Releases: rabbitmq/rabbitmqadmin-ng
v2.9.0
v2.9.0 (Aug 25, 2025)
Enhancements
- RabbitMQ 4.2 forward compatibility:
shovels list_all
andshovels list
now can render
local shovel rows
Upgrades
- RabbitMQ HTTP API client was upgraded to
0.44.0
v2.8.2
v2.8.1
v2.8.0
v2.7.2
v2.7.2 (Aug 6, 2025)
Bug Fixes
shovels declare_amqp091
panicked when the--source-exchange
argument was not provided,
even if--source-queue
was
v2.7.1
v2.7.1 (in development)
Bug Fixes
-
Improved handling of missing or impossible to load/parse
--tls-ca-cert-file
on the command line.The tool now properly handles cases where a CA certificate file path is not provided, making
CA certificate loading optional rather than required, which prevents crashes when TLS is used
without a custom CA certificate bundle -
show overview
could panic when run against a freshly booted RabbitMQ node that did not have certain
metrics/rates initialized and available. Now those metrics will use the default values for their types,
such as0
and0.0
for the counters, gauges, rates
Upgrades
- RabbitMQ HTTP API client was upgraded to
0.40.0
v2.7.0
v2.7.0 (Jul 15, 2025)
Enhancements
-
rabbitmqadmin.conf
now supports more TLS-related settings:ca_certificate_bundle_path
(corresponds to--tls-ca-cert-file
on the command line),
client_certificate_file_path
(corresponds to--tls-cert-file
), andclient_private_key_file_path
(corresponds to--tls-key-file
).As the names suggest, they are used to configure the CA certificate bundle file path, the client certificate file path,
and the client private key file path, respectively:[production] hostname = "(redacted)" port = 15671 username = "user-efe1f4d763f6" password = "(redacted)" tls = true ca_certificate_bundle_path = "/path/to/ca_certificate.pem" client_certificate_file_path = "/path/to/client_certificate.pem" client_private_key_file_path = "/path/to/client_key.pem"
To learn more, see RabbitMQ's TLS guide.
Bug Fixes
- Tool version was unintentionally missing from
-h
output (but present in its long counterpart,--help
) - The
tls
setting inrabbitmqadmin.conf
, a--use-tls
equivalent, was not respected when connecting to a node
in certain cases
v2.6.0
v2.6.0 (Jul 12, 2025)
Enhancements
-
New command,
passwords salt_and_hash
, that implements the password salting and hashing algorithm
used by RabbitMQ's internal authentication backend:rabbitmqadmin passwords salt_and_hash "sEkr37^va1ue" # => ┌───────────────┬──────────────────────────────────────────────────┐ # => │ Result │ # => ├───────────────┼──────────────────────────────────────────────────┤ # => │ key │ value │ # => ├───────────────┼──────────────────────────────────────────────────┤ # => │ password hash │ vRZC0bF0Ut4+6pmcQRSu87S/wRXdHRalgY5DV/5KDd5SzK69 │ # => └───────────────┴──────────────────────────────────────────────────┘
This value can be passed as a
--password-hash
when creating a user with theusers declare
command. -
users declare
now supports a new argument,--hashing-algorithm
, that accepts two
possible values:sha256
(the default) andsha512
:# RabbitMQ nodes must also be configured to use SHA-512 password hashing, # or this user won't be able to authenticate against them rabbitmqadmin users declare --username "username43742" --password "example_%^4@8s7" --hashing-algorithm "sha512"
Target RabbitMQ nodes must be configured to use the same hashing algorithm (SHA-256 is
used by default).
v2.5.0
v2.5.0 (Jul 11, 2025)
Enhancements
-
definitions export
now supports a new transformation:prepare_for_quorum_queue_migration
.rabbitmqadmin definitions export --transformations prepare_for_quorum_queue_migration,drop_empty_policies --stdout
This one not only strips off the CMQ-related keys
but also handles an incompatible"overflow"
/"x-overflow"
key value
and"queue-mode"
/"x-queue-mode"
keys, both not supported
by quorum queues.
Bug Fixes
export definitions
CLI interface was unintentionally different from that ofdefinitions export
.
Note thatexport definitions
only exists for better backwards compatibility withrabbitmqadmin
v1,
usedefinitions export
when possible.