at://did:plc:44ybard66vv44zksje25o7dz/app.bsky.feed.post/3liuwhoozjc2x
Back to Collection
Record JSON
{
"$type": "app.bsky.feed.post",
"createdAt": "2025-02-23T22:54:30.978Z",
"langs": [
"en"
],
"reply": {
"parent": {
"cid": "bafyreigzao7af5yh6afxd77cwgthoxs4afd4erdvln7mfajkfzbtv3om74",
"uri": "at://did:plc:44ybard66vv44zksje25o7dz/app.bsky.feed.post/3liuwcb2iwc2x"
},
"root": {
"cid": "bafyreiefqsdj3zifd2ekhrc43hjf5gl44q5x7dc6gsrhvotwqxktlannca",
"uri": "at://did:plc:i7ozfra6gfsocvqd7q4oa22n/app.bsky.feed.post/3liuvkzts2c2g"
}
},
"text": "my loose take is that you need to look at HTTP response codes and do a refresh based on that anyways, not just rely on declared expiration times, which are only \"firm\", not \"hard\". the session might always be truncated server-side so you need to handle unexpected expiration"
}