Units API.

See the Weblate's Web API documentation for detailed description of the API.

GET /api/units/30162/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, DELETE, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlessecurity/fr/?format=api",
    "source": [
        "When the first computers were attached to data networks, applications were developed to enable them to access to remote computers through the network. To authenticate the remote users, these applications have also relied on usernames and passwords. When a user connects to a distant computer, she sends her username through the network and then provides her password to confirm her `identity`. This authentication scheme is presented in the time sequence diagram below."
    ],
    "previous_source": "",
    "target": [
        ""
    ],
    "id_hash": -8569871396569444522,
    "content_hash": -8569871396569444522,
    "location": "../../principles/security.rst:12",
    "context": "",
    "note": "",
    "flags": "",
    "state": 0,
    "fuzzy": false,
    "translated": false,
    "approved": false,
    "position": 3,
    "has_suggestion": false,
    "has_comment": false,
    "has_failing_check": false,
    "num_words": 72,
    "source_unit": "https://weblate.info.ucl.ac.be/api/units/35252/?format=api",
    "priority": 100,
    "id": 30162,
    "web_url": "https://weblate.info.ucl.ac.be/translate/cnp3-ebook/principlessecurity/fr/?checksum=911b35eb4b28f56",
    "url": "https://weblate.info.ucl.ac.be/api/units/30162/?format=api",
    "explanation": "",
    "extra_flags": "",
    "pending": false,
    "timestamp": "2021-08-27T14:43:06.531698+02:00"
}