- We do that in order to allow the end user to decide wether they want to destroy the host based on who's the one calling onDestroy.
|
|
||
| 1 |
|
1 |
|
| 2 |
|
2 |
|
|
3 |
|
|
| 3 |
|
4 |
|
| 4 |
|
5 |
|
| 5 |
|
6 |
|
|
|
||
| 126 |
|
127 |
|
| 127 |
|
128 |
|
| 128 |
|
129 |
|
| 129 |
|
|
|
|
130 |
|
|
| 130 |
|
131 |
|
| 131 |
|
132 |
|
| 132 |
|
133 |
|
|
|
||
| 46 |
|
46 |
|
| 47 |
|
47 |
|
| 48 |
|
48 |
|
| 49 |
|
|
|
|
49 |
|
|
| 50 |
|
50 |
|
| 51 |
|
51 |
|
| 52 |
|
52 |
|
|
|
||
| 64 |
|
64 |
|
| 65 |
|
65 |
|
| 66 |
|
66 |
|
| 67 |
|
|
|
|
67 |
|
|
| 68 |
|
68 |
|
| 69 |
|
69 |
|
| 70 |
|
70 |
|
| 71 |
|
71 |
|
| 72 |
|
|
|
|
72 |
|
|
| 73 |
|
73 |
|
| 74 |
|
74 |
|
| 75 |
|
75 |
|
| 76 |
|
76 |
|
| 77 |
|
77 |
|
| 78 |
|
|
|
|
78 |
|
|
| 79 |
|
79 |
|
| 80 |
|
80 |
|
| 81 |
|
81 |
|