Amazon Polly is a service that turns text into lifelike speech, allowing you to both create applications that talk and to build entirely new categories of speech-enabled products.
This connector allows you to use the following Polly capabilities:
Synthesize speech with multiple language and voices.
Create and use lexicons within your speech.
Create long audio files and save them to an Amazon S3 bucket.
This component is based on the AWS SDK for .NET v3.
To use the Amazon Polly connector you must have:
An AWS account
An AWS access key (access key ID and secret access key)
Some connector actions also require the input file to be stored in an S3 bucket. To use these capabilities, the AWS account must have access to get objects from the specified bucket.
See the AWS documentation for detailed information about getting started and developing apps with Amazon Polly.
To configure your connector to access Amazon Polly, you need the following AWS authentication information:
The access key ID of your AWS access key
The secret access key of your AWS access key
The AWS Region of the service endpoint to which you want to connect. To reduce latency, choose a region close to your application server. See the API documentation for the list of region names.
Use the above authentication information to fill in the AWSCredentials parameters in all of the public actions available in the AWSPollyConnector_IS module. The OutSystems parameters are:
Region
AccessKeyId
SecretAccessKey
The connector uses the values in these site properties as the default AWS credentials for Amazon Polly authentication.
Alternatively, you can specify different credentials when invoking an action from the connector in your logic by using the AWSCredentials input parameter.
Each time you run an action from the connector, authentication in Amazon Polly is performed as follows (see this logic in GetAmazonCredentials action):
If the AWSCredentials input parameter is passed (the parameter isn’t mandatory), these values are used for authentication.
Otherwise, the authentication uses the values in the Access Key, Secret Access Key, and Region site properties.
If the values in the site properties are not set, an exception is raised: “Invalid configuration. Please validate the values."
With this design, you have the flexibility to define a set of AWS credentials for specific actions, while using the ones configured in the site properties as default credentials for the remaining actions.