proxy_http_version 1.1; proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_set_header X-Forwarded-Proto $scheme; proxy_set_header Connection ""; # Defense-in-depth for CVE-2025-29927: strip the header attackers use to # skip Next.js middleware. Patched in next>=15.2.3, but neutralizing the # input at the edge means a future regression cannot reopen the bypass. proxy_set_header X-Middleware-Subrequest ""; proxy_cache_bypass $http_upgrade; proxy_read_timeout 60s; proxy_send_timeout 60s; proxy_connect_timeout 10s;