- We do that in order to allow the end user to decide wether they want to destroy the host based on who's the one calling onDestroy.
|
|
||
1 |
|
1 |
|
2 |
|
2 |
|
|
3 |
|
|
3 |
|
4 |
|
4 |
|
5 |
|
5 |
|
6 |
|
|
|
||
126 |
|
127 |
|
127 |
|
128 |
|
128 |
|
129 |
|
129 |
|
|
|
|
130 |
|
|
130 |
|
131 |
|
131 |
|
132 |
|
132 |
|
133 |
|
|
|
||
46 |
|
46 |
|
47 |
|
47 |
|
48 |
|
48 |
|
49 |
|
|
|
|
49 |
|
|
50 |
|
50 |
|
51 |
|
51 |
|
52 |
|
52 |
|
|
|
||
64 |
|
64 |
|
65 |
|
65 |
|
66 |
|
66 |
|
67 |
|
|
|
|
67 |
|
|
68 |
|
68 |
|
69 |
|
69 |
|
70 |
|
70 |
|
71 |
|
71 |
|
72 |
|
|
|
|
72 |
|
|
73 |
|
73 |
|
74 |
|
74 |
|
75 |
|
75 |
|
76 |
|
76 |
|
77 |
|
77 |
|
78 |
|
|
|
|
78 |
|
|
79 |
|
79 |
|
80 |
|
80 |
|
81 |
|
81 |
|