Full Prompt
View Source1. Analyze the context and requirements of the i18n-setup task. 2. Outline the steps necessary to fulfill the request. 3. Generate the required configuration, classes, styles, or logic. 4. Highlight any edge cases or security best practices.