Units API.

See the Weblate's Web API documentation for detailed description of the API.

GET /api/units/35254/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, DELETE, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlessecurity/en/?format=api",
    "source": [
        "Alice and Bob are the first names that are used in examples for security techniques. They first appeared in a seminal paper by Diffie and Hellman [DH1976]_. Since then, Alice and Bob are the most frequently used names to represent the users who interact with a network. Other characters such as Eve or Mallory have been added over the years. We will explain their respective roles later."
    ],
    "previous_source": "",
    "target": [
        "Alice and Bob are the first names that are used in examples for security techniques. They first appeared in a seminal paper by Diffie and Hellman [DH1976]_. Since then, Alice and Bob are the most frequently used names to represent the users who interact with a network. Other characters such as Eve or Mallory have been added over the years. We will explain their respective roles later."
    ],
    "id_hash": 1045405912283820860,
    "content_hash": 1045405912283820860,
    "location": "../../principles/security.rst:48",
    "context": "",
    "note": "",
    "flags": "",
    "state": 100,
    "fuzzy": false,
    "translated": true,
    "approved": false,
    "position": 5,
    "has_suggestion": false,
    "has_comment": false,
    "has_failing_check": false,
    "num_words": 67,
    "source_unit": "https://weblate.info.ucl.ac.be/api/units/35254/?format=api",
    "priority": 100,
    "id": 35254,
    "web_url": "https://weblate.info.ucl.ac.be/translate/cnp3-ebook/principlessecurity/en/?checksum=8e8207236fc5333c",
    "url": "https://weblate.info.ucl.ac.be/api/units/35254/?format=api",
    "explanation": "",
    "extra_flags": "",
    "pending": false,
    "timestamp": "2021-08-27T14:43:06.585244+02:00"
}