SettleMint
ArchitectureComponentsInfrastructure

Overview

The infrastructure layer contains the services that coordinate DALP workflows, protect signing keys, prepare transactions, index blockchain events, route RPC traffic, and provide trusted feed data behind the platform interfaces.

DALP infrastructure services turn platform actions into reliable EVM operations. They sit below the Asset Console and Unified API, where they coordinate workflows, custody signing, transaction preparation, chain reads and writes, event indexing, network routing, account abstraction, and feed data.

How the layer fits together

The infrastructure layer is the execution backbone between DALP's business-facing platform and the EVM networks it operates on. A user action becomes a managed workflow: the platform validates the business context, then infrastructure services preserve progress, prepare the chain operation, request signatures through the configured custody path, submit the transaction, and update application read models after chain events are indexed.

Rendering diagram...

This separation lets client teams review the platform in two parts. Product and compliance teams can focus on the Asset Console, Unified API, identity model, asset rules, and workflows. Technology, security, and operations teams can review signing, EVM connectivity, retries, read-model freshness, and deployment-specific providers.

Decision path for reviewers

Start with the operation you need to explain, then open the detail page for the service that owns that part of the operation.

Review questionRead nextWhat the page defines
How does DALP keep a multi-step operation alive?Execution EngineWorkflow orchestration, retry handling, failure recovery, and how lifecycle operations continue across infrastructure steps.
How are transactions prepared and sent?Contract Runtime, then Transaction SignerABI encoding, contract calls, state queries, gas handling, nonce coordination, signing, and broadcasting.
Where are signing keys controlled?Key Guardian, plus Account abstraction when smart accounts are in scopeLocal, custody-provider, HSM-backed, and ERC-4337 signing paths, including which component controls key material and smart-account execution.
How does DALP reach EVM networks?Chain Gateway and EVM RPC NodeRPC routing, upstream configuration, failover, direct JSON-RPC access, transaction submission, state queries, and supported EVM connectivity patterns.
How do chain events become application state?Chain IndexerEvent ingestion, event-to-domain translation, historical blockchain state, and queryable read models for applications and integrations.
How are external prices and values supplied?Feeds systemPrice and foreign-exchange feed types, subject scopes, feed resolution, and where feed values enter DALP workflows.

These detail pages are the public reference set for the overview above. If a claim is not covered in a detail page, the overview keeps the claim narrow instead of turning infrastructure into a catch-all promise.

Operating model

Operators configure and monitor these services. End users and integrations do not call infrastructure components directly; they use the Asset Console, Unified API, CLI, SDK, or documented integration endpoints.

That split keeps the user-facing workflow stable while operators can change custody backends, RPC providers, deployment topology, feed sources, and observability wiring behind it.

Infrastructure monitoring with real-time API metrics

Ownership and limits

AreaDALP infrastructure coversOperator or provider ownsNot covered by this layer
Workflow executionCoordinating infrastructure steps, retrying supported operations, and preserving progress.Deployment sizing, operational runbooks, monitoring response, and incident escalation.Business approval rules, legal sign-off, or asset-policy decisions.
Signing and custodyPreparing signing requests and routing them through the configured signer path.Custody-provider configuration, HSM operation, key ceremonies, access policies, and contractual custody commitments.A blanket custody guarantee or replacement for the selected custody provider's controls.
EVM connectivityRouting contract calls, transaction submission, reads, retries, and failover through configured EVM access.RPC provider selection, private-network access, endpoint credentials, throughput planning, and network availability commitments.Non-EVM networks, bridge guarantees, settlement finality promises, or RPC-provider SLAs.
Indexed state and feed dataTurning supported chain events into read models and resolving configured feed values.Feed-source contracts, data-vendor controls, source freshness monitoring, and deployment-specific reconciliation procedures.Legal valuation, market-data licensing commitments, or external source accuracy promises.

Component responsibilities

ResponsibilityInfrastructure services involvedWhat client reviewers should understand
Workflow continuityExecution Engine, Transaction SignerMulti-step lifecycle actions are coordinated, retried, and resumed without exposing raw infrastructure steps to users.
Signing and custodyKey Guardian, Transaction Signer, Account abstractionSigning routes can use local signing, custody providers, HSM-backed signing, or ERC-4337 execution paths.
EVM network accessContract Runtime, Chain Gateway, EVM RPC NodeContract calls, transaction submission, RPC routing, failover, and chain reads are handled below the platform interfaces.
Queryable state and external valuesChain Indexer, Feeds systemChain events become application read models, while feed data remains an operator-controlled input for workflows that need trusted external values.

What stays outside this layer

Infrastructure services do not replace the platform's identity, compliance, asset, or policy model. They execute the operation after the platform has selected the asset, participant, compliance path, signer route, and chain context.

They also do not make legal, custody, RPC-provider, or availability promises by themselves. Those commitments depend on the selected deployment architecture, custody backend, network providers, monitoring setup, and contractual operating model.

On this page