Category: provider Model Studio Qwen TTS Voice Clone Use voice cloning models to replicate timbre from enrollment audio samples. Critical model names Use one of these exact model strings: qwen3-tts-vc-2026-01-22 qwen3-tts-vc-realtime-2026-01-15 Prerequisites Install SDK in a virtual environment: python3 -m venv .venv . .venv/bin/activate python -m pip install dashscope Set DASHSCOPE_API_KEY in your environment, or add dashscope_api_key to ~/.alibabacloud/credentials . Normalized interface (tts.voice_clone) Request text (string, required) voice_sample (string | bytes, required) enrollment sample voice_name (string, optional) stream (bool, optional) Response audio_url (string) or streaming PCM chunks voice_id (string) request_id (string) Operational guidance Use clean speech samples with low background noise. Respect consent and policy requirements for cloned voices. Persist generated voice_id and reuse for future synthesis requests. Local helper script Prepare a normalized request JSON and validate response schema: .venv/bin/python skills/ai/audio/alicloud-ai-audio-tts-voice-clone/scripts/prepare_voice_clone_request.py \ --text "Welcome to this voice-clone demo" \ --voice-sample "https://example.com/voice-sample.wav" Output location Default output: output/ai-audio-tts-voice-clone/audio/ Override base dir with OUTPUT_DIR . Validation mkdir -p output/alicloud-ai-audio-tts-voice-clone for f in skills/ai/audio/alicloud-ai-audio-tts-voice-clone/scripts/*.py ; do python3 -m py_compile " $f " done echo "py_compile_ok"
output/alicloud-ai-audio-tts-voice-clone/validate.txt Pass criteria: command exits 0 and output/alicloud-ai-audio-tts-voice-clone/validate.txt is generated. Output And Evidence Save artifacts, command outputs, and API response summaries under output/alicloud-ai-audio-tts-voice-clone/ . Include key parameters (region/resource id/time range) in evidence files for reproducibility. Workflow Confirm user intent, region, identifiers, and whether the operation is read-only or mutating. Run one minimal read-only query first to verify connectivity and permissions. Execute the target operation with explicit parameters and bounded scope. Verify results and save output/evidence files. References references/sources.md