at://did:plc:44ybard66vv44zksje25o7dz/app.bsky.feed.post/3liuwhoozjc2x

Back to Collection

Record JSON

{
  "$type": "app.bsky.feed.post",
  "createdAt": "2025-02-23T22:54:30.978Z",
  "langs": [
    "en"
  ],
  "reply": {
    "parent": {
      "cid": "bafyreigzao7af5yh6afxd77cwgthoxs4afd4erdvln7mfajkfzbtv3om74",
      "uri": "at://did:plc:44ybard66vv44zksje25o7dz/app.bsky.feed.post/3liuwcb2iwc2x"
    },
    "root": {
      "cid": "bafyreiefqsdj3zifd2ekhrc43hjf5gl44q5x7dc6gsrhvotwqxktlannca",
      "uri": "at://did:plc:i7ozfra6gfsocvqd7q4oa22n/app.bsky.feed.post/3liuvkzts2c2g"
    }
  },
  "text": "my loose take is that you need to look at HTTP response codes and do a refresh based on that anyways, not just rely on declared expiration times, which are only \"firm\", not \"hard\". the session might always be truncated server-side so you need to handle unexpected expiration"
}