Description
When using auth.protect() inside clerkMiddleware in a Next.js 16 app (proxy/Node.js runtime), unauthenticated users are redirected back to the current page URL instead of the sign-in page. Route protection is effectively bypassed — unauthenticated users can access protected pages.
Root Cause
Clerk resolves the sign-in redirect URL via NEXT_PUBLIC_CLERK_SIGN_IN_URL through process.env in two places:
clerkMiddleware.js:
const SIGN_IN_URL = process.env.NEXT_PUBLIC_CLERK_SIGN_IN_URL || "";
const signInUrl = resolvedParams.signInUrl || SIGN_IN_URL;
utils.js (handleMultiDomainAndProxy):
const signInUrl = (opts?.signInUrl) || SIGN_IN_URL;
return { proxyUrl, isSatellite, domain, signInUrl };
This signInUrl is spread over resolvedOptions in createAuthenticateRequestOptions, so requestState.signInUrl ends up as "" when the env var is unavailable.
In handleControlFlowErrors, when auth.protect() throws a sign-in redirect error, Clerk calls:
createRedirect({ signInUrl: requestState.signInUrl, baseUrl: clerkRequest.clerkUrl, ... })
.redirectToSignIn({ returnBackUrl })
With signInUrl = "", new URL("", "https://example.com/dashboard") resolves to https://example.com/dashboard — the current page — and the user is never redirected to sign-in.
Why NEXT_PUBLIC_CLERK_SIGN_IN_URL is unavailable in the proxy
In Next.js 16, the proxy runs in the Node.js runtime (previously Edge in Next.js ≤15). NEXT_PUBLIC_* variables are inlined at build time into browser bundles, but in the Node.js proxy context they must be available via process.env at runtime. This works in standalone Next.js apps where next dev runs from the project root and loads .env files directly. In monorepo setups (e.g. pnpm workspaces + Turbo), process.env.NEXT_PUBLIC_CLERK_SIGN_IN_URL is not reliably populated in the proxy runtime, so SIGN_IN_URL falls back to "".
This was confirmed by testing with @clerk/nextjs 7.0.8 and 7.0.12 — both versions exhibit the same behavior. It is NOT a version regression.
Environment
@clerk/nextjs: 7.0.8, 7.0.12 (both affected)
next: 16.2.2 (proxy/Node.js runtime — proxy.ts replaces middleware.ts)
- pnpm workspaces + Turbo monorepo
Steps to Reproduce
- Create a Next.js 16 app inside a pnpm workspace monorepo
- Add
proxy.ts with standard route protection:
import { clerkMiddleware, createRouteMatcher } from "@clerk/nextjs/server";
const isPublicRoute = createRouteMatcher(["/sign-in(.*)", "/sign-up(.*)"]);
export default clerkMiddleware((auth, request) => {
if (!isPublicRoute(request)) {
auth.protect();
}
});
- Set
NEXT_PUBLIC_CLERK_SIGN_IN_URL=/sign-in in .env
- Run via Turbo (
turbo run dev)
- Open an incognito window and navigate to a protected route
Expected Behavior
Unauthenticated users are redirected to /sign-in.
Actual Behavior
Error: NEXT_REDIRECT
digest: 'NEXT_REDIRECT;replace;https://example.com/dashboard;307;',
clerk_digest: 'CLERK_PROTECT_REDIRECT_TO_SIGN_IN',
returnBackUrl: 'https://example.com/dashboard'
The page renders normally — protected content visible to unauthenticated users.
Workaround
Bypass auth.protect() and redirect manually using NextResponse.redirect():
import { clerkMiddleware, createRouteMatcher } from "@clerk/nextjs/server";
import { NextResponse } from "next/server";
const isPublicRoute = createRouteMatcher(["/sign-in(.*)", "/sign-up(.*)"]);
export default clerkMiddleware(async (auth, request) => {
if (!isPublicRoute(request)) {
const { userId } = await auth();
if (!userId) {
return NextResponse.redirect(new URL("/sign-in", request.url));
}
}
});
Description
When using
auth.protect()insideclerkMiddlewarein a Next.js 16 app (proxy/Node.js runtime), unauthenticated users are redirected back to the current page URL instead of the sign-in page. Route protection is effectively bypassed — unauthenticated users can access protected pages.Root Cause
Clerk resolves the sign-in redirect URL via
NEXT_PUBLIC_CLERK_SIGN_IN_URLthroughprocess.envin two places:clerkMiddleware.js:utils.js(handleMultiDomainAndProxy):This
signInUrlis spread overresolvedOptionsincreateAuthenticateRequestOptions, sorequestState.signInUrlends up as""when the env var is unavailable.In
handleControlFlowErrors, whenauth.protect()throws a sign-in redirect error, Clerk calls:With
signInUrl = "",new URL("", "https://example.com/dashboard")resolves tohttps://example.com/dashboard— the current page — and the user is never redirected to sign-in.Why
NEXT_PUBLIC_CLERK_SIGN_IN_URLis unavailable in the proxyIn Next.js 16, the proxy runs in the Node.js runtime (previously Edge in Next.js ≤15).
NEXT_PUBLIC_*variables are inlined at build time into browser bundles, but in the Node.js proxy context they must be available viaprocess.envat runtime. This works in standalone Next.js apps wherenext devruns from the project root and loads.envfiles directly. In monorepo setups (e.g. pnpm workspaces + Turbo),process.env.NEXT_PUBLIC_CLERK_SIGN_IN_URLis not reliably populated in the proxy runtime, soSIGN_IN_URLfalls back to"".This was confirmed by testing with
@clerk/nextjs7.0.8 and 7.0.12 — both versions exhibit the same behavior.It is NOT a version regression.Environment
@clerk/nextjs: 7.0.8, 7.0.12 (both affected)next: 16.2.2 (proxy/Node.js runtime —proxy.tsreplacesmiddleware.ts)Steps to Reproduce
proxy.tswith standard route protection:NEXT_PUBLIC_CLERK_SIGN_IN_URL=/sign-inin.envturbo run dev)Expected Behavior
Unauthenticated users are redirected to
/sign-in.Actual Behavior
The page renders normally — protected content visible to unauthenticated users.
Workaround
Bypass
auth.protect()and redirect manually usingNextResponse.redirect():