- We do that in order to allow the end user to decide wether they want to destroy the host based on who's the one calling onDestroy.
|
||
| 1 | 1 |
|
| 2 | 2 |
|
| 3 |
|
|
| 3 | 4 |
|
| 4 | 5 |
|
| 5 | 6 |
|
|
||
| 126 | 127 |
|
| 127 | 128 |
|
| 128 | 129 |
|
| 129 |
|
|
| 130 |
|
|
| 130 | 131 |
|
| 131 | 132 |
|
| 132 | 133 |
|
|
||
| 46 | 46 |
|
| 47 | 47 |
|
| 48 | 48 |
|
| 49 |
|
|
| 49 |
|
|
| 50 | 50 |
|
| 51 | 51 |
|
| 52 | 52 |
|
|
||
| 64 | 64 |
|
| 65 | 65 |
|
| 66 | 66 |
|
| 67 |
|
|
| 67 |
|
|
| 68 | 68 |
|
| 69 | 69 |
|
| 70 | 70 |
|
| 71 | 71 |
|
| 72 |
|
|
| 72 |
|
|
| 73 | 73 |
|
| 74 | 74 |
|
| 75 | 75 |
|
| 76 | 76 |
|
| 77 | 77 |
|
| 78 |
|
|
| 78 |
|
|
| 79 | 79 |
|
| 80 | 80 |
|
| 81 | 81 |
|