the last time the role run, I realized there was no need to revalidate all SANs even though only one SAN had been validated during the previous pass. It seems that let’s encrypt servers memorize the SANs which are already validated and the SANs which still need to be challenged.
Long story short, I need to renew the valid certificate, even though it is still valid until 01/24/2020 (which is strange because I thought there was a 90 days validity period and it was issued on 12/18/2019).
When using the acme_certificate module, whatever value I use for the field remaining_days (I tried 90 and 37), with the field force set to yes, the certificate is not renewed because I don’t get the challenge_data in the response.
So, is this a let's encrypt or ansible issue, or is this expected meaning I will soon lose my wildcard certificate until I can renew it (the current one expires on Christmas day)?
Also, the data you showed about the new certificate seems to indicate that it is valid until 2020-03-17.
The data I got from the ansible module shows a different story:
I never tried to create a new private key with an earlier certificate.
My process creates a new private key over the previous one each time I try to apply for a new certificate.
(in an overly simplistic view) Ansible is basically just a simplified scripting language (YAML), that wraps complicated tasks into a simple(r) single one (PlayBooks) - but it really doesn’t DO anything on its’ own.
You do need to review the ansible “script” to ensure it works as expected and doesn’t destroy/overwrite the private key file at any point and is putting things where you need and expect them to be.