Thanks for the updated script! 2.1 adds another method:
C:\Program Files\Duplicati 2>Duplicati.CommandLine.ServerUtil export --help
Description:
Export a backup configuration
Usage:
Duplicati.CommandLine.ServerUtil export <backups>... [options]
Arguments:
<backups> The backup id or name to export, use 'all' to export all backups
Options:
--encryption-passphrase <encryption-passphrase> The passphrase to use for encrypting the backup configuration []
--export-passwords Flag toggling the inclusion of sensitive values, such as passwords, defaults to true if a passphrase is supplied []
--overwrite Flag toggling the overwriting of existing files [default: False]
--unencrypted Flag toggling unencrypted export of configurations [default: False]
--destination <destination> The folder where the backup configuration should be exported to [default: C:\Program Files\Duplicati 2]
--password <password> The password to use for connecting to the server []
--hosturl <hosturl> The host URL to use [default: http://localhost:8200/]
--server-datafolder <server-datafolder> The server datafolder to use for locating the database []
--settings-file <settings-file> The settings file to use []
--insecure Accepts any TLS/SSL certificate (dangerous) [default: False]
--settings-encryption-key <settings-encryption-key> The encryption key to use for the settings file. Can also be supplied with environment variable SETTINGS_ENCRYPTION_KEY []
--secret-provider <secret-provider> The secret provider to use for reading secrets []
--secret-provider-cache <InMemory|None|Persistent> The secret provider cache to use for reading secrets [default: None]
--secret-provider-pattern <secret-provider-pattern> The pattern to use for the secret provider [default: $]
--host-cert <host-cert> The SHA1 hash of the host certificate to accept. Use * for any certificate, same as --insecure (dangerous) []
-?, -h, --help Show help and usage information