diff --git a/Dockerfile b/Dockerfile
index a59d486..27ba980 100644
--- a/Dockerfile
+++ b/Dockerfile
@@ -1,4 +1,4 @@
-FROM golang:1.19.5-alpine as go-builder
+FROM golang:1.21.1-alpine as go-builder
WORKDIR /authorizer
COPY server server
COPY Makefile .
diff --git a/README.md b/README.md
index 2af26af..587ca5d 100644
--- a/README.md
+++ b/README.md
@@ -68,6 +68,7 @@ Deploy production ready Authorizer instance using one click deployment options a
| Railway.app |
| [docs](https://docs.authorizer.dev/deployment/railway) |
| Heroku |
| [docs](https://docs.authorizer.dev/deployment/heroku) |
| Render | [](https://render.com/deploy?repo=https://github.com/authorizerdev/authorizer-render) | [docs](https://docs.authorizer.dev/deployment/render) |
+| Koyeb |
| [docs](https://docs.authorizer.dev/deployment/koyeb) |
### Deploy Authorizer Using Source Code
diff --git a/server/handlers/playground.go b/server/handlers/playground.go
index b8ae5b8..14ce52f 100644
--- a/server/handlers/playground.go
+++ b/server/handlers/playground.go
@@ -21,7 +21,7 @@ func PlaygroundHandler() gin.HandlerFunc {
disablePlayground, err := memorystore.Provider.GetBoolStoreEnvVariable(constants.EnvKeyDisablePlayGround)
if err != nil {
log.Debug("error while getting disable playground value")
- return
+ disablePlayground = false
}
// if env set to false, then check if logged in as super admin, if logged in then return graphql else 401 error
diff --git a/server/utils/webhook.go b/server/utils/webhook.go
index 2571cf5..5d280a7 100644
--- a/server/utils/webhook.go
+++ b/server/utils/webhook.go
@@ -83,10 +83,8 @@ func RegisterEvent(ctx context.Context, eventName string, authRecipe string, use
}
req.Header.Set("Content-Type", "application/json")
- if webhook.Headers != nil {
- for key, val := range webhook.Headers {
- req.Header.Set(key, val.(string))
- }
+ for key, val := range webhook.Headers {
+ req.Header.Set(key, val.(string))
}
client := &http.Client{Timeout: time.Second * 30}