Permissions for @turbot/azure-applicationgateway

Taking a look at permissions and associated grant levels for each permission for Application Gateway Service:

PermissionGrant LevelHelp
microsoft.network/applicationgateways/readmetadataget application gateway.
microsoft.network/applicationgateways/writeadmincreate or update application gateway. this action will be whitelisted when azure explicit deny is released.
microsoft.network/applicationgateways/deleteadmindelete application gateway. this action will be whitelisted when azure explicit deny is released.
microsoft.network/applicationgateways/backendhealth/actionreadonlyget an application gateway backend health
microsoft.network/applicationgateways/getbackendhealthondemand/actionmetadataget an application gateway backend health on demand
microsoft.network/applicationgateways/start/actionoperatorstart an application gateway
microsoft.network/applicationgateways/stop/actionoperatorstop an application gateway
microsoft.network/applicationgateways/setsecuritycenterconfiguration/actionadminset application gateway securitycenter configuration
microsoft.network/applicationgateways/effectivenetworksecuritygroups/actionmetadataget effective security groups of an application gateway
microsoft.network/applicationgateways/effectiveroutetable/actionmetadataget effective route table of an application gateway
microsoft.network/applicationgateways/backendaddresspools/join/actionadminjoin application gateway backend address pool
microsoft.network/applicationgateways/providers/microsoft.insights/logdefinitions/readreadonlygets the logs for application gateway
microsoft.network/applicationgateways/providers/microsoft.insights/metricdefinitions/readmetadataread application gateway metric definitions
microsoft.resources/deployments/cancel/actionoperatoroperator level is safe as users still need the service specific write/delete permissions to deploy resources.
microsoft.resources/deployments/deleteoperatoroperator level is safe as users still need the service specific write/delete permissions to deploy resources.
microsoft.resources/deployments/operations/readmetadata
microsoft.resources/deployments/readmetadata
microsoft.resources/deployments/validate/actionoperator
microsoft.resources/deployments/writeoperatoroperator level is safe as users still need the service specific write permissions to deploy resources.
microsoft.resources/subscriptions/resourcegroups/readmetadata