Units API.

See the Weblate's Web API documentation for detailed description of the API.

GET /api/units/2418372/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, DELETE, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "translation": "https://l10n.opensuse.org/api/translations/yast-scanner/master/pt_BR/?format=api",
    "source": [
        "Check that your firewall allows scanning via network."
    ],
    "previous_source": "",
    "target": [
        "Verifique se seu firewall permite digitalização via rede."
    ],
    "id_hash": 3280369552155847041,
    "content_hash": 3280369552155847041,
    "location": "src/modules/Scanner.rb:2564",
    "context": "",
    "note": "Determine if any kind of firewall seems to be active by calling\n\"iptables -n -L | grep -E -q 'DROP|REJECT'\"\nto find out if there are currently dropping or rejecting packet filter rules.\nOne might use a more specific test via\n\"iptables -n -L | grep -v '^LOG' | grep -E -q '^DROP|^REJECT'\"\nto match only for DROP and REJECT targets and exclude LOG targets\nbut it does not cause real problems when there is a false positive result here\nbecause all what happens it that then a needless firewall info popup would be shown.\nIf any kind of firewall seems to be active, show a popup message\nregarding scanning via network and firewall.\n@return true if any kind of firewall seems to be active",
    "flags": "",
    "labels": [],
    "state": 20,
    "fuzzy": false,
    "translated": true,
    "approved": false,
    "position": 161,
    "has_suggestion": true,
    "has_comment": false,
    "has_failing_check": false,
    "num_words": 8,
    "source_unit": "https://l10n.opensuse.org/api/units/12581923/?format=api",
    "priority": 100,
    "id": 2418372,
    "web_url": "https://l10n.opensuse.org/translate/yast-scanner/master/pt_BR/?checksum=ad8636ba4041a981",
    "url": "https://l10n.opensuse.org/api/units/2418372/?format=api",
    "explanation": "",
    "extra_flags": "",
    "pending": false,
    "timestamp": "2016-09-16T14:23:39Z"
}