Overview
The infrastructure layer contains the services that coordinate DALP workflows, protect signing keys, prepare transactions, index blockchain events, route RPC traffic, and provide trusted feed data behind the platform interfaces.
DALP infrastructure services turn platform actions into reliable EVM operations. They sit below the Asset Console and Unified API, where they coordinate workflows, custody signing, transaction preparation, chain reads and writes, event indexing, network routing, account abstraction, and feed data.
How the layer fits together
The infrastructure layer is the execution backbone between DALP's business-facing platform and the EVM networks it operates on. A user action becomes a managed workflow: the platform validates the business context, then infrastructure services preserve progress, prepare the chain operation, request signatures through the configured custody path, submit the transaction, and update application read models after chain events are indexed.
This separation lets client teams review the platform in two parts. Product and compliance teams can focus on the Asset Console, Unified API, identity model, asset rules, and workflows. Technology, security, and operations teams can review signing, EVM connectivity, retries, read-model freshness, and deployment-specific providers.
Decision path for reviewers
Start with the operation you need to explain, then open the detail page for the service that owns that part of the operation.
| Review question | Read next | What the page defines |
|---|---|---|
| How does DALP keep a multi-step operation alive? | Execution Engine | Workflow orchestration, retry handling, failure recovery, and how lifecycle operations continue across infrastructure steps. |
| How are transactions prepared and sent? | Contract Runtime, then Transaction Signer | ABI encoding, contract calls, state queries, gas handling, nonce coordination, signing, and broadcasting. |
| Where are signing keys controlled? | Key Guardian, plus Account abstraction when smart accounts are in scope | Local, custody-provider, HSM-backed, and ERC-4337 signing paths, including which component controls key material and smart-account execution. |
| How does DALP reach EVM networks? | Chain Gateway and EVM RPC Node | RPC routing, upstream configuration, failover, direct JSON-RPC access, transaction submission, state queries, and supported EVM connectivity patterns. |
| How do chain events become application state? | Chain Indexer | Event ingestion, event-to-domain translation, historical blockchain state, and queryable read models for applications and integrations. |
| How are external prices and values supplied? | Feeds system | Price and foreign-exchange feed types, subject scopes, feed resolution, and where feed values enter DALP workflows. |
These detail pages are the public reference set for the overview above. If a claim is not covered in a detail page, the overview keeps the claim narrow instead of turning infrastructure into a catch-all promise.
Operating model
Operators configure and monitor these services. End users and integrations do not call infrastructure components directly; they use the Asset Console, Unified API, CLI, SDK, or documented integration endpoints.
That split keeps the user-facing workflow stable while operators can change custody backends, RPC providers, deployment topology, feed sources, and observability wiring behind it.

Ownership and limits
| Area | DALP infrastructure covers | Operator or provider owns | Not covered by this layer |
|---|---|---|---|
| Workflow execution | Coordinating infrastructure steps, retrying supported operations, and preserving progress. | Deployment sizing, operational runbooks, monitoring response, and incident escalation. | Business approval rules, legal sign-off, or asset-policy decisions. |
| Signing and custody | Preparing signing requests and routing them through the configured signer path. | Custody-provider configuration, HSM operation, key ceremonies, access policies, and contractual custody commitments. | A blanket custody guarantee or replacement for the selected custody provider's controls. |
| EVM connectivity | Routing contract calls, transaction submission, reads, retries, and failover through configured EVM access. | RPC provider selection, private-network access, endpoint credentials, throughput planning, and network availability commitments. | Non-EVM networks, bridge guarantees, settlement finality promises, or RPC-provider SLAs. |
| Indexed state and feed data | Turning supported chain events into read models and resolving configured feed values. | Feed-source contracts, data-vendor controls, source freshness monitoring, and deployment-specific reconciliation procedures. | Legal valuation, market-data licensing commitments, or external source accuracy promises. |
Component responsibilities
| Responsibility | Infrastructure services involved | What client reviewers should understand |
|---|---|---|
| Workflow continuity | Execution Engine, Transaction Signer | Multi-step lifecycle actions are coordinated, retried, and resumed without exposing raw infrastructure steps to users. |
| Signing and custody | Key Guardian, Transaction Signer, Account abstraction | Signing routes can use local signing, custody providers, HSM-backed signing, or ERC-4337 execution paths. |
| EVM network access | Contract Runtime, Chain Gateway, EVM RPC Node | Contract calls, transaction submission, RPC routing, failover, and chain reads are handled below the platform interfaces. |
| Queryable state and external values | Chain Indexer, Feeds system | Chain events become application read models, while feed data remains an operator-controlled input for workflows that need trusted external values. |
What stays outside this layer
Infrastructure services do not replace the platform's identity, compliance, asset, or policy model. They execute the operation after the platform has selected the asset, participant, compliance path, signer route, and chain context.
They also do not make legal, custody, RPC-provider, or availability promises by themselves. Those commitments depend on the selected deployment architecture, custody backend, network providers, monitoring setup, and contractual operating model.
Related architecture pages
- Component catalog for the full platform inventory
- Platform layer for the interfaces that call into infrastructure services
- Key flows for cross-service operation sequences
System Factory
How DALP creates a system for an organization, keeps assets scoped to that system, and uses the token factory registry to isolate multi-tenant reads.
DALP Execution Engine
The DALP Execution Engine orchestrates digital asset lifecycle operations with guaranteed delivery, automatic retry handling, and transparent failure recovery, ensuring complex multi-step processes complete reliably even through system failures.