Releases: rabbitmq/rabbitmqadmin-ng
v2.8.0
v2.7.2
v2.7.2 (Aug 6, 2025)
Bug Fixes
shovels declare_amqp091panicked when the--source-exchangeargument was not provided,
even if--source-queuewas
v2.7.1
v2.7.1 (Jul 17, 2025)
Bug Fixes
-
Improved handling of missing or impossible to load/parse
--tls-ca-cert-fileon the command line.The tool now properly handles cases where a CA certificate file path is not provided, making
CA certificate loading optional rather than required, which prevents crashes when TLS is used
without a custom CA certificate bundle -
show overviewcould panic when run against a freshly booted RabbitMQ node that did not have certain
metrics/rates initialized and available. Now those metrics will use the default values for their types,
such as0and0.0for the counters, gauges, rates
Upgrades
- RabbitMQ HTTP API client was upgraded to
0.40.0
v2.7.0
v2.7.0 (Jul 15, 2025)
Enhancements
-
rabbitmqadmin.confnow supports more TLS-related settings:ca_certificate_bundle_path(corresponds to--tls-ca-cert-fileon the command line),
client_certificate_file_path(corresponds to--tls-cert-file), andclient_private_key_file_path(corresponds to--tls-key-file).As the names suggest, they are used to configure the CA certificate bundle file path, the client certificate file path,
and the client private key file path, respectively:[production] hostname = "(redacted)" port = 15671 username = "user-efe1f4d763f6" password = "(redacted)" tls = true ca_certificate_bundle_path = "/path/to/ca_certificate.pem" client_certificate_file_path = "/path/to/client_certificate.pem" client_private_key_file_path = "/path/to/client_key.pem"
To learn more, see RabbitMQ's TLS guide.
Bug Fixes
- Tool version was unintentionally missing from
-houtput (but present in its long counterpart,--help) - The
tlssetting inrabbitmqadmin.conf, a--use-tlsequivalent, was not respected when connecting to a node
in certain cases
v2.6.0
v2.6.0 (Jul 12, 2025)
Enhancements
-
New command,
passwords salt_and_hash, that implements the password salting and hashing algorithm
used by RabbitMQ's internal authentication backend:rabbitmqadmin passwords salt_and_hash "sEkr37^va1ue" # => ┌───────────────┬──────────────────────────────────────────────────┐ # => │ Result │ # => ├───────────────┼──────────────────────────────────────────────────┤ # => │ key │ value │ # => ├───────────────┼──────────────────────────────────────────────────┤ # => │ password hash │ vRZC0bF0Ut4+6pmcQRSu87S/wRXdHRalgY5DV/5KDd5SzK69 │ # => └───────────────┴──────────────────────────────────────────────────┘
This value can be passed as a
--password-hashwhen creating a user with theusers declare
command. -
users declarenow supports a new argument,--hashing-algorithm, that accepts two
possible values:sha256(the default) andsha512:# RabbitMQ nodes must also be configured to use SHA-512 password hashing, # or this user won't be able to authenticate against them rabbitmqadmin users declare --username "username43742" --password "example_%^4@8s7" --hashing-algorithm "sha512"
Target RabbitMQ nodes must be configured to use the same hashing algorithm (SHA-256 is
used by default).
v2.5.0
v2.5.0 (Jul 11, 2025)
Enhancements
-
definitions exportnow supports a new transformation:prepare_for_quorum_queue_migration.rabbitmqadmin definitions export --transformations prepare_for_quorum_queue_migration,drop_empty_policies --stdoutThis one not only strips off the CMQ-related keys
but also handles an incompatible"overflow"/"x-overflow"key value
and"queue-mode"/"x-queue-mode"keys, both not supported
by quorum queues.
Bug Fixes
export definitionsCLI interface was unintentionally different from that ofdefinitions export.
Note thatexport definitionsonly exists for better backwards compatibility withrabbitmqadminv1,
usedefinitions exportwhen possible.
v2.4.0
v2.3.0
v2.2.1
v2.2.0
v2.2.0 (Jun 12, 2025)
Enhancements
connectionsis a new command group for operations on connectionschannelsis a new command group for operations on channelsoperator_policiesis a new command group for working with operator policies.
It matches thepoliciesgroup but acts on operator policiespolicies setandpolicies updateare two new aliases forpolicies declare. The former follows the naming
used byrabbitmqctland the latter reflects the fact that the command can be used to update an existing policy,
in particular, to override its definitionpolicies patchis a new command that updates a policy definition by merging the provided definition with the existing onepolicies delete_definition_keysis a new command that removes keys from a policy definitionpolicies delete_definition_keys_from_all_inis a new command that removes definition keys from all policies in a virtual hostpolicies update_definitionis a new command that updates a policy definition key; for multi-key updates, see `policies patchpolicies update_definitions_of_all_inis a new command that updates a definition key for all policies in a virtual hostpolicies declare_overrideis a new command that declares a policy that overrides another policypolicies declare_blanketis a new command that declares a low priority policy that matches all objects not matched
by any other policiesparameters list_allis a new command that lists all runtime parameters across all virtual hostsparameters list_inis a new command that lists runtime parameters of a given component (type)
in a specific virtual host