Unit Instance
Units API.
See the Weblate's Web API documentation for detailed description of the API.
GET /api/units/30164/?format=api
https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlessecurity/fr/?format=api", "source": [ "Alice and Bob are the first names that are used in examples for security techniques. They first appeared in a seminal paper by Diffie and Hellman [DH1976]_. Since then, Alice and Bob are the most frequently used names to represent the users who interact with a network. Other characters such as Eve or Mallory have been added over the years. We will explain their respective roles later." ], "previous_source": "", "target": [ "" ], "id_hash": 1045405912283820860, "content_hash": 1045405912283820860, "location": "../../principles/security.rst:48", "context": "", "note": "", "flags": "", "state": 0, "fuzzy": false, "translated": false, "approved": false, "position": 5, "has_suggestion": false, "has_comment": false, "has_failing_check": false, "num_words": 67, "source_unit": "https://weblate.info.ucl.ac.be/api/units/35254/?format=api", "priority": 100, "id": 30164, "web_url": "https://weblate.info.ucl.ac.be/translate/cnp3-ebook/principlessecurity/fr/?checksum=8e8207236fc5333c", "url": "https://weblate.info.ucl.ac.be/api/units/30164/?format=api", "explanation": "", "extra_flags": "", "pending": false, "timestamp": "2021-08-27T14:43:06.585244+02:00" }{ "translation": "