Backend: Block use of untrusted regexp in `spec:inputs:regex` syntax
Problem
The recently introduced spec:inputs:regex
syntax to validate string inputs with user-defined regex is vulnerable to DoS attack because we are using the regexp provided by the user as-is.
Solution
Wrap the regexp using Gitlab::UntrustedRegexp
object as per suggestion in !133122 (diffs, comment 1595301580)