Units API.

See the Weblate's Web API documentation for detailed description of the API.

GET /api/units/30171/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, DELETE, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlessecurity/fr/?format=api",
    "source": [
        "Eavesdropping and pervasive monitoring are not the only possible attacks against a network. Another type of attacker is the active attacker. In the literature, these attacks are often called `Man in the middle` or `MITM` attacks. Such attacks occur when one user, let us call him `Mallory`, has managed to configure the network so that he can both capture and modify the packets exchanged by two users. The simplest scenario is when Mallory controls a router that is on the path used by both Alice and Bob. For example, Alice could be connected to a WiFi access router controlled by Mallory and Bob would be a regular server on the Internet."
    ],
    "previous_source": "",
    "target": [
        ""
    ],
    "id_hash": -1772842527446963395,
    "content_hash": -1772842527446963395,
    "location": "../../principles/security.rst:155",
    "context": "",
    "note": "",
    "flags": "",
    "state": 0,
    "fuzzy": false,
    "translated": false,
    "approved": false,
    "position": 12,
    "has_suggestion": false,
    "has_comment": false,
    "has_failing_check": false,
    "num_words": 111,
    "source_unit": "https://weblate.info.ucl.ac.be/api/units/35261/?format=api",
    "priority": 100,
    "id": 30171,
    "web_url": "https://weblate.info.ucl.ac.be/translate/cnp3-ebook/principlessecurity/fr/?checksum=6765991d3cd16b3d",
    "url": "https://weblate.info.ucl.ac.be/api/units/30171/?format=api",
    "explanation": "",
    "extra_flags": "",
    "pending": false,
    "timestamp": "2021-08-27T14:43:06.772873+02:00"
}