mirror of
https://github.com/openclaw/openclaw.git
synced 2026-05-21 15:34:48 +00:00
* refactor: remove stale file-backed shims * fix: harden sqlite state ci boundaries * refactor: store matrix idb snapshots in sqlite * fix: satisfy rebased CI guardrails * refactor: store current conversation bindings in sqlite table * refactor: store tui last sessions in sqlite table * refactor: reset sqlite schema history * refactor: drop unshipped sqlite table migration * refactor: remove plugin index file rollback * refactor: drop unshipped sqlite sidecar migrations * refactor: remove runtime commitments kv migration * refactor: preserve kysely sync result types * refactor: drop unshipped sqlite schema migration table * test: keep session usage coverage sqlite-backed * refactor: keep sqlite migration doctor-only * refactor: isolate device legacy imports * refactor: isolate push voicewake legacy imports * refactor: isolate remaining runtime legacy imports * refactor: tighten sqlite migration guardrails * test: cover sqlite persisted enum parsing * refactor: isolate legacy update and tui imports * refactor: tighten sqlite state ownership * refactor: move legacy imports behind doctor * refactor: remove legacy session row lookup * refactor: canonicalize memory transcript locators * refactor: drop transcript path scope fallbacks * refactor: drop runtime legacy session delivery pruning * refactor: store tts prefs only in sqlite * refactor: remove cron store path runtime * refactor: use cron sqlite store keys * refactor: rename telegram message cache scope * refactor: read memory dreaming status from sqlite * refactor: rename cron status store key * refactor: stop remembering transcript file paths * test: use sqlite locators in agent fixtures * refactor: remove file-shaped commitments and cron store surfaces * refactor: keep compaction transcript handles out of session rows * refactor: derive transcript handles from session identity * refactor: derive runtime transcript handles * refactor: remove gateway session locator reads * refactor: remove transcript locator from session rows * refactor: store raw stream diagnostics in sqlite * refactor: remove file-shaped transcript rotation * refactor: hide legacy trajectory paths from runtime * refactor: remove runtime transcript file bridges * refactor: repair database-first rebase fallout * refactor: align tests with database-first state * refactor: remove transcript file handoffs * refactor: sync post-compaction memory by transcript scope * refactor: run codex app-server sessions by id * refactor: bind codex runtime state by session id * refactor: pass memory transcripts by sqlite scope * refactor: remove transcript locator cleanup leftovers * test: remove stale transcript file fixtures * refactor: remove transcript locator test helper * test: make cron sqlite keys explicit * test: remove cron runtime store paths * test: remove stale session file fixtures * test: use sqlite cron keys in diagnostics * refactor: remove runtime delivery queue backfill * test: drop fake export session file mocks * refactor: rename acp session read failure flag * refactor: rename acp row session key * refactor: remove session store test seams * refactor: move legacy session parser tests to doctor * refactor: reindex managed memory in place * refactor: drop stale session store wording * refactor: rename session row helpers * refactor: rename sqlite session entry modules * refactor: remove transcript locator leftovers * refactor: trim file-era audit wording * refactor: clean managed media through sqlite * fix: prefer explicit agent for exports * fix: use prepared agent for session resets * fix: canonicalize legacy codex binding import * test: rename state cleanup helper * docs: align backup docs with sqlite state * refactor: drop legacy Pi usage auth fallback * refactor: move legacy auth profile imports to doctor * refactor: keep Pi model discovery auth in memory * refactor: remove MSTeams legacy learning key fallback * refactor: store model catalog config in sqlite * refactor: use sqlite model catalog at runtime * refactor: remove model json compatibility aliases * refactor: store auth profiles in sqlite * refactor: seed copied auth profiles in sqlite * refactor: make auth profile runtime sqlite-addressed * refactor: migrate hermes secrets into sqlite auth store * refactor: move plugin install config migration to doctor * refactor: rename plugin index audit checks * test: drop auth file assumptions * test: remove legacy transcript file assertions * refactor: drop legacy cli session aliases * refactor: store skill uploads in sqlite * refactor: keep subagent attachments in sqlite vfs * refactor: drop subagent attachment cleanup state * refactor: move legacy session aliases to doctor * refactor: require node 24 for sqlite state runtime * refactor: move provider caches into sqlite state * fix: harden virtual agent filesystem * refactor: enforce database-first runtime state * refactor: rename compaction transcript rotation setting * test: clean sqlite refactor test types * refactor: consolidate sqlite runtime state * refactor: model session conversations in sqlite * refactor: stop deriving cron delivery from session keys * refactor: stop classifying sessions from key shape * refactor: hydrate announce targets from typed delivery * refactor: route heartbeat delivery from typed sqlite context * refactor: tighten typed sqlite session routing * refactor: remove session origin routing shadow * refactor: drop session origin shadow fixtures * perf: query sqlite vfs paths by prefix * refactor: use typed conversation metadata for sessions * refactor: prefer typed session routing metadata * refactor: require typed session routing metadata * refactor: resolve group tool policy from typed sessions * refactor: delete dead session thread info bridge * Show Codex subscription reset times in channel errors (#80456) * feat(plugin-sdk): consolidate session workflow APIs * fix(agents): allow read-only agent mount reads * [codex] refresh plugin regression fixtures * fix(agents): restore compaction gateway logs * test: tighten gateway startup assertions * Redact persisted secret-shaped payloads [AI] (#79006) * test: tighten device pair notify assertions * test: tighten hermes secret assertions * test: assert matrix client error shapes * test: assert config compat warnings * fix(heartbeat): remap cron-run exec events to session keys (#80214) * fix(codex): route btw through native side threads * fix(auth): accept friendly OpenAI order for Codex profiles * fix(codex): rotate auth profiles inside harness * fix: keep browser status page probe within timeout * test: assert agents add outputs * test: pin cron read status * fix(agents): avoid Pi resource discovery stalls Co-authored-by: dataCenter430 <titan032000@gmail.com> * fix: retire timed-out codex app-server clients * test: tighten qa lab runtime assertions * test: check security fix outputs * test: verify extension runtime messages * feat(wake): expose typed sessionKey on wake protocol + system event CLI * fix(gateway): await session_end during shutdown drain and track channel + compaction lifecycle paths (#57790) * test: guard talk consult call helper * fix(codex): scale context engine projection (#80761) * fix(codex): scale context engine projection * fix: document Codex context projection scaling * fix: document Codex context projection scaling * fix: document Codex context projection scaling * fix: document Codex context projection scaling * chore: align Codex projection changelog * chore: realign Codex projection changelog * fix: isolate Codex projection patch --------- Co-authored-by: Eva (agent) <eva+agent-78055@100yen.org> Co-authored-by: Josh Lehman <josh@martian.engineering> * refactor: move agent runtime state toward piless * refactor: remove cron session reaper * refactor: move session management to sqlite * refactor: finish database-first state migration * chore: refresh generated sqlite db types * refactor: remove stale file-backed shims * test: harden kysely type coverage # Conflicts: # .agents/skills/kysely-database-access/SKILL.md # src/infra/kysely-sync.types.test.ts # src/proxy-capture/store.sqlite.test.ts # src/state/openclaw-agent-db.test.ts # src/state/openclaw-state-db.test.ts * refactor: remove cron store path runtime * refactor: keep compaction transcript handles out of session rows * refactor: derive embedded transcripts from sqlite identity * refactor: remove embedded transcript locator handoff * refactor: remove runtime transcript file bridges * refactor: remove transcript file handoffs * refactor: remove MSTeams legacy learning key fallback * refactor: store model catalog config in sqlite * refactor: use sqlite model catalog at runtime # Conflicts: # docs/cli/secrets.md # docs/gateway/authentication.md # docs/gateway/secrets.md * fix: keep oauth sibling sync sqlite-local # Conflicts: # src/commands/onboard-auth.test.ts * refactor: remove task session store maintenance # Conflicts: # src/commands/tasks.ts * refactor: keep diagnostics in state sqlite * refactor: enforce database-first runtime state * refactor: consolidate sqlite runtime state * Show Codex subscription reset times in channel errors (#80456) * fix(codex): refresh subscription limit resets * fix(codex): format reset times for channels * Update CHANGELOG with latest changes and fixes Updated CHANGELOG with recent fixes and improvements. * fix(codex): keep command load failures on codex surface * fix(codex): format account rate limits as rows * fix(codex): summarize account limits as usage status * fix(codex): simplify account limit status * test: tighten subagent announce queue assertion * test: tighten session delete lifecycle assertions * test: tighten cron ops assertions * fix: track cron execution milestones * test: tighten hermes secret assertions * test: assert matrix sync store payloads * test: assert config compat warnings * fix(codex): align btw side thread semantics * fix(codex): honor codex fallback blocking * fix(agents): avoid Pi resource discovery stalls * test: tighten codex event assertions * test: tighten cron assertions * Fix Codex app-server OAuth harness auth * refactor: move agent runtime state toward piless * refactor: move device and push state to sqlite * refactor: move runtime json state imports to doctor * refactor: finish database-first state migration * chore: refresh generated sqlite db types * refactor: clarify cron sqlite store keys * refactor: remove stale file-backed shims * refactor: bind codex runtime state by session id * test: expect sqlite trajectory branch export * refactor: rename session row helpers * fix: keep legacy device identity import in doctor * refactor: enforce database-first runtime state * refactor: consolidate sqlite runtime state * build: align pi contract wrappers * chore: repair database-first rebase * refactor: remove session file test contracts * test: update gateway session expectations * refactor: stop routing from session compatibility shadows * refactor: stop persisting session route shadows * refactor: use typed delivery context in clients * refactor: stop echoing session route shadows * refactor: repair embedded runner rebase imports # Conflicts: # src/agents/pi-embedded-runner/run/attempt.tool-call-argument-repair.ts * refactor: align pi contract imports * refactor: satisfy kysely sync helper guard * refactor: remove file transcript bridge remnants * refactor: remove session locator compatibility * refactor: remove session file test contracts * refactor: keep rebase database-first clean * refactor: remove session file assumptions from e2e * docs: clarify database-first goal state * test: remove legacy store markers from sqlite runtime tests * refactor: remove legacy store assumptions from runtime seams * refactor: align sqlite runtime helper seams * test: update memory recall sqlite audit mock * refactor: align database-first runtime type seams * test: clarify doctor cron legacy store names * fix: preserve sqlite session route projections * test: fix copilot token cache test syntax * docs: update database-first proof status * test: align database-first test fixtures * docs: update database-first proof status * refactor: clean extension database-first drift * test: align agent session route proof * test: clarify doctor legacy path fixtures * chore: clean database-first changed checks * chore: repair database-first rebase markers * build: allow baileys git subdependency * chore: repair exp-vfs rebase drift * chore: finish exp-vfs rebase cleanup * chore: satisfy rebase lint drift * chore: fix qqbot rebase type seam * chore: fix rebase drift leftovers * fix: keep auth profile oauth secrets out of sqlite * fix: repair rebase drift tests * test: stabilize pairing request ordering * test: use source manifests in plugin contract checks * fix: restore gateway session metadata after rebase * fix: repair database-first rebase drift * fix: clean up database-first rebase fallout * test: stabilize line quick reply receipt time * fix: repair extension rebase drift * test: keep transcript redaction tests sqlite-backed * fix: carry injected transcript redaction through sqlite * chore: clean database branch rebase residue * fix: repair database branch CI drift * fix: repair database branch CI guard drift * fix: stabilize oauth tls preflight test * test: align database branch fast guards * test: repair build artifact boundary guards * chore: clean changelog rebase markers --------- Co-authored-by: pashpashpash <nik@vault77.ai> Co-authored-by: Eva <eva@100yen.org> Co-authored-by: stainlu <stainlu@newtype-ai.org> Co-authored-by: Jason Zhou <jason.zhou.design@gmail.com> Co-authored-by: Ruben Cuevas <hi@rubencu.com> Co-authored-by: Pavan Kumar Gondhi <pavangondhi@gmail.com> Co-authored-by: Shakker <shakkerdroid@gmail.com> Co-authored-by: Kaspre <36520309+Kaspre@users.noreply.github.com> Co-authored-by: dataCenter430 <titan032000@gmail.com> Co-authored-by: Kaspre <kaspre@gmail.com> Co-authored-by: pandadev66 <nova.full.stack@outlook.com> Co-authored-by: Eva <admin@100yen.org> Co-authored-by: Eva (agent) <eva+agent-78055@100yen.org> Co-authored-by: Josh Lehman <josh@martian.engineering> Co-authored-by: jeffjhunter <support@aipersonamethod.com>
352 lines
11 KiB
Swift
352 lines
11 KiB
Swift
import Foundation
|
|
import SwiftUI
|
|
|
|
struct GatewaySessionDefaultsRecord: Codable {
|
|
let model: String?
|
|
let contextTokens: Int?
|
|
}
|
|
|
|
struct GatewaySessionEntryRecord: Codable {
|
|
let key: String
|
|
let displayName: String?
|
|
let provider: String?
|
|
let subject: String?
|
|
let room: String?
|
|
let space: String?
|
|
let updatedAt: Double?
|
|
let sessionId: String?
|
|
let systemSent: Bool?
|
|
let abortedLastRun: Bool?
|
|
let thinkingLevel: String?
|
|
let verboseLevel: String?
|
|
let inputTokens: Int?
|
|
let outputTokens: Int?
|
|
let totalTokens: Int?
|
|
let model: String?
|
|
let contextTokens: Int?
|
|
}
|
|
|
|
struct GatewaySessionsListResponse: Codable {
|
|
let ts: Double?
|
|
let databasePath: String
|
|
let count: Int
|
|
let defaults: GatewaySessionDefaultsRecord?
|
|
let sessions: [GatewaySessionEntryRecord]
|
|
}
|
|
|
|
struct SessionTokenStats {
|
|
let input: Int
|
|
let output: Int
|
|
let total: Int
|
|
let contextTokens: Int
|
|
|
|
var contextSummaryShort: String {
|
|
"\(Self.formatKTokens(self.total))/\(Self.formatKTokens(self.contextTokens))"
|
|
}
|
|
|
|
var percentUsed: Int? {
|
|
guard self.contextTokens > 0, self.total > 0 else { return nil }
|
|
return min(100, Int(round((Double(self.total) / Double(self.contextTokens)) * 100)))
|
|
}
|
|
|
|
var summary: String {
|
|
let parts = ["in \(input)", "out \(output)", "total \(total)"]
|
|
var text = parts.joined(separator: " | ")
|
|
if let percentUsed {
|
|
text += " (\(percentUsed)% of \(self.contextTokens))"
|
|
}
|
|
return text
|
|
}
|
|
|
|
static func formatKTokens(_ value: Int) -> String {
|
|
if value < 1000 { return "\(value)" }
|
|
let thousands = Double(value) / 1000
|
|
let decimals = value >= 10000 ? 0 : 1
|
|
return String(format: "%.\(decimals)fk", thousands)
|
|
}
|
|
}
|
|
|
|
struct SessionRow: Identifiable {
|
|
let id: String
|
|
let key: String
|
|
let kind: SessionKind
|
|
let displayName: String?
|
|
let provider: String?
|
|
let subject: String?
|
|
let room: String?
|
|
let space: String?
|
|
let updatedAt: Date?
|
|
let sessionId: String?
|
|
let thinkingLevel: String?
|
|
let verboseLevel: String?
|
|
let systemSent: Bool
|
|
let abortedLastRun: Bool
|
|
let tokens: SessionTokenStats
|
|
let model: String?
|
|
|
|
var ageText: String {
|
|
relativeAge(from: self.updatedAt)
|
|
}
|
|
|
|
var label: String {
|
|
self.displayName ?? self.key
|
|
}
|
|
|
|
var flagLabels: [String] {
|
|
var flags: [String] = []
|
|
if let thinkingLevel { flags.append("think \(thinkingLevel)") }
|
|
if let verboseLevel { flags.append("verbose \(verboseLevel)") }
|
|
if self.systemSent { flags.append("system sent") }
|
|
if self.abortedLastRun { flags.append("aborted") }
|
|
return flags
|
|
}
|
|
}
|
|
|
|
enum SessionKind {
|
|
case cron, direct, group, global, unknown
|
|
|
|
static func from(key: String) -> SessionKind {
|
|
if key == "global" { return .global }
|
|
let parts = key.lowercased().split(separator: ":").filter { !$0.isEmpty }
|
|
if parts.first == "cron" { return .cron }
|
|
if parts.count >= 3, parts[0] == "agent", parts[2] == "cron" { return .cron }
|
|
if key.hasPrefix("group:") { return .group }
|
|
if key.contains(":group:") { return .group }
|
|
if key.contains(":channel:") { return .group }
|
|
if key == "unknown" { return .unknown }
|
|
return .direct
|
|
}
|
|
|
|
var label: String {
|
|
switch self {
|
|
case .cron: "Cron"
|
|
case .direct: "Direct"
|
|
case .group: "Group"
|
|
case .global: "Global"
|
|
case .unknown: "Unknown"
|
|
}
|
|
}
|
|
|
|
var tint: Color {
|
|
switch self {
|
|
case .cron: .green
|
|
case .direct: .accentColor
|
|
case .group: .orange
|
|
case .global: .purple
|
|
case .unknown: .gray
|
|
}
|
|
}
|
|
}
|
|
|
|
struct SessionDefaults {
|
|
let model: String
|
|
let contextTokens: Int
|
|
}
|
|
|
|
extension SessionRow {
|
|
static var previewRows: [SessionRow] {
|
|
[
|
|
SessionRow(
|
|
id: "direct-1",
|
|
key: "user@example.com",
|
|
kind: .direct,
|
|
displayName: nil,
|
|
provider: nil,
|
|
subject: nil,
|
|
room: nil,
|
|
space: nil,
|
|
updatedAt: Date().addingTimeInterval(-90),
|
|
sessionId: "sess-direct-1234",
|
|
thinkingLevel: "low",
|
|
verboseLevel: "info",
|
|
systemSent: false,
|
|
abortedLastRun: false,
|
|
tokens: SessionTokenStats(input: 320, output: 680, total: 1000, contextTokens: 200_000),
|
|
model: "claude-3.5-sonnet"),
|
|
SessionRow(
|
|
id: "group-1",
|
|
key: "discord:channel:release-squad",
|
|
kind: .group,
|
|
displayName: "discord:#release-squad",
|
|
provider: "discord",
|
|
subject: nil,
|
|
room: "#release-squad",
|
|
space: nil,
|
|
updatedAt: Date().addingTimeInterval(-3600),
|
|
sessionId: "sess-group-4321",
|
|
thinkingLevel: "medium",
|
|
verboseLevel: nil,
|
|
systemSent: true,
|
|
abortedLastRun: true,
|
|
tokens: SessionTokenStats(input: 5000, output: 1200, total: 6200, contextTokens: 200_000),
|
|
model: "claude-opus-4-6"),
|
|
SessionRow(
|
|
id: "global",
|
|
key: "global",
|
|
kind: .global,
|
|
displayName: nil,
|
|
provider: nil,
|
|
subject: nil,
|
|
room: nil,
|
|
space: nil,
|
|
updatedAt: Date().addingTimeInterval(-86400),
|
|
sessionId: nil,
|
|
thinkingLevel: nil,
|
|
verboseLevel: nil,
|
|
systemSent: false,
|
|
abortedLastRun: false,
|
|
tokens: SessionTokenStats(input: 150, output: 220, total: 370, contextTokens: 200_000),
|
|
model: "gpt-4.1-mini"),
|
|
]
|
|
}
|
|
}
|
|
|
|
struct ModelChoice: Identifiable, Hashable, Codable {
|
|
let id: String
|
|
let name: String
|
|
let provider: String
|
|
let contextWindow: Int?
|
|
}
|
|
|
|
extension String? {
|
|
var isNilOrEmpty: Bool {
|
|
switch self {
|
|
case .none: true
|
|
case let .some(value): value.isEmpty
|
|
}
|
|
}
|
|
}
|
|
|
|
extension [String] {
|
|
fileprivate func dedupedPreserveOrder() -> [String] {
|
|
var seen = Set<String>()
|
|
var result: [String] = []
|
|
for item in self where !seen.contains(item) {
|
|
seen.insert(item)
|
|
result.append(item)
|
|
}
|
|
return result
|
|
}
|
|
}
|
|
|
|
enum SessionLoadError: LocalizedError {
|
|
case gatewayUnavailable(String)
|
|
case decodeFailed(String)
|
|
|
|
var errorDescription: String? {
|
|
switch self {
|
|
case let .gatewayUnavailable(reason):
|
|
"Could not reach the gateway for sessions: \(reason)"
|
|
|
|
case let .decodeFailed(reason):
|
|
"Could not decode gateway session payload: \(reason)"
|
|
}
|
|
}
|
|
}
|
|
|
|
struct SessionStoreSnapshot {
|
|
let databasePath: String
|
|
let defaults: SessionDefaults
|
|
let rows: [SessionRow]
|
|
}
|
|
|
|
@MainActor
|
|
enum SessionLoader {
|
|
static let fallbackModel = "claude-opus-4-6"
|
|
static let fallbackContextTokens = 200_000
|
|
|
|
static let defaultDatabasePath = standardize(
|
|
OpenClawPaths.stateDirURL
|
|
.appendingPathComponent("agents/main/agent/openclaw-agent.sqlite").path)
|
|
|
|
static func loadSnapshot(
|
|
activeMinutes: Int? = nil,
|
|
limit: Int? = nil,
|
|
includeGlobal: Bool = true,
|
|
includeUnknown: Bool = true) async throws -> SessionStoreSnapshot
|
|
{
|
|
var params: [String: AnyHashable] = [
|
|
"includeGlobal": AnyHashable(includeGlobal),
|
|
"includeUnknown": AnyHashable(includeUnknown),
|
|
]
|
|
if let activeMinutes { params["activeMinutes"] = AnyHashable(activeMinutes) }
|
|
if let limit { params["limit"] = AnyHashable(limit) }
|
|
|
|
let data: Data
|
|
do {
|
|
data = try await ControlChannel.shared.request(method: "sessions.list", params: params)
|
|
} catch {
|
|
let msg = (error as? LocalizedError)?.errorDescription ?? error.localizedDescription
|
|
if msg.localizedCaseInsensitiveContains("unknown method: sessions.list") {
|
|
throw SessionLoadError.gatewayUnavailable(
|
|
"Gateway is too old (missing sessions.list). Restart/update the gateway.")
|
|
}
|
|
throw SessionLoadError.gatewayUnavailable(msg)
|
|
}
|
|
|
|
let decoded: GatewaySessionsListResponse
|
|
do {
|
|
decoded = try JSONDecoder().decode(GatewaySessionsListResponse.self, from: data)
|
|
} catch {
|
|
throw SessionLoadError.decodeFailed(error.localizedDescription)
|
|
}
|
|
|
|
let defaults = SessionDefaults(
|
|
model: decoded.defaults?.model ?? self.fallbackModel,
|
|
contextTokens: decoded.defaults?.contextTokens ?? self.fallbackContextTokens)
|
|
|
|
let rows = decoded.sessions.map { entry -> SessionRow in
|
|
let updated = entry.updatedAt.map { Date(timeIntervalSince1970: $0 / 1000) }
|
|
let input = entry.inputTokens ?? 0
|
|
let output = entry.outputTokens ?? 0
|
|
let total = entry.totalTokens ?? input + output
|
|
let context = entry.contextTokens ?? defaults.contextTokens
|
|
let model = entry.model ?? defaults.model
|
|
|
|
return SessionRow(
|
|
id: entry.key,
|
|
key: entry.key,
|
|
kind: SessionKind.from(key: entry.key),
|
|
displayName: entry.displayName,
|
|
provider: entry.provider,
|
|
subject: entry.subject,
|
|
room: entry.room,
|
|
space: entry.space,
|
|
updatedAt: updated,
|
|
sessionId: entry.sessionId,
|
|
thinkingLevel: entry.thinkingLevel,
|
|
verboseLevel: entry.verboseLevel,
|
|
systemSent: entry.systemSent ?? false,
|
|
abortedLastRun: entry.abortedLastRun ?? false,
|
|
tokens: SessionTokenStats(
|
|
input: input,
|
|
output: output,
|
|
total: total,
|
|
contextTokens: context),
|
|
model: model)
|
|
}.sorted { ($0.updatedAt ?? .distantPast) > ($1.updatedAt ?? .distantPast) }
|
|
|
|
return SessionStoreSnapshot(databasePath: decoded.databasePath, defaults: defaults, rows: rows)
|
|
}
|
|
|
|
static func loadRows() async throws -> [SessionRow] {
|
|
try await self.loadSnapshot().rows
|
|
}
|
|
|
|
private static func standardize(_ path: String) -> String {
|
|
(path as NSString).expandingTildeInPath.replacingOccurrences(of: "//", with: "/")
|
|
}
|
|
}
|
|
|
|
func relativeAge(from date: Date?) -> String {
|
|
guard let date else { return "unknown" }
|
|
let delta = Date().timeIntervalSince(date)
|
|
if delta < 60 { return "just now" }
|
|
let minutes = Int(round(delta / 60))
|
|
if minutes < 60 { return "\(minutes)m ago" }
|
|
let hours = Int(round(Double(minutes) / 60))
|
|
if hours < 48 { return "\(hours)h ago" }
|
|
let days = Int(round(Double(hours) / 24))
|
|
return "\(days)d ago"
|
|
}
|