since(std::time::UNIX_EPOCH)
130        .map(|d| d.as_secs())
131        .unwrap_or(0)
132}
133
134/// Parse a `SQLite` TEXT timestamp ("YYYY-MM-DD HH:MM:SS") into Unix seconds.
135///
136/// Does not use `chrono` to avoid adding a dependency to `zeph-memory`.
137fn parse_sqlite_timestamp_secs(s: &str) -> Option<u64> {
138    // Expected format: "YYYY-MM-DD HH:MM:SS"
139    let s = s.trim();
140    if s.len() < 19 {
141        return None;
142    }
143    let year: u64 = s[0..4].parse().ok()?;
144    let month: u64 = s[5..7].parse().ok()?;
145    let day: u64 = s[8..10].parse().ok()?;
146    let hour: u64 = s[11..13].parse().ok()?;
147    let min: u64 = s[14..16].parse().ok()?;
148    let sec: u64 = s[17..19].parse().ok()?;
149
150    // Days since Unix epoch (1970-01-01). Simple but accurate for years 1970-2099.
151    // Leap year calculation: divisible by 4 and not 100, or divisible by 400.
152    let is_leap = |y: u64| (y.is_multiple_of(4) && !y.is_multiple_of(100)) || y.is_multiple_of(400);
153    let days_in_month = |y: u64, m: u64| -> u64 {
154        match m {
155            1 | 3 | 5 | 7 | 8 | 10 | 12 => 31,
156            4 | 6 | 9 | 11 => 30,
157            2 => {
158                if is_leap(y) {
159                    29
160                } else {
161                    28
162                }
163            }
164            _ => 0,
165        }
166    };
167
168    let mut days: u64 = 0;
169    for y in 1970..year {
170        days += if is_leap(y) { 366 } else { 365 };
171    }
172    for m in 1..month {
173        days += days_in_month(year, m);
174    }
175    days += day.saturating_sub(1);
176
177    Some(days * 86400 + hour * 3600 + min * 60 + sec)
178}
179
180// ── Sweep loop ────────────────────────────────────────────────────────────────
181
182/// Start the background eviction loop.
183///
184/// The loop runs every `config.sweep_interval_secs` seconds. Each iteration:
185/// 1. Queries `SQLite` for all non-deleted entries and their eviction metadata.
186/// 2. Scores each entry using `policy`.
187/// 3. If the count exceeds `config.max_entries`, soft-deletes the excess lowest-scoring rows.
188/// 4. Queries for all soft-deleted rows and attempts to remove their Qdrant vectors.
189///    If Qdrant removal fails, it is retried on the next sweep cycle.
190///
191/// If `config.max_entries == 0`, the loop exits immediately without doing anything.
192///
193/// # Errors (non-fatal)
194///
195/// Database and Qdrant errors are logged but do not stop the loop.
196pub async fn start_eviction_loop(
197    store: Arc<SqliteStore>,
198    config: EvictionConfig,
199    policy: Arc<dyn EvictionPolicy + 'static>,
200    cancel: CancellationToken,
201) {
202    if config.max_entries == 0 {
203        tracing::debug!("eviction disabled (max_entries = 0)");
204        return;
205    }
206
207    let mut ticker = interval(Duration::from_secs(config.sweep_interval_secs));
208    // Skip the first immediate tick so the loop doesn't run at startup.
209    ticker.tick().await;
210
211    loop {
212        tokio::select! {
213            () = cancel.cancelled() => {
214                tracing::debug!("eviction loop shutting down");
215                return;
216            }
217            _ = ticker.tick() => {}
218        }
219
220        tracing::debug!(max_entries = config.max_entries, "running eviction sweep");
221
222        // Phase 1: score and soft-delete excess entries.
223        match run_eviction_phase1(&store, &*policy, config.max_entries).await {
224            Ok(deleted) => {
225                if deleted > 0 {
226                    tracing::info!(deleted, "eviction phase 1: soft-deleted entries");
227                }
228            }
229            Err(e) => {
230                tracing::warn!(error = %e, "eviction phase 1 failed, will retry next sweep");
231            }
232        }
233
234        // Phase 2: clean up soft-deleted entries from Qdrant.
235        // On startup or after a crash, this also cleans up any orphaned vectors.
236        match run_eviction_phase2(&store).await {
237            Ok(cleaned) => {
238                if cleaned > 0 {
239                    tracing::info!(cleaned, "eviction phase 2: removed Qdrant vectors");
240                }
241            }
242            Err(e) => {
243                tracing::warn!(error = %e, "eviction phase 2 failed, will retry next sweep");
244            }
245        }
246    }
247}
248
249#[cfg_attr(
250    feature = "profiling",
251    tracing::instrument(name = "memory.eviction_phase1", skip_all)
252)]
253async fn run_eviction_phase1(
254    store: &SqliteStore,
255    policy: &dyn EvictionPolicy,
256    max_entries: usize,
257) -> Result<usize, MemoryError> {
258    let candidates = store.get_eviction_candidates().await?;
259    let total = candidates.len();
260
261    if total <= max_entries {
262        return Ok(0);
263    }
264
265    let excess = total - max_entries;
266    let mut scored: Vec<(f64, MessageId)> = candidates
267        .into_iter()
268        .map(|e| (policy.score(&e), e.id))
269        .collect();
270
271    // Sort ascending by score — lowest scores (most forgettable) first.
272    scored.sort_by(|a, b| a.0.partial_cmp(&b.0).unwrap_or(std::cmp::Ordering::Equal));
273
274    let ids_to_delete: Vec<MessageId> = scored.into_iter().take(excess).map(|(_, id)| id).collect();
275    store.soft_delete_messages(&ids_to_delete).await?;
276
277    Ok(ids_to_delete.len())
278}
279
280#[cfg_attr(
281    feature = "profiling",
282    tracing::instrument(name = "memory.eviction_phase2", skip_all)
283)]
284async fn run_eviction_phase2(store: &SqliteStore) -> Result<usize, MemoryError> {
285    // Find all soft-deleted entries that haven't been cleaned from Qdrant yet.
286    let ids = store.get_soft_deleted_message_ids().await?;
287    if ids.is_empty() {
288        return Ok(0);
289    }
290
291    // TODO: call Qdrant delete-vectors API here before marking as cleaned.
292    // The embedding_store handles vector lifecycle separately; when that API
293    // is wired in, the call should happen here and mark_qdrant_cleaned should
294    // only be called on success. Tracked in issue: phase-2 Qdrant cleanup.
295    tracing::warn!(
296        count = ids.len(),
297        "eviction phase 2: Qdrant vector removal not yet wired — marking cleaned without actual deletion (MVP)"
298    );
299
300    // Mark as cleaned after the (future) Qdrant call succeeds. For now this
301    // prevents infinite retries on every sweep cycle.
302    store.mark_qdrant_cleaned(&ids).await?;
303    Ok(ids.len())
304}
305
306// ── Tests ─────────────────────────────────────────────────────────────────────
307
308#[cfg(test)]
309mod tests {
310    use super::*;
311
312    /// Build a timestamp string for a time N seconds ago from now.
313    ///
314    /// Returns a string parseable by `parse_sqlite_timestamp_secs`.
315    fn ts_ago(seconds_ago: u64) -> String {
316        let ts = unix_now_secs().saturating_sub(seconds_ago);
317        // Convert back to "YYYY-MM-DD HH:MM:SS" using the same logic as parse_sqlite_timestamp_secs
318        let sec = ts % 60;
319        let min = (ts / 60) % 60;
320        let hour = (ts / 3600) % 24;
321        let mut total_days = ts / 86400;
322        let is_leap =
323            |y: u64| (y.is_multiple_of(4) && !y.is_multiple_of(100)) || y.is_multiple_of(400);
324        let mut year = 1970u64;
325        loop {
326            let days_in_year = if is_leap(year) { 366 } else { 365 };
327            if total_days < days_in_year {
328                break;
329            }
330            total_days -= days_in_year;
331            year += 1;
332        }
333        let month_days = [
334            0u64,
335            31,
336            28 + u64::from(is_leap(year)),
337            31,
338            30,
339            31,
340            30,
341            31,
342            31,
343            30,
344            31,
345            30,
346            31,
347        ];
348        let mut month = 1u64;
349        while month <= 12 {
350            let month_idx = usize::try_from(month).unwrap_or_else(|_| unreachable!());
351            if total_days < month_days[month_idx] {
352                break;
353            }
354            total_days -= month_days[month_idx];
355            month += 1;
356        }
357        let day = total_days + 1;
358        format!("{year:04}-{month:02}-{day:02} {hour:02}:{min:02}:{sec:02}")
359    }
360
361    fn make_entry(access_count: u32, seconds_ago: u64) -> EvictionEntry {
362        let ts = ts_ago(seconds_ago);
363        EvictionEntry {
364            id: MessageId(1),
365            created_at: ts.clone(),
366            last_accessed: Some(ts),
367            access_count,
368        }
369    }
370
371    #[test]
372    fn ebbinghaus_recent_high_access_scores_near_one() {
373        let policy = EbbinghausPolicy::default();
374        // Use 1 second ago to ensure t is close to 0
375        let entry = make_entry(10, 1);
376        let score = policy.score(&entry);
377        // t = 1, n = 10, denominator = 86400 * ln(11) ≈ 207_946; exp(-1/207_946) ≈ 1.0
378        assert!(
379            score > 0.99,
380            "score should be near 1.0 for recently accessed entry, got {score}"
381        );
382    }
383
384    #[test]
385    fn ebbinghaus_old_zero_access_scores_lower() {
386        let policy = EbbinghausPolicy::default();
387        let old = make_entry(0, 7 * 24 * 3600); // 7 days ago, never accessed
388        let recent = make_entry(0, 60); // 1 minute ago
389        assert!(
390            policy.score(&old) < policy.score(&recent),
391            "old entry must score lower than recent"
392        );
393    }
394
395    #[test]
396    fn ebbinghaus_high_access_decays_slower() {
397        let policy = EbbinghausPolicy::default();
398        let low = make_entry(1, 3600); // accessed 1 hour ago, 1 time
399        let high = make_entry(20, 3600); // accessed 1 hour ago, 20 times
400        assert!(
401            policy.score(&high) > policy.score(&low),
402            "high access count should yield higher score"
403        );
404    }
405
406    #[test]
407    fn ebbinghaus_never_accessed_uses_created_at_as_reference() {
408        let policy = EbbinghausPolicy::default();
409        // An old entry (7 days ago) with last_accessed = None.
410        // Score should be the same as make_entry(0, 7 days) because both use created_at.
411        let old_with_no_last_accessed = EvictionEntry {
412            id: MessageId(2),
413            created_at: ts_ago(7 * 24 * 3600),
414            last_accessed: None,
415            access_count: 0,
416        };
417        let old_with_same_last_accessed = make_entry(0, 7 * 24 * 3600);
418        let score_no_access = policy.score(&old_with_no_last_accessed);
419        let score_same = policy.score(&old_with_same_last_accessed);
420        // Both reference the same time; scores should be approximately equal
421        let diff = (score_no_access - score_same).abs();
422        assert!(diff < 1e-6, "scores should match; diff = {diff}");
423    }
424
425    #[test]
426    fn eviction_config_default_is_disabled() {
427        let config = EvictionConfig::default();
428        assert_eq!(
429            config.max_entries, 0,
430            "eviction must be disabled by default"
431        );
432    }
433
434    #[test]
435    fn parse_sqlite_timestamp_known_value() {
436        // 2024-01-01 00:00:00 UTC
437        let ts = parse_sqlite_timestamp_secs("2024-01-01 00:00:00").unwrap();
438        // Days from 1970 to 2024: 54 years, roughly
439        // Reference: 2024-01-01 00:00:00 UTC = 1704067200
440        assert_eq!(
441            ts, 1_704_067_200,
442            "2024-01-01 must parse to known timestamp"
443        );
444    }
445}